White Papers

 

Displaying 1–15 (of 10464)

Popularity is determined by a calculation of page views and community comments.

Title Date
Get the Most Value Out of Network Security Summary
This resource introduces a Next Generation Intrusion Prevention System (NGIPS) to keep cyber threats at bay and protect your organization's sensitive information, by reducing cost, frequency and impact of attacks.

sponsored by: HP and Intel
12-01-2014
Amazon Web Services: An Overview Summary
This whitepaper provides a comprehensive explanation of Amazon Web Services and shows you how it can help your organization.

sponsored by: Global Knowledge
12-01-2014
Amazon Web Services: Risk and Compliance Summary
This comprehensive guide will assist AWS customers with integrating AWS into their existing control framework supporting their IT environment. Read on for a risk and compliance overview, and follow along with the AWS risk and compliance program that includes: risk management, control environment, and information security.

sponsored by: Intel Amazon Web Services
11-30-2014
Monitoring your Citrix 7.5 Desktop environment using System Center 2012 Operations Manager Summary
Join us to learn how Comtrade's XenDesktop and XenApp 7.6 Management Pack for System Center Operations Manager (SCOM) can enhance your monitoring and management capabilities, helping proactively identify issues before they impact your users.

sponsored by: Citrix Ready and ComTrade
09-30-2014
How to survive security risks within a BYOD environment Summary
Mobile device security is a moving target, and requires organizations to stay up-to-date on not just the threats, but also on the technology that defends against those threats. So how do you do it? Consult the following white paper to find out now including the technology to consider and more.

sponsored by: Dell, Inc. and Windows 8 Pro
09-30-2014
How LeapFrog handled their BYOD project with Citrix Summary
LeapFrog Enterprises, Inc, a leader in educations entertainment for children, needed a better way to manage corporate and BYOD devices at scale, improve the ease of use for administrators and help desk, and to ensure that their data was secure. The following case study explores their journey and how they attained these benefits with Citrix.

sponsored by: Citrix
09-30-2014
Shift Your Business into a Higher Gear with In-Memory Platform Summary
Learn how the SAP HANA platform takes advantage of the advanced, enterprise-class capabilities of the Intel Xeon processor E7 v2 family to break down long-standing technology barriers and deliver transformative business value.

sponsored by: SAP & Intel
09-30-2014
Replatforming Your E-commerce Site: 10 Best Practices For Cross-Channel Retailers Summary
The following white paper examines the biggest issues with first-generation e-commerce solutions and offers insight into why replatforming holds the answers to successful growth. Read on to uncover the top 10 best practices for replatforming and more.

sponsored by: OmniTi
09-30-2014
How technology can help you address six of the biggest challenges and opportunities in a changing environment. Summary
IT departments increasingly find themselves confronted with the challenge to overcome the restrictions of ad hoc, incompatible and multi-vendor storage and server environments. In this whitepaper, learn how a flexible approach can help you address six of the biggest challenges and opportunities in a changing business environment.

sponsored by: Fujitsu
09-30-2014
Breaking Big: When Big Data Goes Bad Summary
Learn about the differences between conventional data and big data, as well as how those differences put big data environments at a great risk of data quality problems.

sponsored by: Information Builders
09-30-2014
Resolving the Catch-22 of UC&C in Regulated Environments Summary
This white paper explains why organizations in regulated sectors like finance, government, and healthcare have a different set of requirements for cloud-based unified communications and collaboration services, and introduces a suite of email and collaboration tools that meets these needs.

sponsored by: Dimension Data
09-30-2014
Computer Weekly – 30 September 2014: Hacking IT from the inside Summary
In this week's Computer Weekly, car giant Daimler talks about IT security strategy and the benefits of its own in-house hacking team. App developers are under fire for collecting too much personal data – we examine the best practice. And our review of Microsoft's Surface Pro 3 tablet asks whether it can replace the laptop. Read the issue now.

sponsored by: ComputerWeekly.com
09-30-2014
Dresner Advisory Services Wisdom of Crowds® Collaborative BI Market Study, 2014 Edition Summary
Consult the following extensive report to gain a holistic understanding of business intelligence, the tools, and strategies needed to ensure that your projects are a success. Additionally, learn how industry leaders are handling their own initiatives and more.

sponsored by: Information Builders
09-30-2014
2014 Workplace Trends and Salary Guide Summary
Access this guide to get a look at the current state of business. You'll learn about the most challenging issues facing businesses today and get insight into how to handle them. You'll also explore salary trends specific to IT positions for geographic markets across the United States.

sponsored by: Randstad
09-30-2014
Embedding Business Analytics to Improve Your Application's Value Proposition Summary
The best BI solutions provide robust analytical capabilities for non-technical users including intuitive interfaces that make data access and manipulation easy. So when it comes down to it, how do you do it? Consult the following white paper to learn about the tools and strategies to help get you there.

sponsored by: Information Builders
09-30-2014

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>