American Registry of Internet Numbers White Papers

(View All Report Types)
Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

Prepare Your Network for the Future: Embrace IPv6
sponsored by Hewlett Packard Enterprise
EGUIDE: This E-Guide from SearchEnterpriseWAN.com explores the importance of IPv6 and why it should be on every enterprise's short-term to-do list. View now to uncover how this influential protocol will shape your enterprise now and in the future.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

IPv6 Timeline: The Road to a New Protocol
sponsored by Hewlett Packard Enterprise
EGUIDE: This IPv6 timeline lists the major milestones in the history of the protocol, describing how – and why – it became what it is today.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition
sponsored by Hewlett Packard Enterprise
EGUIDE: Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

Maturing Your DLP Strategy for Today’s Threats
sponsored by SearchSecurity.com
EGUIDE: Social networks have become a new avenue to cybercriminals today, using social engineering to exploit systems and data. In this expert resource, uncover how social networking is impacting data loss prevention (DLP) strategies and explore eight key questions to ask your vendor to help mature your DLP solution.
Posted: 02 Feb 2012 | Published: 02 Feb 2012

SearchSecurity.com

Information Security ASEAN July 2014
sponsored by SearchSecurity.com
EZINE: This issue looks at the state of the Personal Data Protection Act in Singapore and Malaysia?
Posted: 27 Jun 2014 | Published: 27 Jun 2014

SearchSecurity.com

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

Under Attack? 2016 Defenses Escape Compromise
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

SearchSecurity.com

PROACTIVE PREPARATION AND HARDENING TO PROTECT AGAINST DESTRUCTIVE ATTACKS
sponsored by Mandiant
WHITE PAPER: Destructive attacks, including ransomware, pose a serious threat to organizations and hardening your security posture has become paramount to sustain business operations. Access this comprehensive guide to learn how you can protect your organization from common techniques used by threat actors.
Posted: 11 May 2022 | Published: 11 May 2022

TOPICS:  .NET
Mandiant

DevSecOps
sponsored by VMware Tanzu
EBOOK: DevSecOps is about making security an inextricable, if not intrinsic, part of the application lifecycle to support increasingly complex, cloud-native applications. But where do you start? Begin by downloading a copy of this comprehensive DevSecOps for Dummies e-book, in which you’ll find helpful definitions and how-tos.
Posted: 25 May 2022 | Published: 25 May 2022

TOPICS:  .NET
VMware Tanzu

February Essentials Guide on Threat Management
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: Today, security pros must fight on multiple fronts as cybercriminals find new ways to exploit customers and their users. In this Information Security Essential Guide, get a comprehensive look into today’s threat landscape and gain new strategies to tackle emerging cyberattacks.
Posted: 07 Feb 2012 | Published: 06 Feb 2012

SearchSecurity.com

Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

SearchSecurity.com

ISM Essentials Guide – Threat Management
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.
Posted: 18 Dec 2012 | Published: 18 Dec 2012

SearchSecurity.com

Continuous Security for Google Cloud and Containers
sponsored by Sysdig
WHITE PAPER: Google Cloud Platform (GCP) allows enterprises to integrate container development and the cloud to support rapid development and deployment of applications. As these companies progress with cloud use, they must establish and manage security and compliance processes. Read this white paper to learn how Sysdig can help.
Posted: 02 Dec 2021 | Published: 02 Dec 2021

TOPICS:  .NET
Sysdig

Ransomware’s New Trend: Exfiltration and Extortion
sponsored by Palo Alto Networks
WHITE PAPER: The primary concern of ransomware was once recovering data and restoring critical systems, but now today’s victims have 3 significant concerns to contend with in this threat type. Download this white paper for a comprehensive look at today’s data exfiltration and extortion threats, best practices for defense and more.
Posted: 13 Oct 2021 | Published: 13 Oct 2021

TOPICS:  .NET
Palo Alto Networks

Converged infrastructure fundamentals
sponsored by ComputerWeekly.com
EGUIDE: Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive. The day of converged infrastructures has arrived.
Posted: 04 Jan 2021 | Published: 04 Jan 2021

ComputerWeekly.com

Why you need convergence
sponsored by ComputerWeekly.com
EGUIDE: You need convergence today more ever.  Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

ComputerWeekly.com

Converged infrastructure fundamentals
sponsored by ComputerWeekly.com
EGUIDE: Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive. The day of converged infrastructures has arrived.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

ComputerWeekly.com

Fighting Cybercrime in the 21st Century
sponsored by SearchSecurity.com
EBOOK: Strengthen your security with these expert insights into fighting advanced crimeware.
Posted: 20 May 2015 | Published: 20 May 2015

SearchSecurity.com

Stay Ahead of New Ransomware Threats: Protect against data exfiltration and extortion
sponsored by Palo Alto Networks
WHITE PAPER: Recent data shows that threats are developing in two key areas: data exfiltration and extortion. Bad actors are using ransomware as a means to these ends. Organizations must be aptly prepared by knowing what these processes look like. View this white paper to get an in-depth look at an exfiltration-focused attack as well as the extortion phase.
Posted: 22 Jan 2021 | Published: 16 Dec 2020

Palo Alto Networks

HP Device Manager 4.5 User Guide
sponsored by Hewlett Packard Enterprise
WHITE PAPER: this comprehensive white paper gives insight into an innovative server-based application that provides powerful centralized administration capabilities for thin client devices running HP software
Posted: 19 Jul 2013 | Published: 30 Nov 2012

Hewlett Packard Enterprise

6 Steps For Protecting Your Company’s Domain Name
sponsored by ZeroFOX
WHITE PAPER: A comprehensive approach to domain security should be multifaceted, covering everything from domain name registration and access controls to DNS security, encryption, email authentication and domain monitoring. Tap into this white paper to uncover 6 steps for protecting your company’s domain name.
Posted: 02 Jun 2022 | Published: 03 Jun 2022

TOPICS:  .NET
ZeroFOX

Containerized Deployments On Amazon Web Services
sponsored by TIBCO
DATA SHEET: Preparing your organization for the cloud requires a level of security and agility that some enterprises find difficult to maintain. Check out this data sheet to examine how your enterprise can safely and swiftly launch into the cloud leveraging containerized deployments on Amazon Web Services (AWS).
Posted: 09 Jun 2022 | Published: 10 Jun 2022

TOPICS:  .NET
TIBCO

Computer Weekly – 23 May 2017: Global ransomware attack could be a security wake-up call
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the global WannaCry ransomware attack that spread over 150 countries – will it be the wake-up call to take cyber security seriously? Also, find out how Moscow is leading the way in smart city digitisation. And our latest buyer's guide examines customer experience management.
Posted: 22 May 2017 | Published: 23 May 2017

ComputerWeekly.com

Future of the Internet Outlook
sponsored by AppNeta
INFOGRAPHIC: Throughout the pandemic, internet connectivity issues have plagued end users during a time where it’s paramount in the new normal: working from home. AppNeta’s 2021 State of Work from Anywhere Outlook survey explores a variety of questions to 1,000+ adults. Read on to discover their results.
Posted: 31 Aug 2021 | Published: 31 Aug 2021

TOPICS:  .NET
AppNeta

Computer Weekly Buyer's Guide to services for digitisation and IoT
sponsored by ComputerWeekly.com
EBOOK: In this 13-page buyer's guide, Computer Weekly looksat the use of mid-sized nearshore IT service providers, choosing a cloud-based platform, and how to manage the huge volume of IoT data.
Posted: 13 Dec 2017 | Published: 13 Dec 2017

ComputerWeekly.com