Security Compliance White Papers

(View All Report Types)
EZ Insight Report: IBM Rational Jazz Strategy for Collaborative Application Lifecycle Management (Full report)
sponsored by IBM
WHITE PAPER: Analyst report which includes new or expanded discussion of Open Services for Lifecycle Collaboration, Rational Requirements Manager, Quality Manager, Insight, and IBM Software Delivery Services for Cloud and Rational Asset Manager.
Posted: 13 Mar 2009 | Published: 13 Mar 2009

IBM

Decision Matrix: Selecting an Enterprise Content Management Vendor (Competitor Focus)
sponsored by EMC Corporation
WHITE PAPER: Due to demand from enterprises which want to invest in the most appropriate Content Management solution, Datamonitor has developed the ECM Decision Matrix and selection tool.
Posted: 20 May 2008 | Published: 01 Dec 2006

EMC Corporation

Embracing the Cloud: Top Seven Imperatives for an Organization
sponsored by Wipro
WHITE PAPER: This paper analyzes the impact of the cloud on the IT Ecosystem and provides answers to what an organization needs to do in embracing a right cloud strategy.
Posted: 12 Jun 2009 | Published: 01 Mar 2009

Wipro

10 Steps to Managing Risk and Regulatory Compliance in Blogs and Wikis
sponsored by Techrigy
WHITE PAPER: Risks related to collaboration tools like blogs and wikis can create legal liability and regulatory problems. Learn how to gain competitive advantage from these community-building tools while ensuring the content in them is appropriate and secure.
Posted: 08 Oct 2007 | Published: 01 Sep 2007

Techrigy

Automated Penetration Testing; Can IT Afford Not To?
sponsored by Core Security Technologies
WHITE PAPER: This paper contains an overview of penetration testing, a summary of vulnerabilities that can be revealed through penetration testing, and the business and technical benefits of performing penetration testing across your infrastructure.
Posted: 18 Jan 2007 | Published: 01 Jan 2007

Core Security Technologies

7 Essential Steps of Network Security
sponsored by Qualys
WHITE PAPER: This paper details the essential aspects of putting into place a measurable and sustainable 7 step vulnerability management program, and demonstrates how QualysGuard automates everything you need along the way.
Posted: 07 Nov 2008 | Published: 07 Nov 2008

Qualys

Capturing Business Value from Inbound Documents with OCR and Dynamic Document Capture
sponsored by Esker Inc.
WHITE PAPER: With this white paper, Gain insight into the operational efficiencies resulting from document process automation, including cost savings and error reduction.
Posted: 16 Apr 2008 | Published: 01 Apr 2008

Esker Inc.

Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage
sponsored by Symantec Corporation
WHITE PAPER: Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.
Posted: 17 May 2006 | Published: 01 Mar 2006

Symantec Corporation

Top 5 IT Considerations for Secure Wireless Email
sponsored by Sybase iAnywhere
WHITE PAPER: The use of wireless email has exploded over the last several years and IT has struggled to keep up with the security challenges. Read this white paper to learn about the top five considerations for secure wireless email.
Posted: 06 Jun 2007 | Published: 01 Jan 2006

Sybase iAnywhere

Virtualization Is Key to Storage Consolidation
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Many organizations have consolidated their storage infrastructures and a growing number see storage virtualization as an essential part of an effective consolidation strategy. Read this white paper to learn the benefits delivered from this strategy.
Posted: 01 Nov 2007 | Published: 01 Nov 2007

Hewlett Packard Enterprise