Acceptable Use Policy White Papers

(View All Report Types)
BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Strategies for Managing Social Networking & Personal Web Use in the Workplace
sponsored by Total Defense
WHITE PAPER: Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.
Posted: 14 May 2012 | Published: 14 May 2012

Total Defense

Solution Note: Enabling the Secure Use of Facebook
sponsored by Palo Alto Networks
WHITE PAPER: With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Palo Alto Networks

Protecting Credit Card Data: How to Achieve PCI Compliance
sponsored by Motorola Solutions
WHITE PAPER: This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.
Posted: 20 Jun 2008 | Published: 01 Jul 2007

Motorola Solutions

Protecting the End User
sponsored by Proofpoint
WHITE PAPER: Today's threat landscape requires a fresh mindset and new strategy, one that focuses on protecting people. In this white paper, explore the factors that play into end-user risk and how to mitigate these factors. Also, find concrete steps that your organization can take to build a people-centric defense.
Posted: 16 May 2024 | Published: 31 Jan 2019

Proofpoint

U.S. FTC Safeguards Rule
sponsored by Cisco
WHITE PAPER: The Safeguards Rule requires mitigation of “reasonably foreseeable internal and external risks” - in other words, protection against data breaches, data leakage, phishing, and ransomware. Learn how Cisco Umbrella supports compliance in this white paper.
Posted: 23 Feb 2024 | Published: 23 Feb 2024

TOPICS:  Security
Cisco

16 Ways Dell OpenManage Helps Your Business
sponsored by Dell Technologies & Intel®
WHITE PAPER: Access this infographic that highlights the 16th generation of Dell PowerEdge servers with 16 examples of how OpenManage portfolio enhances server range.
Posted: 15 May 2024 | Published: 15 May 2024

TOPICS:  IT Management
Dell Technologies & Intel®

The Total Economic Impact™ Of KX Insights
sponsored by KX
WHITE PAPER: Read this paper to learn the total economic impact™ of KX Insights, which will identify the cost, benefit, flexibility, and risk factors that could affect your investment decision.
Posted: 15 Jun 2022 | Published: 15 Jun 2022

TOPICS:  IT Management
KX

Cebu Pacific Air's Productivity Game Changer
sponsored by Slack
WHITE PAPER: Learn how Cebu Pacific Air improved operational efficiency and saved 114,000 hours a year.
Posted: 20 Nov 2023 | Published: 20 Nov 2023

TOPICS:  IT Management
Slack

Design an Efficient Storage System With Intel DAOS and Supermicro Hardware
sponsored by Supermicro
WHITE PAPER: Learn how Supermicro and Intel®, with their DAOS software stack, is designed from the ground up for performance and uses persistent memory and NVMe SSDs to provide a high-efficiency storage solution for demanding applications.
Posted: 08 Sep 2021 | Published: 08 Sep 2021

TOPICS:  IT Management
Supermicro