White Papers

Channel: In Search of Wisdom - Frank Buytendijk RSS Feed for In Search of Wisdom - Frank Buytendijk

 

Displaying 1–15 (of 11447)

Popularity is determined by a calculation of page views and community comments.

Title Date
Amazon Web Services: Risk and Compliance Summary
This comprehensive guide will assist AWS customers with integrating AWS into their existing control framework supporting their IT environment. Read on for a risk and compliance overview, and follow along with the AWS risk and compliance program that includes: risk management, control environment, and information security.

sponsored by: Amazon Web Services
11-30-2014
Report: Forrester Total Economic Impact of SVN MultiSite Summary
A recent Forrester Research Total Economic Impact (TEI) Report revealed that SVN MultiSite delivered a return on investment (ROI) of 357%. Forrester's TEI methodology measures costs and cost reduction, and weighs the enabling value of a technology in increasing the effectiveness of overall business processes.

sponsored by: WANdisco
07-31-2014
Strengthening and Simplifying Enterprise Security and Data Protection Summary
This informative white paper describes one company's comprehensive portfolio of security and data protection solutions.

sponsored by: CDW Corporation
07-22-2014
8 Noble Truths of Backup and Recovery Summary
This exclusive whitepaper details eight guidelines you must follow in order to ensure effective backup and recovery for your data.

sponsored by: Acronis
07-21-2014
Application Delivery Optimization: Business And Technology Issues Summary
This expert e-guide discusses the challenges of the virtual enterprise, why response time is key for application optimization and more.

sponsored by: CA Technologies.
07-21-2014
Kicking off an e-health revolution Summary
It has been hailed as the next big thing for many years but, it is fair to say, e-health has failed to fulfill its potential. Issues around cost, ease of use and privacy have held back its adoption. Now, find out how Telefonica hopes to kick start the e-health revolution.

sponsored by: ComputerWeekly.com
07-21-2014
Low-Code Application Solutions for High-Turn Delivery Summary
Explore this brief resource to see why many companies are choosing low-code platforms over traditional hand-coded development platforms. Read on to discover the advantages that low-code platforms provide, including the ability to lower barriers between requirements and delivery.

sponsored by: K2
07-21-2014
IPS/IDS: Innovations, Changes and How to Solve Your Problems Summary
This expert e-guide explores recent innovations to IDS/IPS technologies and outlines strategies for solving breach detection issues.

sponsored by: IBM
07-21-2014
Solution Spotlight: Threat Intelligence Can Give Enterprise Security the Upper Hand Summary
In this expert e-guide, discover how threat intelligence can go hand in hand with new technology—and how to avoid system vulnerabilities for security purposes.

sponsored by: IBM
07-21-2014
Computer Weekly – 22 July 2014: Time to get serious about endpoint security Summary
In this week's Computer Weekly, with billions of devices joining corporate networks every year, our latest buyer's guide looks at endpoint security. IBM and Apple have announced plans to work together on corporate mobility – we analyse what the deal means for IT leaders. And we take an in-depth look at in-memory databases. Read the issue now.

sponsored by: ComputerWeekly.com
07-21-2014
Make Data Make Sense: IBM Watson Foundations Summary
Tune into the following brief video to learn about IBM Watson, an analytics platform that can turn virtually any amount of data into insights within seconds. Hear how this technology helped many leading companies make smarter decisions, gain deeper insights into their data, and more.

sponsored by: IBM
07-18-2014
11 Best Practices for Mobily Device Management Summary
This informative resource examines how to construct an effective MDM plan, outlining 11 best practices that can help guarantee success.

sponsored by: IBM
07-18-2014
Protection for Every Enterprise: How BlackBerry Security Works Summary
This guide explores BlackBerry 10 and their mobile security methods, as well as their criteria for having the most secure mobile operating system.

sponsored by: BlackBerry
07-18-2014
Keeping Advanced Persistent Threats in Check Summary
This white paper provides valuable information on APTs and proposes one company's comprehensive next-generation security solution.

sponsored by: CDW Corporation
07-18-2014
Leverage Data to Enhance Customer Experiences Summary
This e-guide highlights how Disney, Cincinnati Bell, and other organizations can benefit from digital data and analytics to help improve customer experiences. Don't let valuable data slip through your fingers -- read now to learn how to take advantage of available customer information that results in maximum benefits for you and your customers.

sponsored by: Invenio Marketing
07-18-2014

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>