IEC White Papers

(View All Report Types)
Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Complying With IEC62443 A Product Security Perspective
sponsored by Cybellum
WHITE PAPER: IEC 62443 is a comprehensive framework of standards for securing Industrial Automation and Control Systems, including specific sections relevant to product security professionals. Use this white paper as a reference to better understand this IEC 62443 with regards to product security and where your adherence stands.
Posted: 01 May 2024 | Published: 01 May 2024

TOPICS:  .NET
Cybellum

Israel Electric Corporation Moves Toward Smarter Maintenance
sponsored by IBM
CASE STUDY: This use case describes how Israel's largest electricity provider utilizes IBM's predictive analytics software to monitor its turbine performance in real time, enabling the company to discover and resolve anomalies before outages occur.
Posted: 25 Feb 2015 | Published: 30 Sep 2013

IBM

Understanding Security Frameworks
sponsored by JAMF
EBOOK: Cybersecurity frameworks address many of the key challenges common to security strategies by providing a clear, concise roadmap for managing cybersecurity plans. This e-book is designed to show you how you can use cybersecurity frameworks as part of a comprehensive security strategy. Read on to learn more.
Posted: 01 Nov 2023 | Published: 01 Nov 2023

TOPICS:  .NET
JAMF

Guide: IAM, Third-Party IoT Risk, Cybersecurity Frameworks and CISO Best Practices
sponsored by Beta Systems
EGUIDE: Read this guide to explore trends in identity and access management (IAM) and third-party IoT risk, best practices for fitting NIST and ISO/IEC JTC 1 frameworks into your security program and the importance of cyber literacy, as well as finding the right security talent, for CISOs.
Posted: 01 Feb 2022 | Published: 01 Feb 2022

TOPICS:  .NET
Beta Systems

Cybersecurity for Medical Devices in a Connected Healthcare System
sponsored by Wind River
EBOOK: As healthcare systems become more connected, cybersecurity for medical devices is critical to mitigate risks. This white paper examines the key considerations for implementing an effective security strategy throughout the device lifecycle. Read the full white paper to learn more.
Posted: 17 Jun 2024 | Published: 17 Jun 2024

Wind River

Industrial Cybersecurity: Monitoring & Anomaly Detection
sponsored by Cisco
RESOURCE: Industrial control systems (ICS) are all around us: in water, in gas, and electricity distribution networks, running power plants and critical infrastructure, in production lines and transportation networks, and more.
Posted: 27 Jan 2020 | Published: 27 Jan 2020

Cisco

Storage Capacity 101 to Post-Grad in a Flash
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: In this report from Quocirca, analyst Clive Longbottom explains why you don't always get what you think you're getting with flash storage.
Posted: 08 Feb 2021 | Published: 14 Mar 2016

TechTarget ComputerWeekly.com

Plugging Into Zero Clients Powers Investment Programme
sponsored by Dell
CASE STUDY: Discover how a VDI solution enabled improvement of a desktop environment by centralizing data to tighten security.
Posted: 14 Nov 2014 | Published: 31 Oct 2014

Dell

Mobile NFC in Transport
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

TechTarget ComputerWeekly.com

Cloud Security Frameworks and 10 IAM Tools for Network Security
sponsored by Nexum
EGUIDE: Cloud security and identity and access management (IAM) are two necessary tenets of a secure organization. Make sure you understand the specifics of each by reading this guide that explores these two separate but important topics in detail, covering cloud security frameworks and 10 IAM tools for network security.
Posted: 07 Dec 2021 | Published: 01 Dec 2021

TOPICS:  .NET
Nexum

Critical Power and IT Data continuity for Healthcare
sponsored by Schneider Electric
EBOOK: Discover in this product overview how Schneider Electric can help you navigate the power and digital solutions landscape to prepare your organization for a future of safe, efficient, and patient-centered healthcare.
Posted: 16 May 2024 | Published: 16 May 2024

TOPICS:  .NET
Schneider Electric

Building a Cybersecurity Strategy for the Digital Economy
sponsored by Schneider Electric
EBOOK: Download this e-book for help establishing a pragmatic approach for creating a multi-layered cybersecurity strategy to help you reduce your business and digital risks.
Posted: 23 May 2024 | Published: 23 May 2024

TOPICS:  .NET
Schneider Electric

How to Build a Proactive Compliance Program with Identity Security
sponsored by CyberArk
EBOOK: This eBook reviews nearly 20 global regulations and frameworks, with details on their security-focused requirements. This includes:NIS2 directiveDORANIST Special Publication 800-207 on Zero Trust ArchitectureDownload the eBook and learn how you can streamline compliance initiatives.
Posted: 21 Jun 2024 | Published: 22 Jun 2024

TOPICS:  .NET
CyberArk

Prefabricated and Micro Datacentres: The Essential Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As debate continues to rage about what role private, enterprise-owned datacentres will play in firms' IT strategies in the years to come, what is becoming clear is that they type of facilities companies rely on are sure to change in line with their evolving business needs.
Posted: 08 Feb 2021 | Published: 26 Sep 2016

TechTarget ComputerWeekly.com

Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Hewlett-Packard Enterprise

Why You Need A Next-Generation Firewall
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Hewlett Packard Enterprise

Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

The AI Disruption: Challenges And Guidance For Data Center Design
sponsored by Schneider Electric
EBOOK: This eBook analyzes impact of AI on data center design. Key takeaways: AI workloads driving higher rack densities; transition from air to liquid cooling needed; guidance on power, cooling, racks. Read the full eBook to learn best practices for AI-ready data centers.
Posted: 16 Mar 2024 | Published: 16 Mar 2024

TOPICS:  .NET
Schneider Electric

The AI Disruption: Challenges and Guidance for Data Center Design
sponsored by Schneider Electric
WHITE PAPER: Artificial intelligence (AI) deployments are taking up an increasingly large portion of data center workloads. This paper explains relevant attributes and trends of AI workloads and describes the resulting data center challenges, including Guidance for how to address these challenges. Read on to learn more.
Posted: 25 Jan 2024 | Published: 26 Jan 2024

TOPICS:  .NET
Schneider Electric

Step-by-step disaster recovery planning guide
sponsored by TechTarget ComputerWeekly.com
EBOOK: IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.
Posted: 29 Mar 2022 | Published: 29 Mar 2022

TechTarget ComputerWeekly.com

Semiconductor Secure Power Solutions
sponsored by Schneider Electric
WHITE PAPER: Discover in this white paper how Integrated Schneider Electric solutions can offer your organization a complete electrical system including power monitoring and a resilient architecture to improve subfunction operation, enable optimum use of energy, and save up to 30% on operating energy costs.
Posted: 23 May 2024 | Published: 23 May 2024

TOPICS:  .NET
Schneider Electric

APC Smart-UPS Modular Ultra
sponsored by Insight
PRODUCT OVERVIEW: The APC Smart-UPS Modular Ultra is a next-gen lithium-ion UPS with increased power, runtime, and redundancy. It features universal bays, EcoStruxure connectivity, and a modular and scalable design. Read the full product overview to learn more.
Posted: 01 Jun 2024 | Published: 01 Jun 2024

TOPICS:  .NET
Insight

Link Software Development to Measured Business Value Creation
sponsored by JBS Custom Software Solutions
EBOOK: PH
Posted: 04 Jun 2021 | Published: 04 Jun 2021

All resources sponsored by JBS Custom Software Solutions

Virtualization Security: Protecting Virtualized Environments
sponsored by TechTarget ComputerWeekly.com
BOOK: This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

TechTarget ComputerWeekly.com

Zero Trust Security for Zero Operational Downtime
sponsored by Palo Alto Networks
RESEARCH CONTENT: Though they present great opportunity, Industrial Internet of Things (IIoT) initiatives present great security risk as well as financial risk, because of the costly nature of shutting down operations. So, how can you secure your business’s OT environment and mitigate such risks? Tap into this 2023 VDC Research paper for insights.
Posted: 20 Nov 2023 | Published: 20 Nov 2023

TOPICS:  .NET
Palo Alto Networks