Security Forensics White Papers

(View All Report Types)
IT Transformation Consulting Services: Align your technology direction
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This brief resource introduces an IT transformation consulting service as a means of achieving effective, value-driven change. Read on now to learn how you can ensure business and IT alignment, spur business growth, and more.
Posted: 09 Oct 2013 | Published: 31 May 2012

Hewlett Packard Enterprise

The Cybercrime Arms Race
sponsored by Kaspersky
WHITE PAPER: Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Kaspersky

How to Transform Your Business - A Strategic Roadmap for Delivering Value
sponsored by SAP America, Inc.
WHITE PAPER: Read this white paper to learn how to integrate your operations into a new structure acquired through mergers and acquisitions; align your IT operations into a single platform; enhance customer service; increase the productivity of your global workforce; and bolster supply chain efficiency.
Posted: 14 May 2012 | Published: 14 May 2012

SAP America, Inc.

Evolution Vs. Revolution: Driving B2B Efficiencies Forward with People, Processes and Technology Tools
sponsored by SEEBURGER
WHITE PAPER: B2B integration technology, offers powerful and complementary tools and services for seamless business integration and meeting the challenges of global collaboration.
Posted: 27 Oct 2008 | Published: 27 Oct 2008

SEEBURGER

Paths to Success: Three Ways to Innovate Your Business Model
sponsored by IBM Line of Business
WHITE PAPER: In today's ever-changing times,innovation in business models is a success differentiator for CEOs,as we learned from the IBM 2006 Global CEO Study.
Posted: 29 Nov 2007 | Published: 01 Jun 2007

IBM Line of Business

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER: Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Virtual and Superior: How to Build Teams that Get Things Done
sponsored by Citrix
WHITE PAPER: This white paper highlights tips and best practices for CIOs looking for more effective ways to cut risk and create value in virtual environments through better teamwork.
Posted: 12 Sep 2012 | Published: 12 Sep 2012

Citrix

Take Back the Endpoint
sponsored by Kaspersky
WHITE PAPER: During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Kaspersky

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

Data Monetization Strategies: Make and Save Money With Data and Analytics
sponsored by Information Builders
WHITE PAPER: Are you sitting on your data with no plan? Do you know how to capitalize on information you already have? This whitepaper dives into the world of profiting from data. Access now to discover 4 essential steps to getting started, as well as challenges to overcome and a discussion on the importance of data integrity.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Information Builders