Iris Scanning White Papers

(View All Report Types)
How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020

Veracode, Inc.

Control IT With Configuration Audit and Control
sponsored by Tripwire, Inc.
WHITE PAPER: Learn how establishing a change policy that enforces all changes are auditable and authorized, and all unauthorized changes are investigated, can enable IT organizations to reach compliance, security, and availability goals
Posted: 01 Mar 2007 | Published: 01 Feb 2007

Tripwire, Inc.

Managed Office Protection: Switching from AV to SaaS
sponsored by Panda Security
WHITE PAPER: Antivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS.
Posted: 24 Jun 2009 | Published: 01 Mar 2008

Panda Security

Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions
sponsored by Tango/04 Computing Group
WHITE PAPER: Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.
Posted: 19 Sep 2007 | Published: 01 Sep 2007

Tango/04 Computing Group

Enterprise Backup and Recovery Considerations: How to Maintain Your Restore-Readiness
sponsored by Sirius Computer Solutions
WHITE PAPER: IT systems are vulnerable to a variety of disruptions. This paper will focus on common processes and procedures that should be part of any effective enterprise backup/restore system.
Posted: 08 Jul 2009 | Published: 26 Jun 2009

Sirius Computer Solutions

Leadership Makes the Difference during Times of Global Financial Crisis: Optimizing Business Cycles through Technology Investment
sponsored by SAP America, Inc.
WHITE PAPER: Investing in the right IT platform and end-to-end business processes enables companies to simplify the IT landscape and reduce total it cost.
Posted: 26 Jan 2009 | Published: 23 Jan 2009

SAP America, Inc.

Business Intelligence: The Definitive Guide for Midsize Organizations
sponsored by SAP America, Inc.
WHITE PAPER: Business intelligence (BI) allows organizations to better understand, analyze, and even predict what's occurring in their company.
Posted: 09 Jun 2008 | Published: 01 Jun 2008

SAP America, Inc.

Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER: This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008

Enigma, Inc.

Enabling Developer Access to Production Data
sponsored by Voltage Security, Inc.
WHITE PAPER: With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Voltage Security, Inc.

Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER: According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM