When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints
sponsored by Sunbelt Software
WHITE PAPER:
Endpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.
Posted: 30 Jul 2009 | Published: 30 Jul 2009
|
|
|
The Top Five Virtualization Mistakes
sponsored by Vyatta Inc.
WHITE PAPER:
This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful.
Posted: 17 Jun 2009 | Published: 01 Jun 2007
|
|
|
Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER:
The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Posted: 26 Mar 2009 | Published: 01 Apr 2008
|
|
|
Cisco Continuous Data Protection for Files
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software.
Posted: 25 Mar 2009 | Published: 25 Mar 2009
|
|
|
Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by IBM
WHITE PAPER:
This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 13 Feb 2009 | Published: 13 Feb 2009
|
|
|
Understanding Web Application Security Challenges
sponsored by IBM
WHITE PAPER:
This paper explains what you can do to help protect your organization, and it discusses an approach for improving your organization's Web application security.
Posted: 13 Feb 2009 | Published: 13 Feb 2009
|
|
|
Support PCI Security Compliance with Enhanced Solutions from IBM
sponsored by IBM
WHITE PAPER:
This white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance.
Posted: 13 Feb 2009 | Published: 13 Feb 2009
|
|
|
Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER:
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008
|
|
|
3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER:
This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008
|
|
|
A Comprehensive Best Practice Approach to Business Resilience and Risk Mitigation
sponsored by IBM
WHITE PAPER:
This white paper serves as a comprehensive, best-practices approach to business resilience and risk mitigation. Common types of risk and the steps organizations must take to develop an effective risk mitigation strategy are discussed.
Posted: 29 May 2008 | Published: 01 Sep 2007
|
|
|
Security Beyond Corporate Boundaries: Using Citrix Application Delivery to Protect Corporate Information
sponsored by Citrix
WHITE PAPER:
Ensuring your data security goes beyond the implementation of firewalls and spyware. This white paper discusses key information on virtualization deployment, and offers tips to better manage your disaster recovery enviroment.
Posted: 05 May 2008 | Published: 01 Apr 2008
|
|
|
Acquire a global view of your organization's security state: the importance of security assessments
sponsored by IBM Software Group
WHITE PAPER:
Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
Posted: 09 Jan 2008 | Published: 09 Jan 2008
|
|
|
The importance of security assessments
sponsored by IBM
WHITE PAPER:
This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007
|
|
|
Drive business value with innovation for security defense
sponsored by IBM
WHITE PAPER:
This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
Posted: 06 Dec 2007 | Published: 01 Apr 2007
|
|
|
Extend Business Reach with a Robust Security Infrastructure
sponsored by IBM Software Group
WHITE PAPER:
This white paper discusses the advantages of a security management solution designed to deliver integrated, comprehensive solutions across a heterogeneous environment.
Posted: 03 Aug 2007 | Published: 01 Jul 2007
|
|
|
7 Key Factors to Software Protection
sponsored by Arxan
WHITE PAPER:
This white paper explores the magnitude and types of software piracy threats and details the seven key application security factors that must be considered during the development process.
Posted: 08 Jun 2007 | Published: 01 Jun 2007
|
|
|
Addressing the Insider Threat with NetIQ Operational Change Control Solutions
sponsored by SUSE
WHITE PAPER:
Download "Addressing the Insider Threat with NetIQ Operational Change Control Solutions" to get the expert advice you need to build a comprehensive management system that reduces and eliminates the risk of an insider threat.
Posted: 09 Aug 2006 | Published: 29 Mar 2006
|
|