ASIS White Papers

(View All Report Types)
The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Prevent Downtime: Ascend to Peak Performance with ASI & HP Proactive Care Services
sponsored by ASI Systems
WHITE PAPER: This whitepaper covers the importance of taking a proactive approach in your data center and details a product to help you do so.
Posted: 30 Dec 2013 | Published: 22 May 2013

ASI Systems

How to Get Fast, Effective IT Help
sponsored by ASI Systems
EGUIDE: This whitepaper covers the importance of getting the best IT vendor support possible especially if you rely heavily on IT.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

ASI Systems

What you should know: Hot data backup techniques and trends
sponsored by Hedvig Inc
EGUIDE: One of the new data backup techniques fundamentally changing the way people recover from a storage system failure is recovery-in-place. Discover best use cases and how to fully leverage recovery-in-place. Read on to learn six more business continuity management system trends shaping the industry.
Posted: 15 Feb 2017 | Published: 13 Feb 2017

Hedvig Inc

Expert guide: Best enterprise content management software of 2022
sponsored by TechTarget ComputerWeekly.com
EBOOK: Enterprise content management (ECM) software can be an expensive, heavily involved purchase, so it's important to understand options before arriving at a decision. In this expert guide, we listed 10 important ECM platforms to consider while making a buying decision.
Posted: 17 Feb 2022 | Published: 17 Feb 2022

TechTarget ComputerWeekly.com

Expert Checklist: 11 Steps for Aligning Your BC/DR Program with Business Needs
sponsored by TechTarget Storage
EGUIDE: This e-guide provides an expert checklist for developing a successful business continuity program, designed with the specific needs of your organization in mind.
Posted: 25 Jul 2013 | Published: 25 Jul 2013

TechTarget Storage

Data Governance for the Enterprise
sponsored by TechTarget Business Analytics
EBOOK: Data governance is all about managing data as a business asset and ensuring that data is accurate, consistent, integrated, timely, complete and secure. This report examines the market trends for implementing data governance.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

TechTarget Business Analytics

Deduplication School 2010 Presentation Download
sponsored by EMC Backup and Recovery Solutions
PRESENTATION TRANSCRIPT: This presentation download will explain how to leverage data deduplication technology to benefit your organization.
Posted: 05 Apr 2010 | Published: 05 Apr 2010

EMC Backup and Recovery Solutions

E-Guide: DR Checklist: Tailoring your Plan to your Organization's Needs
sponsored by FalconStor Software
EGUIDE: This E-Guide is your ticket to establishing a successful disaster recovery and business continuity strategy.
Posted: 03 May 2012 | Published: 03 May 2012

FalconStor Software

Information Security Asean July 2016
sponsored by TechTarget Security
EZINE: In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

TechTarget Security

Backup School 2010 Presentation Download
sponsored by TechTarget Data Backup
PRESENTATION TRANSCRIPT: Storage demands continue to grow exponentially – even as the budgets and resources available to satisfy those demands shrink. This Storage Decisions’ Data Deduplication seminar presentation download provides independent information that will help end users select the appropriate deduplication system for their IT environment.
Posted: 09 Apr 2010 | Published: 09 Apr 2010

TechTarget Data Backup

Cybersecurity Information Sharing: Establishing New Protocols
sponsored by BMC Software, Inc.
EGUIDE: This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

BMC Software, Inc.

Information Security ANZ March 2016
sponsored by TechTarget
EZINE: Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly
Posted: 03 Mar 2016 | Published: 03 Mar 2016

TechTarget

Information Security ANZ March 2014
sponsored by TechTarget Security
EZINE: This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget Security

Presentation Transcript: Understanding Dedupe
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: Access this presentation transcript, brought to you by SearchStorage.com, to develop a better understanding of data deduplication from one of the world’s leading experts on deduplication – W. Curtis Preston.
Posted: 10 Aug 2010 | Published: 10 Aug 2010

Symantec Corporation

Your Guide to Combatting Ransomware's Domination of 2017
sponsored by CyberArk
EGUIDE: Learn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.
Posted: 06 Jun 2017 | Published: 02 Jun 2017

CyberArk

Information Security Magazine – November 2012
sponsored by Dell SonicWALL
EZINE: Consult this enlightening online magazine to learn more about how you can keep up with the rapidly changing technology trends. Find out to defend against adversaries and create a strong enterprise that's prepared for a myriad of attacks.
Posted: 13 Nov 2012 | Published: 01 Nov 2012

Dell SonicWALL

Developing Effective DR/BC Plans
sponsored by TechTarget Disaster Recovery
ESSENTIAL GUIDE: This handbook offers tips on how to develop and implement an effective disaster recovery plan.
Posted: 15 May 2013 | Published: 15 May 2013

TechTarget Disaster Recovery

Global Risks Report 2017
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals
Posted: 08 Feb 2021 | Published: 13 Jan 2017

TechTarget ComputerWeekly.com

Computer Weekly: How cloud is saving lives
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how the power of public cloud is helping scientists to tackle diseases such as cancer and malaria. Big banks are turning to tech startups for innovation – we ask why. And our latest buyer's guide examines micro-datacentre technologies. Read the issue now.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

TechTarget ComputerWeekly.com

Computer Weekly – 5 August 2014: Driving virtualisation into pole position in Formula One
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the Caterham F1 team has used virtualisation in its trackside technology to help race performance. We analyse how growing competition in the cloud market is affecting Amazon Web Services' dominant position. And we look at an emerging datacentre technology - silicon photonics. Read the issue now.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

TechTarget ComputerWeekly.com

Focus: Securing for the future
sponsored by TechTarget ComputerWeekly.com
EGUIDE: 2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
Posted: 08 Feb 2021 | Published: 10 Jan 2017

TechTarget ComputerWeekly.com

Calculating Cloud ROI : From the Customer Perspective
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This white paper lays out a framework to help IT and business decision makers calculate the return on investment of cloud services.
Posted: 15 Mar 2013 | Published: 01 Jul 2012

TechTarget ComputerWeekly.com

New E-Guide: Securing and Consolidating Remote and Branch Offices
sponsored by Brocade
WHITE PAPER: The remote office/branch office (ROBO) is now a main part of many organizations' storage initiatives. This eGuide, featuring articles from Storage magazine, outlines the issues of protecting ROBO data and provides insight and strategies for...
Posted: 04 Sep 2007 | Published: 01 Sep 2007

Brocade

CI/CD Security Risks
sponsored by Palo Alto Networks
EBOOK: Pipelines open new attack surfaces if not secured properly. In this 42-page eBook, learn key strategies to lock down your CI/CD environments and processes to avoid data breaches, compromised infrastructure, and failed audits.
Posted: 08 Nov 2023 | Published: 06 Nov 2023

TOPICS:  .NET
Palo Alto Networks

Proactive Security: Software vulnerability management and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
Posted: 08 Feb 2021 | Published: 17 May 2019

TechTarget ComputerWeekly.com