Security Services White Papers

(View All Report Types)
A guide to build vs. buy service models for threat detection and response
sponsored by AT&T Cybersecurity
WHITE PAPER: Many important considerations and factors go into choosing DIY vs. managed service models for threat detection and response. Each has pros and cons, plus tradeoffs from both a risk and cost perspective. In this guide, decide which path is best for your organization today.
Posted: 08 Feb 2021 | Published: 07 May 2020

AT&T Cybersecurity

Achieving PCI Compliance with Red Hat Enterprise Linux
sponsored by Red Hat and JBoss
WHITE PAPER: While enterprises are often able to achieve compliance during an audit, they often have difficulty maintaining compliance on an ongoing basis. Learn how Red Hat Enterprise Linux's built-in features will allow your business to develop a robust implementation for managing all security necessary to achieve and maintain compliance on an on-going basis.
Posted: 20 Aug 2009 | Published: 19 Aug 2009

Red Hat and JBoss

Taking the Next Step: How to Achieve Breakthrough Success in the IT Managed Services Business
sponsored by Kaseya
WHITE PAPER: The drive to build a company from the ground up and offer a competitive product or service that fulfills a need is a powerful pull. Owners of IT service provider businesses are no different. Check out this white paper to learn more.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

Kaseya

Managed File Transfer: When Data Loss Prevention Is Not Enough - Moving Beyond Stopping Leaks and Protecting Email
sponsored by Coviant Software Corporation
WHITE PAPER: Read this paper to learn how Data Loss Prevention products can identify high-risk network traffic that require intervention and how your IT staff can use an MFT solution to reduce your business risk from these transfers.
Posted: 15 Dec 2010 | Published: 14 Dec 2010

Coviant Software Corporation

Cisco Cloud Security Accelerates Cloud Adoption
sponsored by Cisco Systems, Inc.
WHITE PAPER: Despite the business benefits the cloud has to offer, many organizations are often hesitant to adopt it because of one significant barrier – security. This paper explores some of the key security considerations of the cloud and how Cisco cloud security can help organizations take a strategic and architectural approach to secure cloud adoption.
Posted: 14 Jun 2012 | Published: 14 Jun 2012

Cisco Systems, Inc.

Five Network Security Threats and How to Protect Your Business
sponsored by Qwest Communications
WHITE PAPER: Threats abound in today’s corporate networks. Keeping your enterprise and its assets secure requires a proactive security strategy. Discover the five most costly network security threats and see how you can protect your business with a layered security approach.
Posted: 26 Aug 2010 | Published: 25 Aug 2010

Qwest Communications

Security Intelligence – Is Security a Battle You Can Win
sponsored by IBM
WHITE PAPER: This white paper details the need for IT teams to discover the benefits of security intelligence (SI), and how it can simplify the complex security environment for better security analytics.
Posted: 14 Oct 2013 | Published: 30 Jun 2011

IBM

The Financial Benefit of Cisco’s Elastic Core
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore how three Cisco software-based initiatives for the core network can help you address the challenges facing core networks today – including the increasing volumes of traffic, diversity of services, and adoption of cloud services.
Posted: 28 Jun 2013 | Published: 31 Dec 2012

Cisco Systems, Inc.

Securing virtual desktop infrastructure with Citrix NetScaler
sponsored by Citrix Systems, Inc.
WHITE PAPER: Learn how by integrating an extensive set of network and application-layer protection mechanisms, advanced access and action control capabilities, deep visibility, and other key capabilities can help you deliver the security and available you need to be successful with VDI.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

Citrix Systems, Inc.

The importance of security assessments
sponsored by IBM
WHITE PAPER: This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM