Your Search returned 1 results from our Editorial content

Sort By
  • Close-button

    IT Security Frameworks and Standards

   

Your Search returned 34 results from our White Paper Library

Sort By
  • Close-button

    IT Security Frameworks and Standards

Acronis Software

Disk Backups

Hidden Costs of Virtualization

Checkout the benefits of virtualization and master the tricks of planning a perfect virtualization project. Gain tips on intelligent budgeting to handle...


Juniper Networks

Networking & Communications

JUNOS Software: The Power of One Operating System

Discover how to reduce Complexity, Achieve Operational Excellence, and Dynamically Deliver Services with Lower total cost of ownership (TCO). This whitepaper...


Symantec Corporation

Cybercrime

Norton Cybercrime Report 2011

431 million people around the world become victims of cybercrime every year. This report reveals the latest stats from around the world, with a tailored...


Symantec.cloud

Security

10 Things You Have to do Today to Protect Your Business...

Cloud computing, consumerization, tablets and social media are but a few of the changes challenging traditional IT and security. Discover the 10 things...


Tripwire

Cybercrime

10 Steps For Early Incident Detection

Why are there so many stories of companies suffering cyber-attacks in the media? Most aren’t discovered until a third party reports them, usually weeks...


IBM

Security

IBM X-Force 2013 Mid-Year Trend and Risk Report

Read this report for an in-depth analysis of the latest security threats and trends.


Websense

Mobile Device Management

A 3-Step Plan For Mobile Security

This paper provides a three step plan to establish a mobile security strategy that encompasses both corporate and personal devices.


VeriSign

Security

Five Steps To Prepare For A DDoS Attack

This article provides five key DDoS mitigation steps enterprises can take now to prepare for a future attack.


VeriSign

Security

DDoS Mitigation: Best Practices For A Rapidly Changing Threat...

This white paper presents best practices to assist organizations in combating the DDoS threat while minimizing impact on business operations.


Symantec Corporation

Change Management

Best Practices for Implementing a Security Process

This paper looks at aligning security processes, the human element of security, with the latest security technologies – creating a secure barrier against...


Previous 1 3 4
no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/1432/exablox
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/1592/pivotal
  • /view_company_report/506/qualys
  • /view_company_report/1242/teradata

Poll

Is the internet a disappointment?