All White Papers

Resources available: 1050

Enabling the Mobile Workforce

With the consumerization of mobility, employees expect mobile technology and a user experience comparable to their everyday personal mobile use. Providing the level of support needed for workforce mobility can be challenging, complex and costly. Outsourcing mobile support enables enterprises to deliver the...

2014 Gartner Magic Quadrant Report

For the 7th year in a row, Riverbed is in the "Leaders" Quadrant of the 2014 Magic Quadrant for WAN Optimization Controllers. In this report, Gartner presents an overview of the WAN optimization market and its latest trends. Find out what Gartner has to say about the strategic value of WAN...

Vormetric Insider Threat Report Financial Services

Financial services firms enjoy a few advantages over organizations in other industries. Banks and investment firms tend to have larger IT/security budgets and highly experienced security staff members. Large metropolitan banks also have more lucrative salary structures, and so they also have the luxury of...

Using Encryption and Access Control for PCI DSS 3.0 Compliance in AWS

Compliance and security continue to be top concerns for organizations that plan to move their environment to cloud computing. Besides that, achieving PCI compliance is not a simple task.It is difficult for many organizations to navigate the current landscape of information systems and adequately fulfill all...

Server Data is the Main Target for Advanced Persistent Threats - THE CASE FOR A DATA-CENTRIC SECURITY MODEL

This white paper discusses why the old data security model no longer works, the inherent risks of APTs and why perimeter defenses alone are not sufficient to safeguard organizations against the current generation of security threats. Read this paper to learn more about: * The benefits of a data-centric...

Security in the Cloud for SAP HANA

Intel, Vormetric, Virtustream and SAP deliver enterprise-class customer-controlled data security High-speed data analytics is changing the way companies compete, enabling them to generate real-time insights to support their most important business processes. Cloud computing offers a complementary technology...

Data Security Architecture Overview

The Vormetric Data Security Architecture white paper provides an understanding of the architectural underpinning of Vormetric Data Security Platform, a comprehensive solution for a data-centric security architecture for minimizing the attack surface of sensitive data and to assist in meeting data compliance...

The Vormetric 2013 Insider Threat Report

The 2013 Vormetric Insider Threat Report administered by The Enterprise Strategy Group (ESG), revealed insider threats (i.e., threats posed by employees, third parties with insider privileges, or malicious software that uses legitimate access rights to networks, applications, and sensitive data as an attack...

Securing Sensitive Data within Amazon Web Services EC2 and EBS - Challenges and Solutions to Protecting Data within the AWS Cloud

In this white paper, learn about the specific problems around data protection when using servers within Amazon Web Services (AWS) environments. This includes both problems specific to the environment, the motivations that drive the need for this data protection, and recent changes in cyber threats that...

The Insider Threat - How Privileged Users Put Critical Data at Risk

This white paper discusses the growing insider risks. It will also cover how organizations become breached-either by internal users through malicious or benign actions or from external threats that acquire the credentials of trusted insiders. It also touches on how organizations can limit privileged...

©1994-2014 Infoworld, Inc.