White Papers

Channel: Christine Connors RSS Feed for Christine Connors

 

Displaying 1–15 (of 3474)

Popularity is determined by a calculation of page views and community comments.

Title Date
Why Nasuni Includes Encryption and Local Authentication in Their Security Model Summary
In this white paper learn how you can remove these challenges by adopting this enterprise file system, which provides a security model that combines strong encryption and local authentication with the native capabilities of top-tier cloud storage providers.

sponsored by: Nasuni
12-13-2017
Who Owns Your Data? Summary
7 in 10 users have access to data they shouldn't, according to SailPoint's Market Pulse Survey. This e-book explores IAM and data protection strategies to ensure your organization is taking the correct precautions when protecting access to your data.

sponsored by: SailPoint Technologies
12-12-2017
Seven Laws for Universal Data Summary
In this era of digital chaos, explore what you need to have a data management framework that can sort through the mess and provide useful information.

sponsored by: SAP
12-11-2017
The data center network manager's guide to the future Summary
A data center network manager needs to be alert and ready for new challenges. This guide outlines what's coming and how to keep data center operations flowing.

sponsored by: SearchNetworking.com
12-11-2017
Nasuni UniFS – a True Global File System Summary
In this white paper, discover the requirements of today's cloud-based file systems, and how Nasuni's Unified File Share is providing permanent writes to the cloud, local and global data locking, and more.

sponsored by: Nasuni
12-11-2017
You Need an Action Plan for the GDPR Summary
It's time to create an action plan to tackle GDPR. This 10-page Forrester Report offers GDPR assistance to security and privacy professionals in preparing data protection strategies to comply with 5 core requirements of the regulation.

sponsored by: SailPoint Technologies
12-11-2017
Stopping the Insider Threat Summary
Insider threat is an IAM issue: malicious insiders, by definition, have been granted some level of authorized access and are therefore often harder to detect than bright-line cases of unauthorized access or intrusion. Explore this white paper to gain insight into insider threats and how you can prevent them with a successful IAM approach.

sponsored by: SailPoint Technologies
12-08-2017
What is a Cloud Era File System? Summary
Read this white paper to get a deeper understating of the history of file storage systems, as well as the 6 things that make a cloud era file system unique.

sponsored by: Nasuni
12-07-2017
Customer IAM Analysis Summary
In this white paper, gain insight into customer IAM strategies and key capabilities to keep in mind when evaluating the right approach for your organization.

sponsored by: Janrain
12-07-2017
Key Considerations in Selecting a Customer IAM Solution Summary
The rise of the social customer creates opportunities for organizations to develop deeper relationships with customers in support of business objectives. Explore this white paper to gain insight into selecting a customer IAM strategy that works best for your organization.

sponsored by: Janrain
12-07-2017
Getting the Most out of Data with SAP Summary
Find out how SAP can help you realize the full value of your data by transforming it into real-time and predictive insights while maintaining better data quality and establishing a single source of truth.

sponsored by: SAP
12-07-2017
The State of Backup In 2017 Summary
This e-book explores the history of backup, from 9-track tapes all the way up through today's cloud-targeted systems. Click inside to learn why many of today's backup systems still don't instill confidence, and what technologies may be just over the horizon.

sponsored by: Nasuni
12-06-2017
Top Trends That Will Shape CIAM in 2018 and Beyond Summary
In order for digital businesses to manage, govern, and secure customers' access to systems and data without hurting the customer experience, businesses should implement a customer IAM strategy. This Forrester report details 12 key trends shaping the customer IAM landscape and how security and risk pros can respond to them in a productive manner.

sponsored by: Janrain
12-06-2017
Don't Come Last in a Mobile-First Future Summary
Download this white paper to discover how to overcome the most pressing mobility challenges including device security and management, app development, remote support, mobile data and analytics, and more.

sponsored by: SOTI Inc.
12-06-2017
IT Managers Weigh in on Biggest Benefits of Big Data Analytics Summary
Find out how businesses use big data to become more data-driven and get a better understanding of their customers.

sponsored by: Hortonworks
12-06-2017

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>