Web Blocking Software White Papers

(View All Report Types)
Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork

SaaS vs. Premise-based Monitoring: 9 Reasons Why SaaS Makes More Sense
sponsored by LogicMonitor
WHITE PAPER: Access this resource for the 9 benefits of SaaS, and to find out why server and network monitoring is ideal for a cloud-based model.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

LogicMonitor

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

Chiayi City Tax Bureau Protects Intranet and Extranet from Unauthorized Access with Extreme Networks
sponsored by Extreme Networks
WHITE PAPER: This cast study takes a look at how one company successfully updated their network infrastructure and boosted network performance.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Extreme Networks

How Citrix ShareFile Enables Secure Data Sharing in the Enterprise
sponsored by Citrix Systems, Inc.
WHITE PAPER: This white paper will guide even the most experienced of IT professionals on how to share data securely in the face of IT trends like BYOD and mobile workforces.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

Citrix Systems, Inc.

Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

(ISC)2 UK Ltd

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Storage Provider Profile: Red Hat
sponsored by Red Hat
WHITE PAPER: The following white paper profiles a scale-out, open source object-based storage software solution and the benefits it provides for businesses looking for a middle road when integrating data.
Posted: 30 Jun 2014 | Published: 30 Nov 2012

Red Hat

Hyper-V Virtual Labs Tips and Tricks
sponsored by Veeam Software
WHITE PAPER: Check out this exclusive resource to uncover a complete list of tips and tricks for virtual lab testing in a Hyper-V environment, so you can eliminate as many risks as possible.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

Veeam Software