Cybersecurity resilience in an era of identity sprawl
sponsored by One Identity
WHITE PAPER:
As a CISO, your concerns expressed to the board of directors about cybersecurity have been largely drowned out by macroeconomic challenges, pipeline complexity and a need to enable a drastic increase in remote access.
Posted: 12 Jun 2024 | Published: 12 Jun 2024
|
|
|
Top 5 Best Practices for Creating Effective Campaign Dashboards
sponsored by Tableau Software
WHITE PAPER:
We can define an effective marketing dashboard as one that enables marketers to visually display relevant and current campaign, customer, advertising and/or branding information needed to achieve marketing objectives.
Posted: 04 Jun 2008 | Published: 01 Jun 2008
|
|
|
Small Business Firewall Software Vs. Hardware Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Small business firewall software and hardware firewalls are the methods used to protect computers against hacker attacks and other Internet threats.
Posted: 02 Feb 2009 | Published: 02 Feb 2009
|
|
|
Corporate networks: Business 2.0 and beyond
sponsored by SonicWALL
WHITE PAPER:
The performance and security needs of corporate networks have evolved greatly in the last five years. This brochure provides a management overview of what's changed and why. But more importantly, it shows why flexibility, visibility, agility and affordability are now the key factors in network decision-making. Read on to learn more.
Posted: 29 Oct 2009 | Published: 24 Jul 2009
|
|
|
IDC White Paper: Key Criteria in Selecting an Enterprise Online PC Backup Solution
sponsored by Iron Mountain
WHITE PAPER:
This paper illustrates the top–level benefits of online PC backup. Read this paper to learn more about how to choose an online PC backup solution for your mid-sized organization or enterprise!
Posted: 11 Jan 2010 | Published: 15 Dec 2008
|
|
|
Symantec Internet Security Threat Report: Trends for 2008
sponsored by Symantec Corporation
WHITE PAPER:
This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
Posted: 09 Jun 2009 | Published: 01 Apr 2009
|
|
|
An EMC Perspective on Data De-Duplication for Backup
sponsored by EMC Corporation
WHITE PAPER:
This paper explores the factors that are driving the need for de-duplication and the benefits of data de-duplication as a feature of an organization's backup strategy.
Posted: 19 Jun 2008 | Published: 01 May 2008
|
|
|
Top Reasons to Upgrade to Symantec Backup Exec™ 12.5 and Backup Exec System Recovery 8.5
sponsored by Symantec Corporation
WHITE PAPER:
Download this whitepaper to find out the top reasons to upgrade to a more effective backup system and how to get continuous data protection and complete system recovery.
Posted: 02 Oct 2008 | Published: 02 Oct 2008
|
|
|
Optimizing IT Service Delivery: The Need for Linux System Management
sponsored by Red Hat and JBoss
WHITE PAPER:
One way IT organizations are handling the growing need to achieve IT efficiency is by implementing systems management functions in their business environments. As the business value of Linux based deployment increases, so does the need for Linux systems management. This IDC white paper will examine the key benefits of system management software.
Posted: 03 Sep 2009 | Published: 03 Sep 2009
|
|
|
The Top 3 Cost-Cutting Mistakes CIOs Make And How to Avoid Them
sponsored by Rally Software
WHITE PAPER:
The current economic downturn has resulted in contraction of IT Department budgets and a mandate to allocate resources to only the most critical projects, then execute it flawlessly. In these tough times, it is imperative for CIOs to deliver more value as IT budgets fall.
Posted: 03 Apr 2009 | Published: 03 Apr 2009
|
|