Your Search returned 0 results from our Editorial content

Sort By

Your Search returned 34 results from our White Paper Library

Sort By
EMC Corporation

Data Deduplication

The ROI of Backup Redesign Using Deduplication: An EMC Data...

This IDC White Paper takes a look at the specific business value associated with using Data Domain systems as part of rapidly evolving backup and data...



How Encrypting Content in Transit and at Rest Reduces Liabilities...

This white paper explains how to implement effective encryption to ensure your organization reduces costs and liability. Discover four top encryption points...



The Big Data Security Challenge: Make SIEM Work For You...

Big Data is not only a challenge for customer-facing organizations—but for security teams as well. See why and how to overcome it in this paper.



Optimize Log management: How To Collect and Store Logs Securely...

This paper looks at concerns attributed to log management and explains how to collect and store logs securely.



Defending Against Today’s Targeted Phishing Attacks

“Is this email a phish or is it legitimate?” It’s a the question that is being asked more and more often. See how to work it out.

Symantec Corporation

Application Security

The Vulnerability Gap: Website Security Risks In The Asia...

Featuring survey results of 100 senior IT executives in Japanese enterprises, this paper analyses the gap between perceptions of Web security and the reality....



The Unwitting Danger Within Understanding and Mitigating...

This eBook from Rapid7explores the different kinds of user-based risks in today's corporate environment.


Storage Area Network (SAN)

Maximizing Your Virtual Environment for the Latest Business...

This IDC paper outlines challenges with virtualized IT environments and how to address these issues.


Network Storage

Deep Dive - Veeam Backup & Replication with NetApp Storage...

This paper guides you through the necessary steps to test and evaluate Veeam Backup & Replication storage snapshots.



Streamlining Information Protection Through A Data-Centric...

This paper looks at covers the use of FPE and tokenization for field-level data protection, as well as both static and real-time data masking

Previous 1 3 4



Thinking Different

In 2016, get ready for the mobile API explosion

Jon Collins’ in-depth look at tech and society


China Rising

How far can China push its bid to control the internet?

Phil Muncaster reports on China and beyond


Most Recent Comments


Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/775/aruba-networks
  • /view_company_report/1450/carbon-black
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/2095/simply-hired
  • /view_company_report/419/splunk
  • /view_company_report/1352/tegile-systems


Does Altruistic Malware introduce more risk despite good intentions?