White Papers

Channel: Agile Data - Kelle O'Neal RSS Feed for Agile Data - Kelle O'Neal

 

Displaying 1–15 (of 7475)

Popularity is determined by a calculation of page views and community comments.

Title Date
Get the Most Value Out of Network Security Summary
This resource introduces a Next Generation Intrusion Prevention System (NGIPS) to keep cyber threats at bay and protect your organization's sensitive information, by reducing cost, frequency and impact of attacks.

sponsored by: HP and Intel
12-01-2014
Amazon Web Services: Risk and Compliance Summary
This comprehensive guide will assist AWS customers with integrating AWS into their existing control framework supporting their IT environment. Read on for a risk and compliance overview, and follow along with the AWS risk and compliance program that includes: risk management, control environment, and information security.

sponsored by: Intel Amazon Web Services
11-30-2014
Amazon Web Services: Risk and Compliance Summary
This comprehensive guide will assist AWS customers with integrating AWS into their existing control framework supporting their IT environment. Read on for a risk and compliance overview, and follow along with the AWS risk and compliance program that includes: risk management, control environment, and information security.

sponsored by: Intel Amazon Web Services
11-30-2014
Information Security Magazine: September 2014 Summary
Open source software vulnerabilities have security executives worried. Lower your risk by revisiting application security policy and enforcing development best practices.

sponsored by: SearchSecurity.com
09-02-2014
Considerations for Third-Party and Server Appliance Tools Summary
In this expert e-guide, examine what types of tools are available to help IT shops monitor storage performance in VMware server environments. Get advice about, discover the benefits of, and explore the drawbacks of third-party storage performance monitoring tools.

sponsored by: Rackspace
08-30-2014
A Closer Look at Big Storage Architecture Summary
As companies store and analyze an ever-growing volume of data, it can be difficult to stay up to date on all the various categories of storage while deciding which storage architecture is best for your big data needs. In this expert e-guide, explore strengths and use cases for various storage options.

sponsored by: Caringo
08-30-2014
BI Architect Has Options to Tap to Support Expanding Environments Summary
Designing a systems architecture and technology infrastructure that can meet the increasing demands of business intelligence platforms is an exercise in finding the right combination of tools among a multitude of different choices. So how do you do it? Consult the following expert e-guide to find out now.

sponsored by: Actuate
08-29-2014
The Role of the User Experience in Video Conferencing Summary
Many organizations today are starting to realize the benefits of video as a collaborative tool in the workplace, and have begun to implement new strategies.  Workers are working remotely all around the world, and videoconferencing can bring everyone together in one place.

sponsored by: Polycom, Inc.
08-29-2014
Countering Cyber Threats with Behavioral Analytics Summary
This white paper explores how organizations can leverage big data and behavioral analytics in their network to foil the top attacks.

sponsored by: RSA, The Security Division of EMC
08-29-2014
Keys to Purchasing Storage and Subsequent Efficiency Summary
In this expert e-guide learn how to make a smart decision when purchasing storage by knowing what to look for in your solution. Learn how storage administrators can blend business tactics with financial metrics to strategically overcome tight storage budgets while remaining efficient.

sponsored by: EMC Corporation
08-29-2014
DataGravity Architecture Summary
This white paper explores a data-aware storage platform that provides integrated data protection, discovery, search, and file analytics within a state-of-the-art primary storage system that doesn't impede production performance.

sponsored by: DataGravity
08-29-2014
How to Unlock your IT Data with Business Discovery Summary
Consult the following white paper to examine the 5 essential components for successful business discovery and ultimately, a far superior business intelligence strategy as a whole.

sponsored by: QlikTech, Inc.
08-29-2014
Future-proof your mobility strategy with Dell Enterprise Mobility Management Summary
Read this paper to discover best practices to future-proof your mobile strategy in the evolving world of devices, operating systems, work habits and mobile business models. Also, find out how Dell Enterprise Mobility Management (EMM) can help maintain security and control administrative complexity.

sponsored by: Dell Software
08-29-2014
HP Propel, a Solution to Transform IT into a Multi-Supplier Service Broker Summary
This exclusive whitepaper covers what IT must do to stay relevant in the age of modern technologies.

sponsored by: Hewlett-Packard Company
08-29-2014
Next Generation Challenges solved by Solution Data Summary
Check out the following infographic by Solution Data to learn about the first generation of systems specifically designed with the ever-growing big data reality in mind. See how these big data systems can help glean actionable intelligence from data, allow for unlimited access from anywhere, and more.

sponsored by: APX & IBM
08-29-2014

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>