CIE White Papers

(View All Report Types)
Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

What is a Modern Infrastructure?
sponsored by SearchDataCenter.com
EZINE: This expert e-zine examines the increasing interest in leveraging white box switching as a means of enabling more network flexibility and choice, and how this shift could potentially "disrupt" your existing network operations.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

SearchDataCenter.com

The Desktop Admin's Guide to BYOD: Pros and Cons of BYOD
sponsored by SearchSecurity.com
EBOOK: Despite the fact that BYOD and BYOPC can reduce costs, add IT flexibility, and keep employees happy, they are not without issues. Check out this E-Book from SearchConsumerization.com to learn the promises and pitfalls of BYOD and BYOPC and discover how to successfully embrace them in your organization.
Posted: 23 May 2012 | Published: 23 May 2012

SearchSecurity.com

Creating and Enforcing Email Security Policies
sponsored by SearchSecurity.com
EGUIDE: This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

SearchSecurity.com

Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD
sponsored by SearchSecurity.com
EBOOK: BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

SearchSecurity.com

Compass®for Edge Computing
sponsored by Cobalt Iron
DATA SHEET: With Cobalt Iron Compass, you can eliminate the complexity and costs normally associated with edge computing backup processes. Download this datasheet to find out how and to discover the essential benefits of leveraging this solution for edge computing backup.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

Cobalt Iron

Desktop Admin Guide to BYOD
sponsored by SearchConsumerization.com
EBOOK: This expert resource takes an in-depth look at the promises and pitfalls of initiating a BYOPC program within your organization.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

All resources sponsored by SearchConsumerization.com

BYOD: Policy Creation and it's Increasingly Growing Need
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchSecurity.com discusses how your methodology for BYOD policy creation could decide how effective your initiative is. Read on and discover a step-by-step guide for creating an efficient and effective policy.
Posted: 23 Sep 2013 | Published: 23 Sep 2013

SearchSecurity.com

Exchange Insider E-Zine vol. 13 – Everything you need to know about Exchange Online retention policies
sponsored by SearchWindowsServer.com
EZINE: In this expert e-zine, explore the numerous benefits of Exchange Online retention policies as well as the PowerShell script necessary to manage and implement them. In addition, discover techniques to repair Outlook Web App 2010, new tools from the Microsoft Exchange team, and the latest Exchange updates.
Posted: 24 Apr 2012 | Published: 20 Apr 2012

SearchWindowsServer.com

The Future of Desktop Virtualization, Chapter 4
sponsored by SearchSecurity.com
EBOOK: This expert resource discusses how bring your own device (BYOD) policies, when used in conjunction with virtual desktop infrastructure (VDI), can return control back to IT while reducing the administrative and management headaches commonly associated with user-owned devices in the enterprise.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

SearchSecurity.com

E-Book: New Enterprise Desktop Chapter 3: Windows 7 Security: Strengths and Weaknesses
sponsored by SearchDataCenter.com
EBOOK: Each new OS is touted as the “Holy Grail” of features that every IT pro has been waiting for. Windows 7 is no different. This chapter looks at the Windows 7 security features such as BitLocker and Action Center, and separates those that really count from those that sound better on paper.
Posted: 17 Aug 2011 | Published: 17 Aug 2011

SearchDataCenter.com

Risk Management: Safeguarding Against a World of Threats
sponsored by HP Enterprise Security
EBOOK: Access this expert e-book to discover all the different components that make up a comprehensive risk management policy. Uncover the importance of accurate risk management metrics, why governance, risk, and compliance are a unified framework, 4 components your risk management strategy may be missing, and more.
Posted: 17 May 2012 | Published: 01 May 2012

HP Enterprise Security

4 Things You Need to Know Now about Edge Computing
sponsored by Hewlett Packard Enterprise
DATA SHEET: By 2023, it is predicted that more than half of new enterprise IT infrastructure will be at the edge. Today, many organizations are at the beginning of their edge journeys. For guidance as your organization progresses along its edge journey, explore this data sheet and unlock 4 important factors to keep in mind.
Posted: 12 Sep 2022 | Published: 12 Sep 2022

TOPICS:  .NET
Hewlett Packard Enterprise

COMFORTE - Data Security Platform
sponsored by Comforte AG
EBOOK: The growing complexity of digital business ecosystems, data exposure risks, and meeting evolving compliance requirements are pushing today’s business to their limits of what’s possible. Download this e-book to learn about a data security platform that is designed to simplify operations and improve security.
Posted: 01 Feb 2022 | Published: 02 Feb 2022

TOPICS:  .NET
Comforte AG

Data Protection Technical Guide
sponsored by SearchSecurity.com
EBOOK: This whitepaper examines some of the challenges associated with deploying DLP, identifies common pitfalls, and explains how DLP can be used effectively. Learn from CSOs and other experts as they share what you need to know when it comes to DLP technologies.
Posted: 13 Mar 2013 | Published: 13 Mar 2013

SearchSecurity.com

eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by SearchCompliance.com
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 12 Mar 2009 | Published: 05 Mar 2009

SearchCompliance.com

E-Book: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by Safestone Technologies
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 08 Mar 2011 | Published: 08 Mar 2011

Safestone Technologies

eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by SearchCompliance.com
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 12 Mar 2009 | Published: 05 Mar 2009

SearchCompliance.com

eBook: Compliance 2.0: Comprehensive, Scalable and Sustainable Systems
sponsored by SearchCompliance.com
EBOOK: This expert e-book will help you prioritize compliance investments to reduce costs. Explore how companies are building a holistic approach to compliance, what strategies work and what technologies and practices you can leverage.
Posted: 12 Mar 2009 | Published: 05 Mar 2009

SearchCompliance.com

Container Security 101
sponsored by Palo Alto Networks
EBOOK: Developers have widely embraced containers because they are designed to make building and deploying so-called cloud native applications simpler, but they also carry a range of cybersecurity issues. Download this e-book to learn how you can ensure security for these essential applications.
Posted: 22 Apr 2022 | Published: 23 Apr 2022

TOPICS:  .NET
Palo Alto Networks

Enhancing Guest Experiences with Unified Communications and Video Security
sponsored by Motorola, Inc.
WHITE PAPER: Consumers are in constant pursuit of the most satisfying experience — one that is immediate, seamless and customized. This is more difficult to achieve in the siloed organizational structures of today’s hospitality organizations. In this white paper, learn more about the business benefits of arming staff with a reliable communication system.
Posted: 08 Feb 2021 | Published: 21 Feb 2020

Motorola, Inc.

Modern Security Solutions for the Mainframe
sponsored by Beta Systems
WHITE PAPER: Jump into this white paper to learn how to identify and plug system security vulnerabilities in your z/OS environments by comparing your current RACF settings to industry standards as defined by Security Technical Implementation Guides.
Posted: 04 Nov 2021 | Published: 22 Jan 2020

Beta Systems

File Sync and Share Requires Planning and Caution
sponsored by SearchStorage.com
EBOOK: File sync and share can boost productivity, but cause security issues. IT can regain control with the right deployment model and a corporate-sanctioned online file-sharing service.
Posted: 12 Jun 2014 | Published: 12 Jun 2014

SearchStorage.com

Sorting Storage Options on AWS
sponsored by SearchAWS
EBOOK: Sorting through AWS Data Storage options is no small task. With a little background, however, you can successfully -- and securely -- choose the right option for your company.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SearchAWS

How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE: According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017

One Identity

Recent BI and Reporting Trends for Oracle EBS
sponsored by Noetix Corporation
EBOOK: Are you able to effectively leverage and report on Oracle eBusiness Suite data? Read this expert e-book to find out the latest technology trends that may affect your BI and reporting strategy. Learn more about how to get the most out of included BI/reporting features, when to use OBIEE and when you may need to consider alternative tools.
Posted: 31 May 2012 | Published: 31 May 2012

Noetix Corporation