WHITE PAPER:
This paper explains what you can do to help protect your organization, and it discusses an approach for improving your organization's Web application security.
WHITE PAPER:
This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
WHITE PAPER:
This white paper explores the magnitude and types of software piracy threats and details the seven key application security factors that must be considered during the development process.
WHITE PAPER:
This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful.
WHITE PAPER:
This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
WHITE PAPER:
Download "Addressing the Insider Threat with NetIQ Operational Change Control Solutions" to get the expert advice you need to build a comprehensive management system that reduces and eliminates the risk of an insider threat.
WHITE PAPER:
Ensuring your data security goes beyond the implementation of firewalls and spyware. This white paper discusses key information on virtualization deployment, and offers tips to better manage your disaster recovery enviroment.
WHITE PAPER:
The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
WHITE PAPER:
This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
WHITE PAPER:
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.