White Papers

 

Displaying 1–15 (of 12228)

Popularity is determined by a calculation of page views and community comments.

Title Date
The Evolving Role of CISOs and their Importance to the Business Summary
Explore this 67 page Ponemon Institute Security Report to gain insight into the evolution and influence of CISOs through interviews with 184 companies regarding insights, challenges and approaches to security in today's global threat landscape.

sponsored by: F5 Networks
11-21-2017
Workload Management: Meet SLA Commitments and Increase Workforce Efficiency Summary
Find out how to deliver a better customer experience and build your competitive advantage by implementing workload management that enables you to expose inefficiencies in your workflows, meet SLA commitments, and increase employee engagement.

sponsored by: Genesys
11-21-2017
Business Alignment Throughout the DevOps Loop Summary
Discover how to close the gaps in the DevOps toolchain caused by siloed development tools so that you can truly automate, accelerate, and collaborate across the full delivery cycle.

sponsored by: Blueprint Software
11-21-2017
The Total Economic Impact™ Of IBM BigFix Patch And BigFix Compliance Summary
This Forrester white paper provides information collected from a study examining the potential ROI enterprises may gain by deploying IBM's BigFix Patch and BigFix Compliance. Uncover the security and cost benefits users saw with this implementation through real examples and experiences.

sponsored by: IBM
11-21-2017
DDoS: Strategies for Dealing With a Growing Threat Summary
In 2015, 10% of average DDoS attacks were above 50 Gbps, today the average size of attacks greater than 50 Gbps quadrupled to 42%. This IDG paper provides research on recent DDoS attacks and compares the data to a similar study conducted a few years ago to discover what measures organizations need to take now to prevent the attacks.

sponsored by: A10 Networks
11-21-2017
Why Performance Matters When Building your New SD-WAN Summary
In this e-book, gain a better understanding of the new generation of high performance SD-WANs. Then, learn how your IT network pros can rapidly connect end users to any type of application, reduce time-to-market for new regional offices and overall increase the performance, visibility and control over the entire network.

sponsored by: Sliverline Technologies
11-21-2017
A Matchmaker's Guide to UBA Solutions Summary
Gartner predicts that by 2020, less than 5 stand-alone user behavior analytics (UBA) solutions will remain in the market, with most vendors focusing on specific use cases and outcomes. This paper offers a list of questions to help you pick the right UBA strategy to confirm your company's protection far into the future.

sponsored by: Rapid 7
11-21-2017
The Most Important Benefit of NFV Summary
In today's competitive landscape, carriers see NFV as the strategy to improve their competitive position. In this resource, discover the 2 most important benefits of NFV to help overcome the challenges of customer demands and the growth of IoT devices.

sponsored by: netElastic Systems
11-21-2017
Monitoring Critical Users Builds Credibility at UCaaS Leader Summary
In this case study, learn how AppNeta network monitoring tools can help your organization troubleshoot issues faster and alert your IT team when a customer is nearing the limit of bandwidth.

sponsored by: AppNeta
11-20-2017
PowWow SmartUX™ & Blackberry Dynamics® Summary
Discover how to simplify and extend business apps to mobile to transform how work is done with anywhere, anytime access to apps and data. Plus, learn about low-code tools like the PowWow SmartUX platform, built to create apps that run on any device and any OS.

sponsored by: PowWow
11-20-2017
Case Study: Incident Response Time Savings and Compliance Ease Summary
This case study explores how ESB energy company overcame its challenges of having limited IT staff resources, a growing compliance burden, and numerous threats from hackers. Uncover how ESB overcame these issues by implementing a vulnerability management approach alongside an incident detection response strategy.

sponsored by: Rapid 7
11-20-2017
Real-Time Threat Prevention Lets Managed IT Services Provider Vology Thrive Summary
In this case study, learn how deploying a cloud-based security system gave the IT consulting company Vology both the protection they need to fight against today's threats, and the ability to learn and grow from each attack that comes their way

sponsored by: Juniper Networks, Inc.
11-20-2017
3 Critical Steps to Business Continuity and Availability in Financial Services Summary
In this white paper, read about how the definition of "business continuity" has evolved not only in financial services, but across both the public and private sectors. Then learn the 3 steps that any business needs to take in order to ensure the uptime today's customers expect.

sponsored by: Veeam Software
11-20-2017
All Together Now: Securing the Internet of Things Summary
In this white paper, learn how deeper visibility into IoT device's network utilization and behavior can help improve both network management and network security. Then, uncover the tools and techniques IT pros can implement for stronger IoT security.

sponsored by: Juniper Networks, Inc.
11-20-2017
Improving Success For Agile and DevOps Projects Summary
Learn how to overcome the 3 main obstacles that stand in the way of enterprise-class Agile and DevOps project success.

sponsored by: Blueprint Software
11-20-2017

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>