White Papers

 

Displaying 1–15 (of 8596)

Popularity is determined by a calculation of page views and community comments.

Title Date
Next-Generation Firewalls: The Cornerstone of Future Security Summary
Inside, learn about one offering that combines network, cloud and endpoint security capabilities, and enables them all with accurate threat intelligence to prevent successful cyber breaches. Read on to find 6 key abilities of this offering that make it stand out

sponsored by: Palo Alto Networks
11-20-2017
Achieve SIEM Solution Success Summary
In order to unify data, reliably detect attacks, and identify risk across your organization, a SIEM deployment is necessary. This white paper offers Gartner's 6 challenges of the main causes behind failed SIEM deployments and suggests an approach to implementing a successful SIEM platform while keeping these challenges in mind.

sponsored by: Rapid 7
11-20-2017
How To Scale Your SaaS With Public Cloud Analytics Summary
Every organization is at a different stage in their cloud journey, but no matter how far along you are, how you monitor applications running on both public and private cloud infrastructures is critical. In this e-book, gain insight into how to use metrics-driven analytics to address these new monitoring demands, cut cloud costs, and more.

sponsored by: VMware
11-20-2017
How to Secure your Network Smarter and Faster Summary
In this resource, learn about Junos Space Security Director to help manage and automate workflows, allowing network administrators to monitor applications and users and remediate security threats faster across all firewalls.

sponsored by: Juniper Networks, Inc.
11-20-2017
All Together Now: Securing the Internet of Things Summary
In this white paper, learn how deeper visibility into IoT device's network utilization and behavior can help improve both network management and network security. Then, uncover the tools and techniques IT pros can implement for stronger IoT security.

sponsored by: Juniper Networks, Inc.
11-20-2017
Monitoring Critical Users Builds Credibility at UCaaS Leader Summary
In this case study, learn how AppNeta network monitoring tools can help your organization troubleshoot issues faster and alert your IT team when a customer is nearing the limit of bandwidth.

sponsored by: AppNeta
11-20-2017
PowWow SmartUX™ & Blackberry Dynamics® Summary
Discover how to simplify and extend business apps to mobile to transform how work is done with anywhere, anytime access to apps and data. Plus, learn about low-code tools like the PowWow SmartUX platform, built to create apps that run on any device and any OS.

sponsored by: PowWow
11-20-2017
Case Study: Buyer's Remorse No More Summary
Explore this case study to discover how a finance company, after being hacked, was able to secure incredibly sensitive client information by implementing a testing framework alongside a vulnerability management platform.

sponsored by: Rapid 7
11-20-2017
Case Study: Incident Response Time Savings and Compliance Ease Summary
This case study explores how ESB energy company overcame its challenges of having limited IT staff resources, a growing compliance burden, and numerous threats from hackers. Uncover how ESB overcame these issues by implementing a vulnerability management approach alongside an incident detection response strategy.

sponsored by: Rapid 7
11-20-2017
3 Critical Steps to Business Continuity and Availability in Financial Services Summary
In this white paper, read about how the definition of "business continuity" has evolved not only in financial services, but across both the public and private sectors. Then learn the 3 steps that any business needs to take in order to ensure the uptime today's customers expect.

sponsored by: Veeam Software
11-20-2017
3 Critical Steps to Health Care Business Continuity Summary
Like many industries, healthcare has become increasingly digitized. Everything from patient records to billing is taking place online. Read on to find 3 steps to take that are necessary to ensure high availability in not only the healthcare industry, but any organization's digital transformation journey.

sponsored by: Veeam Software
11-20-2017
Damage Control: The Impact of Critical IT Incidents Summary
IT incidents result in annual costs running into millions of dollars, while the average organization is dealing with hundreds of incidents every week. This paper provides understanding into a research report analyzing the impact critical IT incidents have on organizations, which halt business processes and impact users.

sponsored by: Splunk
11-20-2017
Becoming a People Company: The Way to Unlock Fast-Track Growth Summary
The workplace and its demands are always changing. That can pose a challenge for attracting, engaging and retaining the best people. This white paper explores survey results of what over 500 HR leaders find to be the best ways to keep up with the industries rapidly changing landscape.

sponsored by: Sage (UK) Limited
11-17-2017
Unleash Intelligent Disruption with a Modern Data Warehouse Summary
Find out how to accelerate data warehouse modernization with advanced data management for Microsoft Azure. Learn how to provide greater access to data for faster decision-making powered by machine-learning.

sponsored by: INFORMATICA
11-17-2017
The Total Economic Impact™ Of Zendesk Summary
Discover how your organization can provide friction-free customer service experiences, with technology that taps into 5 functional areas, as well as Forrester's Total Economic Impact framework to choose the best customer relationship platform for your business.

sponsored by: Zendesk
11-17-2017

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>