Audit Trail Reports

Best Practices for Mobile Data Protection
sponsored by TechTarget Security
EGUIDE: This expert e-guide presents five essential best practices for securing employee-liable mobile devices and tablets that will allow you to safely embrace the trend toward using personal devices for business.
Posted: 01 Jun 2011 | Published: 01 Jun 2011

TechTarget Security

Anatomy of an Archiving Project White Paper
sponsored by IBM
WHITE PAPER: Companies worldwide are affirming the value of archiving as a best practice for managing data growth, completing faster application upgrades and much more. Inside this white paper, learn how archiving can help support data retention compliance initiatives and mitigate risk for audits and electronic discovery requests.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

IBM

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER: Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Distributed Data Capture: Reducing the Cost of Remote Business Processes
sponsored by Kofax, Inc.
WHITE PAPER: In today’s global economy, information exchange is vital. Competitive advantage goes to the companies that can share information and collaborate quickly and accurately in the most cost-effective manner. Read this white paper now to learn how to effectively lower the costs of your business's document capture process.
Posted: 10 Mar 2011 | Published: 10 Mar 2011

Kofax, Inc.

System z: Making great security even better
sponsored by IBM
WHITE PAPER: Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

ASG-Discovery and Dependency Mapping (ASG-DDM)™
sponsored by ASG Software Solutions
WHITE PAPER: Understanding which hardware and software components support which business systems is extremely difficult. For many years, the clipboard and spreadsheet appear to have been the tools of choice, with the result that many decisions were made based on outdated and inaccurate information. Read this paper to find out more.
Posted: 25 May 2010 | Published: 25 May 2010

ASG Software Solutions

Step by Step: Best practices for security patch management
sponsored by TechTarget Security
EGUIDE: Whether you're new to patch management or just need a refresher, this expert e-guide reviews best practices for security patch management to ensure accurate, effective patch testing in your organization.
Posted: 03 Mar 2011 | Published: 03 Mar 2011

TechTarget Security

 Password Self Help – Password Reset for IBM i
sponsored by Safestone Technologies
WHITE PAPER: Check out this white paper to learn about a self help password application that can give you a high ROI and free up time to work on more business critical issues.
Posted: 07 Jun 2011 | Published: 07 Jun 2011

Safestone Technologies

Five Critical Rules for Firewall Management: Lessons from the Field
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
Posted: 11 May 2016 | Published: 08 Jun 2011

Dell SecureWorks

Unifying Management of Physical and Electronic Records: The Records Management Imperative
sponsored by EMC Corporation
WHITE PAPER: This white paper explains the features and benefits of such a unified approach to enterprise records management, and describes how the EMC Documentum/OmniRIM solution works.
Posted: 13 Mar 2008 | Published: 01 Feb 2007

EMC Corporation