Information Security Policies White Papers

(View All Report Types)
QRadar Risk Manager: Security Intelligence Keeps You Ahead of Threats
sponsored by IBM
WHITE PAPER: This white paper highlights an automated risk management solution that correlates information on asset vulnerabilities and device configurations to better predict risks before they occur.
Posted: 17 Dec 2013 | Published: 31 Jan 2013

IBM

Intelligent Business Strategies whitepaper: Enterprise Information Protection - The Impact of Big Data (March 2013)
sponsored by IBM
WHITE PAPER: This informative white paper examines what the effects of big data on information security and privacy are, discussing the requirements that organizations need to meet before introducing big data and identifying its impact on said requirements.
Posted: 16 Oct 2013 | Published: 16 Oct 2013

IBM

Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

NetIQ

Reducing the Cost of Achieving PCI Compliance with Lumension® Compliance and IT Risk Management
sponsored by Lumension
WHITE PAPER: In this white paper, gain critical information about a streamlined compliance and risk management solution that helps identify, assess, remediate, and manage IT environments to demonstrate PCI DSS requirements.
Posted: 16 Oct 2013 | Published: 31 Dec 2009

Lumension

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Unified Communications Security
sponsored by NextPlane
WHITE PAPER: This crucial paper examines several kinds of attacks designed specifically to disrupt UC platforms and discusses how your organization can defend against these increasingly frequent threats.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

NextPlane

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Business Driven Governance: Managing Policies for Data Retention
sponsored by IBM
WHITE PAPER: This resource explains how you can establish and manage an overall data retention strategy through information governance and database archiving policies.
Posted: 27 Feb 2014 | Published: 31 Aug 2013

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM