Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER:
The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005
|
|
|
The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER:
This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012
|
|
|
The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER:
This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012
|
|
|
Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER:
Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011
|
|
|
ISA/IEC-62443-3-3 A Cybersecurity Framework To Protect Industrial Automation And Control Systems
sponsored by Cisco
WHITE PAPER:
In order to provide guidance for securing IACSs, the International Society of Automation (ISA) and The International Electrotechnical Commission (IEC) have come together to create the ISA/IEC-62443-3-3. This white paper takes you through the ISA/IEC-62443-3-3, demonstrating how you can comply with the security framework. Read on to learn more.
Posted: 09 Nov 2023 | Published: 09 Nov 2023
|
|
|
ISA/IEC-62443-3-3: What is it and how to comply?
sponsored by Cisco
WHITE PAPER:
While so many technology regulations and standards out there, it can be hard to decide what to focus on first. In the industrial sector, protecting your systems and devices from cyberthreats is the clear priority. However, if ISA99 applies to your organization, then you know this is not an easy endeavor. But it can be. Read on to see how.
Posted: 09 Nov 2023 | Published: 09 Nov 2023
|
|
|
Israel Electric Corporation Moves Toward Smarter Maintenance
sponsored by IBM
CASE STUDY:
This use case describes how Israel's largest electricity provider utilizes IBM's predictive analytics software to monitor its turbine performance in real time, enabling the company to discover and resolve anomalies before outages occur.
Posted: 25 Feb 2015 | Published: 30 Sep 2013
|
|
|
Understanding Security Frameworks
sponsored by JAMF
EBOOK:
Cybersecurity frameworks address many of the key challenges common to security strategies by providing a clear, concise roadmap for managing cybersecurity plans. This e-book is designed to show you how you can use cybersecurity frameworks as part of a comprehensive security strategy. Read on to learn more.
Posted: 01 Nov 2023 | Published: 01 Nov 2023
|
|
|
Guide: IAM, Third-Party IoT Risk, Cybersecurity Frameworks and CISO Best Practices
sponsored by Beta Systems
EGUIDE:
Read this guide to explore trends in identity and access management (IAM) and third-party IoT risk, best practices for fitting NIST and ISO/IEC JTC 1 frameworks into your security program and the importance of cyber literacy, as well as finding the right security talent, for CISOs.
Posted: 01 Feb 2022 | Published: 01 Feb 2022
|
|
|
Industrial Cybersecurity: Monitoring & Anomaly Detection
sponsored by Cisco
RESOURCE:
Industrial control systems (ICS) are all around us: in water, in gas, and electricity distribution networks, running power plants and critical infrastructure, in production lines and transportation networks, and more.
Posted: 27 Jan 2020 | Published: 27 Jan 2020
|
|
|
WIND RIVER STUDIO: DEVELOP Safety Artifacts
sponsored by Wind River
LANDING PAGE:
Wind River Studio provides certifiable platforms for safety-critical systems, meeting avionics, industrial, automotive, and medical standards. Discover how their cloud-native tools expedite development of real-time operating systems. For faster, secure robotics or infrastructure solutions, explore Wind River Studio.
Posted: 07 Dec 2023 | Published: 07 Dec 2023
|
|
|
Storage Capacity 101 to Post-Grad in a Flash
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT:
In this report from Quocirca, analyst Clive Longbottom explains why you don't always get what you think you're getting with flash storage.
Posted: 14 Mar 2016 | Published: 14 Mar 2016
|
|
|
Hyperconverged Reference Architecture
sponsored by Panduit
EBOOK:
In this e-book, explore Panduit’s proposals of foundational reference architecture utilizing a Dell Technologies configuration and validated Panduit physical infrastructure components.
Posted: 21 Apr 2023 | Published: 21 Apr 2023
|
|
|
VxWorks Cert Edition
sponsored by Wind River
PRODUCT OVERVIEW:
By leveraging VxWorks Cert Edition, you can provide your organization with the assurance that you will have a strong OS foundation to meet the most demanding safety certification standards. Read on to learn about an integrated development suite equipped with the tools you need to enable standardization across your enterprise.
Posted: 26 Aug 2023 | Published: 26 Aug 2023
|
|
|
Category 7 and 7A / Class F and FA Cabling Concerns
sponsored by Panduit
WHITE PAPER:
Category 7/Class F and Category 7A/Class FA refer to cabling performance standards recognized primarily in Europe but see very limited adoption globally. This white paper compares the performance and tradeoffs of Category 6A and Category 7 and explains why Panduit recommends installation of a Category 6A / Class EA system. Dig into the paper here.
Posted: 09 Nov 2023 | Published: 09 Nov 2023
|
|
|
Top cloud security standards and frameworks to consider
sponsored by AccessIT Group, Inc.
EGUIDE:
Security and cloud security standards are lists of security best practices that are used as compliance regulation guidelines. This e-guide looks at a wide array of the most common security standards, analyzing the nuances of each so that you can better understand them. Read on to learn more.
Posted: 24 Mar 2023 | Published: 22 Mar 2023
|
|
|
SecurityServer – Secure Your Organization’s Most Valuable Assets
sponsored by Utimaco
PRODUCT OVERVIEW:
As organizations continue to evolve digitally, the volume of sensitive keys, identities, and data is increasing. Utimaco SecurityServer bundles 30 years of experience in cryptography and Hardware Security Module (HSM) technology into a unique offering that constitutes the root of trust for security and compliance. Read on to learn more.
Posted: 01 Jun 2023 | Published: 01 Jun 2023
|
|
|
SecurityServer – Secure Your Organization’s Most Valuable Assets
sponsored by Utimaco
PRODUCT OVERVIEW:
With digital adoption at an all-time high, more data and digital identities are being created than ever before. If not secured, these present a serious risk to the future of your business. Download this product overview to learn how Utimaco’s products can help better secure your organization against growing threats.
Posted: 21 Oct 2023 | Published: 21 Oct 2023
|
|
|
Cloud security and compliance
sponsored by Fasthosts
INFOGRAPHIC:
In this infographic, find out how you can avoid unnecessary cloud configuration pitfalls in 4 key areas to minimize downtime and protect your business.
Posted: 08 Nov 2023 | Published: 08 Nov 2023
|
|
|
Plugging Into Zero Clients Powers Investment Programme
sponsored by Dell
CASE STUDY:
Discover how a VDI solution enabled improvement of a desktop environment by centralizing data to tighten security.
Posted: 14 Nov 2014 | Published: 31 Oct 2014
|
|
|
Whitepaper: Advanced Threat Protection for Industrial Control Systems and Operational Technology
sponsored by Fortinet, Inc.
PRODUCT OVERVIEW:
As digital innovation initiatives dissolve the operational technology (OT) network boundaries, from IT networks, OT networks have become a target of a growing number of attacks. Download this resource to find out exactly what you need to keep your industrial operations secure.
Posted: 21 Sep 2023 | Published: 21 Sep 2023
|
|
|
Guide to Environmental Sustainability Metrics for Data Centers
sponsored by Schneider Electric
ANALYST BRIEF:
Access this white paper to learn 23 key metrics data center operators can use to report on environmental sustainability in a holistic way and discover how these efforts towards green data centers can improve your company’s ecological footprint.
Posted: 25 Jan 2022 | Published: 26 Jan 2022
|
|
|
Solution Brief : Securing OT with Network Microsegmentation
sponsored by Fortinet, Inc.
PRODUCT OVERVIEW:
While VLAN solutions can provide segmentation with a greater degree of flexibility, it’s insufficient to secure OT networks from advanced threats. In this resource, learn the value of microsegmentation with Fortinet to implement a zero-trust security policy and inspect all network traffic within a VLAN via a next-generation firewall (NGFW).
Posted: 21 Sep 2023 | Published: 21 Sep 2023
|
|
|
Whitepaper: A Solution Guide to Operational Technology Cybersecurity
sponsored by Fortinet, Inc.
EBOOK:
IT and OT networks have traditionally been kept separate but, motivated by business advantages possible through digital transformation, they are now being integrated, albeit with increased cybersecurity risk. Dive into this guide to explore how Fortinet effectively provides security throughout the interconnected IT and OT infrastructure.
Posted: 31 Aug 2023 | Published: 31 Aug 2023
|
|
|
Cloud Security Frameworks and 10 IAM Tools for Network Security
sponsored by Nexum
EGUIDE:
Cloud security and identity and access management (IAM) are two necessary tenets of a secure organization. Make sure you understand the specifics of each by reading this guide that explores these two separate but important topics in detail, covering cloud security frameworks and 10 IAM tools for network security.
Posted: 07 Dec 2021 | Published: 01 Dec 2021
|
|
|
Cisco ISE and Cyber Vision Working Together
sponsored by Cisco
PRODUCT OVERVIEW:
With more devices being connected to industrial networks daily and needing access to enterprise domains, it has become crucial for organizations to segment their networks. In this product overview, you’ll gain insights about a solution designed to improve operations performance and reduce your OT attack surface. Read on to learn more.
Posted: 07 Nov 2023 | Published: 07 Nov 2023
|
|
|
Mobile NFC in Transport
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport.
Posted: 23 Nov 2012 | Published: 23 Nov 2012
|
|
|
u.trust Anchor – Highest Security Inspired by Cloud Technology
sponsored by Utimaco
PRODUCT OVERVIEW:
In the wake of digital transformation, hackers have taken advantage of the expanding attack surface to deliver an unprecedented scale of attacks. Utimaco’s next generation HSM, u.trust Anchor, is designed to deliver a leap forward in security and innovation, bringing together robust encryption and secure key management. Read on to learn more.
Posted: 25 Oct 2023 | Published: 25 Oct 2023
|
|
|
Start with Entry-level HSMs for Robust Security in Every Application
sponsored by Utimaco
PRODUCT OVERVIEW:
Security is often constrained by limited resources, but with entry level hardware security modules (HSMs), tailored to function seamlessly within these limitations, security doesn’t have to come at the expense of efficiency. Unlock Utimaco’s catalogue of offerings and find the HSM that’s right for your organization.
Posted: 25 Oct 2023 | Published: 25 Oct 2023
|
|