Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER:
This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox
sponsored by Global Knowledge
WHITE PAPER:
Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.
Posted: 10 Dec 2008 | Published: 01 Jul 2006
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Router Essentials
sponsored by Global Knowledge
WHITE PAPER:
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023
|
|
|
Infographic: 6 file transfer best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
File sharing is a critical everyday practice across the enterprise. The wide-scale adoption of IM and collaboration tools, as well as cloud-based file-sharing sites, has made the process of sharing data easier -- but also less secure -- than ever. Here are six secure file transfer best practices to avoid exposing confidential data.
Posted: 05 May 2022 | Published: 05 May 2022
|
|
|
The Configurable Solution for PLM, PDM, and DMS
sponsored by Revalize
PRODUCT OVERVIEW:
Discover how the configurable PRO.FILE platform can streamline your product data management and digitalization efforts. Read the overview to learn about its fast, flexible implementation, pre-built application packages, and mobile access.
Posted: 18 Sep 2024 | Published: 19 Sep 2024
|
|
|
Focus ASEAN: Enterprise Mobility
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
With 4G networks and mobile apps that do almost everything from filing corporate expenses to locating an item in a warehouse, enterprise mobility now enables not only managers but also rank and file workers to be more competitive and efficient.
Posted: 08 Feb 2021 | Published: 16 Mar 2017
|
|
|
Preventing Insider Threats with UEBA
sponsored by Exabeam
WHITE PAPER:
Insider threats come from employees, contractors, or partners with access. Exabeam's UEBA technology detects these by analyzing user behavior, setting baselines, and scoring risk. It uses machine learning and automation to identify unusual activities. Read this white paper to see how analytics can protect your organization from data theft.
Posted: 22 Mar 2025 | Published: 20 Mar 2025
|
|
|
Preventing Insider Threats with UEBA
sponsored by Exabeam
WHITE PAPER:
Insider threats come from employees, contractors, or partners with access. Exabeam's UEBA technology detects these by analyzing user behavior, setting baselines, and scoring risk. It uses machine learning and automation to identify unusual activities. Read this white paper to see how analytics can protect your organization from data theft.
Posted: 20 Mar 2025 | Published: 20 Mar 2025
|
|
|
Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022
|
|
|
Focus: Application Virtualisation
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This e-guide focuses on application virtualisation and how big companies are finding various ways to stop applications adversely affecting each other.
Posted: 08 Feb 2021 | Published: 13 Oct 2017
|
|
|
Consolidate NAS and File Shares
sponsored by Panzura
PRODUCT OVERVIEW:
Panzura CloudFS offers a unified global file system that consolidates fragmented NAS environments, reducing data redundancy and enhancing security. It enables seamless collaboration, cyberstorage, and cost savings through deduplication and cloud integration. Discover how CloudFS can optimize your storage architecture in this product overview.
Posted: 06 Mar 2025 | Published: 06 Mar 2025
|
|
|
Exabeam Security Operations Platform Privacy
sponsored by Exabeam
PRODUCT OVERVIEW:
The Exabeam Security Operations Platform offers AI-driven cybersecurity with cloud-scale log management, behavioral analytics, and automated investigation. It ensures data privacy with encryption, role-based access, and compliance with regulations like GDPR. Read this overview to learn how Exabeam processes data while maintaining security.
Posted: 26 Mar 2025 | Published: 26 Mar 2025
|
|
|
7 Reasons Why HR Needs Modern Document Management
sponsored by AWS
WHITE PAPER:
HR teams waste time managing documents across scattered systems. This white paper explores how modern document management with SAP SuccessFactors addresses challenges: streamlined creation, centralized storage, automated retention, standardized workflows, faster hiring, secure sharing, and AI assistance. Focus on people, not paperwork.
Posted: 21 Mar 2025 | Published: 21 Mar 2025
|
|
|
Magic Quadrant for Document Management
sponsored by AWS
GARTNER MAGIC QUADRANT:
Gartner's Magic Quadrant for Document Management evaluates vendors for content-centric activities in digital workplaces, collaboration, and operations. It highlights leading solutions for managing unstructured information and key trends in AI, deployment models, and user experiences. Read the full report for informed document management decisions.
Posted: 21 Mar 2025 | Published: 21 Mar 2025
|
|
|
A Framework for Navigating Enterprise Storage
sponsored by Panzura
WHITE PAPER:
This white paper explores on-premises, cloud-native, and hybrid cloud storage architectures, detailing their benefits and challenges. It provides criteria for choosing the right hybrid cloud file platform, comparing solutions from NetApp, Nasuni, and Panzura. Read the full white paper to optimize your enterprise storage strategy.
Posted: 06 Mar 2025 | Published: 06 Mar 2025
|
|
|
Boosting Community Outreach One File At A Time
sponsored by Iron Mountain
WHITE PAPER:
The Ada Jenkins Center in North Carolina digitized its large collection of patient files to free up space, improve access, and enhance patient confidentiality. This allowed the Center to focus more on its core mission of community outreach. Read the full case study to learn how the digitization process was implemented.
Posted: 13 Feb 2025 | Published: 13 Feb 2025
|
|
|
2024-25 Dcig Top 5 Enterprise Multi-Site File Collaboration Ctera Solution Profile
sponsored by CTERA
ANALYST REPORT:
This analyst report examines top enterprise file collaboration solutions, highlighting key features like multi-cloud support, security, and technical support. Learn how CTERA's solutions can improve productivity, reduce costs, and mitigate risks for your distributed workforce. Read the full report to discover why CTERA made DCIG's Top 5.
Posted: 28 Oct 2024 | Published: 28 Oct 2024
|
|
|
Extracting actionable data from banking malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
Posted: 08 Feb 2021 | Published: 17 Aug 2016
|
|
|
UNIT 42 Managed Services Threat Report Summary
sponsored by Palo Alto Networks
RESEARCH CONTENT:
The MITRE Engenuity Unit 42 team identified a sophisticated attack involving APT10 and BlackCat groups. The report details the attack vectors, malware analysis, and recommendations to enhance your security posture. Read the full report to understand the impact and mitigate the risk of similar attacks.
Posted: 05 Oct 2024 | Published: 05 Oct 2024
|
|
|
Royal Holloway: An enhanced approach for USB security management
sponsored by TechTarget ComputerWeekly.com
RESOURCE:
USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.
Posted: 08 Feb 2021 | Published: 03 Jul 2020
|
|
|
An Analysis of Attacker Activity through NDR, EDR, and NGFW Data
sponsored by Fortinet, Inc.
RESEARCH CONTENT:
This white paper analyzes over 11 trillion network events to uncover the most common MITRE ATT&CK tactics and techniques used by attackers in 2023. It provides insights on C2, RAT malware, valid account abuse, and more to help security teams detect and respond to threats. Read the full white paper for comprehensive analysis.
Posted: 07 Oct 2024 | Published: 08 Oct 2024
|
|
|
2024 Cyber Security Report
sponsored by Checkpoint Software Technologies
RESEARCH CONTENT:
In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.
Posted: 03 May 2024 | Published: 04 May 2024
|
|
|
Fortinet Unified Secure Access Service Edge
sponsored by Fortinet, Inc.
ANALYST REPORT:
Fortinet SASE Solution Earns AAA Rating. CyberRatings.org thoroughly tested FortiSASE to determine how it handled TLS/SSL 1.2 and 1.3 cipher suites, how it defended against 205 exploits and 7,140 malware samples, and whether any of 1,124 evasions could bypass its protection. Read the full report to get all the details.
Posted: 18 Dec 2024 | Published: 04 Dec 2024
|
|
|
Zscaler Zero Trust Exchange
sponsored by Zscaler
RESEARCH CONTENT:
CyberRatings.org evaluated Zscaler Zero Trust Exchange using their SSE Threat Protection Methodology v2.1. The product excelled in handling TLS/SSL cipher suites, blocking exploits and malware, and resisting evasion techniques. Performance metrics for HTTP/HTTPS capacity and file downloads were assessed. Read the report for detailed results.
Posted: 04 Mar 2025 | Published: 04 Mar 2025
|
|
|
NAS meets cloud and unstructured data challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
NAS file access storage has progressed to meet the challenges of the cloud era. This e-guide provides key insights into NAS as we know it in the era of cloud and big, unstructured data sets.
Posted: 08 Feb 2021 | Published: 11 Jan 2019
|
|
|
Mix and match:Overcoming cloud integration challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This 33-page EGuide seeks to shine a light on all various forms of cloud integration challenges, alongside some of the approaches enterprises have taken to addressing them.
Posted: 29 Mar 2021 | Published: 04 Jan 2021
|
|
|
Mix and match: Overcoming cloud integration challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This 33-page EGuide seeks to shine a light on all various forms of cloud integration challenges, alongside some of the approaches enterprises have taken to addressing them.
Posted: 08 Feb 2021 | Published: 22 Jul 2020
|
|