Radar Defense Industry White Papers

(View All Report Types)
Requirements Engineering for the Aerospace and Defense Industry
sponsored by IBM
WHITE PAPER: A requirements engineering approach can help product and systems development organizations work in harmony. Read this white paper for an exploration of requirements engineering and its important role in product development.
Posted: 12 Apr 2010 | Published: 22 Jun 2009

IBM

Successfully Managing Programs and Risk in the Aerospace and Defense Industry
sponsored by Oracle Corporation
WHITE PAPER: Succeeding in this difficult environment requires an enterprise software solution that enables aerospace and defense companies to plan and execute programs and projects, demonstrate earned value compliance and manage resources and costs. Enterprise project portfolio management (EPPM) applications help meet these challenges.
Posted: 05 Apr 2010 | Published: 19 Feb 2010

Oracle Corporation

Creating an Online Parts Catalog to Increase Part Sales and Improve Aftermarket Customer Satisfaction
sponsored by Enigma, Inc.
WHITE PAPER: This white paper documents the experiences of three companies that have implemented Enigma's electronic parts catalogs.
Posted: 11 Mar 2008 | Published: 01 Jan 2008

Enigma, Inc.

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Is GMO Product Information on Your Radar?
sponsored by LANSA
WHITE PAPER: This brief resource explores the need for food manufacturers to disclose GMO information before the upcoming Global Data Synchronization Network (GDSN) is introduced, and describes how the right product information management and data aggregation systems can help you get there.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

LANSA

Frost Radar™: Secure Web Gateways, 2021
sponsored by Menlo Security
ANALYST REPORT: The Frost and Sullivan ‘Frost Radar’ reveals the market positioning of companies in an industry using their growth and innovation scores. Read the Frost Radar on secure web gateways (SWGs) to see the most significant vendors and how they stack up.
Posted: 03 Mar 2022 | Published: 04 Mar 2022

TOPICS:  .NET
Menlo Security

Strategies for Profitable Growth - Aerospace & Defense Manufacturing
sponsored by SAP AG
WHITE PAPER: Examine the comprehensive strategies, solutions, and best practices for the aerospace and defense (A&D) manufacturing industry based on technical and business expertise. Learn best practices and strategies for profitable growth in your business.
Posted: 21 Feb 2008 | Published: 01 Jan 2005

SAP AG

GigaOm Radar for DDoS Protection
sponsored by Cloudflare
ANALYST REPORT: Recently, ransomware and distributed denial of service (DDoS) attacks have been combined, in which a company is hit with a DDoS and then a ransom demanded in exchange for not launching a larger DDoS. Tap into this report to learn how you can find the right DDoS protection platform for your organization.
Posted: 09 Jun 2022 | Published: 09 Jun 2022

TOPICS:  .NET
Cloudflare

Cisco Cyber Vision Enables Active Defense of Industrial Operations
sponsored by Cisco IoT
WHITE PAPER: Industrial companies need to protect facilities from sophisticated attacks and security gaps brought on by digital transformation. What businesses need is the visibility and access to detect and deal with these threats. Your IT and OT systems must remain secure. Read more to learn about anomaly detection and how it can keep your business safe.
Posted: 09 May 2022 | Published: 10 May 2022

TOPICS:  .NET
Cisco IoT

Better defenses against modern bots
sponsored by Cloudflare
WHITE PAPER: This white paper stands as an overview of Cloudflare’s observations, best practices, and advice in bot protection. Download now to learn about the current bot landscape, attack tactics and required layered defenses to stop bots.
Posted: 10 Feb 2022 | Published: 11 Feb 2022

TOPICS:  .NET
Cloudflare

EMA Radar Report: Unified Data Analytics
sponsored by Hewlett Packard Enterprise
ANALYST REPORT: As companies increasingly consolidate and streamline their complex data architectures, data lakes and data warehouses are converging into the unified analytics warehouse (UAW). Access this EMA Radar Report to explore HPE’s UAW capabilities and see why it’s rated above industry averages for performance, scaling, and analytical flexibility.
Posted: 04 May 2022 | Published: 05 May 2022

TOPICS:  .NET
Hewlett Packard Enterprise

Enable And Protect Your Remote Workforce
sponsored by AT&T Cybersecurity
WHITE PAPER: Download this white paper to learn about the cybersecurity challenges associated with an increasingly remote and virtual workforce, and what to look for in a remote security solution.
Posted: 08 Feb 2021 | Published: 30 Oct 2020

AT&T Cybersecurity

E-Guide: Is Your Storage Infrastructure Ready for the Cloud?
sponsored by AdvizeX Technologies
WHITE PAPER: To be properly prepared for the coming clouds, you'll have to make the right preparations. Check out this brief e-guide to learn what some of the hot new products are in the storage market, and to see what should be on your radar as you transform your infrastructure in anticipation for the cloud.
Posted: 20 May 2011 | Published: 20 May 2011

AdvizeX Technologies

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro

New Mobile Risks Call for a Layered Security Approach
sponsored by SearchCIO.com
EBOOK: As enterprises' mobile footprints grow, so do the security risks. A single-pronged security approach is no longer enough. Download this handbook to discover how to build a layered enterprise mobile security strategy.
Posted: 09 Aug 2016 | Published: 09 Aug 2016

TOPICS:  CIOs
SearchCIO.com

Presentation Transcript: How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
PRESENTATION TRANSCRIPT: In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this Presentation Transcript, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus utilities.
Posted: 07 Jan 2010 | Published: 07 Jan 2010

Faronics

Intelligent Endpoint Threat Defense
sponsored by Intel Security
WHITE PAPER: Endpoint security is critical with the growth of technology devices. Learn how to protect your enterprise.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

GigaOm Radar for Cloud Observability
sponsored by Splunk
WHITE PAPER: Cloud computing, agile development, continuous deployments, and new DevOps practices have transformed IT. Now, how that IT is monitored needs to transform too. Learn more about monitoring your new IT here.
Posted: 07 Dec 2021 | Published: 05 Apr 2021

TOPICS:  IT Management
Splunk

Cyber defense: Understanding and combating the threat
sponsored by IBM
WHITE PAPER: The Global Defense Solutions Projects and Defense Exchange Conference (SPADE) is held annually to bring together organizations involved in network-centric operations, intelligence activities and other defense aspects. This resource explains some of the important topics.
Posted: 20 Jul 2012 | Published: 20 Jul 2012

IBM

Four Key Elements to Improving Systems Engineering in Aerospace and Defense
sponsored by IBM
WEBCAST: This webcast explores four key ways in which A&D companies can improve SE and looks at IBM Rational® solutions and approaches that can help organizations deliver quality products on time and within budget, while increasing efficiency and improving collaboration.
Posted: 13 Dec 2010 | Premiered: Dec 13, 2010

IBM

Layered Security Doesn't Stop Cybercriminals – but VDI Might
sponsored by Dell, Microsoft and Citrix
EGUIDE: This exclusive e-guide discusses ways cybercriminals successfully breach even the most well-secured enterprise defenses. Read on and learn how VDI can offer an enhanced level of security enterprises require.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell, Microsoft and Citrix

Avoiding Audits - How to Get Of Software Vendors’ Radar
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Software license audits bog down operations and can be costly, though the ultimate sacrifice of the audit process is the relationship with customers. View this whitepaper to identify the 4 key triggers for being identified by a vendor for an audit, and how to alter habits to avoid unjust scrutiny.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Enterprise

IT INDUSTRY OUTLOOK
sponsored by CompTIA
WHITE PAPER: CompTIA's IT Industry Outlook 2021 is a research report that explores the trends shaping the industry, its workforce and its business models. Learn factors that could positively and negatively impact business growth in 2021, 2021 budget projections compared to 2020, and more.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

CompTIA

Malware Attacks Demand a New Malware Defense Approach
sponsored by SearchSecurity.com
EGUIDE: Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013

SearchSecurity.com

Defense-In-Depth Security: Key to Keeping IT Safe
sponsored by SearchSecurity.com
EBOOK: The enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

SearchSecurity.com

INDUSTRIAL CYBERSECURITY: Monitoring & Anomaly Detection
sponsored by Cisco IoT
EBOOK: The risk in ICS environments involves threats that would undermine the operational safety and the availability or even the physical integrity of the production tool. Theft of critical industrial data is also feared, and at the heart of it all is the advent of IoT. Read this Cisco e-book to learn more about these risks.
Posted: 23 Mar 2022 | Published: 23 Mar 2022

TOPICS:  .NET
Cisco IoT