Bitpipe.com
Business of Information Technology
>
Business Management
>
Risk Management
>
Environmental Health White Papers
(View All Report Types)
A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER:
This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted:
05 Jun 2014 |
Published:
05 Jun 2014
TOPICS:
Malware
|
Network Security
|
Risk Management
|
Security
|
Security Best Practices
|
Security Management
|
Security Systems
|
Security Threats
|
Vulnerability Management
Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER:
Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted:
01 Jul 2014 |
Published:
29 Apr 2014
TOPICS:
Application Security
|
Authentication
|
Authorization
|
Compliance (Systems Operations)
|
Data Loss Prevention (DLP)
|
Data Security
|
Mobile Workers
|
Passwords
|
Risk Management
|
Security
|
Security Best Practices
|
Security Infrastructure
|
Security Management
|
Security Managers
|
Security Policies
|
Security Systems
|
Security Threats
Data Security for Mobile Users: One Size Does Not Fit All
sponsored by Accellion, Inc.
WHITE PAPER:
Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users.
Posted:
01 Jul 2014 |
Published:
30 Apr 2014
TOPICS:
Data Security
|
Mobile Device Management
|
Mobile Workers
|
Risk Management
|
Security
|
Security Best Practices
|
Security Infrastructure
|
Security Management
|
Security Managers
|
Security Policies
|
Security Systems
|
Smart Phones
5 Ways Dropbox for Business Keeps Your Data Protected
sponsored by Dropbox for Business
WHITE PAPER:
This white paper presents 5 ways that this cloud service will protect your data, with security as a native core function.
Posted:
12 Jun 2014 |
Published:
31 May 2014
TOPICS:
Cloud Computing
|
Cloud Security
|
Data Security
|
Risk Management
|
Security
|
Security Management
|
Security Managers
|
Security Threats
IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER:
Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted:
08 Oct 2014 |
Published:
31 Mar 2014
TOPICS:
Access Control
|
Access Control Software
|
Authentication
|
Authorization
|
Fraud Protection
|
Identification Systems
|
Identity Management
|
Identity Management Software
|
Risk Assessment
|
Risk Management
|
Securities Industry
|
Security
|
Security Best Practices
|
Security Industry
|
Security Management
|
Security Managers
|
Security Policies
|
Security Software
|
Security Systems
|
Security Threats
|
Software Licensing
|
SSO
CIO's Guide to Managing Cloud Adoption and Risk
sponsored by SkyHigh
WHITE PAPER:
This whitepaper details how to handle shadow IT by taking the right approach to risk management in the cloud.
Posted:
04 Jun 2014 |
Published:
04 Jun 2014
TOPICS:
Cloud Computing
|
Cloud Management
|
Cloud Security
|
Data Center Design
|
Data Center Management
|
Data Centers
|
Risk Assessment
|
Risk Management
Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER:
In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted:
03 Jul 2014 |
Published:
30 Apr 2012
TOPICS:
Authentication
|
Authorization
|
Cloud Security
|
Data Security
|
File Management Programs
|
File Sharing Protocols
|
File Transfer Protocols
|
FTP
|
Network Security
|
Risk Management
|
Security
|
Security Management
A "How-To" Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER:
Find out how cloud services for security-rich data backup can help your organization avoid the risks involved with data growth.
Posted:
25 Aug 2014 |
Published:
30 Sep 2012
TOPICS:
Backup Software
|
Backups
|
Cloud Backup
|
Cloud Computing
|
Data Storage
|
Fraud Protection
|
Risk Management
|
Storage Hardware
|
Storage Management
10 Essentials for Secure EMM
sponsored by Citrix
WHITE PAPER:
This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted:
09 May 2014 |
Published:
01 Jun 2014
TOPICS:
Data Security
|
Mobile Device Management
|
Mobile Workers
|
Risk Management
|
Security
|
Security Best Practices
|
Security Management
|
Security Managers
|
Security Policies
|
Security Threats
|
Smart Phones
|
Tablet PC
|
User Experience
Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER:
Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted:
08 Oct 2014 |
Published:
29 Nov 2013
TOPICS:
Compliance Best Practices
|
Cross-Site Scripting
|
Cybersecurity
|
Data Security
|
Hackers
|
Internet Security
|
Payment Card Industry Data Security Standard
|
Regulatory Compliance
|
Risk Assessment
|
Risk Management
|
Security
|
Security Best Practices
|
Security Industry
|
Security Management
|
Security Managers
|
Security Threats
|
Virus Protection
|
Vulnerability Assessments
|
Vulnerability Management
|
Web Application Security
|
Web Applications Management
Browse by Report Type:
Environmental Health White Papers
|
Environmental Health Multimedia
|
Environmental Health IT Downloads
Home
About Us
Contact Us
Advertise with Us
Partners
Site Index