White Papers by Topic: Security

Resources available: 324

The Keys to Securing Data in a Collaborative Workplace

Losing data is costly. IT professionals have spent years learning how to protect their organizations from hackers, but how do you ward off both external and internal threats when employees are seeking ways to collaborate more and more?

Evaluating File Sync and Share Solutions: 12 Questions to Ask about Security

File sync and share can increase productivity, but how do you pick a solution that works for you? Download to learn some important questions to ask file sync and share vendors about security.

The Truth About Cloud Security

"Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?

Comprehensive Advanced Threat Defense

The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-­based approach to Advanced Threat Defense.

Advanced Threat Defense: A Comprehensive Approach

In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive approach to network advanced threat defense.

EndPoint Interactive eGuide

In this eGuide, Network World, Computerworld, and CIO examine two endpoint trends - BYOD and collaboration - and offer tips and advice on how best to manage them. Read on to learn how to make the most of endpoints in your enterprise.

A More Predictable Way to Budget Software Costs

Wavetronix enables creative collaboration while cost-effectively accessing all the latest tools with Adobe Creative Cloud for teams. For Wavetronix, collaboration was easy when its marketing team was small and everyone worked in the same office.

Adobe Creative Cloud for teams Security Overview

This white paper describes the proactive approach and procedures implemented by Adobe to increase the security of your Creative Cloud experience and your data.

Surescripts Case Study- Securing Keys and Certificates

Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its healthcare customers.

Ponemon 2014 SSH Security Vulnerability Report

According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations vulnerable to attacks.

©1994-2014 Infoworld, Inc.