Association for Automatic Identification and Mobility White Papers

(View All Report Types)
Firewall Buyers Guide
sponsored by Palo Alto Networks
BUYER'S GUIDE: As network perimeters have evolved, firewalls have too. So, what constitutes a modern firewall? This buyer’s guide maps out 15 non-negotiable capabilities. Keep reading to access those insights and more.
Posted: 04 Apr 2024 | Published: 04 Apr 2024

TOPICS:  .NET
Palo Alto Networks

Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
sponsored by Exabeam
WHITE PAPER: The MITRE ATT&CK framework offers a standardized knowledge base of adversary tactics and techniques, aiding organizations in crafting threat-informed defenses. This SANS white paper details how to use the ATT&CK framework for cyber threat intelligence, gap identification, and analytics testing, with practical strategies.
Posted: 04 Apr 2025 | Published: 05 Apr 2025

Exabeam

Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
sponsored by Exabeam
WHITE PAPER: The MITRE ATT&CK framework offers a standardized knowledge base of adversary tactics and techniques, aiding organizations in crafting threat-informed defenses. This SANS white paper details how to use the ATT&CK framework for cyber threat intelligence, gap identification, and analytics testing, with practical strategies.
Posted: 09 Apr 2025 | Published: 05 Apr 2025

Exabeam

Outlining 11 typical types of medical mistakes and patient harms
sponsored by XtelligentMedia Healthcare
EGUIDE: Understanding the most common types of medical errors might help tailor patient safety best practices.
Posted: 24 Oct 2024 | Published: 25 Oct 2024

XtelligentMedia Healthcare

The 5 Stages of CTEM
sponsored by XM Cyber
WHITE PAPER: Increasingly, The Continuous Threat Exposure Management (CTEM) Framework by Gartner is being seen as an impactful way to address the full range of challenges that put organizations at risk. Read this white paper now to discover the 5 stages of CTEM and find out how you can change the way your business handles cyber risk.
Posted: 09 Jan 2025 | Published: 11 Jan 2025

XM Cyber

Testing New Publishing System
sponsored by ERROR TEST
WHITE PAPER: Preparing this resource to be approved and published when we do the switch to the new publishing system.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TOPICS:  Access Control
ERROR TEST

Strata Network Security Buyer’s Guide
sponsored by Palo Alto Networks
EBOOK: In this e-book, discover the essential buyer’s guide to network security solutions, and the secrets to creating security RFPs that get results.
Posted: 31 May 2024 | Published: 01 Jun 2024

TOPICS:  .NET
Palo Alto Networks

Truman Medical Centers/ University Health Charts Big Improvements In Clinician Communication And Satisfaction With Single Mobility Investment
sponsored by Zebra Technologies
CASE STUDY: Giving nurses, doctors and other staff one key clinical mobile device has improved care team satisfaction by 35% – and that’s just one of the many benefits realized so far. Explore the benefits of a single mobility investment in this case study.
Posted: 10 May 2024 | Published: 10 May 2024

TOPICS:  .NET
Zebra Technologies

Buyer’s Guide to Automated Layer 2 Discovery & Mapping Tools
sponsored by Progress Software Corporation WhatsUp Gold
BUYER'S GUIDE: Layer 2 discovery provides detailed network views, saving time on documentation and ensuring compliance. A complete solution includes automatic discovery, inventories, mapping, and compliance tools to quickly identify issues and maintain accurate diagrams. Learn how it optimizes network management in this buyer's guide.
Posted: 26 Apr 2023 | Published: 18 Apr 2025

All resources sponsored by Progress Software Corporation WhatsUp Gold

Secure Voting
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 08 Feb 2021 | Published: 04 Apr 2016

TechTarget ComputerWeekly.com

Build Solar Better Balance of System Solutions from PV Module to Transmission Line
sponsored by Panduit
PRODUCT OVERVIEW: Explore Panduit's balance of system solutions for solar plants, from module to transmission. Featuring UV-resistant cable management, grounding, identification, and protection components for efficiency and reliability in harsh environments. Read this white paper to learn how BOS components can reduce downtime and maximize your solar project's ROI.
Posted: 17 Mar 2025 | Published: 18 Mar 2025

Panduit

ACCELERATING IMPACT: NONPROFITS + SERVICENOW
sponsored by ServiceNow
EBOOK: How can you balance the nuanced IT requirements within your nonprofit while delivering exceptional experiences for customers and employees? Access this e-book to examine the key areas in which ServiceNow supports the organizational and digital transformation goals of nonprofits.
Posted: 07 Jan 2025 | Published: 07 Jan 2025

ServiceNow

The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 08 Feb 2021 | Published: 09 May 2017

TechTarget ComputerWeekly.com

Next-Gen Cybersecurity: How to Automate Suspicious & Malicious File Analysis in SentinelOne
sponsored by CODEHUNTER
WHITE PAPER: As the volume and complexity of malware grows, security teams struggle with alert fatigue and false positives. Automate the malware analysis process with SentinelOne and CodeHunter to enhance threat detection, improve response time, and streamline security operations. Read the e-book to learn more.
Posted: 27 Aug 2024 | Published: 27 Aug 2024

CODEHUNTER

Building a Future-Ready Workforce
sponsored by Censia, Inc
WHITE PAPER: AI-enabled skills management offers scalable workforce planning amid rapid skill evolution. Discover how AI can future-proof your talent management strategy.
Posted: 18 Mar 2025 | Published: 19 Mar 2025

All resources sponsored by Censia, Inc

XDR Maximizing Operation Efficiency
sponsored by Bitdefender
EBOOK: Streamlining security operations with automation and XDR can enhance efficiency, reduce risks, and empower security teams. In this e-book, you'll learn how to simplify incident response, leverage XDR, and implement best practices to strengthen your cybersecurity posture. Read on now to learn more.
Posted: 25 Feb 2025 | Published: 06 Mar 2025

Bitdefender

Data discovery: how to pick the right software
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this guide, we break down data discovery software by defining the categories, explaining the features and revealing the benefits. We also highlight the major players and products in an effort to inform buying decisions.
Posted: 08 Feb 2021 | Published: 20 Nov 2019

TechTarget ComputerWeekly.com

Are we trusting social networks too much?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
Posted: 08 Feb 2021 | Published: 31 Jan 2017

TechTarget ComputerWeekly.com

Nucleus Research: Beti® Bolsters Payroll Success
sponsored by Paycom
PRODUCT OVERVIEW: Payroll is critical but challenging for many organizations, especially with complex workforces. Beti, a self-service payroll feature from Paycom, lets employees manage, verify, and approve their paychecks before processing.
Posted: 19 Feb 2025 | Published: 20 Feb 2025

Paycom

A Holistic Approach to Strengthening Cyber Resilience
sponsored by Verizon
WHITE PAPER: As network perimeters dissolve and access points multiply, cybersecurity must adapt to distributed work. This white paper explores holistic strategies for strengthening cyber resilience in today's complex threat landscape. Read the full white paper to discover actionable approaches for securing your organization's digital assets.
Posted: 28 Mar 2025 | Published: 28 Mar 2025

Verizon

How to Plan for Tomorrow’s SOC, Today
sponsored by Palo Alto Networks
EBOOK: Discover in this e-book the 5 Steps and 4 Keys to transforming security operations to combat advanced attacks and improve SOC efficiencies, so you can plan for tomorrow’s SOC, today.
Posted: 24 Apr 2024 | Published: 24 Apr 2024

TOPICS:  .NET
Palo Alto Networks

The Island Enterprise Browser: A Comprehensive Solution for a Viable BYOD Policy
sponsored by Island
PRODUCT OVERVIEW: Discover how the Island Enterprise Browser offers a comprehensive and viable solution for BYOD management. Learn how it simplifies provisioning, controls data leakage, and ensures user privacy - all while addressing the challenges of traditional BYOD approaches. Read the full white paper to learn more.
Posted: 07 Feb 2025 | Published: 07 Feb 2025

Island

Optimize your Security Posture with the Threat Intelligence Lifecycle
sponsored by Google
WHITE PAPER: This white paper examines the threat intelligence lifecycle and its role in cyber defense. Learn to enhance security by understanding adversaries, predicting threats, and building resilience. Discover key intelligence services and best practices for integrating threat intelligence. Read the full white paper to transform your strategy.
Posted: 08 Mar 2025 | Published: 08 Mar 2025

Google

Mobile Payments Using Host Card Emulation with NFC
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 08 Feb 2021 | Published: 11 May 2018

TechTarget ComputerWeekly.com

Top 10 Health Care Cyber Security Tips
sponsored by LexisNexis
WHITE PAPER: Healthcare records can fetch up to $250 on the black market, requiring robust cybersecurity strategies that balance protection and user experience. This white paper offers ten tips for using digital identity intelligence to detect threats while ensuring a seamless experience. Learn to secure healthcare data without compromising engagement.
Posted: 19 Apr 2025 | Published: 19 Apr 2025

LexisNexis