Environmental Safety White Papers

(View All Report Types)
Protecting the End User
sponsored by Proofpoint
WHITE PAPER: Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.
Posted: 16 May 2024 | Published: 31 Jan 2019

Proofpoint

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
sponsored by Vormetric
WHITE PAPER: This white paper defines the global legal obligations and financial services laws that require data encryption.
Posted: 10 Jun 2014 | Published: 31 May 2014

Vormetric

How the Convergence of Cloud, Big Data, Mobile, and Social Forces Impacts Global Business
sponsored by IBM
WHITE PAPER: This white paper details the results of a survey of IT professionals from around the world regarding the business impact of cloud, big data, mobile, and social forces.
Posted: 16 Jun 2014 | Published: 13 May 2014

IBM

Cloud Adoption & Risk Report
sponsored by SkyHigh
WHITE PAPER: This survey reveals the ongoing struggle with the growing risks in cloud adoption in 2014 to help IT leaders better prepare for future migration projects.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

SkyHigh

Beyond the Breach
sponsored by FireEye
WHITE PAPER: This informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

FireEye

How CIOs are Increasing Innovation by Harnessing Big Data
sponsored by Red Hat
WHITE PAPER: This whitepaper explains the benefits of a new storage solution that allows you to confidently support business growth, manage cost and risk, capitalize on emerging technologies, and drive future innovation across an organization.
Posted: 01 Jul 2014 | Published: 29 Nov 2013

Red Hat

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Case Management and Smart Process Applications
sponsored by K2
WHITE PAPER: This report looks at the applicability of smart process applications, the drivers for improved case management, and the feature sets required of a modern case management system.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

K2