White Papers

 

Displaying 1–15 (of 2040)

Popularity is determined by a calculation of page views and community comments.

Title Date
EMC IT: Leading the Transformation Summary
Check out this research to learn which methods organizations are using to reap the benefits of cloud computing. You'll also examine how one IT approach allows you to transform IT, your organization, and the role of employees in the organization through virtualization, hybrid cloud, and IT-as-a-Service.

sponsored by: EMC
11-26-2014
Data Management Guidelines: Four Records Retention Issues To Address Summary
This e-guide details data management guidelines to help you determine what you should keep when implementing a records retention policy. Learn about four issues that can occur if you retain too much unnecessary data, including access trouble, cost influx, and more.

sponsored by: Symantec Corporation
11-26-2014
BPM Report: How to Improve Process Excellence to Benefit your Organization Summary
In this State of the Industry report, PEX Network researches how companies are approaching operational excellence. What tools and methodologies are they using? What is the outlook for budgets and resources? Access this report to also examine how process excellence can better support the strategic objectives of business execs.

sponsored by: K2
11-25-2014
Enterprise Mobile Security Needs Shift from Devices to Data Summary
In this expert eguide, examine how the mobile security market has evolved in recent years, beginning with the first iPhone in June 2007.

sponsored by: Symantec Corporation
11-21-2014
Insider Edition: Seeking Security in the Cloud, through STAR Summary
Improved capabilities for logging and reporting cloud-based activity are now available, as are new ways for cloud providers to certify and communicate their security postures. This Insider Edition looks at efforts such as the STAR certification and the recently announced CloudTrust protocol.

sponsored by: SearchSecurity.com
11-21-2014
4 Steps to Security Intelligence Summary
Download this brief whitepaper to find out the four steps to security intelligence.

sponsored by: Hewlett-Packard Company
11-21-2014
Computer Weekly – 25 November 2014: Networking keeps Heathrow flying high Summary
In this week's Computer Weekly, we go behind the scenes at Heathrow Airport's new Terminal 2 to see the innovative network supporting operations. We visit the secret location of AT&T's global internet disaster recovery centre. And we assess the risks for HM Revenue & Customs in moving off its IT outsourcing mega-deal. Read the issue now.

sponsored by: ComputerWeekly.com
11-21-2014
Mobile Content Management Summary
The following solution spotlight explores the key elements that point to significant ROI with mobile enterprise content management. Additionally, Holly Group consultant, Steve Weissman, sheds light on security concerns that come with enabling mobile ECM.

sponsored by: IBM
11-21-2014
Identity and Access Governance Buyer's Guide Summary
This Identity and Access Governance Buyer's Guide is designed to help you define requirements for an Identity and Access Governance solution for your enterprise.

sponsored by: Courion Corporation
11-21-2014
The Ins and Outs of Harnessing Hadoop Summary
Hadoop technology has made it easier for organizations to process and analyze big data from both internal and external sources – but there are limits.

sponsored by: SearchBusinessAnalytics
11-21-2014
Case Management and Smart Process Applications Summary
This report looks at the applicability of smart process applications, the drivers for improved case management, and the feature sets required of a modern case management system.

sponsored by: K2
11-20-2014
Protecting Your Business with a More Mature IT Security Strategy Summary
HP Security Intelligence and Operations Consulting has performed maturity assessments evaluating people, processes and technology in 69 SOCs. This report presents their findings on the measured maturity level of SOCs by industry.

sponsored by: Hewlett-Packard Company
11-20-2014
In the Cloud, Big Data's a Big Deal Summary
The public cloud puts big data analytics within reach for even small organizations.

sponsored by: SearchCloudComputing.com
11-20-2014
Ponemon Cost of Cyber Crime Study: Global Report Summary
Ponemon Institute's 2014 Cost of Cyber Crime Study taps into the collective experience of 257 organizations in seven countries, describing the most common and most costly types of attacks; the greatest internal and external costs; and the security technologies most effective in reducing losses.

sponsored by: Hewlett-Packard Company
11-19-2014
2014 Cost of Cyber Crime Study: Australia Summary
This exclusive whitepaper explores the economic impact of cyber-crime on Australia in 2014.

sponsored by: Hewlett-Packard Company
11-19-2014

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>