P3P White Papers

(View All Report Types)
Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

How Secure is Your Platform With the Evolving Threat Landscape?
sponsored by IBM
WHITE PAPER: This exclusive paper analyzes the business differentiators among the leading security vendors and examines how safe they can actually keep your data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

IBM

Is your security as good as the cloud’s?
sponsored by Trend Micro, Inc.
WHITE PAPER: This paper examines the relative merits of Software-as-a-Service and Infrastructure-as-a-Service, as well as issues and risks to consider. View now to determine whether these models are likely to provide better or worse security than your current in-house security.
Posted: 07 Oct 2011 | Published: 04 Oct 2011

Trend Micro, Inc.

Deploying a Wireless LAN
sponsored by BlackBerry
WHITE PAPER: Many factors must be considered when planning for a WLAN deployment. This paper provides a starting point for posing questions to WLAN equipment and service vendors.
Posted: 18 May 2007 | Published: 01 May 2007

BlackBerry

Killing Data
sponsored by Voltage Security, Inc.
WHITE PAPER: Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

Voltage Security, Inc.

Tripwire VIA System State Intelligence executive brief
sponsored by Tripwire, Inc.
WHITE PAPER: What's missing from today's approach to IT security is real-time security intelligence that immediately shows you when you have a security problem, what caused it and what to do about it. This white paper reveals how you can easily utilize cutting-edge technologies to take the guesswork out of identifying the activity that needs your attention.
Posted: 28 Sep 2012 | Published: 28 Sep 2012

Tripwire, Inc.

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

IBM X-Force 2013 Mid-Year Trend and Risk Report
sponsored by IBM
WHITE PAPER: In this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).
Posted: 06 Nov 2013 | Published: 30 Sep 2013

IBM

Aligning Security to Provide the Anticipated Business Results
sponsored by AT&T Corp
WHITE PAPER: This resource looks at some of the more important questions IT managers should consider when implementing a security solutions strategy.
Posted: 21 Sep 2011 | Published: 21 Sep 2011

AT&T Corp

Mobile Security Solutions: Securing & Leveraging Mobile Devices
sponsored by Entrust, Inc.
WHITE PAPER: This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Entrust, Inc.