Compliance (Security) White Papers

(View All Report Types)
Protecting Server Data in Small and Medium-sized Businesses
sponsored by Iron Mountain
WHITE PAPER: Read this white paper to learn how to successfully protect server data outside a centralized data center and focus on specific needs and requirements for SMBs.
Posted: 11 Jan 2010 | Published: 01 Sep 2006

Iron Mountain

Achieving GLBA Compliance with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific GLBA mandates while increasing overall efficiency and agility.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss

Performance Management Applications Overview
sponsored by Oracle Corporation
WHITE PAPER: Hyperion performance management applications deliver a wide range of Business benefits as well as IT benefits; this overview outlines key benefits.
Posted: 12 Oct 2009 | Published: 01 Dec 2008

Oracle Corporation

The Path to IFRS Conversion: Considerations for the banking and capital markets industry
sponsored by Deloitte
WHITE PAPER: As acceptance of IFRS in the United States becomes imminent, more banks and capital markets institutions are asking key questions: How does IFRS affect my institution? What events would influence my institution's pace of IFRS adoption? What obstacles might we need to consider? Read this paper to learn the answers to these questions and more.
Posted: 04 Sep 2009 | Published: 03 Sep 2009

Deloitte

Choosing a Cloud Provider with Confidence
sponsored by GeoTrust, Inc.
WHITE PAPER: The goal of this paper is to help enterprises make decisions about where and when to use cloud solutions by outlining issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.
Posted: 02 Feb 2011 | Published: 02 Feb 2011

GeoTrust, Inc.

Enabling Continuous Compliance Across the Enterprise
sponsored by IBM
WHITE PAPER: Today's innovative enterprises are transforming compliance into a continuous action that is woven into the fabric of both their IT security and business environments. Learn how this transformation can significantly improve compliance results with fewer resources, while providing valuable insights to drive strategic business decisions.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

The Great Firewall of China? How to address the specific challenges of reaching China with your website
sponsored by CDNetworks
WHITE PAPER: This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

CDNetworks

Sustainability Matters: Why - and how - business is widening its focus to consider the needs of stakeholders
sponsored by Oracle Corporation
WHITE PAPER: This white paper demonstrates how running a responsible business and high levels of performance do not have to work against each other. And it makes a case for why sustainability issues should simply be part of a company’s overall performance management practices.
Posted: 15 Sep 2009 | Published: 01 Dec 2008

Oracle Corporation

Killing Data
sponsored by Voltage Security, Inc.
WHITE PAPER: Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

Voltage Security, Inc.