Compliance (Security) White Papers

(View All Report Types)
How Web Security Improves Productivity and Compliance
sponsored by OpenText Security Solutions
WHITE PAPER: This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.
Posted: 30 May 2013 | Published: 31 Dec 2012

OpenText Security Solutions

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Why Virtualize?
sponsored by AT&T Corp
WHITE PAPER: This paper explains the potential benefits and key decisions associated with virtualization projects and how to get started.
Posted: 13 Oct 2010 | Published: 13 Oct 2010

AT&T Corp

Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements
sponsored by Oracle Corporation
WHITE PAPER: Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy.
Posted: 09 Apr 2012 | Published: 31 Jan 2012

Oracle Corporation

Data Loss Prevention 2.0: Preventing the loss of confidential information via webmail, Facebook, wikis and blogs
sponsored by Code Green Networks, Inc.
WHITE PAPER: In today’s technology rich environment organizations are finding employees often post sensitive company information to insecure or public Internet sites using Web 2.0 applications. Code Green Networks TrueDLP provides organizations with a complete data loss prevention solution to stop the loss or theft of confidential or proprietary information.
Posted: 09 Nov 2009 | Published: 09 Nov 2009

Code Green Networks, Inc.

The Big Shift to Cloud-based Security
sponsored by Qualys
WHITE PAPER: Access this white paper to learn how small and medium-sized organizations can manage their IT risks and maintain regulatory compliance with minimal staff and budget, using cloud-based security.
Posted: 11 Jan 2011 | Published: 11 Jan 2011

Qualys

Leveraging XBRL for Value in Organizations
sponsored by ISACA
WHITE PAPER: This white paper was developed jointly by ISACA and IFAC, providing guidance on how to leverage value from XBRL initiatives and compliance requirements, with examples and case studies included.
Posted: 18 Aug 2011 | Published: 18 Aug 2011

ISACA

Sustainability Matters: Why - and how - business is widening its focus to consider the needs of stakeholders
sponsored by Oracle Corporation
WHITE PAPER: This white paper demonstrates how running a responsible business and high levels of performance do not have to work against each other. And it makes a case for why sustainability issues should simply be part of a company’s overall performance management practices.
Posted: 15 Sep 2009 | Published: 01 Dec 2008

Oracle Corporation

A Virtualization Roadmap from Dell and Intel
sponsored by DellEMC and Intel®
WHITE PAPER: Virtualization is more than a technology. It is a way of thinking about problems that allow us to go beyond the physical limitations nor­mally associated with entire classes of hardware, from servers to storage. Attaining the maximum benefits of virtualization, however, requires a plan and constant monitoring to ensure peak performance.
Posted: 29 Apr 2010 | Published: 29 Apr 2010

DellEMC and Intel®

Mimecast Unifies Email Security, Archiving, and Continuity Services in the Cloud
sponsored by Mimecast
WHITE PAPER: The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured. Read this whitepaper to learn more.
Posted: 17 Aug 2010 | Published: 17 Aug 2010

Mimecast