Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola Solutions
WHITE PAPER:
This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007
|
|
|
How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER:
Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020
|
|
|
Web Based Attacks
sponsored by Symantec Corporation
WHITE PAPER:
This report describes the anatomy of web based attacks and examines some of the factors that have influenced a shift toward this type of attack over the last year.
Posted: 11 Jun 2009 | Published: 01 Feb 2009
|
|
|
The Virtual Office Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER:
The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.
Posted: 10 Oct 2008 | Published: 10 Oct 2008
|
|
|
Citrix GoToMyPCCorporate - Security White Paper
sponsored by Citrix Online - GotoMyPC
WHITE PAPER:
In this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control.
Posted: 19 Jun 2008 | Published: 01 Jan 2006
|
|
|
An EMC Perspective on Data De-Duplication for Backup
sponsored by EMC Corporation
WHITE PAPER:
This paper explores the factors that are driving the need for de-duplication and the benefits of data de-duplication as a feature of an organization's backup strategy.
Posted: 19 Jun 2008 | Published: 01 May 2008
|
|
|
Network Security for Small Business
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Achieving effective network security for small business requires a solution designed to fit your needs today and can adapt to tomorrow's threats. This paper examines how best to protect your network, as well as the benefits a secure environment offers.
Posted: 25 Sep 2008 | Published: 25 Sep 2008
|
|
|
Security Threat Report: July 2008
sponsored by Sophos
WHITE PAPER:
This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008
|
|
|
Virtual Desktop Infrastructure
sponsored by VMware, Inc.
WHITE PAPER:
Learn about the benefits of desktop virtualization: administrative and management tasks are reduced; applications can quickly be added, deleted, upgraded, and patched; security is centralized; and data is easier to safeguard and back up.
Posted: 07 Oct 2008 | Published: 03 Oct 2008
|
|
|
Advanced Load Balancing: 8 Must-have Features for Today's Network Demands
sponsored by Citrix
WHITE PAPER:
Today’s web applications require more than simple load balancing. This white paper describes the 8 must-have features of a more comprehensive application delivery solution.
Posted: 19 Sep 2008 | Published: 07 Jun 2010
|
|