Enterprise Security Spending White Papers

(View All Report Types)
A guide to build vs. buy service models for threat detection and response
sponsored by AT&T Cybersecurity
WHITE PAPER: Many important considerations and factors go into choosing DIY vs. managed service models for threat detection and response. Each has pros and cons, plus tradeoffs from both a risk and cost perspective. In this guide, decide which path is best for your organization today.
Posted: 08 Feb 2021 | Published: 07 May 2020

AT&T Cybersecurity

Tripwire VIA System State Intelligence executive brief
sponsored by Tripwire, Inc.
WHITE PAPER: What's missing from today's approach to IT security is real-time security intelligence that immediately shows you when you have a security problem, what caused it and what to do about it. This white paper reveals how you can easily utilize cutting-edge technologies to take the guesswork out of identifying the activity that needs your attention.
Posted: 28 Sep 2012 | Published: 28 Sep 2012

Tripwire, Inc.

Protecting the Dynamic Datacenter
sponsored by Trend Micro
WHITE PAPER: Trend Micro server and application protection addresses the challenging operational security and compliance needs of today’s dynamic datacenter. We provide comprehensive protection, greater operational efficiency, superior platform support, and tighter integration with existing investments. Read this paper to learn more!
Posted: 17 Mar 2010 | Published: 01 Aug 2009

Trend Micro

How to Align your Security Needs with Business Objectives
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This whitepaper covers the emphasis on security that is growing in IT and offers a solution that can provide data protection that is in line with your business goals.
Posted: 12 Feb 2014 | Published: 10 Apr 2013

Hewlett-Packard Enterprise

Practical Advantages of Fireware® XTM for Hands-On IT Administrators
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Take a look at the new XTM (extensible threat management) network security from WatchGuard. See the tangible benefits this new generation of security solutions offers. No hype -- just concrete examples of XTM features and the advantages they deliver for you to evaluate against your current security.
Posted: 26 Oct 2009 | Published: 26 Jul 2009

WatchGuard Technologies, Inc.

Guard Data In Government Environments by Implementing Continuous Diagnostics and Mitigation
sponsored by IBM
WHITE PAPER: This resource features a cost-effective automated diagnostics and mitigation security solution that offers continuous protection and is easily integrated with existing systems.
Posted: 09 May 2014 | Published: 31 Dec 2013

IBM

All Qualified Security Assessors Are Not Created Equal
sponsored by AT&T Corp
WHITE PAPER: The Payment Card Industry Data Security Standard (PCI DSS) requires Level 1 merchants and service providers to undergo an onsite assessment of their security systems and procedures annually. This assessment is typically performed by a Qualified Security Assessor (QSA). This paper provides criteria to consider in choosing a QSA for your assessment
Posted: 04 Aug 2010 | Published: 04 Aug 2010

AT&T Corp

Continuous Cyber Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Lumeta Corporation

2010 SMB Information Protection Survey by Symantec
sponsored by Symantec Corporation
WHITE PAPER: This year’s survey sheds light on precisely the risks small and midsized businesses (SMBs) are facing, what they are doing about it and how much it is costing them. It also provides some simple steps SMBs can take to improve their information protection footing.
Posted: 31 Aug 2010 | Published: 23 Jun 2010

Symantec Corporation

The Business Value of Integrated Anti-Virus Management
sponsored by IBM
WHITE PAPER: This white paper features an integrated anti-malware protection solution that not only improves identification and remediation across all endpoints, but also offers benefits to your bottom line.
Posted: 13 May 2014 | Published: 31 Jan 2014

IBM