Netsky White Papers

(View All Report Types)
Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007

Symantec Corporation

Best Practices in Contract Management: How to Shrink Your Sales Cycle through Smart Contract Management
sponsored by SpringCM
WHITE PAPER: This white paper discusses the seven best practices in contract management. It's time for you to think about how to manage your contracts more effectively, close more deals, and get more cash. Learn how in this paper.
Posted: 16 Apr 2008 | Published: 11 Oct 2010

SpringCM

Symantec Internet Security Threat Report: Trends for 2008
sponsored by Symantec Corporation
WHITE PAPER: This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
Posted: 09 Jun 2009 | Published: 01 Apr 2009

Symantec Corporation

Solution Guide - Choosing Storage for Dell Database Solutions with Dell™ PowerVault™ and Dell/EMC Storage
sponsored by DellEMC and IntelĀ®
WHITE PAPER: This white paper provides a guide for choosing an appropriate storage architecture for Dell Database Solutions deployed on Dell PowerEdge servers with Dell PowerVault and Dell/EMC storage.
Posted: 27 Aug 2008 | Published: 27 Aug 2008

DellEMC and IntelĀ®

Driving Business Success with Software Reuse
sponsored by IBM
WHITE PAPER: This white paper explains how Software Reuse and its underlying fundamentals have evolved dramatically. It also discusses the benefits of constructing critical enterprise software applications through reusable parts.
Posted: 30 Jul 2008 | Published: 01 Mar 2008

IBM

Stopping data leakage: Exploiting your existing security investment
sponsored by Sophos
WHITE PAPER: This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
Posted: 01 Oct 2008 | Published: 01 Jun 2008

Sophos

HP BladeSystem c-Class SAN Connectivity Technology Brief
sponsored by PC Connection and HP
WHITE PAPER: This paper describes the hardware and software required to connect HP BladeSystem c--Class server blades to Storage Area Networks1 (SANs) using Fibre Channel (FC) interconnect technology.
Posted: 15 Apr 2008 | Published: 01 Jun 2007

PC Connection and HP

Reinventing the Desktop
sponsored by Pano Logic, Inc
WHITE PAPER: Pano is a solution built specifically for desktop virtualization and it consists of a palm-sized device that connects a user's keyboard, mouse, monitor, and USB.
Posted: 28 Feb 2008 | Published: 01 Jan 2007

Pano Logic, Inc

IBM Internet Security Systems X-Force® 2008 Mid-Year Trend Statistics
sponsored by IBM
WHITE PAPER: Read this white paper to discover the implications, so you can enhance information security for the rest of 2008 and beyond.
Posted: 27 Oct 2008 | Published: 27 Oct 2008

IBM

Protecting Web Applications from Attack and Misuse
sponsored by Citrix
WHITE PAPER: Application-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.
Posted: 27 Jul 2006 | Published: 01 Jul 2006

Citrix