Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola Solutions
WHITE PAPER:
This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007
|
|
|
eGuide: Expert Tips for Deploying Secure Messaging Technologies
sponsored by TechTarget Security
WHITE PAPER:
This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
Posted: 24 Oct 2008 | Published: 22 Oct 2008
|
|
|
Multilayer Security: Enabling a Sustainable Alternative to Paper-Based Customer Communications
sponsored by VeriSign EMEA
WHITE PAPER:
A multilayer security approach delivers the end-to-end solution needed to comprehensively target various security issues.
Posted: 04 Dec 2008 | Published: 13 Nov 2008
|
|
|
Enabling Developer Access to Production Data
sponsored by Voltage Security, Inc.
WHITE PAPER:
With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
Posted: 15 Dec 2008 | Published: 15 Dec 2008
|
|
|
The Perfect Storm - Why Now Is The Time For Open Source
sponsored by Red Hat and Intel
WHITE PAPER:
Open source is recognized for its ease of use, high performance, and affordability, especially amidst turbulent economic conditions. The high value of open source, coupled with economic and organizational pressure, represents a "perfect storm" for CIOs, giving them the opportunity to deploy high-performing, cost-effective open source solutions.
Posted: 19 Jun 2009 | Published: 01 Jun 2009
|
|
|
Virtual Desktop Infrastructure
sponsored by VMware, Inc.
WHITE PAPER:
Learn about the benefits of desktop virtualization: administrative and management tasks are reduced; applications can quickly be added, deleted, upgraded, and patched; security is centralized; and data is easier to safeguard and back up.
Posted: 07 Oct 2008 | Published: 03 Oct 2008
|
|
|
Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER:
This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009
|
|
|
Implementing an identity management solution
sponsored by SAP America, Inc.
WHITE PAPER:
This document describes the SAP NetWeaver Identity Management products, which cover most of the core functionality for implementing an identity management solution, including a virtual directory.
Posted: 18 Jun 2008 | Published: 01 Sep 2007
|
|
|
Cisco IT GRC Security Assessment Service
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Effectively addressing security threats and compliance obligations with limited resources can be challenging. This paper describes how to reduce risk and cost of security and compliance by aligning business and technology information protection strategies.
Posted: 15 Jun 2009 | Published: 12 Jun 2009
|
|
|
Enterprise Resource Planning Software: Taking the Plunge
sponsored by VAI, Vormittag Associates, Inc.
WHITE PAPER:
Check out this white paper to discover the many benefits of Enterprise Resource Planning (ERP) software.
Posted: 20 Mar 2009 | Published: 20 Mar 2009
|
|