Government Security White Papers

(View All Report Types)
Web Services Security: What's Required to Secure a Service-Oriented Architecture
sponsored by Oracle Corporation
WHITE PAPER: This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment.
Posted: 16 Mar 2009 | Published: 01 Jan 2008

Oracle Corporation

Managing Risk in Outsourced Manufacturing
sponsored by E2open
WHITE PAPER: This white paper looks at some of the management risks and challenges associated with outsourced manufacturing strategies and summarizes the proven ways used by companies that have successfully resolved or mitigated these risks.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

E2open

The Diverse and Exploding Digital Universe
sponsored by EMC Corporation
WHITE PAPER: This white paper, sponsored by EMC, is an update of IDC's inaugural forecast of the digital universe published in March 2007. In this year's update we discuss the implications for business, government, and society.
Posted: 28 Aug 2008 | Published: 27 Aug 2008

EMC Corporation

Small Business Networking: The Basics
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small business networking begins with a secure, reliable, fast data network foundation. This paper fleshes out 7 ways small business networking can transform your company.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Cisco Systems, Inc.

Budgeting, Forecasting and Reporting for Mid-Size Companies
sponsored by Adaptive Planning
WHITE PAPER: Organizations have conducted the budgeting and forecasting process through a readily-available, inexpensive and easy-to-use application the spreadsheet.
Posted: 18 Apr 2008 | Published: 01 Jan 2005

Adaptive Planning

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Posted: 26 Mar 2009 | Published: 01 Apr 2008

Symantec Corporation

Productivity, Internet Abuse, and How to Improve One by Eliminating the Other
sponsored by Bloxx, Inc.
WHITE PAPER: This white paper explains the effect of Internet abuse on employee productivity, which is huge and not fully appreciated.
Posted: 05 Sep 2008 | Published: 05 Sep 2008

Bloxx, Inc.

Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER: This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008

ISC2

HP Integrity Systems: Family Guide
sponsored by Hewlett Packard Enterprise
WHITE PAPER: The HP Adaptive Infrastructure portfolio creates the foundation for delivering better business outcomes by enabling you to reduce operational costs, accelerate speed of IT change, and deliver higher quality of service to the business.
Posted: 16 Oct 2008 | Published: 16 Oct 2008

Hewlett Packard Enterprise