Root Kits White Papers

(View All Report Types)
Five Trends to Track in E-Commerce Fraud
sponsored by ThreatMetrix
WHITE PAPER: This paper outlines five troubling trends in e-commerce fraud, and offers some guidance on how you can mitigate the risk they present to your business.
Posted: 24 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

Preventing Ransomware Threats to Health Data in 10 Steps
sponsored by Cisco Umbrella
WHITE PAPER: Health data has become some of the most sought-after personal data on the black market, making healthcare professionals and hospital systems prime targets for cybercrime – particularly ransomware attacks. This e-guide will provide you with 10 steps to avoid ransomware attacks on your health systems.
Posted: 16 Sep 2016 | Published: 14 Sep 2016

Cisco Umbrella

TOGAF® and Enterprise Portfolio Management
sponsored by Global Knowledge
WHITE PAPER: Learn how The Open Group Architecture Framework (TOGAF®) and Portfolio Management both promise to bring structure and direction to complex and fast-moving organizational environments: the TOGAF framework for the enterprise as a whole and Portfolio Management to the enterprise project world.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Global Knowledge

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Sophos

Choose the Service Desk Delivery Model that Makes Sense
sponsored by Pangea Systems
WHITE PAPER: This white paper discusses three delivery models, including the benefits and considerations you must take when choosing the right model for your business.
Posted: 20 Jun 2014 | Published: 31 Dec 2012

Pangea Systems

Protect Yourself From Antivirus
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

It's Time Businesses Wake up to Mobile Security Reality
sponsored by Threat Track Security
WHITE PAPER: This white paper addresses the need for top-notch mobile security. With the rise of personal devices used in the workplace, security is more important than ever before.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

Threat Track Security

How TCO Benefits Make Cloud Computing a No-Brainer for Many SMBs and Mid-Market Enterprises
sponsored by NetSuite
WHITE PAPER: This resource analyzes the economic benefits of cloud computing in the ERP and CRM space, and details how embracing the cloud can be a competitive differentiator for SMBs.
Posted: 14 Feb 2014 | Published: 28 Feb 2013

NetSuite

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

No Silver Bullet: Eight Ways Malware Defeats Strong Security Controls
sponsored by IBM
WHITE PAPER: This whitepaper explores 8 ways malware can defeat your security strategy and outlines some key techniques for preventing these intrusions.
Posted: 08 Apr 2014 | Published: 31 Dec 2013

IBM