White Papers

 

Displaying 1–15 (of 6728)

Popularity is determined by a calculation of page views and community comments.

Title Date
Get the Most Value Out of Network Security Summary
This resource introduces a Next Generation Intrusion Prevention System (NGIPS) to keep cyber threats at bay and protect your organization's sensitive information, by reducing cost, frequency and impact of attacks.

sponsored by: HP and Intel
12-01-2014
Amazon Web Services: Risk and Compliance Summary
This comprehensive guide will assist AWS customers with integrating AWS into their existing control framework supporting their IT environment. Read on for a risk and compliance overview, and follow along with the AWS risk and compliance program that includes: risk management, control environment, and information security.

sponsored by: Intel Amazon Web Services
11-30-2014
Amazon Web Services: Risk and Compliance Summary
This comprehensive guide will assist AWS customers with integrating AWS into their existing control framework supporting their IT environment. Read on for a risk and compliance overview, and follow along with the AWS risk and compliance program that includes: risk management, control environment, and information security.

sponsored by: Intel Amazon Web Services
11-30-2014
A Closer Look at Big Storage Architecture Summary
As companies store and analyze an ever-growing volume of data, it can be difficult to stay up to date on all the various categories of storage while deciding which storage architecture is best for your big data needs. In this expert e-guide, explore strengths and use cases for various storage options.

sponsored by: Caringo
08-30-2014
Considerations for Third-Party and Server Appliance Tools Summary
In this expert e-guide, examine what types of tools are available to help IT shops monitor storage performance in VMware server environments. Get advice about, discover the benefits of, and explore the drawbacks of third-party storage performance monitoring tools.

sponsored by: Rackspace
08-30-2014
How to Unlock your IT Data with Business Discovery Summary
Consult the following white paper to examine the 5 essential components for successful business discovery and ultimately, a far superior business intelligence strategy as a whole.

sponsored by: QlikTech, Inc.
08-29-2014
BI Architect Has Options to Tap to Support Expanding Environments Summary
Designing a systems architecture and technology infrastructure that can meet the increasing demands of business intelligence platforms is an exercise in finding the right combination of tools among a multitude of different choices. So how do you do it? Consult the following expert e-guide to find out now.

sponsored by: Actuate
08-29-2014
How Videoconferencing is Changing Unified Communications Summary
Organizations are moving beyond justifying videoconferencing based on travel avoidance. Instead, they're interested in enhancing collaboration and improving business outcomes.

sponsored by: Cisco Systems, Inc.
08-29-2014
Expert Advice For Managing a Successful BI Strategy Summary
The following expert e-guide highlights the critical responsibility business users have in leveraging reports and BI dashboards to strengthen strategies. Additionally, learn how to keep these reports simple, so that both IT and business departments can get involved in finding ways to improve business performance.

sponsored by: Actuate
08-29-2014
Countering Cyber Threats with Behavioral Analytics Summary
This white paper explores how organizations can leverage big data and behavioral analytics in their network to foil the top attacks.

sponsored by: RSA, The Security Division of EMC
08-29-2014
DataGravity Architecture Summary
This white paper explores a data-aware storage platform that provides integrated data protection, discovery, search, and file analytics within a state-of-the-art primary storage system that doesn't impede production performance.

sponsored by: DataGravity
08-29-2014
Enabling devices and device management for your mobility/BYOD program Summary
Read this white paper to learn how to support employees with the best devices to increase flexibility, productivity and job satisfaction. Get tips on how to reduce IT complexity as you manage a wider variety of devices, operating systems and user needs. Also, find out how Dell devices and Enterprise Mobility Management can help.

sponsored by: Dell Software
08-29-2014
A Closer Look at Archiving Data and Unified Storage Summary
In this expert e-guide, learn data archiving best practices to help you better understand the process as well as decide what data to move. Also learn why our experts believe unified storage can be beneficial in virtual server environments and examine specific examples.

sponsored by: Imation Corp.
08-29-2014
Future-proof your mobility strategy with Dell Enterprise Mobility Management Summary
Read this paper to discover best practices to future-proof your mobile strategy in the evolving world of devices, operating systems, work habits and mobile business models. Also, find out how Dell Enterprise Mobility Management (EMM) can help maintain security and control administrative complexity.

sponsored by: Dell Software
08-29-2014
APIs Fueling the Connected Car Opportunity Summary
The complexity of the connected car ecosystem creates a range of new development, integration, and security challenges. This whitepaper considers some of the many auto embedded systems, and how developers can successfully integrate them with the lives of today's consumers.

sponsored by: CA Technologies.
08-29-2014

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>