Wired Equivalent Privacy White Papers

(View All Report Types)
Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

Smart Policies for Personal-Liable Smartphones
sponsored by BlackBerry
WHITE PAPER: This white paper addresses how businesses and employees can compromise between personal and business smartphone use, as well as benefit by establishing personal-liable smartphone policies.
Posted: 05 Apr 2010 | Published: 05 Apr 2010

BlackBerry

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Cybercrime Battle Basics
sponsored by ThreatMetrix
WHITE PAPER: This paper shows you how integrated approaches that look beyond the firewall and single technology defenses can defend your company from emerging fraud threats.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

ThreatMetrix

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Access Certification: Addressing and Building on a Critical Security Control
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses the forces driving security controls related to access and how to use automated access certification processes to address these critical issues. The detailed whitepaper walks thorugh the key components of an enterprise-grade access certification solution and highlights the results achieved by customers.
Posted: 21 Mar 2011 | Published: 01 Jan 2010

Oracle Corporation

Killing Data
sponsored by Voltage Security, Inc.
WHITE PAPER: Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

Voltage Security, Inc.

Deploying a Wireless LAN
sponsored by BlackBerry
WHITE PAPER: Many factors must be considered when planning for a WLAN deployment. This paper provides a starting point for posing questions to WLAN equipment and service vendors.
Posted: 18 May 2007 | Published: 01 May 2007

BlackBerry

How to Win Customers and Build Trust Online: What smart companies are doing to build trust and use it to create competitive advantage online
sponsored by VeriSign EMEA
WHITE PAPER: If you can make your site more trustworthy, you can turn customer concerns to your advantage. Learn how trust can be a competitive advantage, and how to go about establishing trust among customers in this white paper.
Posted: 18 Feb 2011 | Published: 18 Feb 2011

VeriSign EMEA