White Papers

Channel: BI For the Mid-Market - Lyndsay Wise RSS Feed for BI For the Mid-Market - Lyndsay Wise

 

Displaying 1–15 (of 16115)

Popularity is determined by a calculation of page views and community comments.

Title Date
Reducing Total Cost of Ownership with Flash Storage Summary
This white paper details how Flash has a lower cost of ownership compared to hard disk storage.

sponsored by: NetApp
12-31-1969
Deployment Guide: Configuring a highly available Microsoft® Exchange Server 2013 environment on a Dell™ PowerEdge™ VRTX Summary
This white paper outlines the best practices for configuring Microsoft Exchange 2013 environment on Dell PowerEdge VRTX architecture.

sponsored by: Dell and Microsoft
12-31-1969
Remote Access Your Users Will Love Summary
This informative white paper explores the importance of user experience when considering remote access solutions. Find out how mobile workstyles are bringing remote access to the forefront and the growing challenges users are experiencing with remote access.

sponsored by: Citrix
03-31-2015
Enterprises Reveal Significant Room for Improvement In Their Security Defenses Summary
This resource explores the results of a survey that depicts that lack of confidence that organizations have in their security defenses, and also presents an approach to detecting malware to prevent it from spreading throughout the network.

sponsored by: Hewlett-Packard Company
02-01-2015
A Guide to Improving Your Network Security in 30 Days Summary
This resource highlights a NGFW solution combined with intrusion prevention to cure your network security issues.

sponsored by: Hewlett-Packard Company
02-01-2015
Security Considerations When Undergoing a Network Refresh Summary
This informative whitepaper reviews the threat landscape of 2013 and outlines the most troublesome risks coming your way in 2014.

sponsored by: Hewlett-Packard Company
02-01-2015
8 Ways to Better Monitor Network Security Threats in the Age of BYOD Summary
This helpful white paper takes a look at a number of ways in which security professionals can gain better control of the BYOD explosion and mitigate risk factors before they impact the enterprise.

sponsored by: Hewlett-Packard Company
02-01-2015
Collaborative Defense – HP Security Research Summary
This white paper from HP Security Research demonstrates why collaboration is essential in defending businesses from cyber attacks and how it can work.

sponsored by: Hewlett-Packard Company
02-01-2015
Incident Response: How to Fight Back, A SANS Survey Summary
This SANS survey on incident response taps into the collective knowledge of 259 security professionals in 19 industries and 13 countries to help you to understand how other companies respond to cyber incidents and how you can improve your own response.

sponsored by: Hewlett-Packard Company
02-01-2015
Next Generation Enterprise Network Security Solutions: The Importance of Incorporating Vulnerability Intelligence Summary
This crucial paper surveys today's network security threat landscape, discussing available tools, best practices, and the critical role that vulnerability intelligence must play in your security strategy.

sponsored by: Hewlett-Packard Company
02-01-2015
The Bot Threat Summary
In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.

sponsored by: Hewlett-Packard Company
02-01-2015
Building a Better Network Security Strategy Summary
This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.

sponsored by: Hewlett-Packard Company
02-01-2015
Not Your Father’s IPS: SANS Survey on Network Security Results Summary
Access this analyst report by SANS to uncover how the integration of next-generation IPS with security information and event management (SIEM) tools is changing IT pros approach to security, and how this shift enables improved functions and potential for efficient alert and reporting.

sponsored by: Hewlett-Packard Company
02-01-2015
Cloud Data Security for Financial Services Summary
This white paper explains that banks can ensure the security of sensitive data stored in the public cloud by deploying a Cloud Access Security Broker, which enables banks to deploy a security platform within their own network infrastructure.

sponsored by: BitGlass
01-30-2015
Managing Identity as the New Perimeter Summary
This white paper provides a comprehensive overview of how mobility and virtualization trends are impacting identity and access management (IAM), what solutions are available to address potential challenges, and how to future-proof your identity management strategy for any business scenario.

sponsored by: Ping Identity Corporation
01-30-2015

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>