Security Architecture White Papers

(View All Report Types)
GoSecure Cybersecurity Perceptions Versus Reality
sponsored by GoSecure
WHITE PAPER: This 29-page research report provides the key findings from a recent GoSecure survey designed to better understand the biases, gaps and misconceptions surrounding cybersecurity. Read on to learn more about this disconnect and discover how to address and overcome it.
Posted: 08 Feb 2021 | Published: 16 Sep 2020

GoSecure

Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

Transitioning to the Private Cloud with Confidence
sponsored by Cisco
WHITE PAPER: Cloud computing may be the future of IT, but it also presents challenges businesses can't afford to overlook. Review the key characteristics, business benefits and barriers when moving to a private cloud.
Posted: 29 Jul 2013 | Published: 29 Jul 2013

Cisco

The Fight for Full Network Visibility in a Dangerous World
sponsored by APCON, Inc.
WHITE PAPER: This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.
Posted: 09 May 2014 | Published: 09 May 2014

APCON, Inc.

Three Guiding Principles to Improve Data Security and Compliance
sponsored by IBM
WHITE PAPER: In this resource, explore a more holistic approach to data protection that simplifies security measures and compliance reporting in an increasingly complex IT landscape.
Posted: 19 Dec 2013 | Published: 31 Oct 2012

IBM

Breach Prevention Industry Best Practices & Standards Data Sheet: Industry Perspectives – Healthcare
sponsored by Symantec Corporation
WHITE PAPER: This informative paper examines how you can build a formidable breach prevention strategy designed specifically for healthcare.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Symantec Corporation

2014 BYOD and Mobile Security Report
sponsored by Lumension
WHITE PAPER: This informative resource takes an in-depth look at the state of BYOD and mobile security, discussing how the landscape has changed over the past year.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Lumension

It’s Time Businesses Wake up to Mobile Security Reality
sponsored by Threat Track Security
WHITE PAPER: This resource underlines the importance of Mobile Device Management (MDM) in ensuring the security of your enterprise in the face of BYOD. Read now to learn how you can alleviate the pressure to account for, manage, and secure the wide range of new endpoints within your organization.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Threat Track Security

Evolution of Integrity Checking with Intel® Trusted Execution Technology: an Intel IT Perspective
sponsored by Intel
WHITE PAPER: As part of an effort to address security concerns, Intel IT evaluated Intel® Trusted Execution Technology (Intel® TXT), a new security technology in Intel® processors. Intel TXT is a foundation technology that can be applied to enhance security in multiple usage models. Read this white paper to learn more.
Posted: 02 May 2011 | Published: 25 Mar 2011

Intel

The Use Case for Integrated Vulnerability Management CORE Security
sponsored by Core Security Technologies
WHITE PAPER: This white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

Core Security Technologies