Corporate WhitepaperWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Corporate Whitepaper returned the following results.
RSS What is RSS?
Related Categories

 •   Wireless Technologies and Mobile Computing
 •   Data Security
 •   Mobile Device Management
 •   Network Security
 •   Security Policies
 •   Endpoint Security
 •   Wireless Security
 •   Security Monitoring
 •   Data Center Management
 •   Application Security

Related Searches
 •   Corporate Accounting
 •   Corporate Definitions
 •   Corporate Documentation
 •   Corporate Expense
 •   Corporate Java
 •   Corporate Whitepaper B2B
 •   Corporate Whitepaper Finds
 •   Maintain Corporate
 •   Open Corporate
 •   Webcast Corporate
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Backup Mobile and Remote Users Securely, With or Without a VPN by Copiun

January 17, 2011 - (Free Research)
This whitepaper examines the challenges with backing up corporate data on these remote users’ PCs and describes Copiun’s Constant Access Gateway option which allows IT organizations to securely backup remote and mobile users without opening any firewall ports or placing the backup server in the DMZ. 
(WHITE PAPER) READ ABSTRACT |

Six Must Have Features for Corporate Laptop Backup by Druva Software

October 18, 2010 - (Free Research)
With the steady shift from desktop to laptop and explosion in use of data extensive applications like Microsoft Outlook, data today is more dispersed and diverse than ever. This Whitepaper explains the 6 critical features your enterprise laptop backup solution will need, to defuse the explosion of corporate data. 
(WHITE PAPER) READ ABSTRACT |

Securing Today’s Mobile Workforce by Juniper Networks, Inc.

February 15, 2012 - (Free Research)
BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues. 
(WHITE PAPER) READ ABSTRACT |

A Manager's Guide to Wireless Hotspots: How to Take Advantage of Them While Protecting the Security of Your Corporate Network by Motorola, Inc.

May 2007 - (Free Research)
This paper discusses the security risks inherent in public Wi-Fi Internet access and the best ways to mitigate these risks. It also discusses the benefits of hosting a corporate hotspot of your own. 
(WHITE PAPER) READ ABSTRACT |

Delivering Enterprise Value with Oracle Governance, Risk & Compliance by Oracle Corporation

October 2010 - (Free Research)
In this whitepaper, Corporate Integrity’s Michael Rasmussen, Risk & Compliance Lecturer, Writer, and Advisor, analyzes how Oracle, as a GRC solutions provider, delivers economic value to its clients. 
(WHITE PAPER) READ ABSTRACT |

Stopping Crimeware In Its Tracks by FireEye

September 2008 - (Free Research)
This paper describes the damaging cybercrime threat posed by botnets, explains why traditional security solutions cannot stop them, and proposes a new approach that can eradicate cybercrime from corporate networks. 
(ANALYST REPORT) READ ABSTRACT |

Cutting Complexity – Simplifying Security by Kaspersky Lab

January 2013 - (Free Research)
Kaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks. 
(WHITE PAPER) READ ABSTRACT |

Single Point of Access, Single Point of Control by Citrix

January 2014 - (Free Research)
Read on to learn how desktop virtualization can help support remote connectivity better than VPN. 
(WHITE PAPER) READ ABSTRACT |

Battling Modern Botnets in the Enterprise by FireEye

September 2008 - (Free Research)
The prevalence of botnets is growing at an alarming rate. The FBI ranked cybercrime as one of it's top priorities and noted that it cost businesses $67.2 billion in 2005 alone. Learn how to keep botnets out of your business. 
(WHITE PAPER) READ ABSTRACT |

Six Features Your Laptop Backup Must Have by Druva Software

April 2010 - (Free Research)
The whitepaper explains the 6 critical features your enterprise laptop backup solution will need to defuse the explosion of corporate data. 
(WHITE PAPER) READ ABSTRACT |

Global Best Practices in Email Security, Privacy and Compliance by Proofpoint, Inc.

August 2008 - (Free Research)
A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution. 
(WHITE PAPER) READ ABSTRACT |

Network Applications and the Impact on Corporate WANs by XO Communications

March 2012 - (Free Research)
Learn about the expanding requirements placed on the WAN and uncover how a WAN solution can help you meet the growing needs of applications and users. 
(WHITE PAPER) READ ABSTRACT |

Mobile Devices: The New Thin Clients by Citrix

June 2013 - (Free Research)
This whitepaper explains what makes thin clients an attractive option for business looking to deliver virtual desktops and corporate applications from a single datacenter. 
(WHITE PAPER) READ ABSTRACT |

Five DLP Tips From Security Executives by Symantec Corporation

March 2013 - (Free Research)
This whitepaper explores how data loss prevention (DLP) programs impact the effectiveness of security executives and corporate data protection. Topics covered include the dangers of exposed data, the direct benefits of DLP programs, and tips for deploying DLP programs. 
(WHITE PAPER) READ ABSTRACT |

Connecting the Clouds: Best Practices for Integrating IT Service Management by BMC Software, Inc.

October 2013 - (Free Research)
This whitepaper covers creating a corporate-wide integration strategy for Software-as-a-Service that meets business needs and improves your quality of service. 
(WHITE PAPER) READ ABSTRACT |

Why performance management? A guide for the midsize organization by IBM

February 2012 - (Free Research)
This brief white paper provides an overview of how performance management can help midsize companies meet challenges using IBM Cognos Express, an integrated, one-stop business intelligence (BI) and planning solution purpose-built for midsize companies. IBM Cognos Express is a cost-effective choice for performance management. 
(WHITE PAPER) READ ABSTRACT |

Taking Windows Mobile on Any Device by Citrix

January 2014 - (Free Research)
This whitepaper provides a project design guide that will help you construct and demonstrate a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security. 
(WHITE PAPER) READ ABSTRACT |

Defeating Advanced Persistent Threat Malware by Infoblox

January 2013 - (Free Research)
How can you protect your organization from APT Malware?  Read this whitepaper to learn why a DNS Firewall implementation is a MUST for your organization and how the Infoblox DNS Firewall may be the industry's first true DNS security solution. 
(WHITE PAPER) READ ABSTRACT |

The Data Center Dilemma: Controlling Costs While Managing Risk by Emerson Network Power

July 2010 - (Free Research)
The escalation in data center costs has been driven by the demand for computing. IT has responded to this demand by adding more servers and replacing older servers with newer devices that deliver more power in less space. Read this whitepaper to learn more. 
(WHITE PAPER) READ ABSTRACT |

4 Secrets to Meaningful Security Discussions with the Board of Directors by Citrix

May 2014 - (Free Research)
This informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors. 
(WHITE PAPER) READ ABSTRACT |

Citrix Receiver for Enterprise Apps by Citrix

March 2010 - (Free Research)
This whitepaper explains how using Oracle applications, Citrix Receiver, and a smart phone, can mobilize any type of enterprise application affordably, overcoming security, usability, and platform incompatibility concerns. 
(WHITE PAPER) READ ABSTRACT |

Free yourself to do more, while securing your business simply and cost-effectively by Sophos, Inc.

June 2009 - (Free Research)
It's vital for businesses to secure their systems and data against a growing field of threats. However, implementing and maintaining full-spectrum protection can be a heavy drain on financial and human resources if not done right. Read this whitepaper to learn how a more efficient approach to security can free up much needed resources. 
(WHITE PAPER) READ ABSTRACT |

Top Five Strategies for Combating Modern Threats - Is Anti-virus Dead? by Sophos, Inc.

October 2008 - (Free Research)
Read this whitepaper to learn about the security implications of modern threats, where emerging technologies can add real value, and five key strategies for ensuring solid malware protection. 
(WHITE PAPER) READ ABSTRACT |

The Best of Both Worlds: Sharing Mac Files on Windows Servers by GroupLogic

October 2009 - (Free Research)
This whitepaper discusses the issues involved in sharing files between Macs and Windows servers and compares the options for successful integration. It is intended for systems administrators, technical evaluators and decision-makers who are considering upgrading or purchasing a Mac/Windows integration solution. 
(WHITE PAPER) READ ABSTRACT |

The ClearPass Access Management System by Aruba Networks

May 2013 - (Free Research)
This whitepaper describes a way that you can take back control of your company network without having to string together a multitude of loosely integrated point-products that only lead to more complexity. Read on and learn how you can manage all things BYOD from one place. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts