Browsers Reports

Solve Exchange Storage Problems Once and for All: A New Approach without Stubs or Links
sponsored by Mimosa Systems
WHITE PAPER: This white paper discusses how Mimosa NearPoint can reduce Exchange storage and keep email accessible to end users, without requiring stub files in Exchange.
Posted: 07 Oct 2008 | Published: 03 Oct 2008

Mimosa Systems

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by IBM
WHITE PAPER: This paper explains two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

The Realities of Single Sign-On
sponsored by PistolStar, Inc.
WHITE PAPER: Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

Business Intelligence: The Strategic Imperative for CIOs
sponsored by Information Builders
WHITE PAPER: Business intelligence (BI) allows organizations to integrate applications and databases essential to users and enables analysis of information to optimize decision-making.
Posted: 18 Jun 2008 | Published: 01 Jan 2007

Information Builders

How to Offer the Strongest SSL Encryption for your Company
sponsored by VeriSign, Inc
WHITE PAPER: Many IT professionals have little understanding of an extremely important protocol within SSL. This technical white paper provides a quick overview on how Server Gated Cryptography (SGC) affects the encryption levels of a Website to its visitors.
Posted: 01 Mar 2005 | Published: 01 Sep 2006

VeriSign, Inc

Web Application Security Trends Report Q3-Q4, 2008
sponsored by Cenzic
WHITE PAPER: Read this white paper to learn how to protect web applications through application security assessment and penetration testing managed services (SaaS) that identify vulnerabilities and allow organizations to stay ahead of hackers.
Posted: 20 May 2009 | Published: 20 May 2009

Cenzic

Computer Weekly – 30 July 2024: CrowdStrike blue screen bug serves a stark warning
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we analyse the lessons from the global IT outage caused by the blue screen bug in CrowdStrike security software. We talk to the data chief of Barilla, the €4bn pasta maker, about the benefits of asking, "So what?" And we find out how Finland is taking a lead on quantum computing. Read the issue now.
Posted: 26 Jul 2024 | Published: 30 Jul 2024

TechTarget ComputerWeekly.com

Computer Weekly – 6 August 2024: Migrating to S/4Hana – how the Co-op made its move
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's ezine, as SAP users prepare for the deadline to move off the ECC platform, we find out how Co-op is migrating to S/4Hana. Our latest buyer's guide looks at how to manage SaaS and on-premise software licensing. And we talk to former NCSC CEO Ciaran Martin about the true risks of nation-state cyber attacks. Read the issue now.
Posted: 02 Aug 2024 | Published: 06 Aug 2024

TechTarget ComputerWeekly.com

CW APAC – Tech career guide: Software development
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at what it takes to land a career and thrive in the fast-moving world of software development
Posted: 20 Aug 2024 | Published: 20 Aug 2024

TechTarget ComputerWeekly.com

Application Delivery Network Buyers' Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
Posted: 15 Mar 2021 | Published: 18 Feb 2021

TechTarget ComputerWeekly.com