White Papers


Displaying 1–15 (of 9615)

Popularity is determined by a calculation of page views and community comments.

Title Date
Deployment Guide: Configuring a highly available Microsoft® Exchange Server 2013 environment on a Dell™ PowerEdge™ VRTX Summary
This white paper outlines the best practices for configuring Microsoft Exchange 2013 environment on Dell PowerEdge VRTX architecture.

sponsored by: Dell and Microsoft
CW Nordics November 2017 Summary
The Nordic countries are pace-setters when it comes to digital transformation and although there is a wealth of IT talent in the region, it seems it is not enough.

sponsored by: ComputerWeekly.com
CapitalOnline Builds OpenStack Private Cloud with Red Hat Summary
Download to learn how one cloud provider improved its infrastructure availability, flexibility, and scalability—all while controlling costs—using an OpenStack private cloud. Included is an explanation of how your team can develop and deploy services faster, and achieve greater scalability for agile, collaborative cloud use.

sponsored by: Red Hat
Compliance: Unlocking the Data that Matters Summary
Improving the safety and resilience of the financial markets, along with fighting financial crime, has risen to the top of companies' agendas. In this white paper, uncover compliance challenges for risk teams in the financial sector as well as ways to gain compliance while maintaining the safety of clients' information.

sponsored by: BT
Extend Your Availability Strategy to the Cloud Summary
Backup and availability are the key to ensuring your business can survive and thrive. This white paper explains how IT administrators can build cloud backup services to serve internal customers, such as different subsidiaries or departments. This paper will also simulate the onboarding of a subsidiary, and demonstrate how to test your service.

sponsored by: Veeam Software
Forrester: How To Become A Superstar Security Leader Summary
As an IT leader your fellow executives trust you to protect, support, and drive business performance. However, expectations of IT security have changed with the increase of digital data. Download this Forrester report to read specific examples of how today's top information security professionals are rising to the occasion.

sponsored by: Google Cloud
Security at Scale with Cloud Computing - A Minute in the Life of Google Summary
"No one in today's highly connected world is exempt from security threats like phishing, ransomware, or denial-of-service (DoS) attacks.

sponsored by: Google Cloud
The Most Important Benefit of NFV Summary
In today's competitive landscape, carriers see NFV as the strategy to improve their competitive position. In this resource, discover the 2 most important benefits of NFV to help overcome the challenges of customer demands and the growth of IoT devices.

sponsored by: netElastic Systems
Computer Weekly Buyer's Guide to cloud-native applications Summary
In this 13-page buyer's guide, Computer Weekly looks at how cloud-native apps can boost agility, how a container based platform is built, and what approach developers should have.

sponsored by: ComputerWeekly.com
SaskTel Improves Sales Processes and Service Delivery with Workload Management Summary
Find out how telecommunications company SaskTel implemented workload management technology to optimize sales processes and boost customer experiences across their services.

sponsored by: Genesys
Workload Management: Meet SLA Commitments and Increase Workforce Efficiency Summary
Find out how to deliver a better customer experience and build your competitive advantage by implementing workload management that enables you to expose inefficiencies in your workflows, meet SLA commitments, and increase employee engagement.

sponsored by: Genesys
The Evolving Risk Landscape Summary
There was nearly a 22% increase in attacks on web applications from 2016 to 2017. While apps have increased productivity, they have also opened the door to unprecedented threats, expanding the risk landscape and putting corporate data at risk. This e-book offers a guide to protecting against web fraud, credential stuffing, ransomware, and phishing.

sponsored by: F5 Networks
Achieve SIEM Solution Success Summary
In order to unify data, reliably detect attacks, and identify risk across your organization, a SIEM deployment is necessary. This white paper offers Gartner's 6 challenges of the main causes behind failed SIEM deployments and suggests an approach to implementing a successful SIEM platform while keeping these challenges in mind.

sponsored by: Rapid 7
Network Switches that Connect Businesses to More Efficiency and Control Summary
IT network pros strive to manage an end to end wireless infrastructure and protect sensitive data regularly. In this resource, discover the advantages of D-Link's switching tools to help your organization the basis for secure and reliable business networks.

sponsored by: D-Link
Journey to GDPR Summary
GDPR readiness is critical and a business necessity, but many organizations are struggling with the complex compliance requirements. This article provides information regarding GDPR as well as strategies to ensure you are compliant with the data processing rules.

sponsored by: IBM

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>