The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER:
This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006
|
|
|
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
CW ANZ: Fix the weak links
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Jul 2018
|
|
|
The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019
|
|
|
DataOps: The Missing Link in Your Industrial Data Architecture
sponsored by HighByte
WHITE PAPER:
How can your business simplify data contextualization to maximize the value of your technology investments? By leveraging DataOps to define standard models and establish and manage integrations, operational teams can provide data to the systems and business users who are requesting it in a more efficient and managed way. Read on to learn more.
Posted: 26 Oct 2023 | Published: 26 Oct 2023
|
|
|
Regaining Control With A Connectivity Cloud
sponsored by Cloudflare
FORRESTER RESEARCH REPORT:
Businesses are struggling to manage the growing complexity of IT and security responsibilities. A connectivity cloud solution could help regain control by providing secure, performant connectivity across on-premises, cloud, and web environments. Read the full Forrester Research report to learn more.
Posted: 13 Jul 2024 | Published: 13 Jul 2024
|
|
|
NVMe promises blisteringly fast flash performance
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this guide we look at the architectural issues blocking agreement on NVMe, the fundamentals that underlie NVMe and its blistering performance, the key NVMe product deployments available, and ask what will become of the storage features associated with the storage controller.
Posted: 08 Feb 2021 | Published: 10 Apr 2018
|
|
|
Understanding Gmail And Yahoo’s New Standards For Senders
sponsored by Sinch
WHITE PAPER:
Gmail and Yahoo are changing email-sending requirements in 2024. Learn how to ensure your domain settings, unsubscribe links, and spam rates align with the new protocols to avoid getting blocked from major inboxes. Access the guide to understand the remediation steps.
Posted: 29 May 2024 | Published: 29 May 2024
|
|
|
Session Border Controllers
sponsored by Ribbon Communications
EBOOK:
What are session border controllers (SBCs), and how do they function in a communications strategy? For answers, and for a deep dive on SBCs, tap into this 47-page e-book.
Posted: 31 Jan 2024 | Published: 31 Jan 2024
|
|
|
Remote Connectivity: The Crucial Link For Healthcare Digitalization
sponsored by TeamViewer
WHITE PAPER:
Remote connectivity is crucial for healthcare digitalization, enabling remote patient monitoring, secure access, and instant IT support. Discover how a secure remote connectivity platform can help your organization improve operational efficiency and patient outcomes. Read the full white paper.
Posted: 10 Oct 2024 | Published: 10 Oct 2024
|
|
|
Controlling and Managing Privileged Access
sponsored by One Identity
WHITE PAPER:
Download this report and learn the risks associated with privileged access, and explains how solutions from One Identity mitigate those risks with granular access control and accountability.
Posted: 17 Apr 2024 | Published: 17 Apr 2024
|
|
|
Unveiling the True Potential of Identity: Strengthening Security through Complementary Practices
sponsored by One Identity
EBOOK:
Download this report and learn why, in today's evolving threat landscape, a complimentary approach to identity governance and Privileged Access Management is vital for organizations seeking to maintain a secure and compliant environment.
Posted: 17 Apr 2024 | Published: 17 Apr 2024
|
|
|
Privileged Access Management
sponsored by One Identity
ANALYST REPORT:
Read this comprehensive overview of the Privileged Access Management (PAM) market including vendor capabilities, product ratings and market leadership analysis from KuppingerCole. Discover leading PAM solutions to help secure privileged access across endpoints, servers, applications and cloud.
Posted: 17 Apr 2024 | Published: 17 Apr 2024
|
|
|
Connectivity Cloud: A Way To Take Back IT And Security Control
sponsored by Cloudflare
WHITE PAPER:
Organizations are losing control over their IT and security as their technology environment becomes more complex. Learn how a "connectivity cloud" can help regain control by providing seamless, secure, and performant connectivity across any network, cloud, or user. Read the full white paper to discover the benefits.
Posted: 13 Jul 2024 | Published: 13 Jul 2024
|
|
|
Bluetooth Low Energy: The IoT battle
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
Posted: 08 Feb 2021 | Published: 10 May 2018
|
|
|
Zero Trust Lateral Access Control
sponsored by Zentera Systems Inc.
PRODUCT OVERVIEW:
Secure your network by controlling lateral access with zero trust identity. Learn how Zentera's CoIP Platform enables targeted lateral access controls to defend against advanced threats inside your network. Read the solution brief to discover this elegant zero trust approach.
Posted: 13 Sep 2024 | Published: 13 Sep 2024
|
|
|
Ribbon Session Border Controllers for Enterprises
sponsored by Ribbon Communications
WHITE PAPER:
To learn the ABCs of SBCs (session border controllers), browse this 8-page white paper that digs into 3 key SBC use cases, a wide range of SBC tools, and more.
Posted: 31 Jan 2024 | Published: 31 Jan 2024
|
|
|
Software Development Kit (SDK) U.Trust SDK
sponsored by Utimaco
BLOG:
The utrust SDK is a professional development environment that enables custom firmware extensions for Utimaco's hardware security modules. It provides full control, efficient development, and qualified support to create tailored security solutions. Read the full details in this blog article.
Posted: 17 Jul 2024 | Published: 17 Jul 2024
|
|
|
Proving ownership of IPv6 addresses
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
Posted: 08 Feb 2021 | Published: 25 Jun 2019
|
|
|
How to Implement an OSS Governance Program
sponsored by Anaconda
WHITE PAPER:
Just like all software, open-source carries risk, and many data science teams still lack security protocols. For some, there simply aren’t security protocols or governance tools for open-source software (OSS). Read on to learn about 6 steps you can take to build an OSS governance program that works for data science and set your team up for success.
Posted: 10 Jul 2023 | Published: 11 Jul 2023
|
|
|
Infographic: 6 file transfer best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
File sharing is a critical everyday practice across the enterprise. The wide-scale adoption of IM and collaboration tools, as well as cloud-based file-sharing sites, has made the process of sharing data easier -- but also less secure -- than ever. Here are six secure file transfer best practices to avoid exposing confidential data.
Posted: 05 May 2022 | Published: 05 May 2022
|
|
|
8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023
|
|
|
Zero trust: Taking back control of IT security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this E-Guide we go in-depth to explore the concept of zerotrust. First, Cliff Saran explores some of the basics of zerotrust, exploring how the advent of mobile computing, remote working, and software-as-a-service (SaaS) had already started the shift in security focus away from the perimeter – even before the Covid-19 pandemic.
Posted: 08 Feb 2021 | Published: 18 Jan 2021
|
|
|
Top Five Reasons to Convert Your AWS DirectConnect to a Multicloud On-Ramp
sponsored by Apcela
BLOG:
This blog post outlines why you should convert the access circuits that enable AWS DirectConnect into a multicloud link instead of a single purpose connection and leveraging existing SD-WAN. Read on to uncover 5 reasons you should convert your AWS DirectConnect to a multicloud on-ramp.
Posted: 21 Jun 2022 | Published: 22 Jun 2022
|
|
|
Navigating Network Failover
sponsored by Cradlepoint
PRODUCT OVERVIEW:
Having a strategy in place for WAN failover can help mitigate risks by providing automatic, seamless transitions to backup connectivity when the primary link fails. Read on here to discover how to navigate network failover with 5G and LTE, as well as assistance from Cradlepoint.
Posted: 26 Mar 2024 | Published: 26 Mar 2024
|
|
|
NVMe flash storage 101
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Flash storage is already much faster than spinning disk, but with the advent of NVMe – a new standard based on PCIe – flash could achieve a potential that has so far eluded it.
Posted: 08 Feb 2021 | Published: 31 Mar 2017
|
|
|
Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019
|
|