White Papers

 

Displaying 1–15 (of 1940)

Popularity is determined by a calculation of page views and community comments.

Title Date
Designing a Multilayered, In-Depth Defense Approach to Authentication Summary
This white paper details the logical and administrative layers of security that you should implement to improve your authentication and authorization security posture. Uncover features you should look for in third-party solutions to supplement native security mechanisms.

sponsored by: Dell Software
09-29-2016
Governance, Risk and Compliance (GRC) for the Real World: 4 Pillars of Success Summary
When organizations leave behind clusters of poorly matched tools and avert the rise of siloes, they are better able to meet GRC requirements. Read on to learn more about the four pillars of a successful GRC program, including assess, audit and alert, remediate, and manage.

sponsored by: Dell Software
09-29-2016
Simple Steps to Evolving Your Website Security in 2016 Summary
Learn how to enforce total protection against website security threats, given the evolving threat landscape of 2016. Access this paper to view several simple steps used to evolve your coverage, including how to increase trust and simplify code signing.

sponsored by: Symantec
09-28-2016
Enterprise Applications on Hyperconverged Infrastructure Summary
Access this extensive guide to discover how a hyperconverged infrastructure can meet application needs while eliminating silos and increasing resource utilization.

sponsored by: Nutanix
09-28-2016
How Automated Business Analytics Helped The Children's Cancer Institute Improve Survival Rates Summary
This case study explores how an automated BI platform helped The Children's Cancer Institute to deliver and implement insights in a matter of hours rather than weeks. Find out how they were able to empower both researchers and business users to quickly analyze, share, and act on a unified view of their data with deeper and more consistent insights.

sponsored by: Yellowfin
09-28-2016
TechTarget Salary Survey 2016 APAC Summary
We recently surveyed 450+ IT professionals throughout APAC to determine the major salary, career and geographical mobility trends. Read the results here and find out how you measure up against your peers.

sponsored by: ComputerWeekly.com
09-28-2016
Information Governance: Expert Q&A, New Initiatives and Digital Drive Summary
This e-guide contains a Q&A session with frequent TechTarget contributor Jeffrey Ritter that discusses how compliance and information governance programs can partner up to secure the funding required to meet both their objectives. And learn about new information governance initiatives and how new tech is driving digital information governance.

sponsored by: Globanet Veritas
09-27-2016
UCB Accelerates Clinical Data Analysis with NetApp EF540 Flash Array Summary
In this white paper, learn how UCB, a leading developer in medicines for neural and immune disorder, used flash storage to speed up their data analysis execution and widen data availability in clinical trials.

sponsored by: NetApp
09-26-2016
Predictive Analytics Foretells Consumer Wants on Social Media Summary
Predictive marketing analytics can show companies how to tap and target consumers on the vast and fertile communications real estate known as social media.

sponsored by: SearchContentManagement
09-26-2016
Data Analytics Maps Positive Customer Journeys Summary
Amid the noise of multiple communication channels, data analytics strategies can identify needs, predict behavior and enhance the customer experience.

sponsored by: SearchCRM
09-26-2016
Laying a Strong Foundation: Building your Legal Hold Process with Code42 CrashPlan Summary
This ebook explores an in-house storage system which bridges both your IT and legal departments to automate the collection, storage, and retrieval of data. See how you can safeguard against data loss, perform legal hold on custodian endpoints regardless of operating system platform, set retention policies individually, and more.

sponsored by: Code42
09-23-2016
Annual Thought Leadership Paper: Everything-as-a-Service Summary
Cloud computing is well underway with everything-as-a-service transforming and disrupting IT operations. It's important that government technology leaders realize that these changes are not fads. Use this white paper to learn the driving factors and ramifications of adopting these services and how cloud can be used as a catalyst for innovation.

sponsored by: Pure Storage
09-21-2016
Information Governance Fighting the Exponential Data Curve Summary
Explore how your company can employ information governance strategies to reorganize large pieces of information into digestible segments to maximize their value. See how you can gain real-time insights about the value of the data you receive, utilize a file and classification tool to help provide archiving solutions, and more.

sponsored by: Veritas
09-21-2016
How to Optimize Your Master Data Management Strategy Summary
This expert e-guide explores an integrated approach to master data management (MDM) that incorporates an enterprise data governance program. Inside, you'll find out how to optimize your data quality strategy and learn how to garner business support for your MDM initiative.

sponsored by: IBM
09-21-2016
Computer Weekly – 20 September 2016: Digital giving – transforming Save the Children with technology Summary
In this week's Computer Weekly, we talk to global charity Save the Children to find out how technology is helping to transform its work. We go behind the scenes at the UK's most secretive court as it discusses bulk data surveillance. And we analyse the often contradictory experiences of firms implementing SAP's Hana platform. Read the issue now.

sponsored by: ComputerWeekly.com
09-20-2016

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>