The Cybercrime Arms Race
sponsored by Kaspersky
WHITE PAPER:
Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008
|
|
|
Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER:
This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007
|
|
|
New Security Solutions Using Intel vPro Technology
sponsored by Intel Corporation
WHITE PAPER:
Intel IT security specialists have identified significant new enterprise security use cases that we can implement using Intel vPro technology. We focused on three high-priority, high-value categories and successfully performed lab tests to validate each use case.
Posted: 02 Apr 2009 | Published: 02 Apr 2009
|
|
|
HP Integrity Systems: Family Guide
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
The HP Adaptive Infrastructure portfolio creates the foundation for delivering better business outcomes by enabling you to reduce operational costs, accelerate speed of IT change, and deliver higher quality of service to the business.
Posted: 16 Oct 2008 | Published: 16 Oct 2008
|
|
|
Enabling Carrier-class Communications with EX Switches
sponsored by Juniper Networks, Inc.
WHITE PAPER:
This white paper explains why a high-performance, highly available and secure network is essential for supporting a wide array of traffic types and a diverse user community.
Posted: 21 Oct 2008 | Published: 21 Oct 2008
|
|
|
Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER:
This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009
|
|
|
The Desktop Dilemma: Liberty vs. Lockdown
sponsored by Bit9, Inc.
WHITE PAPER:
CIOs and IT departments are under tremendous pressure to implement better processes over how software is deployed, managed, and used by their employees on their company computers. This document will outline a nine-step methodology that can make or break your transition to a well-managed and controlled Windows environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009
|
|
|
Digital Billboard Advertising - New Life for a Classic Medium
sponsored by Motorola Solutions
WHITE PAPER:
Read this paper to learn more about the emerging trend of digital billboard advertising and how it can enhance responsiveness, flexibility and profits.
Posted: 02 Mar 2009 | Published: 02 Mar 2009
|
|
|
Web Based Attacks
sponsored by Symantec Corporation
WHITE PAPER:
This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.
Posted: 11 Jun 2009 | Published: 01 Feb 2009
|
|
|
Achieving Cost Savings in Backup with Deduplication
sponsored by ExaGrid Systems, Inc.
WHITE PAPER:
This document discusses that dollars and time currently consumed by existing tape libraries can be far better utilized by moving to disk back-up with deduplication.
Posted: 09 Jul 2010 | Published: 09 Jul 2010
|
|