Your Search returned 0 results from our Editorial content

Sort By

Your Search returned 13 results from our White Paper Library

Sort By
EMC Corporation

Data Deduplication

The ROI of Backup Redesign Using Deduplication: An EMC Data...

This IDC White Paper takes a look at the specific business value associated with using Data Domain systems as part of rapidly evolving backup and data...



How Encrypting Content in Transit and at Rest Reduces Liabilities...

This white paper explains how to implement effective encryption to ensure your organization reduces costs and liability. Discover four top encryption points...



The Big Data Security Challenge: Make SIEM Work For You...

Big Data is not only a challenge for customer-facing organizations—but for security teams as well. See why and how to overcome it in this paper.



Optimize Log management: How To Collect and Store Logs Securely...

This paper looks at concerns attributed to log management and explains how to collect and store logs securely.


Desktop Virtualization

Top 10 reasons to Strengthen Information Security with Desktop...

In this paper we explore ten reasons why desktop virtualization should be the foundation of your layered approach to information security.



Defending Against Today’s Targeted Phishing Attacks

“Is this email a phish or is it legitimate?” It’s a the question that is being asked more and more often. See how to work it out.



Five Steps To Prepare For A DDoS Attack

This article provides five key DDoS mitigation steps enterprises can take now to prepare for a future attack.



DDoS Mitigation: Best Practices For A Rapidly Changing Threat...

This white paper presents best practices to assist organizations in combating the DDoS threat while minimizing impact on business operations.

Symantec Corporation

Application Security

The Vulnerability Gap: Website Security Risks In The Asia...

Featuring survey results of 100 senior IT executives in Japanese enterprises, this paper analyses the gap between perceptions of Web security and the reality....



The Unwitting Danger Within Understanding and Mitigating...

This eBook from Rapid7explores the different kinds of user-based risks in today's corporate environment.

Previous 1

Most Recent Comments


Resource Center

  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/1432/exablox
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/1592/pivotal
  • /view_company_report/506/qualys
  • /view_company_report/1242/teradata


Is the internet a disappointment?