Voice Biometrics White Papers

(View All Report Types)
How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020

Veracode, Inc.

AT&T Business Continuity Survey: 2008
sponsored by AT&T Corp
WHITE PAPER: The goal of this business continuity survey was to learn what these executives were doing about business continuity, and how it figured in their overall IT strategy.
Posted: 06 Oct 2008 | Published: 04 Oct 2008

AT&T Corp

Enterprise Backup and Recovery Considerations: How to Maintain Your Restore-Readiness
sponsored by Sirius Computer Solutions
WHITE PAPER: IT systems are vulnerable to a variety of disruptions. This paper will focus on common processes and procedures that should be part of any effective enterprise backup/restore system.
Posted: 08 Jul 2009 | Published: 26 Jun 2009

Sirius Computer Solutions

Control IT With Configuration Audit and Control
sponsored by Tripwire, Inc.
WHITE PAPER: Learn how establishing a change policy that enforces all changes are auditable and authorized, and all unauthorized changes are investigated, can enable IT organizations to reach compliance, security, and availability goals
Posted: 01 Mar 2007 | Published: 01 Feb 2007

Tripwire, Inc.

Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER: According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

2006 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Topics covered in the survey range from the amount of information security education and training received to the value of certifications to new areas where additional training is required.
Posted: 28 Dec 2007 | Published: 01 Oct 2006

ISC2

Enterprise Portal Rationalization: Using a Service-Oriented Architecture to Stop Web Asset Sprawl
sponsored by Oracle Corporation
WHITE PAPER: This paper provides an overview of the problem of Web sprawl, and an account of the rationalization strategies organizations are adopting to gain the upper hand on sprawl. Adopting a service-oriented architecture based on integrated application platform infrastructure emerges as the key to rationalizing sprawl.
Posted: 03 Apr 2009 | Published: 01 Mar 2009

Oracle Corporation

Business Intelligence: The Definitive Guide for Midsize Organizations
sponsored by SAP America, Inc.
WHITE PAPER: Business intelligence (BI) allows organizations to better understand, analyze, and even predict what's occurring in their company.
Posted: 09 Jun 2008 | Published: 01 Jun 2008

SAP America, Inc.

Leveraging Information for Innovation and Competitive Advantage
sponsored by IBM
WHITE PAPER: This paper by Hurwitz & Associates provides an overview of what is required to create an environment that leverages information dynamically in your enterprise.
Posted: 23 Apr 2008 | Published: 01 Jan 2007

IBM

Managed Office Protection: Switching from AV to SaaS
sponsored by Panda Security
WHITE PAPER: Antivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS.
Posted: 24 Jun 2009 | Published: 01 Mar 2008

Panda Security