Your Search returned 0 results from our Editorial content

Sort By
   

Your Search returned 24 results from our White Paper Library

Sort By
EMC Corporation

Data Deduplication

The ROI of Backup Redesign Using Deduplication: An EMC Data...

This IDC White Paper takes a look at the specific business value associated with using Data Domain systems as part of rapidly evolving backup and data...


Proofpoint

Encryption

How Encrypting Content in Transit and at Rest Reduces Liabilities...

This white paper explains how to implement effective encryption to ensure your organization reduces costs and liability. Discover four top encryption points...


McAfee

Security

The Big Data Security Challenge: Make SIEM Work For You...

Big Data is not only a challenge for customer-facing organizations—but for security teams as well. See why and how to overcome it in this paper.


McAfee

Security

Optimize Log management: How To Collect and Store Logs Securely...

This paper looks at concerns attributed to log management and explains how to collect and store logs securely.


Websense

Security

Defending Against Today’s Targeted Phishing Attacks

“Is this email a phish or is it legitimate?” It’s a the question that is being asked more and more often. See how to work it out.


Symantec Corporation

Application Security

The Vulnerability Gap: Website Security Risks In The Asia...

Featuring survey results of 100 senior IT executives in Japanese enterprises, this paper analyses the gap between perceptions of Web security and the reality....


Rapid7

Security

The Unwitting Danger Within Understanding and Mitigating...

This eBook from Rapid7explores the different kinds of user-based risks in today's corporate environment.


IBM

Storage Area Network (SAN)

Maximizing Your Virtual Environment for the Latest Business...

This IDC paper outlines challenges with virtualized IT environments and how to address these issues.


Veeam

Network Storage

Deep Dive - Veeam Backup & Replication with NetApp Storage...

This paper guides you through the necessary steps to test and evaluate Veeam Backup & Replication storage snapshots.


Voltage

Encryption

Streamlining Information Protection Through A Data-Centric...

This paper looks at covers the use of FPE and tokenization for field-level data protection, as well as both static and real-time data masking


Previous 1 3

Blogs

phil-muncaster

China Rising

Why are Chinese tech giants slumping on US stock markets?

Phil Muncaster reports on China and beyond

rupert-goodwins

Tech Transformations

We can end this new IT security Cold War

Rupert Goodwins’ unique angle on tech change

jon-collins

Thinking Different

How much are banks risking on mobile services?

Jon Collins’ in-depth look at tech and society

no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/1590/check-point-software-technologies
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/1433/nutanix
  • /view_company_report/1592/pivotal
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/1242/teradata

Poll

Would you buy a modular phone?