Implementing a Wireless LAN
sponsored by AT&T Corp
WHITE PAPER:
This paper outlines the networking requirements and considerations for a successful WLAN implementation.
Posted: 08 Nov 2007 | Published: 13 Jul 2007
|
|
|
Beyond Corporate Walls: Motorola Enterprise Mesh Networks
sponsored by Motorola Solutions
WHITE PAPER:
Wireless mesh technology is flexible, secure and allows for easy control of user access. Read this paper to learn how mesh technology can help your enterprise cost effectively extend its wireless coverage without any extra cable or fiber.
Posted: 29 Jun 2007 | Published: 01 Mar 2007
|
|
|
High Availability for SQL Server 2005 Using array-based Replication and Host-based Mirroring Technologies
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
This paper provides the data needed to understand the options and the limitations for implementing remote replication solutions on a clustered HP server and storage area network (SAN)-based storage infrastructure.
Posted: 12 Mar 2008 | Published: 01 Jan 2008
|
|
|
Two Billion Entry Directory Benchmark
sponsored by Oracle Corporation
WHITE PAPER:
This benchmark evaluates Oracle Internet Directory performance under scales and throughput rates representative of those encountered in production use in both the communications industry and as part of large scale delivery architectures.
Posted: 10 Apr 2008 | Published: 01 Mar 2008
|
|
|
The Cost and Benefits of On-Demand Vs. On-Premise Procurement Software
sponsored by Coupa
WHITE PAPER:
While there are dozens of procurement software solutions available, there are really only two types offered: "on-premise" procurement software and newer "ondemand" procurement software. This paper outlines an approach to compute and compare them.
Posted: 10 Sep 2008 | Published: 10 Sep 2008
|
|
|
Disaster Recovery Solutions from VMware: Transforming Disaster Recovery - VMware Infrastructure for Rapid, Reliable and Cost-Effective Disaster Recovery
sponsored by VMware, Inc.
WHITE PAPER:
VMware Infrastructure is transforming the way disaster recovery is done today and in the future; it changes the disaster recovery paradigm to one that is cost effective, rapid and reliable.
Posted: 20 Oct 2008 | Published: 18 Oct 2008
|
|
|
Enterprise Wireless LAN Security
sponsored by Motorola Solutions
WHITE PAPER:
This paper describes the security challenges network administrators face defining and implementing security mechanisms within diverse wired and wireless network environments.
Posted: 29 May 2008 | Published: 01 May 2008
|
|
|
PACs for Industrial Control, the Future of Control
sponsored by National Instruments
WHITE PAPER:
This white paper explores the origins of the Programmable Automation Controllers (PAC), how PACs differ from Programmable Logic Controllers (PLC) and PCs, and the future direction of industrial control with PACs.
Posted: 16 Sep 2008 | Published: 16 Sep 2008
|
|
|
Improving the mobile experience through solid state drive
sponsored by Intel Corporation
WHITE PAPER:
Intel IT is evaluating solid-state drive (SSD) technology to better understand the benefits to users and the impacts on the enterprise. We have initiated a proof of concept (PoC) study that includes extensive benchmark testing as well as deployment of notebooks with SSDs to the Intel workforce.
Posted: 27 May 2009 | Published: 05 Jan 2009
|
|
|
CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Schiphol Airport in Amsterdam is one of Europe's main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.
Posted: 15 Mar 2021 | Published: 12 Feb 2021
|
|
|
CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport
sponsored by TechTarget ComputerWeekly.com
EZINE:
Schiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.
Posted: 08 Feb 2021 | Published: 13 Aug 2020
|
|
|
Secure remote access: More vital than ever thanks to Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
Posted: 06 May 2021 | Published: 06 May 2021
|
|
|
Software-Defined Storage: A Guide to Successful Implementation
sponsored by IBM
EGUIDE:
In this expert e-guide, explore today's SDS implementation options and help you decide which one fits your needs best: commodity or custom hardware. Additionally, uncover the important considerations – like the specific needs of virtual environments, access points, and APIs – that you'll need to address when formulating your storage strategy.
Posted: 08 Feb 2021 | Published: 19 Jul 2016
|
|
|
Wi-Fi 5, 6, and 7: Insights and Impacts on Cabling Infrastructure
sponsored by Panduit
WHITE PAPER:
Because so many people and business rely on wireless devices, wireless access points have seen massive growth in the enterprise space to accommodate. While WAPs continue to improve, wi-fi standards continue to evolve. This is especially true with Wi-Fi 6 which may become the fastest growing standard in history. Read on to learn more about it.
Posted: 08 Jul 2023 | Published: 08 Jul 2023
|
|
|
Zero Trust Is Not Enough for Backup
sponsored by Cobalt Iron
WHITE PAPER:
Traditional security approaches like zero-trust may not be enough to protect critical backup environments from modern cyber threats. In this white paper, you'll discover how the Zero Access model in Cobalt Iron Compass can provide advanced cyber resilience to safeguard your backup data. Read the full white paper now to learn more.
Posted: 13 Nov 2024 | Published: 15 Nov 2024
|
|
|
Privilege access governance close the gap between privileged access and standard user identities
sponsored by One Identity
WHITE PAPER:
Explore how to unify identity management and provisioning processes, eliminate silos, and simplify compliance with One Identity's Privileged Account Governance. Read the full white paper to learn more.
Posted: 10 Jul 2024 | Published: 10 Jul 2024
|
|
|
Elevating Organizational Security with Advanced Authentication
sponsored by One Identity
WHITE PAPER:
As the network perimeter expands, organizations must enhance security at the point of access. This white paper explores how advanced authentication, including multi-factor and adaptive methods, can elevate security, protect against credential theft, and deliver a seamless user experience. Download this paper to examine this approach in detail
Posted: 29 Oct 2024 | Published: 29 Oct 2024
|
|
|
Addressing Municipal Pain Points with ConnectIV CX and AI
sponsored by Intervision
WHITE PAPER:
AI-powered solutions can help government agencies address key municipal pain points like high call volumes, low citizen satisfaction, and compliance issues. Learn how ConnectIV CX leverages AI to transform these challenges into opportunities for improved service delivery. Read the full white paper.
Posted: 23 Jul 2024 | Published: 24 Jul 2024
|
|
|
Getting started with Azure Red Hat OpenShift
sponsored by Red Hat
WHITE PAPER:
As the network perimeter is now everywhere and anywhere users are, security must move with it and needs to be in place at the point of access. Download this e-book to learn how you can secure remote access and build user trust.
Posted: 13 Jun 2024 | Published: 13 Jun 2024
|
|
|
IBM Hybrid Cloud Mesh Product Guide
sponsored by Aliado
WHITE PAPER:
As the network perimeter is everywhere, security must move with it and be in place at the point of access. This e-book explains how to secure remote access and build user trust using IBM Hybrid Cloud Mesh.
Posted: 27 Nov 2024 | Published: 27 Nov 2024
|
|
|
MSSP Success Checklist
sponsored by AT&T and LevelBlue
WHITE PAPER:
In a crowded landscape, how can a Managed Security Service Provider (MSSP) stand out and boost sales? With the right people, processes and tools, this white paper argues. To access a 17-point checklist for MSSP success, continue on.
Posted: 07 Jun 2024 | Published: 07 Jun 2024
|
|
|
What you need to know about Application Security Observability
sponsored by Contrast Security
INFOGRAPHIC:
As the network perimeter extends everywhere users are, security must move with it and be in place at the point of access. Download this infographic to learn 16 key things about observability and how it can help secure remote access and build user trust.
Posted: 12 Sep 2024 | Published: 12 Sep 2024
|
|
|
2024 Cyber Security Report
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT:
In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.
Posted: 03 May 2024 | Published: 04 May 2024
|
|
|
Considerations for Implementing Zero Trust for the Workforce
sponsored by Cloudflare
ESG RESEARCH REPORT:
As the network perimeter expands, organizations must move security to the point of access. This Enterprise Strategy Group report explores how zero-trust network access (ZTNA) can help secure remote access, accelerate zero-trust adoption, and enable consistent, seamless user experiences. Download the report to learn more.
Posted: 19 Oct 2024 | Published: 19 Oct 2024
|
|
|
SAN block access storage in the age of cloud and hyper-converged
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
Posted: 15 Mar 2021 | Published: 12 Feb 2021
|
|
|
SAN block access storage in the age of cloud and hyper-converged
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
Posted: 08 Feb 2021 | Published: 24 Aug 2020
|
|
|
Pioneering Texas School District Improves Its Cybersecurity Posture with the Fortinet Security Fabric
sponsored by Fortinet, Inc.
CASE STUDY:
Athens ISD in Texas enhanced its cybersecurity using Fortinet's Security Fabric. They selected Fortinet for easier firewall management, better network visibility, and integrated endpoint protection. Discover how Fortinet benefited Athens ISD in our case study.
Posted: 21 Mar 2024 | Published: 21 Mar 2024
|
|
|
Why Just Securing Human Identities Is Not Enough
sponsored by CyberArk
WEBCAST:
If your business leverages digital technology, then securing human access is not enough - attackers will find the weak point. Don’t let it happen to you! In this session you'll learn why you need to secure both your human and machine identities, as well as the applications and workloads they access. Tune in now to learn more.
Posted: 21 Aug 2024 | Premiered: Aug 21, 2024
|
|
|
ITSM Problem Management: What Are Your Pain Points?
sponsored by ServiceNow
EGUIDE:
If digital transformation is on your CIO agenda, then a top-of-class ITSM strategy had better be also. In this expert guide, Emily McLaughlin, Content Development Strategist at searchCIO, converses with several notable CIOs who identify their organizations' biggest ITSM pain points, including business-user expectations and risk.
Posted: 08 Feb 2021 | Published: 20 Jun 2016
|
|
|
Prevent Data Loss with Fortinet FortiDLP
sponsored by Fortinet, Inc.
PRODUCT OVERVIEW:
Securing data is more challenging than ever before. FortiDLP is a next-generation, AI-enhanced, cloud-native data protection solution that helps security teams anticipate and prevent data leaks, detect behavior-related insider risks, and train employees on proper cyber hygiene at the point of access to sensitive data.
Posted: 06 Nov 2024 | Published: 30 Oct 2024
|
|
|
Pascoalotto Depends On Check Point For Scalable Security
sponsored by Checkpoint Software Technologies
CASE STUDY:
Paschoalotto, a leading Brazilian call center, needed a scalable security solution to meet strict requirements. They chose Check Point's Quantum Maestro Orchestrator, Security Gateways, and R80 Security Management, which provided scalability, cloud integration, and unified visibility, enabling secure services. Read the case study to learn more.
Posted: 27 Sep 2024 | Published: 27 Sep 2024
|
|
|
SaaS ERP mushrooms during Covid crisis, up to a point
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the migration of business applications to the cloud, under the discipline of the Covid crisis; we examine the question of who is winning the cloud ERP wars; and offer a case study of one large, complex company, Vodafone, that gives a counter example of how cloud still has limits when it comes to ERP.
Posted: 08 Feb 2021 | Published: 18 Sep 2020
|
|
|
DRaas and the key decision points in DR-as-a-service
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the key decisions you'll need to make about the blend of DRaas your organisation wants, which of the key cloud providers are best for which elements of DR service delivery, the pros and cons of moving elements of disaster recovery to the cloud and which to keep closer to home, and the 12 key steps to DRaas deployment.
Posted: 08 Feb 2021 | Published: 25 Jan 2021
|
|
|
Insurance Premium Pricing: Pain Points and Solutions
sponsored by SAS
PRESENTATION TRANSCRIPT:
In this presentation transcript, you’ll learn why automating data extraction systems is crucial for overcoming insurance pricing obstacles. By reducing the reliance on manual processes, insurers can not only improve the accuracy of their data but also minimize operational errors. Read on now to learn more.
Posted: 28 Nov 2024 | Published: 28 Nov 2024
|
|