Mobile Phone Spam White Papers

(View All Report Types)
Log More to Improve Visibility and Enhance Security
sponsored by CrowdStrike
WHITE PAPER: ph
Posted: 22 Sep 2023 | Published: 22 Sep 2023

TOPICS:  Security
CrowdStrike

A Dynamic, AI-powered Approach for Employee Growth and Development that Improves Retention
sponsored by ServiceNow
WHITE PAPER: Read this paper for data-driven strategies to help your organization close talent gaps and boost employee satisfaction that will increase employee retention.
Posted: 17 Nov 2023 | Published: 17 Nov 2023

TOPICS:  IT Management
ServiceNow

Implementing an identity management solution
sponsored by SAP America, Inc.
WHITE PAPER: This document describes the SAP NetWeaver Identity Management products, which cover most of the core functionality for implementing an identity management solution, including a virtual directory.
Posted: 18 Jun 2008 | Published: 01 Sep 2007

SAP America, Inc.

The Desktop Dilemma: Liberty vs. Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: CIOs and IT departments are under tremendous pressure to implement better processes over how software is deployed, managed, and used by their employees on their company computers. This document will outline a nine-step methodology that can make or break your transition to a well-managed and controlled Windows environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

The Top Five Virtualization Mistakes
sponsored by Vyatta Inc.
WHITE PAPER: This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful.
Posted: 17 Jun 2009 | Published: 01 Jun 2007

Vyatta Inc.

Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER: This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

PCI Compliance Made Simple
sponsored by Alert Logic
WHITE PAPER: Major data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance.
Posted: 20 Jul 2009 | Published: 20 Feb 2008

Alert Logic

Frost & Sullivan - Operational and Compliance Benefits of SAP Archiving
sponsored by EMC Corporation
WHITE PAPER: Many organizations maintain data on SAP production servers to make data less available to end users. Read this whitepaper to learn about options that would provide end-users with immediate access to archives through the use of the native SAP interf...
Posted: 20 Aug 2008 | Published: 15 Aug 2008

EMC Corporation

Disk-to-Disk Backup and Recovery: A Guide for the Technical Decision Maker
sponsored by i365, makers of Evault
WHITE PAPER: In this white paper, you will learn about the technology and architecture driving the growing adoption of disk-to-disk backups, and in particular how EVault's solutions are your best choice.
Posted: 31 Jul 2008 | Published: 01 Jul 2008

i365, makers of Evault

Managing Risk in Outsourced Manufacturing
sponsored by E2open
WHITE PAPER: This white paper looks at some of the management risks and challenges associated with outsourced manufacturing strategies and summarizes the proven ways used by companies that have successfully resolved or mitigated these risks.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

E2open