IT Security Services White Papers

(View All Report Types)
A guide to build vs. buy service models for threat detection and response
sponsored by AT&T Cybersecurity
WHITE PAPER: Many important considerations and factors go into choosing DIY vs. managed service models for threat detection and response. Each has pros and cons, plus tradeoffs from both a risk and cost perspective. In this guide, decide which path is best for your organization today.
Posted: 08 Feb 2021 | Published: 07 May 2020

AT&T Cybersecurity

Security Intelligence – Is Security a Battle You Can Win
sponsored by IBM
WHITE PAPER: This white paper details the need for IT teams to discover the benefits of security intelligence (SI), and how it can simplify the complex security environment for better security analytics.
Posted: 14 Oct 2013 | Published: 30 Jun 2011

IBM

How to Overcome Security Skills Deficiencies
sponsored by IBM
WHITE PAPER: This Forrester Research report explores how security leaders are confronting the challenges in recruiting and retaining technical security architects, specialists and staff, paying special attention to how managed security services providers (MSSPs) are critical to staying one step ahead of the security curve. View now to learn more!
Posted: 26 Jul 2013 | Published: 31 May 2013

IBM

Securing virtual desktop infrastructure with Citrix NetScaler
sponsored by Citrix Systems, Inc.
WHITE PAPER: Learn how by integrating an extensive set of network and application-layer protection mechanisms, advanced access and action control capabilities, deep visibility, and other key capabilities can help you deliver the security and available you need to be successful with VDI.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

Citrix Systems, Inc.

Approaches to Distributed Denial of Service (DDoS) Protection: A Cost Analysis
sponsored by VeriSign, Inc
WHITE PAPER: Do you know what a Distributed Denial of Service (DDoS) attack might cost your organization? This white paper defines DDoS, examines the elements that make up a DDoS protection solution, and compares three different approaches to DDoS protection. Read this paper to learn how to ramp up protection and reduce costs.
Posted: 07 Jun 2010 | Published: 03 Jun 2010

VeriSign, Inc

Managed File Transfer: When Data Loss Prevention Is Not Enough - Moving Beyond Stopping Leaks and Protecting Email
sponsored by Coviant Software Corporation
WHITE PAPER: Read this paper to learn how Data Loss Prevention products can identify high-risk network traffic that require intervention and how your IT staff can use an MFT solution to reduce your business risk from these transfers.
Posted: 15 Dec 2010 | Published: 14 Dec 2010

Coviant Software Corporation

The Financial Benefit of Cisco’s Elastic Core
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore how three Cisco software-based initiatives for the core network can help you address the challenges facing core networks today – including the increasing volumes of traffic, diversity of services, and adoption of cloud services.
Posted: 28 Jun 2013 | Published: 31 Dec 2012

Cisco Systems, Inc.

Penetration Tests
sponsored by Internet Security Systems, Inc.
WHITE PAPER: A penetration test offers an invaluable and compelling way to establish a baseline assessment of security as seen from outside the boundaries the organization's network.
Posted: 06 Apr 2003 | Published: 01 Jan 2001

Internet Security Systems, Inc.

Balancing Risk and Innovation with Sourcing Alternatives: Helping IT managers and CIOs raise the ROI of IT
sponsored by IBM
WHITE PAPER: This paper explains how clients can balance risk and innovation through the use of services from IBM.
Posted: 20 May 2011 | Published: 01 Dec 2010

IBM

The importance of security assessments
sponsored by IBM
WHITE PAPER: This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM