IT Agents  >   Standards Organizations  >   National Standards Organizations  >  

CSA

RSS Feed   
CSA White Papers (View All Report Types)
 
Real World Stories of IT Admin Heroes
sponsored by Pure Storage
WHITE PAPER: Check out this compendium of case studies to see 7 shining examples of everyday IT admin heroes as they use Pure Storage to help their organizations simplify and transform operations for mission-critical databases, virtualized environments, and analytics with all-flash and NVMe.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Pure Storage

IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Secure IT Asset Disposition: Achieving Business Value While Mitigating Risks
sponsored by Iron Mountain
WHITE PAPER: The risks of not having an IT asset disposition (ITAD) solution are substantial.Download this white paper for advice on how to dispose of old IT equipment successfully while achieving security, compliance, and environmental goals.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Iron Mountain

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

MicroStrategy Customer Success Story: Ceva Santé Animale
sponsored by MicroStrategy
CASE STUDY: The CIO of Ceva Santé Animale, a global veterinary health company, wanted to "have everything on all devices without VPN (PC, Mac, iPad, Android and Blackberry." View this brief case study to learn how CSA built a sales enablement application on a mobile platform that aggregates CRM, ERP and sales data.
Posted: 22 Jan 2014 | Published: 31 Aug 2013

MicroStrategy

A Computer Weekly buyer's guide to asset management for hybrid IT
sponsored by ComputerWeekly.com
EGUIDE: Hybrid IT opens up a range of new considerations for businesses. In this 14-page buyer's guide, Computer Weekly looks at how to manage its infrastructure, the importance of cost management and the main considerations to make when addressing cloud management issues.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

ComputerWeekly.com

SSO in the Cloud and Mobile Era
sponsored by TechTarget
RESOURCE: Single sign-on has always appeared to be the best option for log-in security, however, as use of the cloud increases and the BYOD trend continues to grow, additional protection is necessary to keep data protected. We're offering free access to one of our expert guides, SSO in the Cloud and Mobile Era.
Posted: 26 Sep 2017 | Published: 03 Nov 2018

TechTarget

SSO in the Cloud and Mobile Era
sponsored by Techtarget
RESOURCE: Single sign-on has always appeared to be the best option for log-in security, however, as use of the cloud increases and the BYOD trend continues to grow, additional protection is necessary to keep data protected. We're offering free access to one of our expert guides, SSO in the Cloud and Mobile Era.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

Techtarget

CW ASEAN: Raising national security standards
sponsored by TechTarget ANZ
EZINE: In this month's CW ASEAN, we describe how Singapore is improving its cyber security defenses and preparations through a partnership with British security company BAE Systems.
Posted: 10 Mar 2017 | Published: 09 Mar 2017


Your expert guide to digital tools for health services
sponsored by ComputerWeekly.com
EGUIDE: At a time when the NHS is faced with unprecedented pressure, new technological solutions can help ease some of the strain. From apps to electronic records and artificial intelligence, technology is playing an increasingly important part in transforming the health service.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

ComputerWeekly.com

An Advanced Approach to On-Prem Sandboxing
sponsored by SonicWall
PRODUCT OVERVIEW: Large organizations and agencies need to counter advanced malware with advanced security techniques, such as sandboxes. However, many also require their sensitive data stays on premises, so they cannot leverage cloud-based offerings. This brief examines an advanced on-prem sandboxing approach that is fast, highly accurate and cost-effective
Posted: 22 Feb 2021 | Published: 22 Feb 2021

TOPICS:  Cybersecurity
SonicWall

Retail Guide: How to Stay Secure as a Retailer Using Cloud to Revolutionize the Customer Experience
sponsored by DivvyCloud
WHITE PAPER: Today’s retailers are facing stress on several fronts: Customer demands for improved experience, competitive pressures, and the need to ensure regulatory compliance. This cloud security guide for retailers breaks down these common challenges and offers pragmatic advice for developing a roadmap for security and compliance.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

DivvyCloud

Ensuring Cloud Security and Compliance in the Financial Services Industry
sponsored by DivvyCloud
WHITE PAPER: In order to meet customer demands, financial service organizations are embracing mobile banking applications. However, teams should be aware of the additional security threats associated with organizational changes. Download this white paper and learn how to ensure cloud security and compliance while embracing digital transformation.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

DivvyCloud

Insider Edition: There's No Room for Either/Or When It Comes to Cloud and Security
sponsored by SearchSecurity.com
EBOOK: Improved capabilities for logging and reporting cloud-based activity are now available, as are new ways for cloud providers to certify and communicate their security postures. This Insider Edition looks at efforts such as the STAR certification and the recently announced CloudTrust protocol.
Posted: 14 May 2014 | Published: 15 May 2014

SearchSecurity.com

Evaluating Risk Management
sponsored by Atlassian
WHITE PAPER: As organizations continue to adopt cloud services, assessing the security risk of each service through a standardized evaluation process becomes critical to preventing data breaches. This guide is designed to help your organization develop a security risk scoring system to evaluate potential risks. Download the guide to learn more.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Atlassian

BYOD: The Evolution of Mobile Security
sponsored by SearchSecurity.com
EGUIDE: This expert guide takes an in-depth look at the new technologies and innovations that are driving the shift towards enterprise mobility, along with how to adapt your management strategy to best take utilize them.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

SearchSecurity.com

Making the case for cloud-based security
sponsored by ComputerWeekly.com
EGUIDE: Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

ComputerWeekly.com

CLOUD API SECURITY RISKS: HOW TO ASSESS CLOUD SERVICE PROVIDER APIS
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchCloudSecurity.com takes an in-depth look at API security, answering critical questions and providing helpful tips for securing your cloud APIs.
Posted: 19 Sep 2013 | Published: 19 Sep 2013

SearchSecurity.com

February Technical Guide on Cloud Compliance
sponsored by SearchSecurity.com
EGUIDE: In this month’s Technical Guide from SearchCloudSecurity.com, gain a global perspective of today’s cloud compliance challenges. Explore key topics, including FedRAMP cloud computing standards, cloud security transparency, PCI in the cloud, Cloud Maturity Model (CMM) and more.
Posted: 27 Feb 2012 | Published: 24 Feb 2012

SearchSecurity.com

Five Steps To Ensuring Secure and Compliant AWS RDS
sponsored by Imperva
WHITE PAPER: While database-as-a-service (DBaaS) program, like AWS RDS, offer unmatched capabilities in terms of access and storage capacity, users often feel that compliance and security can be challenging. Read this white paper to unlock the 5 essential steps your organization should to take to ensure secure and compliant AWS RDS.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

TOPICS:  Cybersecurity
Imperva

Making the case for cloud-based security
sponsored by ComputerWeekly.com
EGUIDE: Cloud-based security tools can hasten threat detection and response, but adoption will depend on where an enterprise is on the cloud readiness scale. Read more in this guide.
Posted: 04 Jan 2021 | Published: 04 Jan 2021

ComputerWeekly.com

The Need for Cloud Computing Security Standards
sponsored by SearchSecurity.com
EGUIDE: While cloud computing promises business advantages such as agility, efficiency, cost savings and more, many organizations are still hesitant to adopt for one prominent reason – security. In this expert e-guide uncover the driving need for cloud computing security standards and how this issue is being addressed.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

SearchSecurity.com

Information Security Asean November 2015
sponsored by TechTarget ANZ
EZINE: The cover story looks at the cyber crime landscape in Singapore and what organisations in the city state are doing to combat it
Posted: 09 Nov 2015 | Published: 09 Nov 2015


Securing Your Cloud Deployment with Today's Top Strategies
sponsored by SearchCloudSecurity.com
EZINE: In this Insider Edition, InfoSec Pros will learn how to achieve better cloud security. It reviews existing cloud security standards and how to assess, and manage, the risk of a cloud deployment.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

SearchCloudSecurity.com

CW ASEAN: Be alert to threats
sponsored by ComputerWeekly.com
EZINE: With cyber threats intensifying in recent years, the role of threat intelligence in anticipating and mitigating threats has become more important than ever. In this month's CW ASEAN, we explore how to make the most out of threat data feeds in an intelligence-driven security strategy.
Posted: 13 Jul 2017 | Published: 13 Jul 2017

ComputerWeekly.com

Cloud Compliance Technical Guide
sponsored by SearchCloudSecurity.com
WHITE PAPER: Check out this expert technical guide for a global perspective on emerging cloud compliance issues.
Posted: 02 Apr 2013 | Published: 31 Dec 2012

SearchCloudSecurity.com

Why You Need A Next-Generation Firewall
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Hewlett Packard Enterprise

Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Hewlett-Packard Enterprise

Secure Your Shared Assets with Zero-Trust Security
sponsored by SonicWall
PRODUCT OVERVIEW: Traditional VPNs are becoming increasingly unreliable against today’s cyberthreats, and organizations are turning towards software-defined perimeter (SDP) security models to ensure protection. Read this solution brief for an overview of SonicWall’s Cloud Edge Secure Access offering, which embraces the zero-trust ideology to protect your SDP.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

TOPICS:  Cybersecurity
SonicWall
 
Browse by Report Type:
CSA White Papers | CSA Multimedia | CSA IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences