Security Research
-
LogRhythm and NERC CIP Compliance
Sponsored by: LogRhythm, Inc.LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs, it automatically performs the first level of log analysis and also ensures you to meet your reporting requirements.
-
Patch Tuesday Alerts
Sponsored by: LumensionEach Tuesday, Lumension Security reviews the Microsoft Security Bulletins and provides specific comments, recommendations and key considerations to help customers implement the latest round of security updates as quickly and effectively as possible.
-
The Top Five Myths of IP Communications
Sponsored by: Cisco Systems, Inc.This white paper addresses the top concerns of IT professionals who resist the deployment of pervasive, enterprise-wide wireless networks. It identifies these reservations based on the experience of Cisco Systems and Intel.
-
An EMC Perspective on Data De-Duplication for Backup
Sponsored by: EMC CorporationThis paper explores the factors that are driving the need for de-duplication and the benefits of data de-duplication as a feature of an organization's backup strategy.
-
Johns Hopkins Bloomberg School of Public Health: Leading Public Health Authority Adopts Security Enhancing Remote Access Solution
Sponsored by: Citrix Online - GotoMyPCJohns Hopkins Bloomberg School of Public Health is an international authority on public health and GoToMyPC Corporate provides the school with secure, easy-to-use remote access to the desktop for faculty and staff members working remotely.
-
Citrix GoToMyPCCorporate - Security White Paper
Sponsored by: Citrix Online - GotoMyPCIn this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control.
-
SAP Netweaver: Streamlining the Transition to Services-Based IT Security
Sponsored by: SAP America, Inc.This paper describes how the SAP NetWeaver® platform and its components help IT organizations align with their enterprise business requirements in the area of security.
-
Implementing an identity management solution
Sponsored by: SAP America, Inc.This document describes the SAP NetWeaver Identity Management products, which cover most of the core functionality for implementing an identity management solution, including a virtual directory.
-
Unix, Linux Uptime and Reliability Increase; Patch Management Woes Plague Windows
Sponsored by: IBMUse this report, the Yankee Group's Global Server Operating System Reliability Survey, to make an informed choice on which servers best fit your needs.
-
The Role of Password Management in Achieving Compliance
Sponsored by: PistolStar, Inc.This paper will look at the dramatic impact password management solutions have had on organizations.
-
The Realities of Single Sign-On
Sponsored by: PistolStar, Inc.Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access.
-
Securing Business Communications Applications in Converged Networks - Best Practices
Sponsored by: Avaya Inc.Converged networks require converged security that expands traditional data security practices to protect the privacy of all network information, including IP telephony traffic.
-
Secure Search: Balancing Security with the Need for Information Access
Sponsored by: EMC CorporationThis white paper summarizes the issues of secure search for large organizations and explores the pros and cons of traditional enterprise search versus federated search.
-
Why You Should Choose IBM BladeCenter S over HP c3000
Sponsored by: IBMRead how IBM® BladeCenter® S provides greater capabilities--including 9TB of flexible storage, low noise, a specialized rack with air filtration and available layer 2-7 secure switching.
-
Integrated Solutions for Defect and Project Tracking
Sponsored by: TechExcelThis paper describes the unique approach and conceptual model that has made DevTrack a clear leader in today's competitive defect tracking market.
-
Top 5 Best Practices for Creating Effective Campaign Dashboards
Sponsored by: Tableau SoftwareWe can define an effective marketing dashboard as one that enables marketers to visually display relevant and current campaign, customer, advertising and/or branding information needed to achieve marketing objectives.
-
LiveWire Mobile Brings Music to Your Ears with Insight from Business Objects
Sponsored by: SAP America, Inc.Read this case study and see how Business Objects helped Livewire manage their royalty stream for end-user downloads, measuring performance and the end-user experience, and analyzing trends quickly and accurately.
-
Best Practices for Home Agents
Sponsored by: Avaya Inc.Employing home agents allows you to expand and improve your call center team. And they can be a form of insurance to keep your business running if disaster strikes. This white paper contains best practices for developing a Home Agents program.
-
The New Information Agenda: Do You Have One?
Sponsored by: IBMThis white paper defines the information agenda; describes key considerations and best practices in creating and implementing an information agenda.
-
Oracle Global IT (GIT) Streamlined Security
Sponsored by: Qualys, Inc.With QualysGuard Enterprise, Oracle GIT Security can monitor the company’s global vulnerability management process, track remediation, and validate policy compliance.
-
CIGNA Finds Good Therapy: Builds a More Efficient Risk Management, Streamlined Compliance, and System Security Program
Sponsored by: Qualys, Inc.CIGNA turned to QualysGuard's on demand Web service appliance to automatically identify and more effectively mitigate system vulnerabilities and misconfigurations.
-
Efficient Installation and Operation of Terminal Server Farms
Sponsored by: visionappThis whitepaper describes some of the potential issues that may be encountered with the installation and operation of terminal servers and explains straightforward ways to resolve them.
-
EMC Documentum Platform
Sponsored by: EMC CorporationCreate content applications and solutions on a single foundation and build a common content repository comprehensive set of services.
-
EMC Documentum Information Rights Management
Sponsored by: EMC CorporationThis White Paper provides an overview of the technical architecture of the Documentum IRM Server and Docuentum IRM clients.
-
The Education Edge: School Administration Software
Sponsored by: BlackbaudThe Education Edge is a complete solution and was developed exclusively for school administrators to help effectively manage every aspect of school administration and student information.