Access Point White Papers

(View All Report Types)
Beyond Corporate Walls: Motorola Enterprise Mesh Networks
sponsored by Motorola Solutions
WHITE PAPER: Wireless mesh technology is flexible, secure and allows for easy control of user access. Read this paper to learn how mesh technology can help your enterprise cost effectively extend its wireless coverage without any extra cable or fiber.
Posted: 29 Jun 2007 | Published: 01 Mar 2007

Motorola Solutions

Implementing a Wireless LAN
sponsored by AT&T Corp
WHITE PAPER: This paper outlines the networking requirements and considerations for a successful WLAN implementation.
Posted: 08 Nov 2007 | Published: 13 Jul 2007

AT&T Corp

Virtualization Overview
sponsored by Global Knowledge
WHITE PAPER: This paper explains an approach to virtualization software that relies on the host operating system to provide the service to talk directly to the underlying hardware.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Oracle Database 11g: Real Application Testing & Manageability Overview
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to learn how the new Real Application Testing capabilities in the Oracle Database 11g allows database administrators to adapt to changes easily, lower their testing costs and reduce hardware and software investments.
Posted: 14 Oct 2008 | Published: 14 Oct 2008

Oracle Corporation

How to Start a Windows Vista Pilot Deployment
sponsored by Microsoft
WHITE PAPER: Thinking about deploying Windows Vista? This guide gives an overview of how to successfully manage a pilot program that provides the best experience for pilot users and helps to provide positive project justification to business decision makers.
Posted: 26 Nov 2008 | Published: 26 Nov 2008

Microsoft

Enterprise Wireless LAN Security
sponsored by Motorola Solutions
WHITE PAPER: This paper describes the security challenges network administrators face defining and implementing security mechanisms within diverse wired and wireless network environments.
Posted: 29 May 2008 | Published: 01 May 2008

Motorola Solutions

Dell PowerVault MD3000 3000 Mailbox Single Copy Cluster Microsoft Exchange 2007 Storage Solution
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper describes a tested and validated storage solution for a 3000 mailbox Exchange 2007 environment with Single Copy Cluster in a high availability clustering mechanism based on the Microsoft Cluster Service shared storage.
Posted: 27 Aug 2008 | Published: 27 Aug 2008

DellEMC and Intel®

Advancing the Economics of Networking: Juniper Networks Ethernet Switching Solutions Reduce Capital and Operational IT Expenses
sponsored by Juniper Networks, Inc.
WHITE PAPER: Juniper Networks proposes to change the current economic model of networking by delivering a new family of solutions that reduce capital and operational expenses, freeing up IT budget dollars and allowing businesses to invest in innovative technologies that will reduce the cost of doing business while improving the bottom line.
Posted: 17 Jul 2009 | Published: 17 Feb 2009

Juniper Networks, Inc.

Integrating HP Data Protector Software with HP Data Deduplication Solutions
sponsored by HP Inc
WHITE PAPER: This white paper will discuss HP Data Protector Software which fully supports HP data deduplication technologies allowing you to recover files more quickly while reducing your data management and storage costs.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

HP Inc

CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Schiphol Airport in Amsterdam is one of Europe's main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.
Posted: 15 Mar 2021 | Published: 12 Feb 2021

TechTarget ComputerWeekly.com

CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport
sponsored by TechTarget ComputerWeekly.com
EZINE: Schiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.
Posted: 08 Feb 2021 | Published: 13 Aug 2020

TechTarget ComputerWeekly.com

Secure remote access: More vital than ever thanks to Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

Software-Defined Storage: A Guide to Successful Implementation
sponsored by IBM
EGUIDE: In this expert e-guide, explore today's SDS implementation options and help you decide which one fits your needs best: commodity or custom hardware. Additionally, uncover the important considerations – like the specific needs of virtual environments, access points, and APIs – that you'll need to address when formulating your storage strategy.
Posted: 08 Feb 2021 | Published: 19 Jul 2016

IBM

Zero Trust Is Not Enough for Backup
sponsored by Cobalt Iron
WHITE PAPER: Traditional security approaches like zero-trust may not be enough to protect critical backup environments from modern cyber threats. In this white paper, you'll discover how the Zero Access model in Cobalt Iron Compass can provide advanced cyber resilience to safeguard your backup data. Read the full white paper now to learn more.
Posted: 13 Nov 2024 | Published: 15 Nov 2024

Cobalt Iron

Privilege access governance close the gap between privileged access and standard user identities
sponsored by One Identity
WHITE PAPER: Explore how to unify identity management and provisioning processes, eliminate silos, and simplify compliance with One Identity's Privileged Account Governance. Read the full white paper to learn more.
Posted: 10 Jul 2024 | Published: 10 Jul 2024

One Identity

Elevating Organizational Security with Advanced Authentication
sponsored by One Identity
WHITE PAPER: As the network perimeter expands, organizations must enhance security at the point of access. This white paper explores how advanced authentication, including multi-factor and adaptive methods, can elevate security, protect against credential theft, and deliver a seamless user experience. Download this paper to examine this approach in detail
Posted: 29 Oct 2024 | Published: 29 Oct 2024

One Identity

Addressing Municipal Pain Points with ConnectIV CX and AI
sponsored by Intervision
WHITE PAPER: AI-powered solutions can help government agencies address key municipal pain points like high call volumes, low citizen satisfaction, and compliance issues. Learn how ConnectIV CX leverages AI to transform these challenges into opportunities for improved service delivery. Read the full white paper.
Posted: 23 Jul 2024 | Published: 24 Jul 2024

Intervision

Getting started with Azure Red Hat OpenShift
sponsored by Red Hat
WHITE PAPER: As the network perimeter is now everywhere and anywhere users are, security must move with it and needs to be in place at the point of access. Download this e-book to learn how you can secure remote access and build user trust.
Posted: 13 Jun 2024 | Published: 13 Jun 2024

Red Hat

IBM Hybrid Cloud Mesh Product Guide
sponsored by Aliado
WHITE PAPER: As the network perimeter is everywhere, security must move with it and be in place at the point of access. This e-book explains how to secure remote access and build user trust using IBM Hybrid Cloud Mesh.
Posted: 27 Nov 2024 | Published: 27 Nov 2024

Aliado

MSSP Success Checklist
sponsored by AT&T and LevelBlue
WHITE PAPER: In a crowded landscape, how can a Managed Security Service Provider (MSSP) stand out and boost sales? With the right people, processes and tools, this white paper argues. To access a 17-point checklist for MSSP success, continue on.
Posted: 07 Jun 2024 | Published: 07 Jun 2024

TOPICS:  .NET
AT&T and LevelBlue

What you need to know about Application Security Observability
sponsored by Contrast Security
INFOGRAPHIC: As the network perimeter extends everywhere users are, security must move with it and be in place at the point of access. Download this infographic to learn 16 key things about observability and how it can help secure remote access and build user trust.
Posted: 12 Sep 2024 | Published: 12 Sep 2024

Contrast Security

Application Security observability
sponsored by Contrast Security
INFOGRAPHIC: As the network perimeter extends everywhere users are, security must move with it and be in place at the point of access. Download this infographic to learn 16 key things about observability and how it can help secure remote access and build user trust.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

Contrast Security

2024 Cyber Security Report
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT: In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.
Posted: 03 May 2024 | Published: 04 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

Transform your IT operations with Chrome Enterprise upgrades
sponsored by Insight
LANDING PAGE: In order to enhance their IT operations, many of today’s organizations have started to seek out how they can improve a handful of their efforts and processes. However, the companies aren’t always sure where to begin. Chrome Enterprise upgrade may just be your starting point. Access this article to gain more insight.
Posted: 18 Jun 2024 | Published: 18 Jun 2024

TOPICS:  .NET
Insight

Considerations for Implementing Zero Trust for the Workforce
sponsored by Cloudflare
ESG RESEARCH REPORT: As the network perimeter expands, organizations must move security to the point of access. This Enterprise Strategy Group report explores how zero-trust network access (ZTNA) can help secure remote access, accelerate zero-trust adoption, and enable consistent, seamless user experiences. Download the report to learn more.
Posted: 19 Oct 2024 | Published: 19 Oct 2024

Cloudflare

SAN block access storage in the age of cloud and hyper-converged
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
Posted: 15 Mar 2021 | Published: 12 Feb 2021

TechTarget ComputerWeekly.com

SAN block access storage in the age of cloud and hyper-converged
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
Posted: 08 Feb 2021 | Published: 24 Aug 2020

TechTarget ComputerWeekly.com

Pioneering Texas School District Improves Its Cybersecurity Posture with the Fortinet Security Fabric
sponsored by Fortinet, Inc.
CASE STUDY: Athens ISD in Texas enhanced its cybersecurity using Fortinet's Security Fabric. They selected Fortinet for easier firewall management, better network visibility, and integrated endpoint protection. Discover how Fortinet benefited Athens ISD in our case study.
Posted: 21 Mar 2024 | Published: 21 Mar 2024

TOPICS:  .NET
Fortinet, Inc.

Why Just Securing Human Identities Is Not Enough
sponsored by CyberArk
WEBCAST: If your business leverages digital technology, then securing human access is not enough - attackers will find the weak point. Don’t let it happen to you! In this session you'll learn why you need to secure both your human and machine identities, as well as the applications and workloads they access. Tune in now to learn more.
Posted: 21 Aug 2024 | Premiered: Aug 21, 2024

CyberArk

ITSM Problem Management: What Are Your Pain Points?
sponsored by ServiceNow
EGUIDE: If digital transformation is on your CIO agenda, then a top-of-class ITSM strategy had better be also. In this expert guide, Emily McLaughlin, Content Development Strategist at searchCIO, converses with several notable CIOs who identify their organizations' biggest ITSM pain points, including business-user expectations and risk.
Posted: 08 Feb 2021 | Published: 20 Jun 2016

ServiceNow

Pascoalotto Depends On Check Point For Scalable Security
sponsored by Checkpoint Software Technologies
CASE STUDY: Paschoalotto, a leading Brazilian call center, needed a scalable security solution to meet strict requirements. They chose Check Point's Quantum Maestro Orchestrator, Security Gateways, and R80 Security Management, which provided scalability, cloud integration, and unified visibility, enabling secure services. Read the case study to learn more.
Posted: 27 Sep 2024 | Published: 27 Sep 2024

Checkpoint Software Technologies

SaaS ERP mushrooms during Covid crisis, up to a point
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at the migration of business applications to the cloud, under the discipline of the Covid crisis; we examine the question of who is winning the cloud ERP wars; and offer a case study of one large, complex company, Vodafone, that gives a counter example of how cloud still has limits when it comes to ERP.
Posted: 08 Feb 2021 | Published: 18 Sep 2020

TechTarget ComputerWeekly.com

Privileged Access Management
sponsored by One Identity
ANALYST REPORT: Read this comprehensive overview of the Privileged Access Management (PAM) market including vendor capabilities, product ratings and market leadership analysis from KuppingerCole. Discover leading PAM solutions to help secure privileged access across endpoints, servers, applications and cloud.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  Access Control
One Identity

DRaas and the key decision points in DR-as-a-service
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at the key decisions you'll need to make about the blend of DRaas your organisation wants, which of the key cloud providers are best for which elements of DR service delivery, the pros and cons of moving elements of disaster recovery to the cloud and which to keep closer to home, and the 12 key steps to DRaas deployment.
Posted: 08 Feb 2021 | Published: 25 Jan 2021

TechTarget ComputerWeekly.com