White Papers

Channel: In Search of Wisdom - Frank Buytendijk RSS Feed for In Search of Wisdom - Frank Buytendijk

 

Displaying 1–15 (of 14653)

Popularity is determined by a calculation of page views and community comments.

Title Date
Deciding between DaaS and VDI? Look No Further Summary
What are your peers saying about their desktop virtualization strategies? 46% of IT pros noted 24/7 support as the number one factor in their choice of a DaaS provider. Find out more when you complete this multiple choice survey and get our exclusive Desktop Virtualization Infographic, plus three more free downloads.

sponsored by: TechTarget
10-02-2018
Why User Stories Fail and How to Jumpstart your Stalled Agile Transition Summary
Discover how to align traditional requirements and Agile user stories with automated process models to get key development projects back on track.

sponsored by: Blueprint Software
11-20-2017
Hyland Ensures Growth with High-Performance, Intelligent Network Security Summary
In this case study, discover how Hyland, a developer of enterprise content management solutions was empowered to build a stronger network security strategy that allowed employees to collaborate freely with each other, customers and partners with no impediments.

sponsored by: Juniper Networks, Inc.
11-20-2017
All Together Now: Securing the Internet of Things Summary
In this white paper, learn how deeper visibility into IoT device's network utilization and behavior can help improve both network management and network security. Then, uncover the tools and techniques IT pros can implement for stronger IoT security.

sponsored by: Juniper Networks, Inc.
11-20-2017
Damage Control: The Impact of Critical IT Incidents Summary
IT incidents result in annual costs running into millions of dollars, while the average organization is dealing with hundreds of incidents every week. This paper provides understanding into a research report analyzing the impact critical IT incidents have on organizations, which halt business processes and impact users.

sponsored by: Splunk
11-20-2017
Improving Success For Agile and DevOps Projects Summary
Learn how to overcome the 3 main obstacles that stand in the way of enterprise-class Agile and DevOps project success.

sponsored by: Blueprint Software
11-20-2017
Business Optimization with Workload Management Summary
Many businesses struggle to efficiently manage CRM cases, work items and customer interactions, which negatively impacts employee performance and the overall customer experience. With workload management tools, the business process could see a major change.

sponsored by: Genesys
11-20-2017
Journey to GDPR Summary
GDPR readiness is critical and a business necessity, but many organizations are struggling with the complex compliance requirements. This article provides information regarding GDPR as well as strategies to ensure you are compliant with the data processing rules.

sponsored by: IBM
11-20-2017
The IT Guide to Synthetic Monitoring Summary
Read this white paper to gain a stronger understanding how synthetic monitoring can help IT team's manage and track the performance of today's SaaS and web applications and networks.

sponsored by: AppNeta
11-20-2017
Achieve SIEM Solution Success Summary
In order to unify data, reliably detect attacks, and identify risk across your organization, a SIEM deployment is necessary. This white paper offers Gartner's 6 challenges of the main causes behind failed SIEM deployments and suggests an approach to implementing a successful SIEM platform while keeping these challenges in mind.

sponsored by: Rapid 7
11-20-2017
3 Critical Steps to Health Care Business Continuity Summary
Like many industries, healthcare has become increasingly digitized. Everything from patient records to billing is taking place online. Read on to find 3 steps to take that are necessary to ensure high availability in not only the healthcare industry, but any organization's digital transformation journey.

sponsored by: Veeam Software
11-20-2017
The Hunt for IoT Summary
30.6 million IoT brute force attacks were launched from January 1 to June 30 2017. This white paper provides an analysis of data collected pertaining to the rise of thingbots in Europe, specifically focusing on the Mirai and Persirai bots containing destructive malware.

sponsored by: F5 Networks
11-20-2017
Case Study: Buyer's Remorse No More Summary
Explore this case study to discover how a finance company, after being hacked, was able to secure incredibly sensitive client information by implementing a testing framework alongside a vulnerability management platform.

sponsored by: Rapid 7
11-20-2017
Case Study: Incident Response Time Savings and Compliance Ease Summary
This case study explores how ESB energy company overcame its challenges of having limited IT staff resources, a growing compliance burden, and numerous threats from hackers. Uncover how ESB overcame these issues by implementing a vulnerability management approach alongside an incident detection response strategy.

sponsored by: Rapid 7
11-20-2017
Real-Time Threat Prevention Lets Managed IT Services Provider Vology Thrive Summary
In this case study, learn how deploying a cloud-based security system gave the IT consulting company Vology both the protection they need to fight against today's threats, and the ability to learn and grow from each attack that comes their way

sponsored by: Juniper Networks, Inc.
11-20-2017

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>