White Papers by Topic: Security

Resources available: 199

IT Security by the Numbers: Calculating the Total Cost of Protection

Humorist Franklin P. Jones may have said it best: "When you get something for nothing, you just haven't been billed for it yet." These are wise words of warning for businesses counting on so-called "free" IT security software.

Virtualization Security Is Not an Oxymoron

While the business benefits of virtualization are clear, the virtualized world makes your organization vulnerable to an array of new cybersecurity threats.

IT Security - Fighting the Silent Threat

"IT Security - Fighting the Silent Threat" is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.

Cutting Complexity - Simplifying Security

This white paper looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.

Security Technologies for Mobile and BYOD

With so many security technologies available, how do you sort through the options and pick the solutions that will really work for your business?

Your Data under Siege: Defeating the Enemy of Complexity

Even if you have adequate antivirus protection, are there still holes in your IT security armor? Is lack of bandwidth to manage the growing list of threats, endpoints, and security systems making your organization vulnerable?

Why Complexity is IT Security's Worst Enemy

This white paper looks at the challenges faced by organizations, and what new IT security threats and issues have arisen as a result. It investigates what new IT security approach is required to effectively respond to the changing threat landscape.

Security for Virtualization

In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented and understood. This makes selecting the right virtual-aware anti-malware solution even more important.

Build Your IT Security Business Case

In this latest whitepaper from Kaspersky Lab, you'll find useful facts, examples and business case arguments to help you get buy-in and commitment from your business.

5 Step Guide to Social Media Security

As businesses embrace social media, related security breaches are on the rise. Corporate Twitter hackings. Rogue employees on the company Facebook account. Executives sharing confidential info on their personal accounts.

©1994-2014 Infoworld, Inc.