Push Messaging White Papers

(View All Report Types)
Ten Ways to Replace Ineffective Meetings
sponsored by Slack
WHITE PAPER: How your business can increase productivity and cut costs by swapping meetings with asynchronous work and task automation.
Posted: 20 Dec 2023 | Published: 20 Dec 2023

TOPICS:  IT Management
Slack

The Case for an Untethered Enterprise
sponsored by Motorola Solutions
WHITE PAPER: Learn how to take your enterprise completely wireless by implementing the most up to date wireless technology.
Posted: 23 Oct 2008 | Published: 22 Oct 2008

Motorola Solutions

Configuration Audit and Control: 10 Critical Factors to Change and Configuration Management Success
sponsored by Tripwire, Inc.
WHITE PAPER: As businesses have instituted internal, industry, and government mandated regulatory compliance, the need for audit data to prove conformity has also become a necessity. Read this white paper to learn how configuration audit and control provides a single, independent source for enforcing and reporting on a change policy across an organization.
Posted: 14 Oct 2008 | Published: 14 Oct 2008

Tripwire, Inc.

Unsung Heroes - How Routing & Switching Keep the Business Going
sponsored by Cisco Systems, Inc.
WHITE PAPER: Routers and switches are the building blocks for all business communications from data to voice and video to wireless access.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Cisco Systems, Inc.

7 Requirements of Data Loss Prevention
sponsored by Symantec Corporation
WHITE PAPER: This report provides a clear understanding of the capabilities a successful data loss prevention solution must deliver. It also incorporates insight into the capabilities that companies require from their solution.
Posted: 10 Mar 2009 | Published: 10 Mar 2009

Symantec Corporation

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Posted: 26 Mar 2009 | Published: 01 Apr 2008

Symantec Corporation

Best Practices for Home Agents
sponsored by Avaya Inc.
WHITE PAPER: Employing home agents allows you to expand and improve your call center team. And they can be a form of insurance to keep your business running if disaster strikes. This white paper contains best practices for developing a Home Agents program.
Posted: 02 Jun 2008 | Published: 01 Feb 2008

Avaya Inc.

Stopping data leakage: Exploiting your existing security investment
sponsored by Sophos
WHITE PAPER: This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
Posted: 01 Oct 2008 | Published: 01 Jun 2008

Sophos

Tap Aggregation and Filtering to Enable Deep Packet Inspection (DPI)
sponsored by Gigamon
WHITE PAPER: Read this brief paper to learn how network monitoring using DPI analyzers is a mission critical application that is tailor-made for the Data Access Network (DAN) architecture and saves substantial amounts of money for the telecom carrier.
Posted: 01 Jul 2009 | Published: 01 Jul 2009

Gigamon

Optimizing IT Service Delivery: The Need for Linux System Management
sponsored by Red Hat and JBoss
WHITE PAPER: One way IT organizations are handling the growing need to achieve IT efficiency is by implementing systems management functions in their business environments. As the business value of Linux based deployment increases, so does the need for Linux systems management. This IDC white paper will examine the key benefits of system management software.
Posted: 03 Sep 2009 | Published: 03 Sep 2009

Red Hat and JBoss