Loss Management White Papers

(View All Report Types)
Evaluating File Sync and Share Security
sponsored by Dropbox for Business
WHITE PAPER: This white paper outlines the twelve questions you need to ask vendors to ensure you're getting the most secure file sync and share service possible.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Dropbox for Business

The Insider Threat of Bring Your Own Cloud (BYOC)
sponsored by SkyHigh
WHITE PAPER: This Ponemon study highlights the latest bring-your-own-cloud (BYOC) trend, and names the top risks associated with personal cloud services in the workplace.
Posted: 04 Jun 2014 | Published: 31 Jan 2014

SkyHigh

Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation

Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
sponsored by IBM
WHITE PAPER: This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
Posted: 08 May 2014 | Published: 31 Jan 2014

IBM

10 Essentials for Secure EMM
sponsored by Citrix
WHITE PAPER: This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted: 09 May 2014 | Published: 01 Jun 2014

Citrix

Protecting DNS Infrastructure—Inside and Out
sponsored by Infoblox
WHITE PAPER: This white paper unveils the critical risk your domain name system (DNS) is in, and offers leading strategies to help you protect your infrastructure against outside-in and inside-out threats.
Posted: 30 May 2014 | Published: 29 May 2014

Infoblox

3 Big data security analytics techniques you can apply now to catch advanced persistent threats
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this informative white paper, unveil 3 ways that big data security analytics can help you gain actionable intelligence to thwart advanced persistent threats (APTs) and achieve visibility into IT infrastructures for top defense.
Posted: 15 Aug 2014 | Published: 19 Nov 2013

Hewlett Packard Enterprise

Threat Intelligence Evaluator's Guide
sponsored by AT&T Cybersecurity
WHITE PAPER: One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AT&T Cybersecurity

Managing IBM License Complexity
sponsored by Flexera Software
WHITE PAPER: In this white paper, examine the most common IBM license models under three categories -- user-based, capacity-based, and "other" -- along with helpful examples. Plus, discover a discovery, inventory and license management tool that simplifies and automates IBM license management.
Posted: 23 Jun 2014 | Published: 31 Dec 2011

Flexera Software

IT Executive Guide to Security Intelligence
sponsored by IBM
WHITE PAPER: This helpful guide discusses one company's approach to security intelligence, and how this innovation could entirely change the way that businesses approach threat management.
Posted: 03 Jul 2014 | Published: 31 Jan 2013

IBM