Security Research
-
Security Threat Report: July 2008
Sponsored by: SophosThis report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
-
Integrating Dell Equallogic™ Sans with Citrix XENSERVER: Realizing Virtualization's Full Potential
Sponsored by: DellEMC and Intel®XenServer enables consolidation of server and other infrastructure resources, by combining servers and storage into resource pools that can be apportioned to the applications with the highest business need.
-
Cisco MDS 9000 Family: Total Investment Protection
Sponsored by: Cisco Systems, Inc.As discussed in this document, the Cisco® MDS 9000 Family provides the leading high-density, highbandwidth storage networking solution along with Integrated Fabric Applications to support dynamic data center requirements.
-
The Virtual Machine Aware SAN
Sponsored by: Cisco Systems, Inc.This white paper describes the innovative approach introduced by the Cisco MDS 9000 Family to support an end-to-end virtualized SAN environment that is flexible, secure, scalable, and mobile.
-
eGuide: Expert Tips for Deploying Secure Messaging Technologies
Sponsored by: TechTarget SecurityThis eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
-
The Case for an Untethered Enterprise
Sponsored by: Motorola SolutionsLearn how to take your enterprise completely wireless by implementing the most up to date wireless technology.
-
HP Integrity Systems: Family Guide
Sponsored by: Hewlett Packard EnterpriseThe HP Adaptive Infrastructure portfolio creates the foundation for delivering better business outcomes by enabling you to reduce operational costs, accelerate speed of IT change, and deliver higher quality of service to the business.
-
Configuration Audit and Control: 10 Critical Factors to Change and Configuration Management Success
Sponsored by: Tripwire, Inc.As businesses have instituted internal, industry, and government mandated regulatory compliance, the need for audit data to prove conformity has also become a necessity. Read this white paper to learn how configuration audit and control provides a single, independent source for enforcing and reporting on a change policy across an organization.
-
The Virtual Office Checklist
Sponsored by: Cisco Systems, Inc.The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.
-
Virtual Desktop Infrastructure
Sponsored by: VMware, Inc.Learn about the benefits of desktop virtualization: administrative and management tasks are reduced; applications can quickly be added, deleted, upgraded, and patched; security is centralized; and data is easier to safeguard and back up.
-
AT&T Business Continuity Survey: 2008
Sponsored by: AT&T CorpThe goal of this business continuity survey was to learn what these executives were doing about business continuity, and how it figured in their overall IT strategy.
-
High Performance Wi-Fi Demystified
Sponsored by: Xirrus - don't useThe Xirrus Wi-Fi Array represents the next generation in wireless LAN (WLAN) architectures.
-
Keys to Microsoft Application Acceleration: Advances in Delivery Systems
Sponsored by: CitrixRead this paper to learn how you can ensure significantly faster access to the Microsoft applications your users depend on. Download this complimentary guide to discover how an integrated advanced delivery solution can help you.
-
Keys to SAP Application Acceleration: Advances in Delivery Systems
Sponsored by: CitrixIt is essential that SAP applications and network infrastructures be considered together as a "application infrastructure" that supports strategic business objectives. This paper examines the challenges associated with SAP application delivery
-
Advanced Load Balancing: 8 Must-have Features for Today's Network Demands
Sponsored by: CitrixToday’s web applications require more than simple load balancing. This white paper describes the 8 must-have features of a more comprehensive application delivery solution.
-
The Ideal Blade Solution to Replace Your Rack Server: IBM BladeCenter JS12 Express Blade
Sponsored by: IBMRead this article to learn how to simplify your traditional UNIX, IBM i and Linux rack-mount and tower setup with the IBM BladeCenter JS12 Express blade and BladeCenter S chassis. Discover how it delivers a complete integrated business system.
-
Productivity, Internet Abuse, and How to Improve One by Eliminating the Other
Sponsored by: Bloxx, Inc.This white paper explains the effect of Internet abuse on employee productivity, which is huge and not fully appreciated.
-
Media Conversion in Video Security and Surveillance Systems
Sponsored by: Transition Networks, Inc.This whitepaper discusses what can be the weakest link in many video applications cabling infrastructure. Learn how media conversion can be an economical and effective means to convert to the cabling medium of your choice.
-
The Diverse and Exploding Digital Universe
Sponsored by: EMC CorporationThis white paper, sponsored by EMC, is an update of IDC's inaugural forecast of the digital universe published in March 2007. In this year's update we discuss the implications for business, government, and society.
-
Security Vs. Flexibility: Must IT Management Choose?
Sponsored by: FaronicsThis white paper focuses on how IT Managers can leverage Centralized Configuration Management (CCM) tools along with other techniques and tools to have it all: security, a uniform standard, and flexibility when needed.
-
Frost & Sullivan - Operational and Compliance Benefits of SAP Archiving
Sponsored by: EMC CorporationMany organizations maintain data on SAP production servers to make data less available to end users. Read this whitepaper to learn about options that would provide end-users with immediate access to archives through the use of the native SAP interf...
-
The Benefits Of Virtualizing Citrix XenApp with Citrix XenServer
Sponsored by: CitrixVirtualization is now generally recognized as one of the key enablers of these objectives. As organizations explore virtualization solutions, the challenge is to select the right strategic vendor with the best solution set for their business.
-
The Basics of ZigBee Transmitter Testing
Sponsored by: National InstrumentsZigbee is a wireless standard for personal area network (PAN) sensor monitoring and control.
-
SenSage Event Data Warehouse
Sponsored by: Hexis Cyber Solutions IncThis document explains how SenSage advantage meets key compliance requirements in PCI, HIPAA, SOX, NISPOM, FISMA, DCID and more.
-
Disk-to-Disk Backup and Recovery: A Guide for the Technical Decision Maker
Sponsored by: i365, makers of EvaultIn this white paper, you will learn about the technology and architecture driving the growing adoption of disk-to-disk backups, and in particular how EVault's solutions are your best choice.