Smurf White Papers

(View All Report Types)
The Cybercrime Arms Race
sponsored by Kaspersky
WHITE PAPER: Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Kaspersky

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

The Five Productivity Benefits of a Secure Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: A secure network foundation from Cisco enables you to easily and cost-effectively add new users and applications as needed.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

Integrating Dell Equallogic™ Sans with Citrix XENSERVER: Realizing Virtualization's Full Potential
sponsored by DellEMC and Intel®
WHITE PAPER: XenServer enables consolidation of server and other infrastructure resources, by combining servers and storage into resource pools that can be apportioned to the applications with the highest business need.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

DellEMC and Intel®

Network Security Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: Every SMB should have a written (and thoughtfully prepared) network-security plan in place. This white paper provides tips to help you develop one for your company.
Posted: 25 Sep 2008 | Published: 25 Sep 2008

Cisco Systems, Inc.

Security Bloopers: Five Common Mistakes
sponsored by Cisco Systems, Inc.
WHITE PAPER: IT professionals often question whether they have adequately protected their company's network. In the rush of the workday, what could you have missed? This document explains how to avoid five common mistakes to protect your network.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Cisco Systems, Inc.

The Desktop Dilemma: Liberty vs. Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: CIOs and IT departments are under tremendous pressure to implement better processes over how software is deployed, managed, and used by their employees on their company computers. This document will outline a nine-step methodology that can make or break your transition to a well-managed and controlled Windows environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

Configuration Audit and Control: 10 Critical Factors to Change and Configuration Management Success
sponsored by Tripwire, Inc.
WHITE PAPER: As businesses have instituted internal, industry, and government mandated regulatory compliance, the need for audit data to prove conformity has also become a necessity. Read this white paper to learn how configuration audit and control provides a single, independent source for enforcing and reporting on a change policy across an organization.
Posted: 14 Oct 2008 | Published: 14 Oct 2008

Tripwire, Inc.

Cisco Continuous Data Protection for Files
sponsored by Cisco Systems, Inc.
WHITE PAPER: Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software.
Posted: 25 Mar 2009 | Published: 25 Mar 2009

Cisco Systems, Inc.

Tap Aggregation and Filtering to Enable Deep Packet Inspection (DPI)
sponsored by Gigamon
WHITE PAPER: Read this brief paper to learn how network monitoring using DPI analyzers is a mission critical application that is tailor-made for the Data Access Network (DAN) architecture and saves substantial amounts of money for the telecom carrier.
Posted: 01 Jul 2009 | Published: 01 Jul 2009

Gigamon