White Papers

 

Displaying 1–15 (of 10867)

Popularity is determined by a calculation of page views and community comments.

Title Date
Amazon Web Services: An Overview Summary
This whitepaper provides a comprehensive explanation of Amazon Web Services and shows you how it can help your organization.

sponsored by: Global Knowledge
12-01-2014
Get the Most Value Out of Network Security Summary
This resource introduces a Next Generation Intrusion Prevention System (NGIPS) to keep cyber threats at bay and protect your organization's sensitive information, by reducing cost, frequency and impact of attacks.

sponsored by: HP and Intel
12-01-2014
Amazon Web Services: Risk and Compliance Summary
This comprehensive guide will assist AWS customers with integrating AWS into their existing control framework supporting their IT environment. Read on for a risk and compliance overview, and follow along with the AWS risk and compliance program that includes: risk management, control environment, and information security.

sponsored by: Intel Amazon Web Services
11-30-2014
Infographic: Is Your Organization Ready to Enable a Mobile Workforce? Summary
This resource outlines the challenges of effective mobile management and takes a look at how desktop virtualization can help overcome these obstacles.

sponsored by: Cisco Systems, Inc.
10-24-2014
Unstructured Data Identification and Management Summary
The following white paper examines the seemingly infinite amount of data management problems that face many organizations today and explores an unstructured data identification and management system designed to help alleviate many, if not all of these challenges.

sponsored by: IBM
10-24-2014
Vendor Profile: Bridging the Gap Between Enterprise Software and Telco Services Summary
This in-depth Ovum report provides an overview of one company that offers a cost-effective solution for the virtualized communications problem. View this resource now to discover how this vendor can integrate voice and messaging capabilities into your existing business processes and applications.

sponsored by: Twilio
10-24-2014
Web Application Firewall Product Analysis: Fortinet FortiWeb 1000D Summary
So just how effective is the FortiWeb 1000D at accomplishing this? This report from NSS labs provides a comprehensive analysis of the security effectiveness, performance and total costs of this web application firewall offering.

sponsored by: Fortinet, Inc.
10-24-2014
Capture: Why it's so Essential to Enterprise Content Mangement Summary
In this AIIM report, learn more about why capture is an essential part of successful enterprise content management (ECM) environments. Discover when to capture, distributing capture, and how to enhance capture by using recognition and automation technologies. The question is not whether you will capture as much as it is when and where.

sponsored by: IBM
10-24-2014
Best practices for data migration projects Summary
This expert e-guide provides a ten step data center migration checklist to avoid potential risk, as well as expert advice on planning migration projects

sponsored by: Bull
10-24-2014
Nuance Healthcare Solutions: Accelerate Summary
Access this informative white paper to learn about a speech recognition technology that's helping clinicians document the patient's story quickly, conveniently and easily by eliminating typing and mouse-clicks.

sponsored by: Nuance
10-24-2014
The Top 5 Security Challenges of Higher Education Summary
This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.

sponsored by: Tenable Network Security
10-24-2014
Dell Enterprise Mobility Management Summary
This exclusive white paper details everything you need to know about mobility, including an in-depth look at one solution that can give an organization complete control to harness the power of BYOD. Read on to learn more.

sponsored by: Dell Software
10-24-2014
Battle the Evolving Threat Landscape with Dynamic Authentication Strategies Summary
This resource highlights the vital need for dynamic authentication, especially to increase the effectiveness by reducing false positives and false negatives.

sponsored by: SecureAuth
10-24-2014
Dell Business Phone Enables BYOD Summary
The exclusive white paper details a business phone solution that's able to keep up with today's modern worker, a mobile one. Read on to learn more.

sponsored by: Dell Software
10-24-2014
Adopting Strong Authentication and SSO in the Cloud Summary
In this white paper, discover the history behind Office 365 and where it currently stands today. Read on to find out why Microsoft is dealing with security risks and an authentication solution they used to protect the identity of mobile users.

sponsored by: SecureAuth
10-24-2014

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>