WHITE PAPER:
One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...
WHITE PAPER:
This paper describes the unique approach and conceptual model that has made DevTrack a clear leader in today's competitive defect tracking market.
WHITE PAPER:
Although there are many different ideas of what CDP is, it is clear that it must protect data in a manner that is both time-addressable and event-addressable. This white paper explains what this means and gives an overview of effective CDP ...
WHITE PAPER:
This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
WHITE PAPER:
Enterprise social applications are the next generation of collaboration and productivity tools, capturing the interpersonal knowledge of workers and the implicit connections among people, systems, and data.
WHITE PAPER:
Network Access Control solutions are immature, with complex integration, inadequate inspection capabilities, and weak policy management. Read this white paper to learn how SSL VPNs allow for an effective dose of NAC with far fewer complicat...
WHITE PAPER:
This paper describes five infrastructure technologies that are making it easier for growing businesses to introduce new IT systems as needed while maintaining high levels of availability.
WHITE PAPER:
This white paper explains how Software Reuse and its underlying fundamentals have evolved dramatically. It also discusses the benefits of constructing critical enterprise software applications through reusable parts.