Smart Media Cards White Papers

(View All Report Types)
Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER: Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012

Entrust, Inc.

The Power of Mobile Peripherals
sponsored by BlackBerry
WHITE PAPER: This white paper discusses how mobile peripherals help extend the value of BlackBerry solutions such as automate data collection, improve accuracy, and lower costs, among other benefits.
Posted: 18 Feb 2010 | Published: 18 Feb 2010

BlackBerry

Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006

Aladdin Knowledge Systems

Security for BlackBerry Devices with Bluetooth Wireless Technology
sponsored by BlackBerry
WHITE PAPER: This document provides information about the Bluetooth® wireless technology and its uses with BlackBerry Device Software and the potential vulnerabilities in Bluetooth wireless technology.
Posted: 11 Aug 2006 | Published: 01 Aug 2006

BlackBerry

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Operationalizing Information Security: Top 10 SIEM Implementer’s Checklist
sponsored by AccelOps Inc.
WHITE PAPER: This informative whitepaper outlines 10 best practices for successful SIEM implementation.
Posted: 23 Jun 2014 | Published: 23 Jun 2014

AccelOps Inc.

Phishing: The Latest Tactics And Potential Business Impacts
sponsored by Symantec
WHITE PAPER: This informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
Posted: 14 May 2014 | Published: 14 May 2014

Symantec

Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
sponsored by TechTarget Security
WHITE PAPER: Transitioning from Mobile Device Management (MDM) to Enterprise Mobile Management (EMM) can be daunting. Explore the key differences between EMM and MDM, how EMM features support security objectives, strategies to align EMM and MIS departments, and more.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

TechTarget Security

Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett Packard Enterprise

Is It True That the Hybrid Cloud Definition Has Been Lost in Translation?
sponsored by Dell EMC and Intel®
WHITE PAPER: Not all IT pros are on the same page when it comes to the "true" definition of hybrid cloud. And unfortunately, the original definition has been lost in vendor marketing jargon. Download this guide to cut through the vendor jargon and discover the true definition of hybrid cloud, as our experts elaborate on the subject.
Posted: 07 Mar 2017 | Published: 06 Mar 2017

Dell EMC and Intel®