White Papers

 

Displaying 1–15 (of 11959)

Popularity is determined by a calculation of page views and community comments.

Title Date
The Evolving Risk Landscape Summary
There was nearly a 22% increase in attacks on web applications from 2016 to 2017. While apps have increased productivity, they have also opened the door to unprecedented threats, expanding the risk landscape and putting corporate data at risk. This e-book offers a guide to protecting against web fraud, credential stuffing, ransomware, and phishing.

sponsored by: F5 Networks
11-20-2017
Why User Stories Fail and How to Jumpstart your Stalled Agile Transition Summary
Discover how to align traditional requirements and Agile user stories with automated process models to get key development projects back on track.

sponsored by: Blueprint Software
11-20-2017
Hyland Ensures Growth with High-Performance, Intelligent Network Security Summary
In this case study, discover how Hyland, a developer of enterprise content management solutions was empowered to build a stronger network security strategy that allowed employees to collaborate freely with each other, customers and partners with no impediments.

sponsored by: Juniper Networks, Inc.
11-20-2017
Next-Generation Firewalls: The Cornerstone of Future Security Summary
Inside, learn about one offering that combines network, cloud and endpoint security capabilities, and enables them all with accurate threat intelligence to prevent successful cyber breaches. Read on to find 6 key abilities of this offering that make it stand out

sponsored by: Palo Alto Networks
11-20-2017
All Together Now: Securing the Internet of Things Summary
In this white paper, learn how deeper visibility into IoT device's network utilization and behavior can help improve both network management and network security. Then, uncover the tools and techniques IT pros can implement for stronger IoT security.

sponsored by: Juniper Networks, Inc.
11-20-2017
How to Secure your Network Smarter and Faster Summary
In this resource, learn about Junos Space Security Director to help manage and automate workflows, allowing network administrators to monitor applications and users and remediate security threats faster across all firewalls.

sponsored by: Juniper Networks, Inc.
11-20-2017
Improving Success For Agile and DevOps Projects Summary
Learn how to overcome the 3 main obstacles that stand in the way of enterprise-class Agile and DevOps project success.

sponsored by: Blueprint Software
11-20-2017
The IT Guide to Synthetic Monitoring Summary
Read this white paper to gain a stronger understanding how synthetic monitoring can help IT team's manage and track the performance of today's SaaS and web applications and networks.

sponsored by: AppNeta
11-20-2017
Case Study: Incident Response Time Savings and Compliance Ease Summary
This case study explores how ESB energy company overcame its challenges of having limited IT staff resources, a growing compliance burden, and numerous threats from hackers. Uncover how ESB overcame these issues by implementing a vulnerability management approach alongside an incident detection response strategy.

sponsored by: Rapid 7
11-20-2017
Real-Time Threat Prevention Lets Managed IT Services Provider Vology Thrive Summary
In this case study, learn how deploying a cloud-based security system gave the IT consulting company Vology both the protection they need to fight against today's threats, and the ability to learn and grow from each attack that comes their way

sponsored by: Juniper Networks, Inc.
11-20-2017
3 Critical Steps to Business Continuity and Availability in Financial Services Summary
In this white paper, read about how the definition of "business continuity" has evolved not only in financial services, but across both the public and private sectors. Then learn the 3 steps that any business needs to take in order to ensure the uptime today's customers expect.

sponsored by: Veeam Software
11-20-2017
Monitoring Critical Users Builds Credibility at UCaaS Leader Summary
In this case study, learn how AppNeta network monitoring tools can help your organization troubleshoot issues faster and alert your IT team when a customer is nearing the limit of bandwidth.

sponsored by: AppNeta
11-20-2017
PowWow SmartUX™ & Blackberry Dynamics® Summary
Discover how to simplify and extend business apps to mobile to transform how work is done with anywhere, anytime access to apps and data. Plus, learn about low-code tools like the PowWow SmartUX platform, built to create apps that run on any device and any OS.

sponsored by: PowWow
11-20-2017
How To Scale Your SaaS With Public Cloud Analytics Summary
Every organization is at a different stage in their cloud journey, but no matter how far along you are, how you monitor applications running on both public and private cloud infrastructures is critical. In this e-book, gain insight into how to use metrics-driven analytics to address these new monitoring demands, cut cloud costs, and more.

sponsored by: VMware
11-20-2017
Computer Weekly – 21 November 2017: What can intent-based networking do for you? Summary
In this week's Computer Weekly, intent-based networking promises to optimise networks through automation and analytics, but can it deliver? Gartner says the CIO role continues to evolve and IT leaders need to champion digital change – we examine the issues. And we find out how security analytics can help deal with cyber threats. Read the issue now.

sponsored by: ComputerWeekly.com
11-17-2017

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>