WML White Papers

(View All Report Types)
Storage Provider Profile: Red Hat
sponsored by Red Hat
WHITE PAPER: The following white paper profiles a scale-out, open source object-based storage software solution and the benefits it provides for businesses looking for a middle road when integrating data.
Posted: 30 Jun 2014 | Published: 30 Nov 2012

Red Hat

Configuration Cheat Sheet for the New vSphere Web Client
sponsored by Global Knowledge
WHITE PAPER: Check out this detailed cheat sheet which will guide you as you dive into the new vSphere Web Client, and will help you to perform tasks that are not possible on the Windows-based client.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

Global Knowledge

Trust in Cyberspace
sponsored by (ISC)2 UK Ltd
WHITE PAPER: In this white paper, unveil a list of characteristics that define trusted software, which is critical to ensuring its quality and reliability as a secure product.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

(ISC)2 UK Ltd

Toshiba Launches Smart Social Infrastructure Through a Flexible, Scalable Cloud Solution
sponsored by IBM
WHITE PAPER: To advance its initiative, Toshiba required a more flexible, scalable cloud solution capable of supporting a wide range of complex projects. This whitepaper highlights the cloud software Toshiba implemented to provide an extensible cloud management framework.
Posted: 10 Dec 2014 | Published: 30 Apr 2014

IBM

Vendor Landscape: Virtual Backup Software
sponsored by Dell Software
WHITE PAPER: In this white paper, learn how to evaluate virtual backup software to end the arguing between virtual and backup admins. Read on to consider a solution to back up your virtual infrastructure, understand what's new in the virtual backup market, and determine which products are most appropriate for particular use-cases and scenarios.
Posted: 08 Oct 2013 | Published: 08 Oct 2013

Dell Software

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork

SanDisk FlashSoft for VMware vSphere
sponsored by SanDisk Corporation
WHITE PAPER: In this brief white paper, you will get insight into an innovative SanDisk product that accelerates application performance in VMware guest machines.
Posted: 07 May 2013 | Published: 31 Dec 2012

SanDisk Corporation

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.