Intellectual Property White Papers
-
How to create an effective data protection strategy for IT compliance
Sponsored by: TechTarget SecurityData protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
-
What's Behind a Cyber Attack?
Sponsored by: IBMThis white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
-
Your Personal Web Attack Survival Guide
Sponsored by: ImpervaThis white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
-
Analyst advice for IT security leaders
Sponsored by: IBMBusiness leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security.
-
Storage Magazine: How to improve your virtual server storage setups
Sponsored by: IBM.In this expert e-zine, featuring server virtualization and storage expert, David Davis, you will gain insight through the process of tweaking virtual server storage setups and discover ten tips that provide practical guidance you can use today to improve the performance of several virtual storage systems.
-
Solitarie Interglobal: Tracked, Hacked and Attacked
Sponsored by: IBM.Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
-
The Trouble Heading for Your Business 2013
Sponsored by: Trend MicroThis resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.
-
Negotiating cloud contracts
Sponsored by: TechTarget ComputerWeekly.comThis article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated.
-
E-Guide: Monitoring Strategies for Insider Threat Detection
Sponsored by: IBMIn this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.
-
Machine Learning Sets New Standard for Data Loss Prevention: Describe, Fingerprint, Learn
Sponsored by: Symantec CorporationMany organizations today are implementing Data Loss Prevention programs to identify sensitive information and create policies aimed at controlling where data should and shouldn’t go, as well as how it should get there. Read this white paper to learn more.
-
Data Loss Prevention for IBM i
Sponsored by: Innovatum, Inc.Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
-
Implementing an Effective Data Loss Prevention Solution for Your Network
Sponsored by: IBMRead this paper for a thorough examination of data loss prevention and for a step-by-step guide for implementing an effective DLP solution in your organization.
-
Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It
Sponsored by: Symantec CorporationThis paper examines the three most common causes of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders-- and then illustrates each cause to show that breaches can occur in.
-
Top Benefits of Symantec Protection Suite
Sponsored by: Symantec CorporationAnti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.
-
Collaboration solutions: Solutions for small and medium business
Sponsored by: IBMCheck out this IBM resource center to identify collaboration software solutions specifically geared towards small and medium-sized businesses.
-
Managing the Entire Database Security & Compliance Lifecycle
Sponsored by: Guardium, an IBM CompanyIncreased difficulty in protecting data has heightened the need for organizations to simplify compliance and reduce costs by replacing manual, resource-intensive audit processes with automated controls for all their enterprise applications. Read this data sheet to learn how Guardium 7 addresses the entire database security and compliance lifecycle.
-
New Insider Threat Emerges in the New Economy
Sponsored by: LumensionLearn how employees and partners are engaging with IT assets and intellectual property.
-
Dell ProSupport Certified Data Destruction
Sponsored by: DellEMC and Intel®The Certified Data Destruction Service can give Dell customers - from small businesses to large public companies and government agencies - peace of mind that your sensitive data stored on a failed hard drive will not fall into the wrong hands.
-
Keep Your Hard Drive
Sponsored by: DellEMC and Intel®The Keep Your Hard Drive service puts Dell customers in complete control of their data and hard drive disposal, while preserving all the benefits of the Dell Limited Warranty on Failed Hard Drives.
-
Windows Essential Business Server 2008: Deploying Windows Mobile 6 with Windows Essential Business Server 2008
Sponsored by: MicrosoftThis document provides step-by-step instructions for deploying devices powered with Windows Mobile 6 in an IT infrastructure that is based on the Windows Essential Business Server 2008 (Windows EBS 2008) server solution.
-
Software Compliance Management: Automating License Compliance in the New, Mixed-IP Development World
Sponsored by: Black Duck SoftwareSoftware compliance management systems help ensure enterprises achieve the business acceleration they want from software reuse, while meeting the stringent requirements of shareholders, regulators and customers for proper management of company.
-
China Auto Industry Research - Inside China: The Chinese View Their Automotive Future
Sponsored by: IBM Line of BusinessAutomotive manufacturers and suppliers view China as the largest combination of automotive market and low-cost manufacturing and supply base to appear in decades.
-
Global Threat Research Report: Russia
Sponsored by: VeriSign, IncThis report takes an in-depth look at the security threat the Russian Business Network (RBN) is to North American-based enterprise businesses. Learn more about their current infrastructure, its corruption, and the impact the RBN has on business today.
-
10 Steps to Managing Risk and Regulatory Compliance in Blogs and Wikis
Sponsored by: TechrigyRisks related to collaboration tools like blogs and wikis can create legal liability and regulatory problems. Learn how to gain competitive advantage from these community-building tools while ensuring the content in them is appropriate and secure.
-
Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper
Sponsored by: Symantec CorporationThis paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.