Your Search returned 1 results from our Editorial content

Sort By
  • Close-button

    IT Security Frameworks and Standards

   

Your Search returned 36 results from our White Paper Library

Sort By
  • Close-button

    IT Security Frameworks and Standards

Acronis Software

Disk Backups

Hidden Costs of Virtualization

Checkout the benefits of virtualization and master the tricks of planning a perfect virtualization project. Gain tips on intelligent budgeting to handle...


Juniper Networks

Networking & Communications

JUNOS Software: The Power of One Operating System

Discover how to reduce Complexity, Achieve Operational Excellence, and Dynamically Deliver Services with Lower total cost of ownership (TCO). This whitepaper...


Symantec Corporation

Cybercrime

Norton Cybercrime Report 2011

431 million people around the world become victims of cybercrime every year. This report reveals the latest stats from around the world, with a tailored...


Symantec.cloud

Security

10 Things You Have to do Today to Protect Your Business...

Cloud computing, consumerization, tablets and social media are but a few of the changes challenging traditional IT and security. Discover the 10 things...


Tripwire

Cybercrime

10 Steps For Early Incident Detection

Why are there so many stories of companies suffering cyber-attacks in the media? Most aren’t discovered until a third party reports them, usually weeks...


IBM

Security

IBM X-Force 2013 Mid-Year Trend and Risk Report

Read this report for an in-depth analysis of the latest security threats and trends.


Websense

Mobile Device Management

A 3-Step Plan For Mobile Security

This paper provides a three step plan to establish a mobile security strategy that encompasses both corporate and personal devices.


Symantec Corporation

Change Management

Best Practices for Implementing a Security Process

This paper looks at aligning security processes, the human element of security, with the latest security technologies – creating a secure barrier against...


Symantec Corporation

Application Security

The Vulnerability Gap: Website Security Risks In The Asia...

Featuring survey results of 100 senior IT executives in Japanese enterprises, this paper analyses the gap between perceptions of Web security and the reality....


Rapid7

Security

The Unwitting Danger Within Understanding and Mitigating...

This eBook from Rapid7explores the different kinds of user-based risks in today's corporate environment.


Previous 1 3 4
no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/1592/pivotal
  • /view_company_report/506/qualys
  • /view_company_report/1242/teradata

Poll

Would you buy a modular phone?