SIG White Papers

(View All Report Types)
The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Oxilion Deploys Red Hat Enterprise Virtualization to Keep Customers Satisfied
sponsored by Red Hat.
WHITE PAPER: Access this white paper to discover a new virtualization platform with cloud capabilities that delivers flexibility, scalability and cost requirements to virtual data centers.
Posted: 16 May 2011 | Published: 16 May 2011

Red Hat.

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

IDC MarketScape: Worldwide Desktop Virtualization Vendor Analysis
sponsored by Citrix
WHITE PAPER: This IDC study assesses the capability and business strategy of 11 vendors in the client virtualization market.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Citrix

The Virtual Office Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

The Hardest Problems in Data Management
sponsored by VMware, Inc.
WHITE PAPER: Modern hardware trends and economics combined with cloud/virtualization technology are radically reshaping today’s data management landscape. Arguably one of the hardest problems faced by today’s solution designers is figuring out how to leverage this on-demand hardware to build an optimal data management platform. Continue reading to learn more.
Posted: 01 Mar 2011 | Published: 01 Mar 2011

VMware, Inc.

CA Automation Suite Paves the Way for Cloud
sponsored by CA Technologies
WHITE PAPER: This white paper describes how virtualisation and cloud initiatives are creating new types of management challenges across physical and virtual data centre environments. Continue reading to learn more.
Posted: 13 Dec 2010 | Published: 01 Oct 2010

CA Technologies

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Delivering IT to the Virtual Workforce
sponsored by Citrix
WHITE PAPER: Uncover the four key requirements of workshifting, the technologies needed to achieve them, and the solutions that can provide these capabilities to your organization.
Posted: 13 Aug 2013 | Published: 30 Jun 2011

Citrix

Database as a Service (DBaaS): How to Create a Database Cloud Service
sponsored by Oracle and Intel®
WEBCAST: This webinar explains how transitioning to database-as-a-service will automate more processes, deliver services faster and lower risk and costs. Watch now to better understand the benefits of presenting and documenting IT services in a service catalog, how to create an effective business catalog to deliver DBaaS to consumers, and more.
Posted: 12 Jun 2014 | Premiered: Jun 5, 2014

Oracle and Intel®

Testing Multiplay Networks
sponsored by Ixia
WHITE PAPER: As the Internet evolves, a wider variety of multiplay services are carried from broadly distributed sources to a large and varied audience of consumers.
Posted: 06 Jun 2008 | Published: 01 Apr 2008

Ixia

Importance of Unified I/O in VMware® ESX Servers
sponsored by Mellanox Technologies, Inc.
WHITE PAPER: Unified I/O in VMware ESX servers deliver many cost and power savings advantages.
Posted: 02 Apr 2008 | Published: 01 Mar 2008

All resources sponsored by Mellanox Technologies, Inc.

May Technical Guide on PCI DSS Guidance
sponsored by TechTarget Security
EGUIDE: This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.
Posted: 08 May 2012 | Published: 07 May 2012

TechTarget Security

PCI-Compliant Cloud Reference Architecture
sponsored by HyTrust
WHITE PAPER: This document presents a reference architecture and additional controls needed to address the three cloud challenges to achieve PCI compliance.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

HyTrust

Safeguard Users And Protect Resources For Your Hybrid Workforce With Cisco Secure Access
sponsored by Cisco & Acepak
INFOGRAPHIC: 78% of businesses support a hybrid workforce, according to the “2023 Security Service Edge (SSE) Adoption Report.” So, how can these businesses ensure that their workforces are as secure as possible? Download this infographic to learn how a converged security approach can help.
Posted: 03 Nov 2023 | Published: 03 Nov 2023

TOPICS:  .NET
Cisco & Acepak

Third-Party Risk Management: How to Avoid the Dangers of Weak Controls
sponsored by ModoModo
EGUIDE: If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. In this guide, security expert Michael Cobb, CISSP-ISSAP, explains how to avoid security risks and implement a third-party risk assessment plan.
Posted: 23 Feb 2017 | Published: 17 Feb 2017

ModoModo

Three Steps to PCI Compliance in the Cloud
sponsored by TechTarget Security
EGUIDE: PCI virtualization compliance is extremely challenging, requiring organizations to not only revalidate service providers, but face ongoing operational problems that that can arise during compliance audits. In this e-guide uncover three steps you can implement to ensure the environment stays compliant over a long-term deployment.
Posted: 27 Apr 2012 | Published: 27 Apr 2012

TechTarget Security

What to Know: Licensing in a Virtualized World
sponsored by TechTarget IT Operations
EBOOK: With more businesses shifting to a virtualized environment, understanding VM licensing, Oracle virtualization licensing and VMware licensing cost is a must for admins.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

TechTarget IT Operations

Introducing Essential Kubernetes Gauges Open Source Observability with Pre-Fabricated SLOs
sponsored by Nobl9
EBOOK: Discover in this short E-book why Essential Kubernetes Gauges (EKG) may be the solution, offering open-source observability with pre-fabricated SLOs.
Posted: 31 Mar 2023 | Published: 01 Apr 2023

TOPICS:  .NET
Nobl9

Get the Confidence You Need to Better Monitor Your Cold Chain
sponsored by Zebra Technologies
PRODUCT OVERVIEW: Recently the exponential increase in the manufacturing and shipment of temperature-sensitive products has made efficient temperature monitoring more important. This product overview looks at how Zebra ZS300 Electronic Temperature Sensors can automatically monitor and regulate temperature sensitive products at scale. Read on to learn more.
Posted: 23 Jan 2024 | Published: 24 Jan 2024

TOPICS:  .NET
Zebra Technologies

A New Service Integration and Management Concept for Growing Businesses
sponsored by ServiceNow
EGUIDE: This exclusive eGuide addresses the role of this new concept, service level agreements (SLAs), some of the points of value it can offer your business, as well as number of helpful tips to keep in mind if you are deciding to implement the system.
Posted: 25 Jul 2016 | Published: 18 Jul 2016

ServiceNow

Computer Weekly Buyer's Guide
sponsored by TechTarget ComputerWeekly.com
EZINE: In this 13-page buyer's guide, Computer Weekly looks at the effects on the IT department of technology commoditisation, open source and software as a service, the trend of insourcing IT, and the concept of service integration and management for outsourced services.
Posted: 08 Feb 2021 | Published: 05 Apr 2016

TechTarget ComputerWeekly.com

Top 10 business applications stories of 2018
sponsored by TechTarget ComputerWeekly.com
WHITE PAPER: The steady modernisation of ERP systems, as they edge to the cloud and are complemented by new-generation customer software, was markedly evident this year. And blockchain and AI are making inroads. In this e-guide, Computer Weekly takes a look at the top 10 business applications of 2018.
Posted: 08 Feb 2021 | Published: 03 Jan 2019

TechTarget ComputerWeekly.com

Logi Bolt Secure, Robust Wireless Connections
sponsored by Logitech Inc.
EBOOK: Download this e-book to gain access to best practices and recommendations for optimizing the performance of Logi Bolt wireless products in your workplace environment.
Posted: 28 Feb 2023 | Published: 28 Feb 2023

TOPICS:  .NET
Logitech Inc.

ESG Lab Review: Testing the Juniper SRX5400
sponsored by Juniper Networks, Inc.
WHITE PAPER: The right tools protect you from breaches. Find out how ESG rated one security platform on performance and scalability.
Posted: 08 Sep 2015 | Published: 08 Sep 2015

TOPICS:  IT Management
Juniper Networks, Inc.

E-Guide: PCI DSS 2011: Key themes to watch
sponsored by TechTarget Security
EGUIDE: This expert tip pinpoints key observations and common themes related to what’s currently happening with today’s PCI DSS compliance programs and explains what’s in store for the future as companies transition to the PCI DSS 2.0 guidelines.
Posted: 20 May 2011 | Published: 20 May 2011

TechTarget Security

The next wave of IoT in Asia: What to expect in 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read about the APAC businesses that have successfully implemented IoT initiatives and are already reaping the benefits, such as achieving increased ROI and reducing operational disruptions.
Posted: 08 Feb 2021 | Published: 08 Feb 2018

TechTarget ComputerWeekly.com

Computer Weekly – 2 October 2018: The most influential women in UK technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we announce our annual list of the 50 most influential women in UK technology, and talk to this year's winner, Code First:Girls CEO Amali de Alwis, about the challenges of achieving diversity in IT. Also, our latest buyer's guide looks at the future of collaboration software. Read the issue now.
Posted: 08 Feb 2021 | Published: 28 Sep 2018

TechTarget ComputerWeekly.com

Tidelift guide to U.S. government cybersecurity requirements
sponsored by Tidelift
EBOOK: The U.S. has instituted new cybersecurity requirements for government agencies and organizations who do business with the government. However, these regulations affect every company that conducts business in the U.S. This Tidelift guide details everything you need to know about the U.S. cybersecurity requirements. Read the guide here.
Posted: 06 May 2023 | Published: 06 May 2023

TOPICS:  .NET
All resources sponsored by Tidelift

Essential Guide to PCI DSS
sponsored by TechTarget Security
EGUIDE: This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 22 Oct 2009 | Published: 14 Sep 2009

TechTarget Security

Presentation Transcript: Virtualized Cardholder Data Environments Capitalizing on Updated PCI SSC Guidance
sponsored by HyTrust
PRESENTATION TRANSCRIPT: 2010 marked the release of the PCI's DSS 2.0 compliance standards, and among a variety of new standards, virtualization has made an appearance. Access this presentation transcript for expert analysis of the latest challenges of PCI compliance, including a detailed overview of concerns related to virtualization.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

HyTrust

Video remote support tool can be worth a thousand texts
sponsored by LogMeIn Rescue Lens
EGUIDE: With an explosion of IoT devices and continued growth of IT consumerization, market researchers see an opportunity for vendors with new-age remote support products. Uncover independent analysts' opinions of a live-video support tool and understand how it differentiates from competitors like Apple's FaceTime or Google Hangouts.
Posted: 15 Mar 2017 | Published: 10 Mar 2017

LogMeIn Rescue Lens

Third-Party Risk Management: Evaluating and Contracting with Vendors
sponsored by BitSight
EGUIDE: This expert e-guide describes how to use standardized documentation for third-party risk assessment in order to minimize risk before deciding on a vendor. Access this resource now for advice on the security-related clauses that financial institutions need to include in their vendor contracts in order to comply with regulatory requirements.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

BitSight

Essential Guide to PCI DSS
sponsored by Information Security Magazine
EGUIDE: This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 14 Sep 2009 | Published: 14 Sep 2009

Information Security Magazine