Vertical Industries  >  

Computer Service Industry

RSS Feed    Add to Google    Add to My Yahoo!
Computer Service Industry White Papers (View All Report Types)
 
Cloud Data Security for Financial Services
sponsored by BitGlass
WHITE PAPER: This white paper explains that banks can ensure the security of sensitive data stored in the public cloud by deploying a Cloud Access Security Broker, which enables banks to deploy a security platform within their own network infrastructure.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

BitGlass

Major Assessment for Business Intelligence and Analytics Platforms
sponsored by Information Builders
WHITE PAPER: Access this informative white paper to discover how different vendors generate a range of BI solutions. Use this resource to assess evaluations of what's on the market today, and gauge which solution is right for you based on your unique business problems and technical concerns.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Information Builders

The Many Benefits of High-Security: Cost-Effective Server Solutions
sponsored by Lenovo
WHITE PAPER: This white paper explains exactly how updating your business' infrastructure benefits its bottom line. Read on for expert advice on how it can best be implemented.
Posted: 17 Apr 2015 | Published: 31 Oct 2013

Lenovo

Increasing SharePoint Adoption: Unleash Content Access Across the Enterprise
sponsored by AvePoint, Inc.
WHITE PAPER: This paper examines how organizations are turning to Microsoft SharePoint to connect their knowledge workers, business processes, and enterprise-wide content. New features in SharePoint Server 2010 are aimed at improving the platform’s scalability and usability, inherently driving the SharePoint deployment to evolve and grow as business dictates.
Posted: 21 Feb 2011 | Published: 21 Feb 2011

AvePoint, Inc.

Exposing the Cybersecurity Cracks: A Global Perspective
sponsored by Websense, Inc.
WHITE PAPER: This eye-opening reviews data collected from nearly 5000 experienced IT workers regarding deficiencies in the ways that their companies attempt to think about, fight, and detect security breaches.
Posted: 01 Jul 2014 | Published: 30 Apr 2014

Websense, Inc.

Profiling an Enigma: The Mystery of North Korea’s Cyber Threat Landscape
sponsored by Hewlett-Packard Company
WHITE PAPER: This highly interesting resource delves into North Korea's cyber threat landscape, deeply analyzing what is known about the regime's capabilities and motives, which are largely shrouded in secrecy.
Posted: 05 Feb 2015 | Published: 29 Aug 2014

Hewlett-Packard Company

The Citrix Desktop Transformation Model
sponsored by Citrix
WHITE PAPER: Desktop virtualization initiatives are topping the priority lists of most IT managers. Learn more about this key strategic directive and the steps to getting started in your organization. Download the white paper from ESG now.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

Citrix

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Encouraging Greater SharePoint Adoption
sponsored by AvePoint, Inc.
WHITE PAPER: This paper discusses the progression of SharePoint usage, features available to encourage SharePoint adoption, focusing on the technology components required, scalability of the platform to accommodate growth, migration strategies, and how AvePoint’s DocAve Software Platform help ensure a scalable, reliable platform for bolstered adoption.
Posted: 21 Feb 2011 | Published: 21 Feb 2011

AvePoint, Inc.

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement