Secure Data White Papers

(View All Report Types)
Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.

Consultants: How Can You Secure Your Information with Customers?
sponsored by Globalscape
WHITE PAPER: This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
Posted: 22 May 2014 | Published: 22 May 2014

Globalscape

How desktop and app virtualization affects IT security
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
Posted: 22 May 2014 | Published: 22 May 2014

Citrix

Cloud Security Designed for Amazon Web Services (AWS)
sponsored by Trend Micro
WHITE PAPER: This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
Posted: 19 May 2014 | Published: 19 May 2014

Trend Micro

Managed Mobility Services: Reduce Your Risk and Improve Productivity
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Learn how HP Managed Mobility Services can help your organisation manage secure access to applications and data, and let users store, sync and share files anytime, anywhere, from any mobile device.
Posted: 02 Sep 2014 | Published: 29 Aug 2014

Hewlett-Packard Enterprise

Enabling the Business with Social Relationship Platforms
sponsored by Hootsuite
WHITE PAPER: Social media is quickly becoming a key part of enterprise business strategy. According to an IDG Research survey, 73% of respondents expect it to be critical or very important in the coming years. So how can CIOs prepare for and encourage the adoption of social media in the enterprise in a secure, compliant way?
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Hootsuite

The Ten Layers of Security in BIRT iHub
sponsored by Actuate
WHITE PAPER: The following white paper explores the 10 layers of security in the BIRT iHub. Learn how to manage each layer successfully, how to enable central configuration, and more.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

Actuate

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM