Security Research
-
A 15-Minute Guide to Collaborative Case Management
Sponsored by: EMC CorporationIn about 15 minutes, learn how collaborative case management can be applied across a variety of case management types, become familiar with the components of a successful collaborative case management solution and gain insight on deployment.
-
Budgeting, Forecasting and Reporting for Mid-Size Companies
Sponsored by: Adaptive PlanningOrganizations have conducted the budgeting and forecasting process through a readily-available, inexpensive and easy-to-use application the spreadsheet.
-
REMOTE CONTROL: How to Reduce the Cost, Complexity and Risk of Managing Your Distributed IT Infrastructure
Sponsored by: UplogixThis white paper outlines the requirements of managing a highly distributed IT environment and examines how new secure remote management solutions can drastically reduce the cost, complexity and risk of managing remote locations.
-
Facilitating Enterprise PCI DSS Compliance - Detail Review
Sponsored by: GlobalscapeHS-PCI solution helps procedure and policy enforcement by monitoring and reporting on PCI DSS compliance by using prompts and warnings.
-
Realizing Business Value in Managed File Transfer
Sponsored by: GlobalscapeManaged File Transfer (MFT) is optimized for moving data; often bulk data, in a secure way that additionally involves the ability to manage data.
-
Directory Services Integration with Database Enterprise User Security
Sponsored by: Oracle CorporationThis paper presents the EUS deployment options available using Oracle Internet Directory and Oracle Virtual Directory and the use cases will help determine when one is more appropriate than the other based on customer environment.
-
Two Billion Entry Directory Benchmark
Sponsored by: Oracle CorporationThis benchmark evaluates Oracle Internet Directory performance under scales and throughput rates representative of those encountered in production use in both the communications industry and as part of large scale delivery architectures.
-
Seven IT Strategies to Help Survive the Downturn
Sponsored by: CompuCom Systems, Inc.The document describes the seven IT strategies worth taking a closer look at that can make a difference and have an impact.
-
Raytheon Open Source Performance Advantages
Sponsored by: Univa UDBy partnering with Univa, Raytheon, a leader in High Performance Computing and Mission Systems Integration, created a best-of-breed solution for scalable, robust and time-critical data movement, file virtualization, and storage and security challenges.
-
Improve Business Agility with Cisco Application Delivery Network Solution
Sponsored by: Cisco Systems, Inc.Cisco ADN can help your organization improve business agility and lower application-delivery costs.
-
ASG-Rochade the Leading Metadata Repository
Sponsored by: ASG Software SolutionsASG-Rochade is a metadata management solution for large and medium-sized organizations; it is a strategic, facilitating technology that manages information about data and systems across your enterprise.
-
Buyer's Guide to Log Management: Comparing On-Premise and On-Demand Solutions
Sponsored by: Alert LogicThis white paper examines and compares two solutions to log management - traditional on-premise log management managed in-house by the infrastructure team and a Software-as-a-Service (SaaS).
-
HP - rp5700 Point of Sale System
Sponsored by: Hewlett Packard EnterpriseThe HP rp5700 Point of Sale System gives you a flexible point-of-sale platform that can go from the front of the store to the back office.
-
Virtualized Client Solutions: HP Remote Client Solutions (RCS)
Sponsored by: Hewlett Packard EnterpriseHP offers client virtualization under its HP Remote Client Solutions (RCS) portfolio, andit includes virtualized client solutions like thin clients blade PCs, blade workstations, VDI and server-based computing.
-
EMC Documentum Enterprise Records Management: The Problem of Enterprise Records Management
Sponsored by: EMC CorporationThis paper examines how one solution provider, EMC, is helping customers address electronic discovery challenges by helping customers manage their information infrastructure more effectively.
-
Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
Sponsored by: IBM Software GroupWhen you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
-
MapXtreme Java v4.8.1
Sponsored by: MapInfo CorporationThis IT Download, MapXtreme Java, provides a Java mapping engine which facilitates optimized location intelligence on the desktop, over the internet, or through an intranet.
-
Tera1100 PC-over-IP Portal Processor Product Brief
Sponsored by: Teradici CorporationThe TERA1100 Portal Processor is designed to be integrated into a Desktop Portal, a small device at the end-user's desk.
-
Top 10 Reasons You Need EMC MozyEnterprise
Sponsored by: EMC CorporationThis document provides the top 10 reasons to choose EMC MozyEnterprise.
-
Cisco 2800 Series Integrated Services Routers
Sponsored by: Cisco Systems, Inc.The Cisco 2800 Series features the ability to deliver multiple high-quality simultaneous services at wire speed up to multiple T1/E1/xDSL connections.
-
Healthcare 2015: Win-win or Lose-lose?
Sponsored by: IBM Line of BusinessThere is a more positive scenario - a "win-win" - but it is one that will require new levels of accountability, tough decisions and hard work on the part of all stakeholders.
-
Top Five Security Issues for Small and Medium-Sized Businesses
Sponsored by: Cisco Systems, Inc.Small and medium-sized businesses use the Internet and networked applications to reach new customers and serve their existing ones more effectively.
-
EMBASSY Remote Administration Server (ERAS)
Sponsored by: Wave Systems Corp.Wave Systems' EMBASSY Remote Administration Server (ERAS) enables centralized IT administration to remotely deploy and manage PC clients that are equipped with Trusted Platform Modules (TPM) and/or Seagate Momentus® 5400 FDE.2 drives.
-
A Closer Look at Windows Vista
Sponsored by: National InstrumentsOne of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...
-
Information Security Roles and Responsibilities Made Easy
Sponsored by: Information Shield, Inc.Reducing the total cost of information security services by properly documented roles and responsibilities.