Implementing a Wireless LAN
sponsored by AT&T Corp
WHITE PAPER:
This paper outlines the networking requirements and considerations for a successful WLAN implementation.
Posted: 08 Nov 2007 | Published: 13 Jul 2007
|
|
|
Beyond Corporate Walls: Motorola Enterprise Mesh Networks
sponsored by Motorola Solutions
WHITE PAPER:
Wireless mesh technology is flexible, secure and allows for easy control of user access. Read this paper to learn how mesh technology can help your enterprise cost effectively extend its wireless coverage without any extra cable or fiber.
Posted: 29 Jun 2007 | Published: 01 Mar 2007
|
|
|
Intel® Xeon® Processor 5500 Series: An Intelligent Approach to IT Challenges
sponsored by Hewlett Packard Company and Intel
WHITE PAPER:
As data centers reach the upper limits of their power and cooling capacity, efficiency has become the focus of extending the life of existing data centers and designing new ones. As part of these efforts, IT needs to refresh existing infrastructure with servers that deliver more performance and scalability, more efficiently. Read on to learn more.
Posted: 08 Jul 2009 | Published: 08 Jul 2009
|
|
|
Best Practices for a Successful Upgrade Project
sponsored by HCL Software
WHITE PAPER:
Upgrades help businesses to maintain a competitive edge in the market. Yet, upgrades pose their own set of challenges. This white paper lists the best practices that should be followed when upgrading to achieve maximum reliability.
Posted: 10 Jul 2008 | Published: 16 May 2008
|
|
|
Enterprise Wireless LAN Security
sponsored by Motorola Solutions
WHITE PAPER:
This paper describes the security challenges network administrators face defining and implementing security mechanisms within diverse wired and wireless network environments.
Posted: 29 May 2008 | Published: 01 May 2008
|
|
|
Support PCI Security Compliance with Enhanced Solutions from IBM
sponsored by IBM
WHITE PAPER:
This white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance.
Posted: 13 Feb 2009 | Published: 13 Feb 2009
|
|
|
Improving the mobile experience through solid state drive
sponsored by Intel Corporation
WHITE PAPER:
Intel IT is evaluating solid-state drive (SSD) technology to better understand the benefits to users and the impacts on the enterprise. We have initiated a proof of concept (PoC) study that includes extensive benchmark testing as well as deployment of notebooks with SSDs to the Intel workforce.
Posted: 27 May 2009 | Published: 05 Jan 2009
|
|
|
Virtualizing the Client PC: A Proof of Concept
sponsored by Intel Corporation
WHITE PAPER:
In this paper Intel IT explores a proof of concept study that examined the viability of abstracting the client operating system from the hardware platform using virtualization.
Posted: 21 Nov 2008 | Published: 21 Nov 2008
|
|
|
Going Parallel with LabVIEW Delivers Throughput Gains
sponsored by National Instruments
WHITE PAPER:
In this whitepaper learn how by combining technologies with NI Lab VIEW parallel programming software and NI TestStand test management software, test engineers can create high-performance test systems.
Posted: 16 Sep 2008 | Published: 16 Sep 2008
|
|
|
CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Schiphol Airport in Amsterdam is one of Europe's main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.
Posted: 15 Mar 2021 | Published: 12 Feb 2021
|
|
|
CW Benelux - August-October 2020: Problems with critical security systems at Schiphol Airport
sponsored by TechTarget ComputerWeekly.com
EZINE:
Schiphol Airport in Amsterdam is one of Europe’s main access points, so you might be surprised to read that IT systems such as those controlling the Dutch borders are rarely tested. In this issue, read about a critical report from the Dutch Court of Audit.
Posted: 08 Feb 2021 | Published: 13 Aug 2020
|
|
|
Secure remote access: More vital than ever thanks to Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
Posted: 06 May 2021 | Published: 06 May 2021
|
|
|
Software-Defined Storage: A Guide to Successful Implementation
sponsored by IBM
EGUIDE:
In this expert e-guide, explore today's SDS implementation options and help you decide which one fits your needs best: commodity or custom hardware. Additionally, uncover the important considerations – like the specific needs of virtual environments, access points, and APIs – that you'll need to address when formulating your storage strategy.
Posted: 08 Feb 2021 | Published: 19 Jul 2016
|
|
|
Wi-Fi 5, 6, and 7: Insights and Impacts on Cabling Infrastructure
sponsored by Panduit
WHITE PAPER:
Because so many people and business rely on wireless devices, wireless access points have seen massive growth in the enterprise space to accommodate. While WAPs continue to improve, wi-fi standards continue to evolve. This is especially true with Wi-Fi 6 which may become the fastest growing standard in history. Read on to learn more about it.
Posted: 08 Jul 2023 | Published: 08 Jul 2023
|
|
|
Zero Trust Is Not Enough for Backup
sponsored by Cobalt Iron
WHITE PAPER:
Traditional security approaches like zero-trust may not be enough to protect critical backup environments from modern cyber threats. In this white paper, you'll discover how the Zero Access model in Cobalt Iron Compass can provide advanced cyber resilience to safeguard your backup data. Read the full white paper now to learn more.
Posted: 13 Nov 2024 | Published: 15 Nov 2024
|
|
|
Magic Quadrant for Security Service Edge
sponsored by Fortinet, Inc.
GARTNER MAGIC QUADRANT:
To secure their web, SaaS and private apps, many organizations are adopting a security service edge (SSE) offering. In this 2024 "Magic Quadrant" report, Gartner unpacks the SSE market, comparing 10 top vendors, including Fortinet, Palo Alto Networks and Zscaler. Continue on to deepen your understanding of the SSE landscape.
Posted: 27 Jun 2024 | Published: 27 Jun 2024
|
|
|
Privilege access governance close the gap between privileged access and standard user identities
sponsored by One Identity
WHITE PAPER:
Explore how to unify identity management and provisioning processes, eliminate silos, and simplify compliance with One Identity's Privileged Account Governance. Read the full white paper to learn more.
Posted: 10 Jul 2024 | Published: 10 Jul 2024
|
|
|
Addressing Municipal Pain Points with ConnectIV CX and AI
sponsored by Intervision
WHITE PAPER:
AI-powered solutions can help government agencies address key municipal pain points like high call volumes, low citizen satisfaction, and compliance issues. Learn how ConnectIV CX leverages AI to transform these challenges into opportunities for improved service delivery. Read the full white paper.
Posted: 23 Jul 2024 | Published: 24 Jul 2024
|
|
|
Getting started with Azure Red Hat OpenShift
sponsored by Red Hat
WHITE PAPER:
As the network perimeter is now everywhere and anywhere users are, security must move with it and needs to be in place at the point of access. Download this e-book to learn how you can secure remote access and build user trust.
Posted: 13 Jun 2024 | Published: 13 Jun 2024
|
|
|
MSSP Success Checklist
sponsored by AT&T and LevelBlue
WHITE PAPER:
In a crowded landscape, how can a Managed Security Service Provider (MSSP) stand out and boost sales? With the right people, processes and tools, this white paper argues. To access a 17-point checklist for MSSP success, continue on.
Posted: 07 Jun 2024 | Published: 07 Jun 2024
|
|
|
What you need to know about Application Security Observability
sponsored by Contrast Security
INFOGRAPHIC:
As the network perimeter extends everywhere users are, security must move with it and be in place at the point of access. Download this infographic to learn 16 key things about observability and how it can help secure remote access and build user trust.
Posted: 12 Sep 2024 | Published: 12 Sep 2024
|
|
|
Transform your IT operations with Chrome Enterprise upgrades
sponsored by Insight
LANDING PAGE:
In order to enhance their IT operations, many of today’s organizations have started to seek out how they can improve a handful of their efforts and processes. However, the companies aren’t always sure where to begin. Chrome Enterprise upgrade may just be your starting point. Access this article to gain more insight.
Posted: 18 Jun 2024 | Published: 18 Jun 2024
|
|
|
2024 Cyber Security Report
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT:
In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.
Posted: 03 May 2024 | Published: 04 May 2024
|
|
|
Considerations for Implementing Zero Trust for the Workforce
sponsored by Cloudflare
ESG RESEARCH REPORT:
As the network perimeter expands, organizations must move security to the point of access. This Enterprise Strategy Group report explores how zero-trust network access (ZTNA) can help secure remote access, accelerate zero-trust adoption, and enable consistent, seamless user experiences. Download the report to learn more.
Posted: 19 Oct 2024 | Published: 19 Oct 2024
|
|
|
SAN block access storage in the age of cloud and hyper-converged
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
Posted: 15 Mar 2021 | Published: 12 Feb 2021
|
|
|
SAN block access storage in the age of cloud and hyper-converged
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
Posted: 08 Feb 2021 | Published: 24 Aug 2020
|
|
|
Pioneering Texas School District Improves Its Cybersecurity Posture with the Fortinet Security Fabric
sponsored by Fortinet, Inc.
CASE STUDY:
Athens ISD in Texas enhanced its cybersecurity using Fortinet's Security Fabric. They selected Fortinet for easier firewall management, better network visibility, and integrated endpoint protection. Discover how Fortinet benefited Athens ISD in our case study.
Posted: 21 Mar 2024 | Published: 21 Mar 2024
|
|
|
Why Just Securing Human Identities Is Not Enough
sponsored by CyberArk
WEBCAST:
If your business leverages digital technology, then securing human access is not enough - attackers will find the weak point. Don’t let it happen to you! In this session you'll learn why you need to secure both your human and machine identities, as well as the applications and workloads they access. Tune in now to learn more.
Posted: 21 Aug 2024 | Premiered: Aug 21, 2024
|
|
|
ITSM Problem Management: What Are Your Pain Points?
sponsored by ServiceNow
EGUIDE:
If digital transformation is on your CIO agenda, then a top-of-class ITSM strategy had better be also. In this expert guide, Emily McLaughlin, Content Development Strategist at searchCIO, converses with several notable CIOs who identify their organizations' biggest ITSM pain points, including business-user expectations and risk.
Posted: 08 Feb 2021 | Published: 20 Jun 2016
|
|
|
Prevent Data Loss with Fortinet FortiDLP
sponsored by Fortinet, Inc.
PRODUCT OVERVIEW:
Securing data is more challenging than ever before. FortiDLP is a next-generation, AI-enhanced, cloud-native data protection solution that helps security teams anticipate and prevent data leaks, detect behavior-related insider risks, and train employees on proper cyber hygiene at the point of access to sensitive data.
Posted: 06 Nov 2024 | Published: 30 Oct 2024
|
|
|
Pascoalotto Depends On Check Point For Scalable Security
sponsored by Checkpoint Software Technologies
CASE STUDY:
Paschoalotto, a leading Brazilian call center, needed a scalable security solution to meet strict requirements. They chose Check Point's Quantum Maestro Orchestrator, Security Gateways, and R80 Security Management, which provided scalability, cloud integration, and unified visibility, enabling secure services. Read the case study to learn more.
Posted: 27 Sep 2024 | Published: 27 Sep 2024
|
|
|
SaaS ERP mushrooms during Covid crisis, up to a point
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the migration of business applications to the cloud, under the discipline of the Covid crisis; we examine the question of who is winning the cloud ERP wars; and offer a case study of one large, complex company, Vodafone, that gives a counter example of how cloud still has limits when it comes to ERP.
Posted: 08 Feb 2021 | Published: 18 Sep 2020
|
|
|
DRaas and the key decision points in DR-as-a-service
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at the key decisions you'll need to make about the blend of DRaas your organisation wants, which of the key cloud providers are best for which elements of DR service delivery, the pros and cons of moving elements of disaster recovery to the cloud and which to keep closer to home, and the 12 key steps to DRaas deployment.
Posted: 08 Feb 2021 | Published: 25 Jan 2021
|
|
|
Privileged Access Management
sponsored by One Identity
ANALYST REPORT:
Read this comprehensive overview of the Privileged Access Management (PAM) market including vendor capabilities, product ratings and market leadership analysis from KuppingerCole. Discover leading PAM solutions to help secure privileged access across endpoints, servers, applications and cloud.
Posted: 17 Apr 2024 | Published: 17 Apr 2024
|
|