All White Papers

Resources available: 1417

Extending the benefits of desktop virtualization to mobile laptop users

Desktop virtualization is attractive to organizations of all types and sizes worldwide because of its many compelling benefits. Delivering virtual desktops significantly reduces operating costs while simultaneously strengthening data security and enhancing IT responsiveness to rapidly changing business...

Security Brief: Transforming Traditional Security

Security operations centers need advanced analytical tools that can quickly collect and shift through security data. This brief looks at the latest options and processes to speed up detection of advanced threats.

Getting Real About Management and "Big Data"

It's an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. Moreover, new "Big Data" technologies purport bringing advanced analytic techniques like predictive analysis and advanced statistical techniques close to the security...

The Big Data Security Analytics Era Is Here

This whitepaper is the cutting edge view on why large organizations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous...

Transforming Information Security: Future-Proofing Processes

The ad-hoc processes put in place for the days of perimeter-based security can't handle the scale and complexity of managing cybersecurity risks for a global enterprise today. This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help...

Capacity Management via DCIM: Real-Time Data Center Intelligence Pays Off

Effective data center capacity planning must proactively manage rack space, power, cooling and network connectivity. To prevent data center resources from becoming inefficient over time, real-time intelligence is critical. A data-center infrastructure management (DCIM) tool must perform automated capacity...

Delivering enterprise information securely on Android and Apple iOS tablets and smartphones

Mobile devices like smartphones and tablets offer new mobility and flexibility for people and IT, but they also pose new challenges for information security and privacy. This white paper discusses the security implications and capabilities of the major mobile OS platforms, and presents comprehensive...

10 essential elements for a secure enterprise mobility strategy

Mobility can help your organization's workforce achieve new levels of productivity and agility. But to be successful, your enterprise mobility strategy must ensure protection and compliance for sensitive business information while providing the convenient user experience people demand. This white paper...

Security Leadership Series: Security Strategies for Success

Given an ever-expanding array of increasingly potent information security threats, today's highly mobile employees and line-of-business groups are front-line participants in the struggle to secure the enterprise. In this exclusive CSO Magazine eBook, it shares best practices for leading meaningful...

Defense throughout the Vulnerability Life Cycle with Alert Logic Threat and Log Manager

New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering. Defending against these risks is an ongoing battle. In response, the array of security technologies available has also grown....

©1994-2014 Infoworld, Inc.