Risk Management Research
-
How CIOs are Increasing Innovation by Harnessing Big Data
Sponsored by: Red HatThis whitepaper explains the benefits of a new storage solution that allows you to confidently support business growth, manage cost and risk, capitalize on emerging technologies, and drive future innovation across an organization.
-
Data Security for Mobile Users: One Size Does Not Fit All
Sponsored by: Accellion, Inc.Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users.
-
Best Practices for a Secure Mobile Workforce
Sponsored by: Accellion, Inc.Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
-
Accellion vs Box: 5 Key Reasons Enterprises Select Accellion
Sponsored by: Accellion, Inc.Read this whitepaper to learn how Accellion's private cloud answers the need for a mobile, scalable, flexible file sharing solution that extends and reinforces enterprise security policies and controls.
-
Symantec Data Loss Prevention for Mobile
Sponsored by: Symantec CorporationThis webcast introduces the highest-rated DLP solution with industry-leading detection technology.
-
A Manifesto for Cyber Resilience
Sponsored by: Symantec CorporationIn this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
-
What's New in Symantec Data Loss Prevention
Sponsored by: Symantec CorporationThis data sheet gives you access to over 9 reasons why you should upgrade your software that focuses on data loss prevention.
-
Managing IBM License Complexity
Sponsored by: Flexera SoftwareIn this white paper, examine the most common IBM license models under three categories -- user-based, capacity-based, and "other" -- along with helpful examples. Plus, discover a discovery, inventory and license management tool that simplifies and automates IBM license management.
-
Operationalizing Information Security: Top 10 SIEM Implementer’s Checklist
Sponsored by: AccelOps Inc.This informative whitepaper outlines 10 best practices for successful SIEM implementation.
-
Respect User Privacy While Securing the Cloud and Mobile Devices
Sponsored by: BitGlassThis white paper offers a security solution that improves visibility and analytics capabilities across disparate mobile devices and cloud applications.
-
Examining Cloud Computing Threats and Mitigations
Sponsored by: CenturyLink Technology SolutionsThis expert e-guide details the new threats that come with cloud computing and how you should deal with them.
-
Voltage Success Story: Envision Pharmaceutical Services
Sponsored by: Voltage Security, Inc.This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
-
Cover Your SaaS!
Sponsored by: BitGlassThis white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
-
The Keys to Securing Data in a Collaborative Workplace
Sponsored by: Dropbox for BusinessThis white paper introduces 5 steps you can take to secure file sync and share so that employees can enjoy the benefits of collaboration without fear of data loss.
-
Personally Identifiable Information (PII) and Personal Health Information (PHI)
Sponsored by: Voltage Security, Inc.This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
-
Omnichannel Considerations for the Purchase Order Process
Sponsored by: OpenText GXSFind out how adopting an omnichannel experience can improve the purchase order process, and benefit both the customers and the business.
-
Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
Sponsored by: Threat Track SecurityThis informative guide explores today's threat landscape, the role of malware and the threat of internal vulnerabilities.
-
Evaluating File Sync and Share Security
Sponsored by: Dropbox for BusinessThis white paper outlines the twelve questions you need to ask vendors to ensure you're getting the most secure file sync and share service possible.
-
AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy
Sponsored by: BitGlassIn this case study, learn how AMAG Pharmaceuticals successfully secured cloud and mobile usage with a software as a service (SaaS) firewall.
-
5 Ways Dropbox for Business Keeps Your Data Protected
Sponsored by: Dropbox for BusinessThis white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
-
HP TippingPoint Intrusion Prevention System halts threats at the door - Solution increases visibility to potential threats, attacks and policy violations against HP systems
Sponsored by: Hewlett-Packard EnterprisePrevent future cyber attacks from occurring by modifying your company's security infrastructure.
-
A Comprehensive Guide to Encryption Technology Approaches
Sponsored by: VormetricThis resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
-
The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
Sponsored by: VormetricThis white paper defines the global legal obligations and financial services laws that require data encryption.
-
Building a Better Network Security Strategy
Sponsored by: Hewlett Packard EnterpriseThis informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
-
6 Ways to Enhance Security in AWS
Sponsored by: SafeNet, Inc.In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.