BlackBerry Enterprise Server for IBM Lotus Domino Version 4.1: Feature and Technical Overview
sponsored by BlackBerry
WHITE PAPER:
Learn about the next step in wireless networking, the BlackBerry Enterprise Server. This paper provides an in-depth look at its architecture, components and key technical features.
Posted: 21 Nov 2006 | Published: 20 Feb 2006
|
|
|
Tripwire Enterprise Datasheet
sponsored by Tripwire, Inc.
WHITE PAPER:
Unauthorized change is the most significant threat to an IT organization's ability to improve availability, security and compliance. That's why thousands of organizations worldwide use Tripwire® Enterprise as their configuration audit and control sol
Posted: 01 Mar 2007 | Published: 01 Feb 2007
|
|
|
Leading the Way in Managed Services
sponsored by Zenith Infotech
WHITE PAPER:
Learn how Zenith enables Managed Services Providers to deliver a complete infrastructure solution to their clients. You'll be able to realign your staff to focus on more revenue generating projects and scaling business by obtaining new clients.
Posted: 20 Jun 2008 | Published: 01 Jul 2008
|
|
|
Securing Business Communications Applications in Converged Networks - Best Practices
sponsored by Avaya Inc.
WHITE PAPER:
Converged networks require converged security that expands traditional data security practices to protect the privacy of all network information, including IP telephony traffic.
Posted: 10 Jun 2008 | Published: 01 Jul 2005
|
|
|
Cisco Security Solutions - A Reference Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER:
This reference guide shows why security matters now more than ever. A strategic security solution empowers organizations to maintain their reputation, meet regulatory compliance standards, protect business information, and optimize business operations. Read on and discover how Cisco can help you meet those objectives.
Posted: 10 Jun 2009 | Published: 09 Jun 2009
|
|
|
New Security Solutions Using Intel vPro Technology
sponsored by Intel Corporation
WHITE PAPER:
Intel IT security specialists have identified significant new enterprise security use cases that we can implement using Intel vPro technology. We focused on three high-priority, high-value categories and successfully performed lab tests to validate each use case.
Posted: 02 Apr 2009 | Published: 02 Apr 2009
|
|
|
The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER:
Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008
|
|
|
Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER:
The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008
|
|
|
Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos
WHITE PAPER:
This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008
|
|
|
The Top Five Virtualization Mistakes
sponsored by Vyatta Inc.
WHITE PAPER:
This paper describes five mistakes common to many implementations of enterprise virtualization. Most of these mistakes relate to virtualization and networking infrastructure. Ideally, after reading this paper, you'll be sensitized to these issues so that you can plan for them and make your virtualization projects more successful.
Posted: 17 Jun 2009 | Published: 01 Jun 2007
|
|