Acceptable Use Policy White Papers

(View All Report Types)
Solution Note: Enabling the Secure Use of Facebook
sponsored by Palo Alto Networks
WHITE PAPER: With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Palo Alto Networks

Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola Solutions
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola Solutions

Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER: Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012

Total Defense

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Protecting the End User
sponsored by Proofpoint
WHITE PAPER: Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.
Posted: 16 May 2024 | Published: 31 Jan 2019

Proofpoint

Identity Security: Why it Matters and Why Now
sponsored by CyberArk
WHITE PAPER: It is no longer a question of if an organization will be hit by a cyber attack but a question of when. Read this paper to learn why Identity Security could be the key factor in preventing cyber attacks from happening.
Posted: 24 Mar 2023 | Published: 24 Mar 2023

TOPICS:  IT Management
CyberArk

Forrester TEI Report on BigQuery and Looker - English (US)
sponsored by Google Cloud
WHITE PAPER: Learn about the cost savings and business benefits enabled by BigQuery and Looker.
Posted: 09 Jun 2023 | Published: 09 Jun 2023

TOPICS:  IT Management
Google Cloud

Cebu Pacific Air's Productivity Game Changer
sponsored by Slack
WHITE PAPER: Learn how Cebu Pacific Air improved operational efficiency and saved 114,000 hours a year.
Posted: 20 Nov 2023 | Published: 20 Nov 2023

TOPICS:  IT Management
Slack

The Total Economic Impact™ Of KX Insights
sponsored by KX
WHITE PAPER: Read this paper to learn the total economic impact™ of KX Insights, which will identify the cost, benefit, flexibility, and risk factors that could affect your investment decision.
Posted: 15 Jun 2022 | Published: 15 Jun 2022

TOPICS:  IT Management
KX

11 Ways Infrastructure and Service Visibility Delivers Benefits Across IT
sponsored by ServiceNow
WHITE PAPER: This paper provides 11 examples of how ServiceNow®IT Operations Management (ITOM) Visibility and other ServiceNow applications provide a solid foundation by working together.
Posted: 06 Oct 2021 | Published: 06 Oct 2021

TOPICS:  IT Management
ServiceNow