CSA White Papers

(View All Report Types)
Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

MicroStrategy Customer Success Story: Ceva Santé Animale
sponsored by MicroStrategy
CASE STUDY: The CIO of Ceva Santé Animale, a global veterinary health company, wanted to "have everything on all devices without VPN (PC, Mac, iPad, Android and Blackberry." View this brief case study to learn how CSA built a sales enablement application on a mobile platform that aggregates CRM, ERP and sales data.
Posted: 22 Jan 2014 | Published: 31 Aug 2013

MicroStrategy

A Computer Weekly buyer's guide to asset management for hybrid IT
sponsored by Livingstone Group
EGUIDE: Hybrid IT opens up a range of new considerations for businesses. In this 14-page buyer's guide, Computer Weekly looks at how to manage its infrastructure, the importance of cost management and the main considerations to make when addressing cloud management issues.
Posted: 08 Feb 2021 | Published: 25 Mar 2019

Livingstone Group

Focus: Health IT
sponsored by TechTarget ComputerWeekly.com
EGUIDE: At a time when the NHS is faced with unprecedented pressure, new technological solutions can help ease some of the strain. From apps to electronic records and artificial intelligence, technology is playing an increasingly important part in transforming the health service.
Posted: 08 Feb 2021 | Published: 01 Sep 2017

TechTarget ComputerWeekly.com

Insider Edition: There's No Room for Either/Or When It Comes to Cloud and Security
sponsored by TechTarget Security
EBOOK: Improved capabilities for logging and reporting cloud-based activity are now available, as are new ways for cloud providers to certify and communicate their security postures. This Insider Edition looks at efforts such as the STAR certification and the recently announced CloudTrust protocol.
Posted: 14 May 2014 | Published: 15 May 2014

TechTarget Security

Security-Enabled Innovation And Cloud Trends
sponsored by Expel
ANALYST REPORT: Security-enabled innovation has yielded anticipated benefits for organizations, but managing costs and resources and ensuring consistent security policies pose significant challenges. In this analyst report, explore key findings and survey results to better understand the double-edged sword of multi-cloud adoption.
Posted: 11 Aug 2023 | Published: 11 Aug 2023

TOPICS:  .NET
Expel

BYOD: The Evolution of Mobile Security
sponsored by TechTarget Security
EGUIDE: This expert guide takes an in-depth look at the new technologies and innovations that are driving the shift towards enterprise mobility, along with how to adapt your management strategy to best take utilize them.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

TechTarget Security

Making the case for cloud-based security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
Posted: 04 Jan 2021 | Published: 04 Jan 2021

TechTarget ComputerWeekly.com

Making the case for cloud-based security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
Posted: 08 Feb 2021 | Published: 07 Jul 2020

TechTarget ComputerWeekly.com

CLOUD API SECURITY RISKS: HOW TO ASSESS CLOUD SERVICE PROVIDER APIS
sponsored by TechTarget Security
EGUIDE: This expert guide from SearchCloudSecurity.com takes an in-depth look at API security, answering critical questions and providing helpful tips for securing your cloud APIs.
Posted: 19 Sep 2013 | Published: 19 Sep 2013

TechTarget Security

February Technical Guide on Cloud Compliance
sponsored by TechTarget Security
EGUIDE: In this month’s Technical Guide from SearchCloudSecurity.com, gain a global perspective of today’s cloud compliance challenges. Explore key topics, including FedRAMP cloud computing standards, cloud security transparency, PCI in the cloud, Cloud Maturity Model (CMM) and more.
Posted: 27 Feb 2012 | Published: 24 Feb 2012

TechTarget Security

Securing Your Cloud Deployment with Today's Top Strategies
sponsored by TechTarget Security
EZINE: In this Insider Edition, InfoSec Pros will learn how to achieve better cloud security. It reviews existing cloud security standards and how to assess, and manage, the risk of a cloud deployment.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

TechTarget Security

Annual Threat Report 2024
sponsored by Expel
RESEARCH CONTENT: Expel’s operators do a massive amount of analysis, triage, and complicated problem-solving—stopping intricate attacks every single day. That makes their observations exemplary of the true state of cybersecurity and its related threats. Download this report to explore all the key findings you can use to optimize your cybersecurity strategy in 2024.
Posted: 29 Feb 2024 | Published: 29 Feb 2024

TOPICS:  .NET
Expel

Information Security Asean November 2015
sponsored by TechTarget
EZINE: The cover story looks at the cyber crime landscape in Singapore and what organisations in the city state are doing to combat it
Posted: 09 Nov 2015 | Published: 09 Nov 2015

TechTarget

Tech career guide: Cyber security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at what it takes to make it in Asia-Pacific's cyber security industry.
Posted: 23 Jun 2022 | Published: 23 Jun 2022

TechTarget ComputerWeekly.com

The Need for Cloud Computing Security Standards
sponsored by TechTarget Security
EGUIDE: While cloud computing promises business advantages such as agility, efficiency, cost savings and more, many organizations are still hesitant to adopt for one prominent reason – security. In this expert e-guide uncover the driving need for cloud computing security standards and how this issue is being addressed.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

TechTarget Security

Cloud Compliance Technical Guide
sponsored by TechTarget Security
WHITE PAPER: Check out this expert technical guide for a global perspective on emerging cloud compliance issues.
Posted: 02 Apr 2013 | Published: 31 Dec 2012

TechTarget Security

Why You Need A Next-Generation Firewall
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Hewlett Packard Enterprise

Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Hewlett-Packard Enterprise

July Essentials Guide on Cloud Computing
sponsored by TechTarget Security
EBOOK: This Information Security Essentials Guide provides key insight into the common cloud security issues organizations face today and how to adapt to the new risks of cloud computing. View now to explore cloud security, compliance, services and more.
Posted: 11 Jul 2012 | Published: 09 Jul 2012

TechTarget Security

Computer Weekly March 2016: Building Data Centers Under the Sea
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, delve into Microsoft's trial of an underwater data center and assess the technology and environmental implications. In addition, read on to see if the desktop PC is set to be reinvented as PC suppliers build new products around Windows 10. Read the issue for these highlights, and more.
Posted: 04 Mar 2016 | Published: 08 Mar 2016

TechTarget ComputerWeekly.com

Unlocking the Hybrid Cloud Management and Security Puzzle
sponsored by BT
EGUIDE: Managing the hybrid cloud means covering all of your bases from having a solid cloud management strategy to security. This is especially important for financial organizations. In this e-guide, find out why a strong cloud security strategy is crucial to financial organizations and fundamentals to consider before adopting a hybrid cloud.
Posted: 04 Aug 2016 | Published: 27 Jul 2016

BT

Choosing the right technology to strengthen cloud security and risk management
sponsored by ServiceNow
WHITE PAPER: Learn the 3 essential elements you should look for in an integrated solution that can help strengthen security, manage risk and monitor compliance in the cloud while also reducing costs and the risk of human error.
Posted: 14 Jul 2023 | Published: 14 Jul 2023

TOPICS:  .NET
ServiceNow

A New Network Architecture: Send in the Clouds
sponsored by TechTarget Networking
EBOOK: This three-part guide covers all key aspects in moving your enterprise network to the cloud, including: security, availability, software-defined networking, and more. Access now if you are planning a future cloud deployment, or have some aspects of the network in the cloud but wonder if you should be moving more.
Posted: 16 Sep 2015 | Published: 16 Sep 2015

TechTarget Networking

Essential Guide: APAC women in cyber security
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In Asia-Pacific, men continue to outnumber women in the growing field of cyber security - even as more women are entering the industry. The lack of awareness of the profession among students and unconscious biases in hiring processes are just some of the challenges that we must overcome before we can see more women in the profession.
Posted: 04 Oct 2021 | Published: 04 Oct 2021

TechTarget ComputerWeekly.com

Increasing agility and reducing cost for private and hybrid cloud computing
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: IT organisations are now responsible for managing public clouds, private clouds, and a mixture of both in addition to controlling traditional IT applications. This white paper discusses the challenges and benefits of these new hybrid infrastructures and how cloud service automation can be a vital tool in overcoming management challenges.
Posted: 06 Aug 2012 | Published: 30 Apr 2012

Hewlett-Packard Enterprise