White Papers

Channel: In Search of Wisdom - Frank Buytendijk RSS Feed for In Search of Wisdom - Frank Buytendijk

 

Displaying 1–15 (of 14407)

Popularity is determined by a calculation of page views and community comments.

Title Date
Security Solution Trends 2016 Summary
In this report, analysts talk about five trends in the security industry. Uncover details on important changes occurring in the enterprise security space, and platform offerings that have been developed as a result.

sponsored by: Juniper Networks, Inc.
12-04-2016
Best Practices for Dealing With Phishing and Ransomware Summary
There are steps you can take to address phishing and ransomware. Discover how to best mitigate these tremendous threats to decrease the likelihood of infection and the subsequent consequences that come from them.

sponsored by: Trustwave
09-30-2016
Computer Weekly – 27 September 2016: Digital knowledge at the British Library Summary
In this week's Computer Weekly, we find out about the technology plans at the British Library as it aims to store the UK's printed and digital history. Graph database technology is being used to help improve food safety throughout the supply chain. And tech leaders tell us how to architect IT for the cloud. Read the issue now.

sponsored by: ComputerWeekly.com
09-27-2016
Safeguarding Vital Data Is a Battle You Can Win Summary
In this resource, uncover what it means to develop data management and protection policies that reach from the core of the business out to mobile devices, the cloud and beyond. Also, learn how to be ready for whatever security challenges the world sends your way.

sponsored by: Intel Security
09-24-2016
6 Uncomfortable Questions To Ask Your All-Flash Vendor Summary
This eBook is intended to help you see past the smoke and mirrors set up by storage vendors. Ask your vendor these six key, albeit uncomfortable storage questions to quickly get to the bottom of things and gain more control in the storage purchasing process.

sponsored by: Kaminario
09-23-2016
Pure Storage for State and Local Government Summary
Today's consumers expect their governments to use their tax dollars wisely and provide a private-like experience. So how can the government deliver the best, most efficient services to its constituents? Flash storage offers remarkable performance that can modernize legacy application, increase efficiency and decrease cost. Read on to learn more.

sponsored by: Pure Storage
09-23-2016
The Transformative Impact of the Cloud: Hybrid Cloud, Public and Private IaaS, and More Summary
In the following research report from 451 Research, learn about the various adoption patterns with cloud computing and discover if these occurrences are something that will affect you sooner than later. Inside, uncover trends, insights into cloud's best practices, and more.

sponsored by: Hewlett Packard Enterprise
09-23-2016
Your Blueprint to Securing Your Public and Hybrid Cloud Summary
Discover how agile and elastic cloud security solutions need to fundamentally scale protection and segmentation within and across cloud environments. Learn what to look for when on the prowl to protect your enterprise on any and every cloud environment you might find yourself in.

sponsored by: Fortinet, Inc.
09-23-2016
Defining Security for Today’s Cloud Environments Summary
Uncover how today's enterprise data centers are evolving from static internal environments to a mix of private, public, and hybrid clouds. Learn why organizations need to augment traditional firewalls and security appliances with expanded protection for east-west traffic, both within internal networks and across clouds.

sponsored by: Fortinet, Inc.
09-23-2016
Laying a Strong Foundation: Building your Legal Hold Process with Code42 CrashPlan Summary
This ebook explores an in-house storage system which bridges both your IT and legal departments to automate the collection, storage, and retrieval of data. See how you can safeguard against data loss, perform legal hold on custodian endpoints regardless of operating system platform, set retention policies individually, and more.

sponsored by: Code42
09-23-2016
Policing cyber crime Summary
This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space

sponsored by: ComputerWeekly.com
09-23-2016
Better Together: Security and Collaboration with Backup and Box Summary
This white paper examines a modern data mobility and security strategy that incorporates both a file sync and share app along with a comprehensive endpoint data backup platform. Access now to find out why just sync and share isn't enough to stand alone and mitigate the potentially permanent loss of critical data.

sponsored by: Code42
09-23-2016
Computer Weekly 50th anniversary special Summary
It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.

sponsored by: ComputerWeekly.com
09-22-2016
Companies, Digital Transformation and Information Privacy: The Next Steps Summary
The following resource features in-depth interviews with legal, technical, and regulatory subject-matter experts on the digital data privacy debate. Explore challenges and strategies global businesses must face regarding this complex, fluctuating policy environment.

sponsored by: Hewlett Packard Enterprise
09-22-2016
5 Questions to Determine If It's Time for a Storage Upgrade Summary
Many IT departments in education are under immense pressure to deliver improved services with limited resources but most legacy data centers aren't capable of delivering the performance required. Take this five question assessment to determine whether your educational infrastructure could benefit from implementing all-flash storage.

sponsored by: Pure Storage
09-22-2016

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>