White Papers

 

Displaying 1–15 (of 2030)

Popularity is determined by a calculation of page views and community comments.

Title Date
Enterprise Mobile Security Needs Shift from Devices to Data Summary
In this expert eguide, examine how the mobile security market has evolved in recent years, beginning with the first iPhone in June 2007.

sponsored by: Symantec Corporation
11-21-2014
Insider Edition: Seeking Security in the Cloud, through STAR Summary
Improved capabilities for logging and reporting cloud-based activity are now available, as are new ways for cloud providers to certify and communicate their security postures. This Insider Edition looks at efforts such as the STAR certification and the recently announced CloudTrust protocol.

sponsored by: SearchSecurity.com
11-21-2014
4 Steps to Security Intelligence Summary
Download this brief whitepaper to find out the four steps to security intelligence.

sponsored by: Hewlett-Packard Company
11-21-2014
Mobile Content Management Summary
The following solution spotlight explores the key elements that point to significant ROI with mobile enterprise content management. Additionally, Holly Group consultant, Steve Weissman, sheds light on security concerns that come with enabling mobile ECM.

sponsored by: IBM
11-21-2014
The Ins and Outs of Harnessing Hadoop Summary
Hadoop technology has made it easier for organizations to process and analyze big data from both internal and external sources – but there are limits.

sponsored by: SearchBusinessAnalytics
11-21-2014
Identity and Access Governance Buyer's Guide Summary
This Identity and Access Governance Buyer's Guide is designed to help you define requirements for an Identity and Access Governance solution for your enterprise.

sponsored by: Courion Corporation
11-21-2014
Computer Weekly – 25 November 2014: Networking keeps Heathrow flying high Summary
In this week's Computer Weekly, we go behind the scenes at Heathrow Airport's new Terminal 2 to see the innovative network supporting operations. We visit the secret location of AT&T's global internet disaster recovery centre. And we assess the risks for HM Revenue & Customs in moving off its IT outsourcing mega-deal. Read the issue now.

sponsored by: ComputerWeekly.com
11-21-2014
Case Management and Smart Process Applications Summary
This report looks at the applicability of smart process applications, the drivers for improved case management, and the feature sets required of a modern case management system.

sponsored by: K2
11-20-2014
Protecting Your Business with a More Mature IT Security Strategy Summary
HP Security Intelligence and Operations Consulting has performed maturity assessments evaluating people, processes and technology in 69 SOCs. This report presents their findings on the measured maturity level of SOCs by industry.

sponsored by: Hewlett-Packard Company
11-20-2014
Protecting Your Business with a More Mature IT Security Strategy Summary
HP Security Intelligence and Operations Consulting has performed maturity assessments evaluating people, processes and technology in 69 SOCs. This report presents their findings on the measured maturity level of SOCs by industry.

sponsored by: Hewlett-Packard Company
11-20-2014
In the Cloud, Big Data's a Big Deal Summary
The public cloud puts big data analytics within reach for even small organizations.

sponsored by: SearchCloudComputing.com
11-20-2014
2014 Cost of Cyber Crime Study: Australia Summary
This exclusive whitepaper explores the economic impact of cyber-crime on Australia in 2014.

sponsored by: Hewlett-Packard Company
11-19-2014
Redbook: Building IBM Enterprise Content Management Solutions From End to End Summary
This IBM Redbooks publication introduces and highlights some of the IBM ECM products that can be implemented and integrated together to create end-to-end ECM solutions.

sponsored by: IBM
11-19-2014
Enterprise Mobility Management Envelops Data as Well as Devices Summary
IT admins may be confused about MDM, MIM and MAM, but each is part of the evolving mobility management market. BYOD policies must account for applications, data and devices.

sponsored by: SearchConsumerization.com
11-18-2014
Putting Big Data Technology in its Place Summary
Businesses must evaluate what big data technology they need most – whether it's Hadoop or in-memory analytics tools, finding the right fit takes planning.

sponsored by: SearchDataManagement
11-18-2014

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>