White Papers

 

Displaying 1–15 (of 7004)

Popularity is determined by a calculation of page views and community comments.

Title Date
Get the Most Value Out of Network Security Summary
This resource introduces a Next Generation Intrusion Prevention System (NGIPS) to keep cyber threats at bay and protect your organization's sensitive information, by reducing cost, frequency and impact of attacks.

sponsored by: HP and Intel
12-01-2014
Amazon Web Services: Risk and Compliance Summary
This comprehensive guide will assist AWS customers with integrating AWS into their existing control framework supporting their IT environment. Read on for a risk and compliance overview, and follow along with the AWS risk and compliance program that includes: risk management, control environment, and information security.

sponsored by: Intel Amazon Web Services
11-30-2014
Use Analytics to Find Problems and Avoid Outages Summary
Tune into the following webinar to learn how IBM can help you with operations, performance, analytics, automation and delivery of your IT services in today's complex on-premises, hybrid, and cloud environments.

sponsored by: IBM
10-24-2014
Computer Weekly – 28 October 2014: Securing critical industrial systems Summary
In this week's Computer Weekly, we examine the security threats to the industrial control systems that power the UK's critical national infrastructure. We look at the key considerations when choosing an infrastructure as a service supplier. And we compare six of the top hybrid flash array products. Read the issue now.

sponsored by: ComputerWeekly.com
10-24-2014
Capture: Why it's so Essential to Enterprise Content Mangement Summary
In this AIIM report, learn more about why capture is an essential part of successful enterprise content management (ECM) environments. Discover when to capture, distributing capture, and how to enhance capture by using recognition and automation technologies. The question is not whether you will capture as much as it is when and where.

sponsored by: IBM
10-24-2014
Battle the Evolving Threat Landscape with Dynamic Authentication Strategies Summary
This resource highlights the vital need for dynamic authentication, especially to increase the effectiveness by reducing false positives and false negatives.

sponsored by: SecureAuth
10-24-2014
The Top 5 Security Challenges of Higher Education Summary
This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.

sponsored by: Tenable Network Security
10-24-2014
Unstructured Data Identification and Management Summary
The following white paper examines the seemingly infinite amount of data management problems that face many organizations today and explores an unstructured data identification and management system designed to help alleviate many, if not all of these challenges.

sponsored by: IBM
10-24-2014
Streaming and Visual Data Discovery for the Internet of Things Summary
Tune into the following webcast to learn how companies are leveraging streaming and visual discovery technology to capitalize on the Internet of Things. In addition, hear about the current landscape of the Internet of Things, Industrial Analytics opportunities, and 6 requirements for IoT visualization success.

sponsored by: Datawatch Corporation
10-24-2014
Microsoft Windows Server in a Flash Summary
Read this white paper to learn how you can combine Violin's enterprise-class storage with the ease and capabilities of Windows Storage Server in an integrated solution so you can achieve higher performance and efficiency for your business critical Microsoft applications.

sponsored by: Violin Memory
10-23-2014
Intro to Archive Manager: Cost Effective Data Retention for HP ALM & HP QC Summary
How can you manage every aspect of the application lifecycle, including project archiving This informative webcast discusses one solution to help companies easily and effectively handle data from applications that have been retired.

sponsored by: Avnet Technology Solutions
10-23-2014
Pushing the Boundaries: Symantec’s Software-Defined Data Center Powered by Vmware vCloud Suite Summary
Evolving from an antivirus software company to a global Fortune 500 company, Symantec's mission is to help customers of all sizes secure and manage information. Their goal was to transform enterprise customer support services for faster, responsive service, and improve scalability and agility of IT service.

sponsored by: Symantec Corporation
10-23-2014
Business Process Management Suite Gives Key Reporting Summary
View this brochure now to see information on a platform that provides a new generation of open source BPM and BRM solutions. Providing standards-based modeling, automation, simulation and monitoring of business processes, companies can rapidly adjust based on compliance needs.

sponsored by: Red Hat
10-23-2014
Why Business Agility Matters, Right Now Summary
Find out just how important business agility is to your organization's success, as well as systems such as ERP and the supply chain.

sponsored by: IFS
10-23-2014
Why BYOD? Summary
This white paper will help you start to build a case for BYOD strategy implementation within your enterprise.  Read on to learn more.

sponsored by: Dell Software
10-23-2014

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>