White Papers

Don't want to miss any new whitepapers?  Subscribe to our whitepaper RSS feed.


Eight Rules for Creating Great White Papers

White papers are one of the most misunderstood, miswritten and misused marketing tools available. While many companies think they need a white paper, few manage to write, design or use them to their full potential. This is unfortunate, because – written and applied well – white papers are one of the most powerful tools in the sales and marketing toolkit.


Desktop Authority: USB and Port Security Option

The myriad of portable storage mediums today make it essential for corporations to prohibit or monitor the use of certain devices on the company network that can be potentially harmful to a corporation. Confidential data can easily be copied to any portable device, viruses can be introduced to the network and spread corporate wide and illegal software and content can be copied to the company network.


Tripwire: Proactively Reduce Risk and Improve IT Security in Physical and Virtual Enviroments

Securing the IT infrastructure in today’s computing environment may well be the biggest challenge faced by organizations. Not only must organizations ensure the integrity of their systems and data, but often they must also prove that their security processes and policies measure up against standards and regulations established and enforced by national standards-developing entities. In addition, the recent popularization of virtualized environments adds a new layer of complexity to the security picture. Businesses are just beginning to comprehend the security implications of these environments.


ScriptLogic: Effective Desktop Management Under FDCC

The Federal Desktop Core Configuration (FDCC) standards have created a unique set of challenges for federal agency IT departments. While the current focus has been on scanning and reporting compliance rates, future efforts will be centered on successfully improving compliance through effective policy and exception management. Native tools provide some of the capabilities, but to really effectively manage the desktop in an FDCC environment; more granular management options are needed. This paper is intended to introduce some of those challenges and provide some options for resolving them.


maXecurity: The Next Generation of Web Access Management

A large financial institution used a competitive product for Web Access Management. By working with P2 Security, the company was able to determine its true Total Cost of Ownership (TCO). An analysis following the installation of maXecurity revealed annual cost savings of millions of dollars per year. In addition, by switching to maXecurity, the Return on Investment (ROI) was measured in months.


The Primer: Nuts and Bolts of Federated Identity Management

For any IT department, it is imperative to understand how your organization can securely manage and control users’ identities. With so many employees accessing up to thirty different resources over the Internet to do their daily jobs—often with thirty different usernames and passwords—organizations are struggling to maintain a secure working environment. This white paper provides an introduction to leveraging user credentials securely through federated identity management.


HID Global – Physical Security on the Edge

While traditional solutions for integrating physical and logical access have historically been intrusive, difficult to deploy and very costly, a new generation of access control solutions that are IP-enabled are paving the way for organizations to make what once was a futuristic scenario, a viable reality. HID Global is meeting these security challenges head on with its new Edge™ Family of IP-based access solutions.


maXecurity: The Next Generation of Web Access Management

A large financial institution used a competitive product for Web Access Management. By working with P2 Security, the company was able to determine its true Total Cost of Ownership (TCO). An analysis following the installation of maXecurity revealed annual cost savings of millions of dollars per year. In addition, by switching to maXecurity, the Return on Investment (ROI) was measured in months.




Mail-SeCure – A Complete Perimeter Security Solution

Protecting ones network from hostile attacks has become a full time job. Especially today, when networks have become an easy target for hackers, intruders, abusers, Email Viruses, Worms, Trojan-horses, Phishing, Spam and DoES (Denial of Email Service).


Two-Factor Authentication Without Tokens: PhoneFactor ™

For most companies, information security is a top priority. Demand for protecting data and employee confidentiality is only continuing to grow, especially in industries that require a regulatory-compliant environment. However, applying usernames and passwords for authentication is insufficient. While two-factor authentication is an effective security solution, traditional token-based systems have been difficult to implement and administer, leading to limited adoption.


Free e-News Subscription

Security Today newsletter provides essential industry news and product information that can help you stay afloat in the fast-paced world of security.

I agree to this site's Privacy Policy