Facebook iconTwitter icon
B2B-Network:
Whitepaper
Title
Client
Date
BackUp To The Cloud For Dummies

Traditional data backup technologies, such as tape, are slow, expensive, and risky. Lost or damaged ta...
NetApp B.V.
2015-08-16
Out of Pocket: A Comprehensive Mobile Threat Assessment of 7 Million iOS and Android Apps

Mobile devices have become critical in today’s digital workplace. But most organizations lack the secu...
FireEye Inc.
2015-08-12
Fallout - The reputational Impact of IT risk

U.S. retailers were not the first to suffer a massive data breach. Nor will they be the last, as cyber...
IBM Deutschland GmbH
2015-08-11
The Need for Third-Party Security, Compliance and Other Capabilities in Microsoft® Office 365®

Osterman Research conducted a market research survey with organizations that had at least 50 email use...
Symantec Singapore Corp
2015-01-29
Reaping the Benefits of Strong, Smarter User Authentication

For business leaders. Passwords and traditional two-factor authentication (2FA) solutions are not enou...
Symantec Singapore Corp
2015-01-29
IBM InfoSphere Guardium (SP)

IBM® InfoSphere Guardium es una solución simple y sólida para evitar filtraciones de datos y cambios n...
IBM
2015-01-22
I Have to Trust Someone. …Don’t I?

Dealing with insider threats to cyber-security Trust is an essential element to operating any type ...
CA Technologies
2015-01-21
Five Simple Strategies for Securing APIs

APIs are an emerging technology for integrating applications using web technology. This approach is ex...
CA Technologies
2015-01-21
IBM InfoSphere Guardium Vulnerability Assessment

IBM InfoSphere® Guardium® Vulnerability Assessment helps harden database infrastructures. It detects v...
IBM
2015-01-19
Loader