IEC White Papers

(View All Report Types)
The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012


Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011


The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012


Securing industrial networks: What is ISA/IEC 62443?
sponsored by Cisco IoT
BLOG: Attacks on operational technology (OT) can interrupt production and revenue, expose proprietary information, or taint product quality. Securing industrial operations is now top of mind—but converting good intentions to action can be challenging. Explore the top barriers to industrial cybersecurity—and how to knock them down—in this resource.
Posted: 16 Mar 2022 | Published: 16 Mar 2022

Cisco IoT

Israel Electric Corporation Moves Toward Smarter Maintenance
sponsored by IBM
CASE STUDY: This use case describes how Israel's largest electricity provider utilizes IBM's predictive analytics software to monitor its turbine performance in real time, enabling the company to discover and resolve anomalies before outages occur.
Posted: 25 Feb 2015 | Published: 30 Sep 2013


Guide: IAM, Third-Party IoT Risk, Cybersecurity Frameworks and CISO Best Practices
sponsored by Beta Systems
EGUIDE: Read this guide to explore trends in identity and access management (IAM) and third-party IoT risk, best practices for fitting NIST and ISO/IEC JTC 1 frameworks into your security program and the importance of cyber literacy, as well as finding the right security talent, for CISOs.
Posted: 01 Feb 2022 | Published: 01 Feb 2022

Beta Systems

Industrial Cybersecurity: Monitoring & Anomaly Detection
sponsored by Cisco
RESOURCE: Industrial control systems (ICS) are all around us: in water, in gas, and electricity distribution networks, running power plants and critical infrastructure, in production lines and transportation networks, and more.
Posted: 27 Jan 2020 | Published: 27 Jan 2020


Storage Capacity 101 to Post-Grad in a Flash
sponsored by
ANALYST REPORT: In this report from Quocirca, analyst Clive Longbottom explains why you don't always get what you think you're getting with flash storage.
Posted: 14 Mar 2016 | Published: 14 Mar 2016

Plugging Into Zero Clients Powers Investment Programme
sponsored by Dell
CASE STUDY: Discover how a VDI solution enabled improvement of a desktop environment by centralizing data to tighten security.
Posted: 14 Nov 2014 | Published: 31 Oct 2014


How to Design Physical Infrastructure for Distributed Computing
sponsored by Schneider Electric
WHITE PAPER: To help you get started with distributed computing, Schneider Electric has divided deployments into three categories ordered from the simplest environments to the most challenging. Explore this e-book to learn about each environment, outline the dilemmas inherent to each, and procure tips for maintaining resiliency and reliability.
Posted: 03 Nov 2021 | Published: 03 Nov 2021

Schneider Electric

Vxworks Redefining The Role Of The RTOS
sponsored by Wind River
EBOOK: The world of embedded systems is undergoing a profound evolution. Once isolated and purpose-built, embedded systems are increasingly software-defined with much greater requirements for connectivity, reliability, and flexibility. In this eBook, discover how VxWorks gives developers the power to be more productive and innovative.
Posted: 11 Jan 2022 | Published: 16 Nov 2021

Wind River

Guide to Environmental Sustainability Metrics for Data Centers
sponsored by Schneider Electric
ANALYST BRIEF: Access this white paper to learn 23 key metrics data center operators can use to report on environmental sustainability in a holistic way and discover how these efforts towards green data centers can improve your company’s ecological footprint.
Posted: 25 Jan 2022 | Published: 26 Jan 2022

Schneider Electric

Mobile NFC in Transport
sponsored by
ESSENTIAL GUIDE: This in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

Cloud Security Frameworks and 10 IAM Tools for Network Security
sponsored by Nexum
EGUIDE: Cloud security and identity and access management (IAM) are two necessary tenets of a secure organization. Make sure you understand the specifics of each by reading this guide that explores these two separate but important topics in detail, covering cloud security frameworks and 10 IAM tools for network security.
Posted: 07 Dec 2021 | Published: 01 Dec 2021


How to develop an effective IT disaster recovery plan
sponsored by Acronis
WHITE PAPER: This white paper will walk you through the entire disaster recovery planning process—from risk assessment to implementation, testing, and ongoing maintenance. Download your copy for coverage on the 8-step process for creating a successful plan, how to avoid five common DR mistakes, and more.
Posted: 15 Mar 2021 | Published: 22 Feb 2021


Cisco Catalyst IR8100 Heavy Duty Series Router
sponsored by Cisco IoT
DATA SHEET: The Catalyst IR8100 Heavy Duty Series Router is touted as Cisco’s most versatile 5G multi-access outdoor industrial router. Access this data sheet for a closer look at the router’s specifications, benefits, use cases and more.
Posted: 22 Mar 2022 | Published: 22 Mar 2022

Cisco IoT

The Digital Onboarding Imperative White Paper
sponsored by Daon
WHITE PAPER: Access this white paper to learn about key drivers for the adoption of digital onboarding services & find out how 2 companies leveraged Daon solutions to meet today’s onboarding needs.
Posted: 11 Mar 2022 | Published: 11 Mar 2022


Enterprise Storage That Delivers Consistent Ultra-high Performance And Sub-millisecond Latency For The Most Intense Workloads
sponsored by Infinidat
DATA SHEET: Modern enterprises demand storage solutions that deliver consistent ultra-high performance. The InfiniBox SSA enterprise storage system is designed for the most demanding applications, efficiently handling workloads with sub-millisecond latency. Check out this data sheet to learn how InfiniBox systems caters to your enterprise's storage needs.
Posted: 21 Apr 2022 | Published: 21 Apr 2022


Creating a smarter way to manage remote locations
sponsored by Hewlett Packard Enterprise
RESOURCE: HPE GreenLake for Compute Ops Management can help organizations avoid downtime and protect data integrity when it comes to managing remote locations. Read on to learn how you can improve the lives of IT professionals within your organization and better manage servers for over 100 office locations.
Posted: 23 Apr 2022 | Published: 23 Apr 2022

Hewlett Packard Enterprise

Digital transformation fuels FIS
sponsored by Hewlett Packard Enterprise
WHITE PAPER: During a year of disruption like no other, FIS launched Ethos, its new fintech data ecosystem used by over 20,000 clients. HPE infrastructure allowed this organization to improve their real-time data access. Read on to learn how about HPE’s scalable, edge-enabled infrastructure helps FIS power their success.
Posted: 01 Feb 2022 | Published: 01 Feb 2022

Hewlett Packard Enterprise

Enterprise Storage That Enables Competitive Advantage At Multi-Petabyte Scale
sponsored by Infinidat
DATA SHEET: The InfiniBox enterprise storage array delivers faster-than-all-flash performance, highly reliable availability, and multi-petabyte scale for mixed application workloads.But the advantages don’t stop there. Explore this data sheet to learn the full specs of the InfiniBox and see a rundown of the 7 benefits it provides
Posted: 01 Dec 2021 | Published: 08 Nov 2021


Secure Your Transition to the Hybrid Workplace
sponsored by HP
WHITE PAPER: As organizations transition to a hybrid workplace, it can be easy to overlook key security precautions. Read this white paper to secure your company’s transition to a hybrid workplace and identify your new IT priorities.
Posted: 15 Jun 2022 | Published: 15 Jun 2022


Prefabricated and Micro Datacentres: The Essential Guide
sponsored by
EGUIDE: As debate continues to rage about what role private, enterprise-owned datacentres will play in firms' IT strategies in the years to come, what is becoming clear is that they type of facilities companies rely on are sure to change in line with their evolving business needs.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Hewlett-Packard Enterprise

Why You Need A Next-Generation Firewall
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Hewlett Packard Enterprise

Threatx Appsec-As-A-Service Offering
sponsored by ThreatX
DATA SHEET: View this data sheet to discover how the ThreatX security operations center (SOC) strives to help you protect your applications with 24/7 monitoring, response and threat hunting driven by AppSec experts and collective intelligence.
Posted: 23 Jul 2021 | Published: 23 Jul 2021


CISSP Exam Guide: Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER: In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 08 Mar 2021 | Published: 31 Dec 2020

McGraw Hill

INDUSTRIAL CYBERSECURITY: Monitoring & Anomaly Detection
sponsored by Cisco IoT
EBOOK: The risk in ICS environments involves threats that would undermine the operational safety and the availability or even the physical integrity of the production tool. Theft of critical industrial data is also feared, and at the heart of it all is the advent of IoT. Read this Cisco e-book to learn more about these risks.
Posted: 23 Mar 2022 | Published: 23 Mar 2022

Cisco IoT