White Papers

 

Displaying 1–15 (of 2686)

Popularity is determined by a calculation of page views and community comments.

Title Date
Why Nasuni Includes Encryption and Local Authentication in Their Security Model Summary
In this white paper learn how you can remove these challenges by adopting this enterprise file system, which provides a security model that combines strong encryption and local authentication with the native capabilities of top-tier cloud storage providers.

sponsored by: Nasuni
12-13-2017
Who Owns Your Data? Summary
7 in 10 users have access to data they shouldn't, according to SailPoint's Market Pulse Survey. This e-book explores IAM and data protection strategies to ensure your organization is taking the correct precautions when protecting access to your data.

sponsored by: SailPoint Technologies
12-12-2017
2017 SAP Australian Digital Experience Report Summary
In this study, learn where businesses are succeeding at digital customer experience management, and where they need to improve.

sponsored by: SAP
12-12-2017
Seven Laws for Universal Data Summary
In this era of digital chaos, explore what you need to have a data management framework that can sort through the mess and provide useful information.

sponsored by: SAP
12-11-2017
Nasuni UniFS – a True Global File System Summary
In this white paper, discover the requirements of today's cloud-based file systems, and how Nasuni's Unified File Share is providing permanent writes to the cloud, local and global data locking, and more.

sponsored by: Nasuni
12-11-2017
SAP Predictive Analytics Gives Cisco Immediate Insights into New Projects Summary
Explore how SAP's predictive analytics technology enabled Cisco Systems to comb through data quickly and spend more time making critical decisions.

sponsored by: SAP India
12-11-2017
Report: IAM Leadership Compass Summary
This 53-page report provides an overview of the market for consumer IAM and provides you with a compass to help you find the IAM strategy that best meets your needs.

sponsored by: Janrain
12-08-2017
Compare the top enterprise file-sync-and-sharing vendors Summary
Enterprise file sync-and-sharing allows for simpler file access and sharing on the consumer and business level, but with so many vendors in the market it can be difficult to compare options. Download this e-guide to learn about the different capabilities of various vendors and what they can do for your mobile EFSS needs.

sponsored by: Insight
12-08-2017
Stopping the Insider Threat Summary
Insider threat is an IAM issue: malicious insiders, by definition, have been granted some level of authorized access and are therefore often harder to detect than bright-line cases of unauthorized access or intrusion. Explore this white paper to gain insight into insider threats and how you can prevent them with a successful IAM approach.

sponsored by: SailPoint Technologies
12-08-2017
What is a Cloud Era File System? Summary
Read this white paper to get a deeper understating of the history of file storage systems, as well as the 6 things that make a cloud era file system unique.

sponsored by: Nasuni
12-07-2017
Advanced and Predictive Analytics Market Study Summary
Discover how business views have changed on advanced and predictive analytics.

sponsored by: TIBCO
12-07-2017
Customer IAM Analysis Summary
In this white paper, gain insight into customer IAM strategies and key capabilities to keep in mind when evaluating the right approach for your organization.

sponsored by: Janrain
12-07-2017
Key Considerations in Selecting a Customer IAM Solution Summary
The rise of the social customer creates opportunities for organizations to develop deeper relationships with customers in support of business objectives. Explore this white paper to gain insight into selecting a customer IAM strategy that works best for your organization.

sponsored by: Janrain
12-07-2017
Top Trends That Will Shape CIAM in 2018 and Beyond Summary
In order for digital businesses to manage, govern, and secure customers' access to systems and data without hurting the customer experience, businesses should implement a customer IAM strategy. This Forrester report details 12 key trends shaping the customer IAM landscape and how security and risk pros can respond to them in a productive manner.

sponsored by: Janrain
12-06-2017
Don't Come Last in a Mobile-First Future Summary
Download this white paper to discover how to overcome the most pressing mobility challenges including device security and management, app development, remote support, mobile data and analytics, and more.

sponsored by: SOTI Inc.
12-06-2017

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>