Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Router Essentials
sponsored by Global Knowledge
WHITE PAPER:
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Proving ownership of IPv6 addresses
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 08 Feb 2021 | Published: 25 Jun 2019
|
|
|
Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017
|
|
|
Voice Network Vulnerabilities in the Enterprise: How to Address Them
sponsored by Ribbon Communications
WHITE PAPER:
As communications technology has advanced and brought on subsequent security issues, it has become clear that firewalls alone are not enough to provide a secure network. Instead, enterprises need a complete, seamless approach to network security to preempt issues and protect their organizations. Access this white paper to learn more.
Posted: 31 Jan 2024 | Published: 31 Jan 2024
|
|
|
Improving Health by Addressing Social Needs: A Sustainable Path Forward
sponsored by ZeOmega
WHITE PAPER:
ZeOmega and the Center for Open Data Enterprise (CODE) have collaborated to create a powerful white paper addressing challenges related to Health-Related Social Needs (HRSN) interventions. Download it now to learn about opportunities to apply funding to address social needs.
Posted: 26 Sep 2024 | Published: 27 Sep 2024
|
|
|
Richmond Advisory Group Incident Readiness Response
sponsored by AT&T and LevelBlue
RESEARCH CONTENT:
To understand why mid-market organizations and SMEs purchase incident readiness and response services, The Richmond Advisory Group surveyed 500 cybersecurity decision-makers. Review the survey’s findings in this 2024 report, “Why Mid-market Organizations Are Prioritizing Incident Readiness and Response in the Face of Regulatory Scrutiny.”
Posted: 07 Jun 2024 | Published: 07 Jun 2024
|
|
|
5 Security Concerns for CISOs and How to Address Them
sponsored by Palo Alto Networks
WHITE PAPER:
This white paper explores 5 key security concerns for CISOs, including supply chain attacks, cloud security, and overloaded security teams. Get expert guidance on how to address these issues and prepare your organization for evolving cyberthreats. Read the full white paper to learn more.
Posted: 08 Nov 2024 | Published: 08 Nov 2024
|
|
|
Cloud computing storage key management
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
Posted: 08 Feb 2021 | Published: 04 May 2016
|
|
|
Enterprise Strategy Group (ESG): API security
sponsored by Cequence
ESG THOUGHT LEADERSHIP EBOOK:
As API usage grows, security must keep pace. This e-book explores the challenges of securing APIs, including common attacks and their business impacts. Discover the range of capabilities needed to protect APIs across the development lifecycle. Read the Enterprise Strategy Group (ESG) e-book to learn how to build a robust API security program.
Posted: 31 Oct 2024 | Published: 31 Oct 2024
|
|
|
Secure Voting
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 08 Feb 2021 | Published: 04 Apr 2016
|
|
|
How to Implement an OSS Governance Program
sponsored by Anaconda
WHITE PAPER:
Just like all software, open-source carries risk, and many data science teams still lack security protocols. For some, there simply aren’t security protocols or governance tools for open-source software (OSS). Read on to learn about 6 steps you can take to build an OSS governance program that works for data science and set your team up for success.
Posted: 10 Jul 2023 | Published: 11 Jul 2023
|
|
|
African + Eastern Deploys Comprehensive Security Program with Secureworks
sponsored by SecureWorks
CASE STUDY:
Middle East beverage distributor African + Eastern deploys comprehensive security program with Secureworks, gaining 24/7 threat monitoring, detection, and response to reduce organizational risk. Read the full case study to learn how Secureworks' managed detection and response solution helped secure their digital environment.
Posted: 14 Nov 2024 | Published: 14 Nov 2024
|
|
|
NVMe flash storage 101
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.
Posted: 08 Feb 2021 | Published: 31 Mar 2017
|
|
|
Addressing the NIST Cybersecurity Framework 2.0 with the CyberArk Identity Security Platform
sponsored by CyberArk
WHITE PAPER:
Enjoy an overview of the NIST Cybersecurity Framework 2.0, a framework for managing and mitigating cybersecurity risk. Learn how CyberArk's Identity Security Platform can help organizations comply with various subcategories of the framework, by offering solutions for identity security.
Posted: 23 Aug 2024 | Published: 23 Aug 2024
|
|
|
Cato Networks: The Cato CTRL SASE Threat Report
sponsored by Cato Networks
RESEARCH CONTENT:
Cato Networks' Q1 2024 SASE Threat Report provides an in-depth look at the evolving cyber threat landscape. Discover the latest tactics used by threat actors, including AI tool abuse and deep fakes. Learn how to improve your enterprise security posture. Read the full report.
Posted: 26 Jun 2024 | Published: 26 Jun 2024
|
|
|
How Modern DCIM Addresses CIO Management Challenges within Distributed, Hybrid IT Environments
sponsored by Schneider Electric
WHITE PAPER:
In this white paper, explore the evolution of enterprise IT portfolios and corresponding management challenges... and how DCIM software can help maintain the foundation for hybrid data center environments with distributed IT infrastructure.
Posted: 09 Mar 2023 | Published: 09 Mar 2023
|
|
|
How a Rideshare Giant Balances SMS Toll Fraud Security with Great User Experience
sponsored by Arkose Labs
CASE STUDY:
This case study explores how a major rideshare company combated SMS toll fraud while preserving a smooth customer experience. By partnering with Arkose Labs, the company saved $2.5M annually, blocked 99.5% of low-risk traffic without friction, and gained deeper visibility into user traffic. Read the full case study to learn more.
Posted: 16 Jul 2024 | Published: 16 Jul 2024
|
|
|
Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
Posted: 08 Feb 2021 | Published: 09 Jul 2020
|
|
|
The myth of email as proof of communication
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT:
Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
Posted: 08 Feb 2021 | Published: 02 Dec 2016
|
|
|
Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019
|
|
|
Luminis Health improves throughput & access at one of the nation’s busiest ERs
sponsored by Fabric Health
CASE STUDY:
Luminis Health faced rising wait times and staff burnout post-pandemic. To address these challenges, they partnered with Fabric to digitally transform their emergency department by digitizing the patient intake process, educating patients about their visit, and improving follow-up scheduling and PCP attachment.
Posted: 29 Aug 2024 | Published: 29 Aug 2024
|
|
|
IT OT Convergence
sponsored by TeamViewer
PRODUCT OVERVIEW:
With Industry 4.0 and a growing need to transform existing processes, industrial sectors are transcending towards connected ecosystems. But a convergence of IT and operational technology (OT) isn’t always as easy as it seems. Discover how TeamViewer Tensor addresses this with a unified, single window access to all IT and OT assets in this resource.
Posted: 14 Dec 2023 | Published: 14 Dec 2023
|
|
|
Print security: An imperative in the IoT era
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT:
Analyst group Quocirca gives the perspective on the risks and best practices of print security.
Posted: 08 Feb 2021 | Published: 10 Jul 2017
|
|
|
You’re Under SIP Attack: Limiting SIP Vulnerabilities
sponsored by Ribbon Communications
WHITE PAPER:
Without the necessary expertise, monitoring, and management, companies could be leaving their network vulnerable to exploitation through their VoIP communications. Read this white paper to understand hackers’ tactics and motivations to help your enterprise operators secure their networks from attack.
Posted: 31 Jan 2024 | Published: 31 Jan 2024
|
|
|
CW Middle East Oct to Dec 2016
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this quarter's CW Middle East ezine, we feature the IT journeys of three companies in the region with detailed analysis of recent IT projects that were designed to support business transformation in a changing world.
Posted: 08 Feb 2021 | Published: 20 Oct 2016
|
|
|
Solving Enterprise Storage Challenges with Cloud-Based NAS Consolidation Solutions
sponsored by Panzura
ANALYST REPORT:
This analyst report evaluates top cloud-based NAS consolidation solutions, highlighting Panzura CloudFS. It covers key features like intelligent caching, high availability, ransomware resilience, and ease of administration. Read the full report to learn how cloud-based NAS consolidation can address your enterprise data management challenges.
Posted: 08 Oct 2024 | Published: 08 Oct 2024
|
|