DSS (Digital Signature Standards) White Papers

(View All Report Types)
Buyer’s Guide for Access Management
sponsored by Oracle Corporation
WHITE PAPER: Bombarded with new threats and emerging technologies, today’s businesses are challenged with securing their sensitive data and applications. In this buyer’s guide, uncover how you can meet regulatory requirements and ensure protection by learning the key features, business drivers and infrastructure requirements behind a robust solution.
Posted: 26 Apr 2011 | Published: 26 Apr 2011

Oracle Corporation

2010 Annual Study: U.S. Enterprise Encryption Trends
sponsored by Symantec Corporation
WHITE PAPER: This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Symantec Corporation

Ponemon - Costs and Consequences of Gaps in Vulnerability Response
sponsored by ServiceNow
WHITE PAPER: Ponemon Institute surveyed almost 3,000 IT security professionals across the globe to understand how organizations are responding to vulnerabilities. This paper presents the findings of the most recent report and compares it to the 2018 study – read on for the complete results.
Posted: 08 Feb 2021 | Published: 06 Aug 2020

ServiceNow

IDC Technology Spotlight: Leveraging the Benefits of Cloud Computing with Specialized Security
sponsored by Trend Micro
WHITE PAPER: There is shift in threat landscape with the emergence of cloud; while offering significant benefits, cloud computing expands the playing field for cybercriminals and increase security demands, IDC Spotlight explores the technology of cloud based security
Posted: 15 May 2011 | Published: 11 May 2011

Trend Micro

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
sponsored by Vormetric
WHITE PAPER: This white paper defines the global legal obligations and financial services laws that require data encryption.
Posted: 10 Jun 2014 | Published: 31 May 2014

Vormetric

The Virtual Office Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust
sponsored by VeriSign Australia
WHITE PAPER: This paper explores new developments in website security that online businesses should be implementing to build confidence in their sites, protect valuable brands and safeguard customers’ sensitive information, not to mention improving their bottom line.
Posted: 06 Aug 2010 | Published: 06 Aug 2010

VeriSign Australia

EMC Isilon Scale-Out NAS and RainStor with Hadoop for Efficient Big Data Management
sponsored by RainStor Inc.
WHITE PAPER: Many enterprises rely on Hadoop to manage and analyze large volumes of data, and as such, they are looking to deploy the right architecture to optimize compute and storage requirements. The traditional approach is running Hadoop on DAS -- but is there a better way?
Posted: 05 May 2014 | Published: 05 May 2014

RainStor Inc.

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM