Search Results: 320 Articles Found for White

Header
1) Introduction to Kubernetes (Cluster Containers Orchestration) (White Paper)
Source: Arnaud Nauwynck
Category:Administration
Author: Arnaud Nauwynck
Posting Date: 2019-09-29
Publish Date: 2019-09-29
PDF   White Paper 
 

2) Why Container Management Platforms Are a Top Enterprise Investment Priority (White Paper)
Source: IDC
Category:Administration
Author: Stephen Elliot, VP Management Software and DevOps @ IDC
Posting Date: 2019-09-24
Publish Date: 2019-07-19
PDF   White Paper 
 

3) Microservices and Docker at Scale (White Paper)
Source: Electric Cloud
Category:Administration
Author: Avan Mathur
Posting Date: 2019-07-13
Publish Date: 2019-07-13
PDF   White Paper 
 

4) The Expert’s Guide to Running Containers in Production (White Paper)
Source: Portworx
Category:Administration
Posting Date: 2019-07-09
Publish Date: 2019-07-09
PDF   White Paper 
 

5) Five Essential Strategies for Successful HPC Clusters, White Paper (White Paper)
Source: Bright Computing
Category:Administration
Author: Douglas Eadline
Posting Date: 2019-05-16
Publish Date: 2019-05-07
PDF   White Paper 
 

6) Application Container Security Guide (White Paper)
Source: NIST
Category:Administration
Posting Date: 2019-02-12
Publish Date: 2019-01-29
PDF   White Paper 
 

7) Best Practices for Container Security (White Paper)
Source: Alert Logic
Category:Administration
Posting Date: 2019-01-15
Publish Date: 2019-01-22
PDF   White Paper 
 

8) Enterprise Container Platform Software Suites, Q4 2018 (White Paper)
Source: Forrester
Category:Administration
Posting Date: 2019-01-15
Publish Date: 2019-01-08
PDF   White Paper 
 

9) Is There A White Box Server in Your Data Center's Future? (White Paper)
Source: Network World
Category:Administration
Posting Date: 2018-10-23
Publish Date: 2018-10-11
PDF   White Paper 
 

10) Top 5 Cloud Mobility Considerations for a Data Protection Strategy (White Paper)
Source: Veeam Software
Category:Cloud
Posting Date: 2019-12-12
Publish Date: 2019-04-12
PDF   White Paper 
 

11) A Checklist for Cloud Data Management (White Paper)
Source: CommVault
Category:Cloud
Posting Date: 2019-11-04
Publish Date: 2018-11-04
PDF   White Paper 
 

12) Why Converged Is a Good Fit for Hybrid Cloud (White Paper)
Source: HITACHI VANTARA & CISCO SYSTEMS
Category:Cloud
Posting Date: 2019-10-31
Publish Date: 2019-10-31
PDF   White Paper 
 

13) Your Journey to the Cloud (White Paper)
Source: Google Cloud
Category:Cloud
Posting Date: 2019-10-29
Publish Date: 2019-10-29
PDF   White Paper 
 

14) Oracle And KPMG Cloud Threat Report (White Paper)
Source: Oracle & KPMG
Category:Cloud
Author: Mary Ann Davidson @ Oracle Corporation & Tony Buffomante @ KPMG
Posting Date: 2019-10-24
Publish Date: 2019-10-24
PDF   White Paper 
 

15) Cloud Security Spotlight Report (White Paper)
Source: SC Magazine
Category:Cloud
Author: Holger Schulze, Founder LinkedIn Information Security Group
Posting Date: 2019-08-31
Publish Date: 2019-08-31
PDF   White Paper 
 

16) Cloud Security Spotlight Report (White Paper)
Source: SC Magazine
Category:Cloud
Author: Holger Schulze, Founder LinkedIn Information Security Group
Posting Date: 2019-08-31
Publish Date: 2019-08-31
PDF   White Paper 
 

17) Risk Management for Cloud Computing (White Paper)
Source: TechTarget
Category:Cloud
Author: Eric Holmquist, Ed Moyle, Karen Goulart
Posting Date: 2019-08-28
Publish Date: 2019-08-28
PDF   White Paper 
 

18) The Cloud Is Not for Cost Savings, But Cost Management is King (White Paper)
Source: Rhythmic
Category:Cloud
Posting Date: 2019-08-05
Publish Date: 2019-07-01
PDF   White Paper 
 

19) The Complete Guide to Cloud Storage 2019 (White Paper)
Source: TechWorld
Category:Cloud
Posting Date: 2019-08-05
Publish Date: 2019-08-05
PDF   White Paper 
 

20) Making Multi-Cloud Work (White Paper)
Source: ComputerWeekly
Category:Cloud
Posting Date: 2019-07-11
Publish Date: 2019-07-11
PDF   White Paper 
 

21) Serverless Computing: From Planet Mars to the Cloud (White Paper)
Source: IEEE
Category:Cloud
Author: Jose Luis V  azquez-Poletti, Ignacio Martln Llorente
Posting Date: 2019-07-10
Publish Date: 2019-07-10
PDF   White Paper 
 

22) A Serverless Real-Time Data Analytics Platform for Edge Computing (White Paper)
Source: IEEE
Category:Cloud
Posting Date: 2019-07-10
Publish Date: 2019-07-10
PDF   White Paper 
 

23) Shadow IT: The Great IT Opportunity (White Paper)
Source: LANDESK
Category:Cloud
Posting Date: 2019-06-28
Publish Date: 2019-06-28
PDF   White Paper 
 

24) The Complete Guide to Serverless Computing (White Paper)
Source: TechWorld
Category:Cloud
Posting Date: 2019-06-24
Publish Date: 2019-06-24
PDF   White Paper 
 

25) The Security Implications of Moving to the Cloud (White Paper)
Source: IBM Security
Category:Cloud
Author: David A. Cass
Posting Date: 2019-06-18
Publish Date: 2018-06-28
PDF   White Paper 
 

26) 3 Key Risks You Need to Plan for When Migrating to The Cloud, White Paper (White Paper)
Source: Rhythmic
Category:Cloud
Posting Date: 2019-06-12
Publish Date: 2019-05-23
PDF   White Paper 
 

27) Top Threats to Cloud Computing, White Paper (White Paper)
Source: Cloud Security Alliance
Category:Cloud
Posting Date: 2019-06-12
Publish Date: 2019-05-24
PDF   White Paper 
 

28) NIST Cybersecurity Framework (White Paper)
Source: AWS
Category:Cloud
Posting Date: 2019-06-12
Publish Date: 2019-05-27
PDF   White Paper 
 

29) Preparing for the Cloud: Understanding the Infrastructure Impacts, White Paper (White Paper)
Source: TechRepublic
Category:Cloud
Posting Date: 2019-06-01
Publish Date: 2019-06-14
PDF   White Paper 
 

30) To Maximize the Cloud, Focus on the Network, White Paper (White Paper)
Source: Equinix
Category:Cloud
Posting Date: 2019-05-16
Publish Date: 2019-05-10
PDF   White Paper 
 

31) Exposed: Cyberattacks on Cloud Honeypots (White Paper)
Source: Sophos
Category:Cloud
Posting Date: 2019-04-10
Publish Date: 2019-04-09
PDF   White Paper 
 

32) 3 Common Multi-Cloud Challenges - and How to Solve Them (White Paper)
Source: BT
Category:Cloud
Posting Date: 2019-03-11
Publish Date: 2019-03-20
PDF   White Paper 
 

33) Top 10 Public Cloud Security Recommendations (White Paper)
Source: Palo Alto Networks
Category:Cloud
Posting Date: 2019-01-15
Publish Date: 2019-01-18
PDF   White Paper 
 

34) Serverless Computing: One Step Forward, Two Steps Back (White Paper)
Source: UC Berkeley
Category:Cloud
Posting Date: 2018-12-24
Publish Date: 2018-12-20
PDF   White Paper 
 

35) Strategically Achieving Multicloud Success (White Paper)
Source: F5/IBM
Category:Cloud
Posting Date: 2018-12-24
Publish Date: 2018-12-14
PDF   White Paper 
 

36) Top 10 Public Cloud Security Recommendations (White Paper)
Source: Palo Alto Networks
Category:Cloud
Posting Date: 2018-12-24
Publish Date: 2018-12-14
PDF   White Paper 
 

37) Key Considerations When Migrating Workloads to the Public Cloud (White Paper)
Source: Insight
Category:Cloud
Posting Date: 2018-12-24
Publish Date: 2018-12-11
PDF   White Paper 
 

38) Closing the Cloud Security Business Gap (White Paper)
Source: SalesForce
Category:Cloud
Posting Date: 2018-12-24
Publish Date: 2018-11-23
PDF   White Paper 
 

39) An Introduction To the New IT Approach Called Hybrid IT (White Paper)
Source: WEI
Category:Cloud
Posting Date: 2018-11-02
Publish Date: 2018-11-14
PDF   White Paper 
 

40) Containers At-Risk: A Review of 21,000 Cloud Environments (White Paper)
Source: Lacework, Inc.
Category:Cloud
Posting Date: 2018-11-02
Publish Date: 2018-10-29
PDF   White Paper 
 

41) Interview of Everything: Cisco CEO Chambers on White Boxes, SDN, Leadership and the Cloud (White Paper)
Source: Network World
Category:Cloud
Posting Date: 2015-05-16
Publish Date: 2015-05-05
PDF   White Paper 
 

42) Three Key Risks and Opportunities of GDPR (White Paper)
Source: comforte AG
Category:Compliance
Posting Date: 2019-11-07
Publish Date: 2019-11-07
PDF   White Paper 
 

43) CCPA and GDPR Comparison Chart (White Paper)
Source: BAKERHOSTETLER LLP
Category:Compliance
Author: Laura Jehl & Alan Friel
Posting Date: 2019-11-06
Publish Date: 2018-11-06
PDF   White Paper 
 

44) Know what to expect from the California Consumer Privacy Act 2018 (White Paper)
Source: Micro Focus
Category:Compliance
Posting Date: 2019-10-15
Publish Date: 2019-10-15
PDF   White Paper 
 

45) Architecting for HIPAA Security and Compliance on Amazon Web Services (White Paper)
Source: Amazon Web Services, Inc.
Category:Compliance
Posting Date: 2019-08-13
Publish Date: 2019-07-12
PDF   White Paper 
 

46) Examining the Data Trinity: Governance, Security and Privacy (White Paper)
Source: SandHill
Category:Compliance
Posting Date: 2019-06-20
Publish Date: 2019-06-20
PDF   White Paper 
 

47) The CIO's Guide to HIPAA Compliant Text Messaging, White Paper (White Paper)
Source: ecfirst
Category:Compliance
Posting Date: 2019-06-01
Publish Date: 2019-06-11
PDF   White Paper 
 

48) Guide to the General Data Protection Regulation, PDF 295 Pages (White Paper)
Source: Information Commissioners Office
Category:Compliance
Posting Date: 2019-04-10
Publish Date: 2019-04-08
PDF   White Paper 
 

49) Maximizing the Value of Your Data Privacy Investments (White Paper)
Source: Cisco Systems
Category:Compliance
Posting Date: 2019-02-12
Publish Date: 2019-01-27
PDF   White Paper 
 

50) The Complete Guide to GDPR (White Paper)
Source: TechWorld
Category:Compliance
Posting Date: 2019-01-15
Publish Date: 2019-01-17
PDF   White Paper 
 

51) GDPR for Security Practitioners, White Paper (White Paper)
Source: One CISO’s Opinion
Category:Compliance
Posting Date: 2018-10-23
Publish Date: 2018-09-30
PDF   White Paper 
 

52) The Rise of White-Box Storage (White Paper)
Source: NetworkComputing
Category:Compliance
Posting Date: 2014-09-19
Publish Date: 2014-08-27
PDF   White Paper 
 

53) Firewall Management:5 Challenges Every Company Must Address (White Paper)
Source: AlgoSec
Category:Connectivity
Posting Date: 2019-11-15
Publish Date: 2019-11-15
PDF   White Paper 
 

54) How to Prepare Your Network for IoT Data Challenges (White Paper)
Source: ComputerWeekly
Category:Connectivity
Author: Kristen Gloss, Associate Site Editor
Posting Date: 2019-10-24
Publish Date: 2019-10-24
PDF   White Paper 
 

55) The SD-WAN Implementation Handbook (White Paper)
Source: Sprint
Category:Connectivity
Posting Date: 2019-10-15
Publish Date: 2019-10-15
PDF   White Paper 
 

56) HopSphere Radius Security (White Paper)
Source: HOPZERO
Category:Connectivity
Author: Bill Alderson, CTO & Ben Haley SVP Product @ HOPZERO
Posting Date: 2019-08-30
Publish Date: 2019-02-25
PDF   White Paper 
 

57) SD-WAN as a Service: The Rise of Managed SD-WAN (White Paper)
Source: Nemertes
Category:Connectivity
Author: John Burke - CIO & Principal Research Analyst at Nemertes Resear
Posting Date: 2019-08-21
Publish Date: 2019-08-21
PDF   White Paper 
 

58) Is a SD-WAN Network as Secure as My MPLS Network? (White Paper)
Source: British Telecommunications
Category:Connectivity
Author: Keith Langridge
Posting Date: 2019-07-11
Publish Date: 2019-07-11
PDF   White Paper 
 

59) The Essential Guide to Workplace Modernization Through Next-Generation Unified Communications, White (White Paper)
Source: Cisco Sytems
Category:Connectivity
Posting Date: 2019-05-16
Publish Date: 2019-05-13
PDF   White Paper 
 

60) Network Operating System Advantages Extend to White Box Switching (White Paper)
Source: Search Networking
Category:Connectivity
Posting Date: 2019-03-11
Publish Date: 2019-03-04
PDF   White Paper 
 

61) OM5 and OM4+ Fiber (White Paper)
Source: Commscope
Category:Connectivity
Posting Date: 2018-11-02
Publish Date: 2018-11-16
PDF   White Paper 
 

62) 10 Things Your Next Firewall Must Do (White Paper)
Source: Palo Alto Networks
Category:Connectivity
Posting Date: 2018-10-23
Publish Date: 2018-10-25
PDF   White Paper 
 

63) Current State Of SD-WAN Implementation and Deployment (White Paper)
Source: Talari Networks
Category:Connectivity
Posting Date: 2018-10-23
Publish Date: 2018-10-08
PDF   White Paper 
 

64) The Future of Networking: It's In a White Box (White Paper)
Source: Network World
Category:Connectivity
Posting Date: 2017-03-11
Publish Date: 2017-03-20
PDF   White Paper 
 

65) Cloud Data Management Report (White Paper)
Source: Veeam Software
Category:Data
Posting Date: 2019-12-12
Publish Date: 2019-12-12
PDF   White Paper 
 

66) What is Artificial Intelligence (AI)? (White Paper)
Source: MIT - Massachusetts Institute of
Category:Data
Posting Date: 2019-12-12
Publish Date: 2019-12-12
PDF   White Paper 
 

67) The Definitive Guide to AIOps (White Paper)
Source: sweetcode.io
Category:Data
Author: CA Technologies
Posting Date: 2019-11-05
Publish Date: 2018-06-05
PDF   White Paper 
 

68) What is AIOps (White Paper)
Source: Red Hat
Category:Data
Author: Marcel Hild, Mgr SW Engineering @ Red Hat
Posting Date: 2019-11-05
Publish Date: 2018-03-25
PDF   White Paper 
 

69) The Complete Guide to :Machine Learning In the Enterprise (White Paper)
Source: TechRepublic
Category:Data
Author: IDG
Posting Date: 2019-09-24
Publish Date: 2017-11-24
PDF   White Paper 
 

70) AI Transforming the Enterprise - 8 Key AI Adoption Trends (White Paper)
Source: KPMG
Category:Data
Posting Date: 2019-09-13
Publish Date: 2019-09-13
PDF   White Paper 
 

71) Advancing Autonomous Operations Technologies for NASA Missions (White Paper)
Source: NASA
Category:Data
Author: Craig A. Cruzen & Jerry T. Thompson of NASA Flight Center
Posting Date: 2019-09-01
Publish Date: 2019-09-01
PDF   White Paper 
 

72) Technology For Civic Data Integration (White Paper)
Source: MetroLab Network
Category:Data
Posting Date: 2019-08-25
Publish Date: 2019-08-25
PDF   White Paper 
 

73) AI at the Edge: A GigaOm Research Byte (White Paper)
Source: GIGAOM
Category:Data
Author: Byron Reese
Posting Date: 2019-08-22
Publish Date: 2019-08-22
PDF   White Paper 
 

74) Data Protection Best Practices (White Paper)
Source: Industrial Internet Consortium
Category:Data
Author: Bassam Zarkout (IGnPower), Apurva Mohan (Schlumberger), Niheer P
Posting Date: 2019-07-24
Publish Date: 2019-07-22
PDF   White Paper 
 

75) A Scorecard Approach to Improving Data Quality (White Paper)
Source: PricewaterhouseCoopers LLP
Category:Data
Author: Phil Nousak, Rob Phelps
Posting Date: 2019-07-17
Publish Date: 2001-07-17
PDF   White Paper 
 

76) Using the k-Nearest Neighbors Algorithm (White Paper)
Source: Promethean Data Solutions
Category:Data
Author: Jim Adams
Posting Date: 2019-07-07
Publish Date: 2019-05-01
PDF   White Paper 
 

77) Managing Cross-Platform Database Environments (White Paper)
Source: Quest Software
Category:Data
Author: Jason Hall, Pini Dibask
Posting Date: 2019-07-03
Publish Date: 2019-07-03
PDF   White Paper 
 

78) Practical Insights on AI (White Paper)
Source: Infosys
Category:Data
Author: Rohit Mohindru, Prabhat Kohli
Posting Date: 2019-07-02
Publish Date: 2019-07-02
PDF   White Paper 
 

79) Data Governance, Data Quality and Artificial Intelligence in the Supply Chain, White Paper (White Paper)
Source: North Carolina State University
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-05-29
PDF   White Paper 
 

80) The Ultimate Guide to Embedded Analytics, White Paper (White Paper)
Source: Qlik
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-06-03
PDF   White Paper 
 

81) DataOps: An Authoritative Guide, White Paper (White Paper)
Source: StreamSets
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-06-03
PDF   White Paper 
 

82) Self-Service Data Prep: 10 Questions to Ask Yourself, White Paper (White Paper)
Source: Paxata
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-06-03
PDF   White Paper 
 

83) The Practical Executive's Guide to Data Loss Prevention, White Paper, (White Paper)
Source: ForcePoint
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-06-12
PDF   White Paper 
 

84) GE Aviation: From Data Silos To Self-Service, White Paper (White Paper)
Source: Dataiku
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-06-13
PDF   White Paper 
 

85) Harnessing Insights in Unstructured Data Through NLP And ML, White Paper (White Paper)
Source: EY
Category:Data
Posting Date: 2019-06-01
Publish Date: 2019-06-14
PDF   White Paper 
 

86) The Complete Guide to Machine Learning in the Enterprise, White Paper (White Paper)
Source: TechWorld
Category:Data
Posting Date: 2019-05-16
Publish Date: 2019-04-25
PDF   White Paper 
 

87) Building Blocks Of A Modern Analytics Platform, White Paper (White Paper)
Source: Tableau Software
Category:Data
Posting Date: 2019-04-10
Publish Date: 2019-04-12
PDF   White Paper 
 

88) Top Ten Big Data Trends, White Paper (White Paper)
Source: Tableau Software
Category:Data
Posting Date: 2019-04-10
Publish Date: 2019-04-12
PDF   White Paper 
 

89) Moving Data to the Cloud - Best Practices, White Paper (White Paper)
Source: Virtual Instruments
Category:Data
Posting Date: 2019-01-15
Publish Date: 2019-01-13
PDF   White Paper 
 

90) The Complete Guide To: Data Science (White Paper)
Source: TechWorld
Category:Data
Posting Date: 2018-12-24
Publish Date: 2018-12-03
PDF   White Paper 
 

91) Do You Really Need Online Data Backups? (White Paper)
Source: Enterprise Technology Services
Category:Data
Posting Date: 2018-10-23
Publish Date: 2018-10-24
PDF   White Paper 
 

92) Archiving vs. Backup - What's the Difference? (White Paper)
Source: solarwinds
Category:Data
Posting Date: 2018-10-23
Publish Date: 2018-10-08
PDF   White Paper 
 

93) The DevOps Roadmap for Security (White Paper)
Source: Signal Sciences
Category:DevOps
Author: James Wickett, Author
Posting Date: 2019-10-01
Publish Date: 2018-10-01
PDF   White Paper 
 

94) The Complete Guide to DevOps (White Paper)
Source: TechRepublic
Category:DevOps
Author: IDG
Posting Date: 2019-09-30
Publish Date: 2017-12-30
PDF   White Paper 
 

95) DevOps Forum Papers (Links to 19 DevOps White Papers) (White Paper)
Source: IT Revolution
Category:DevOps
Author: Gen Kin & Others
Posting Date: 2019-08-14
Publish Date: 2019-08-14
PDF   White Paper 
 

96) Agile Development for Application Security Managers (White Paper)
Source: Quotium
Category:DevOps
Posting Date: 2019-08-12
Publish Date: 2019-08-12
PDF   White Paper 
 

97) Automate Cloud & DevOps Initiatives Across All Phases (White Paper)
Source: BMC
Category:DevOps
Posting Date: 2019-06-26
Publish Date: 2019-06-26
PDF   White Paper 
 

98) How To Use DevOps, Agile To Drive Digital Transformation (White Paper)
Source: Pivotal
Category:DevOps
Author: Michael Cot
Posting Date: 2019-06-18
Publish Date: 2019-06-20
PDF   White Paper 
 

99) Avoid Silos by Shifting Left in a DevOps World (White Paper)
Source: Micro Focus
Category:DevOps
Posting Date: 2019-04-10
Publish Date: 2019-04-05
PDF   White Paper 
 

100) Agile Operations and the Three Ways (White Paper)
Source: CA Technologies
Category:DevOps
Posting Date: 2019-04-10
Publish Date: 2019-04-05
PDF   White Paper 
 

101) Why DevOps Matters, White Paper (White Paper)
Source: Splunk
Category:DevOps
Posting Date: 2019-04-10
Publish Date: 2019-04-18
PDF   White Paper 
 

102) The Complete Guide to: DevOps (White Paper)
Source: TechWorld
Category:DevOps
Posting Date: 2019-03-11
Publish Date: 2019-03-12
PDF   White Paper 
 

103) DevOps Done Right (White Paper) (White Paper)
Source: New Relic
Category:DevOps
Posting Date: 2019-03-11
Publish Date: 2019-03-20
PDF   White Paper 
 

104) SLAs: The Foundation for Stronger Customer Relationships (White Paper)
Source: ConnectWise
Category:Management
Posting Date: 2019-11-20
Publish Date: 2019-11-20
PDF   White Paper 
 

105) What’s Your IT Risk Approach? (White Paper)
Source: US Department of Education (DoE)
Category:Management
Author: Linda Wilbanks, Sr Cyber Risk Advisor @ Federal Student Aid DoE
Posting Date: 2019-11-13
Publish Date: 2018-04-13
PDF   White Paper 
 

106) Customer First. Customer Obsessed (White Paper)
Source: KPMG
Category:Management
Author: Julio Hernandez, David Conway, Urvashi Roe, Tim Knight, Tamsin J
Posting Date: 2019-11-04
Publish Date: 2019-11-04
PDF   White Paper 
 

107) Top 10 Reasons Why Employees Quit Their Job (White Paper)
Source: New Hampshire School Administrat
Category:Management
Author: Susan M. Heathfield, Human Resources Expert
Posting Date: 2019-09-05
Publish Date: 2015-08-22
PDF   White Paper 
 

108) The CIO's IT Transformation Survival Guide (White Paper)
Source: Rackspace
Category:Management
Author: Foreword by Ryan Neading, CIO @ Rackspace
Posting Date: 2019-09-05
Publish Date: 2019-09-05
PDF   White Paper 
 

109) IT Asset Management: Approach, Architecture, and Security Characteristics (White Paper)
Source: NIST
Category:Management
Author: National Cybersecurity Center of Excellence
Posting Date: 2019-08-15
Publish Date: 2015-10-15
PDF   White Paper 
 

110) CIO Leadership - Gartner Insights on How Leaders Innovate for Digital Success (White Paper)
Source: Gartner
Category:Management
Posting Date: 2019-07-11
Publish Date: 2019-07-11
PDF   White Paper 
 

111) Tech Certification Pay (White Paper)
Source: Foote Partners LLC
Category:Management
Author: David Foote
Posting Date: 2019-06-20
Publish Date: 2019-06-01
PDF   White Paper 
 

112) Thinking Architecturally Lead Technical Change Within Your Engineering Team, White Paper (White Paper)
Source: Pivotal
Category:Management
Author: Nathaniel Schutta
Posting Date: 2019-06-20
Publish Date: 2019-06-20
PDF   White Paper 
 

113) Deep Learning for Business Leaders, White Paper (White Paper)
Source: H2O.ai
Category:Management
Posting Date: 2019-06-12
Publish Date: 2019-05-18
PDF   White Paper 
 

114) The Real Cost of Recruitment Fraud, White Paper (White Paper)
Source: Crowe
Category:Management
Posting Date: 2019-06-01
Publish Date: 2019-06-16
PDF   White Paper 
 

115) The 21 Indispensable Qualities of a Leader, White Paper (White Paper)
Source: Purdue University
Category:Management
Posting Date: 2019-05-16
Publish Date: 2019-04-23
PDF   White Paper 
 

116) 4 Characteristics of a Modern Incident Response Plan, White Paper (White Paper)
Source: PagerDuty
Category:Management
Posting Date: 2019-04-10
Publish Date: 2019-04-12
PDF   White Paper 
 

117) The Complete Guide to the Biggest Tech Trends in 2019 (White Paper)
Source: TechWorld
Category:Management
Posting Date: 2019-03-11
Publish Date: 2019-02-25
PDF   White Paper 
 

118) The Executive's Practical Guide to Thriving In the Face of Evolving Cyber Risks (White Paper)
Source: Kip Boyle
Category:Management
Posting Date: 2019-03-11
Publish Date: 2019-02-26
PDF   White Paper 
 

119) How Continuous Monitoring is Revolutionizing Risk Management (White Paper)
Source: BitSight Technologies
Category:Management
Posting Date: 2019-03-11
Publish Date: 2019-03-18
PDF   White Paper 
 

120) IT Predictions and Anti-Predictions for 2019: Networking, Security, Cloud Communications (White Paper)
Source: Masergy
Category:Management
Posting Date: 2019-03-11
Publish Date: 2019-03-19
PDF   White Paper 
 

121) 2018 Cost of a Data Breach Study (White Paper)
Source: IBM, Ponemon Institute LLC
Category:Management
Posting Date: 2019-01-15
Publish Date: 2018-12-22
PDF   White Paper 
 

122) How To Execute on Strategy: Getting Great Ideas from the Whiteboard to the Boardroom (White Paper)
Source: ZDnet
Category:Management
Posting Date: 2017-12-24
Publish Date: 2017-12-20
PDF   White Paper 
 

123) Ethical Hackers: How Hiring White Hats Can Help Defend Your Organization Against the Bad Guys (White Paper)
Source: TechRepublic
Category:Management
Posting Date: 2016-07-21
Publish Date: 2016-06-20
PDF   White Paper 
 

124) Patch Management Best Practices (White Paper)
Source: ConnectWise
Category:Operations
Posting Date: 2019-11-20
Publish Date: 2019-11-20
PDF   White Paper 
 

125) 5 Steps to Successfully Deploying a Healthy CMDB (White Paper)
Source: ServiceNow
Category:Operations
Posting Date: 2019-11-15
Publish Date: 2018-11-15
PDF   White Paper 
 

126) Using AIOps and Cognitive Patterns to Optimize Operations (White Paper)
Source: ACCENTURE
Category:Operations
Author: IDC
Posting Date: 2019-11-15
Publish Date: 2019-09-25
PDF   White Paper 
 

127) Rack and Roll: Explaining the Surging Demand for Integrated Racks (White Paper)
Source: Vertiv
Category:Operations
Posting Date: 2019-11-13
Publish Date: 2019-11-12
PDF   White Paper 
 

128) Gartner: Magic Quadrant for IT Service Management Tools (White Paper)
Source: Gartner
Category:Operations
Author: Analysts Rich Doheny, Chris Matchett & Siddharth Shetty @ Gartne
Posting Date: 2019-11-08
Publish Date: 2019-11-08
PDF   White Paper 
 

129) Micro Data Centers Solutions (White Paper)
Source: Anixter Inc
Category:Operations
Posting Date: 2019-11-06
Publish Date: 2017-11-06
PDF   White Paper 
 

130) Solving Edge Computing Infrastructure Challenges (White Paper)
Source: Schneider Electric
Category:Operations
Author: Patrick Donovan & Wendy Torell of Schneider Electric
Posting Date: 2019-10-30
Publish Date: 2019-10-30
PDF   White Paper 
 

131) Ready Your Infrastructure for the Always-On World (White Paper)
Source: Stratus Technologies
Category:Operations
Posting Date: 2019-10-16
Publish Date: 2019-10-16
PDF   White Paper 
 

132) Top 5 Log Sources You Should Be Ingesting but Probably Aren’t (White Paper)
Source: ReliaQuest
Category:Operations
Author: Joe Partlow, CTO @ ReliaQuest
Posting Date: 2019-10-15
Publish Date: 2019-10-15
PDF   White Paper 
 

133) Best Practices for Managing 3rd Party Vendor Remote Access (White Paper)
Source: SecureLink
Category:Operations
Posting Date: 2019-09-23
Publish Date: 2014-09-23
PDF   White Paper 
 

134) 20 Point Checklist for Vetting a Managed Hosting Provider (White Paper)
Source: LIQUID WEB
Category:Operations
Posting Date: 2019-08-29
Publish Date: 2019-08-29
PDF   White Paper 
 

135) Here’s Why You Should Have a Disaster Recovery Plan (White Paper)
Source: ENTERPRISE TECHNOLOGY SERVICES
Category:Operations
Author: Jim Siragusa
Posting Date: 2019-08-15
Publish Date: 2019-08-15
PDF   White Paper 
 

136) Power Monitoring and Metering: (White Paper)
Source: RARITAN
Category:Operations
Posting Date: 2019-08-14
Publish Date: 2019-08-14
PDF   White Paper 
 

137) Guidance on What to Do with an Older UPS (White Paper)
Source: Schneider Electric
Category:Operations
Author: John Gray, Patrick Donovan
Posting Date: 2019-08-12
Publish Date: 2015-08-12
PDF   White Paper 
 

138) A Framework for How to Modernize Data Center Facility Infrastructure (White Paper)
Source: Schneider Electric
Category:Operations
Author: Patrick Donovan, Wendy Torell
Posting Date: 2019-07-14
Publish Date: 2019-07-14
PDF   White Paper 
 

139) The Complete Guide to OpenStack (White Paper)
Source: TechWorld
Category:Operations
Posting Date: 2019-07-08
Publish Date: 2019-05-30
PDF   White Paper 
 

140) The Complete Guide to Online Backup (White Paper)
Source: SherWeb
Category:Operations
Posting Date: 2019-06-30
Publish Date: 2019-06-30
PDF   White Paper 
 

141) 6 Steps to Successful Capacity Management (White Paper)
Source: BMC
Category:Operations
Posting Date: 2019-06-26
Publish Date: 2019-06-26
PDF   White Paper 
 

142) The Drivers and Benefits of Edge Computing (White Paper)
Source: Schneider Electric
Category:Operations
Author: Steven Carlini
Posting Date: 2019-06-24
Publish Date: 2019-06-24
PDF   White Paper 
 

143) IT Asset Management (White Paper)
Source: ServiceNow
Category:Operations
Posting Date: 2019-06-21
Publish Date: 2019-06-21
PDF   White Paper 
 

144) Best Practices for Implementing Software Asset Management, White Paper (White Paper)
Source: Cherwell
Category:Operations
Posting Date: 2019-06-17
Publish Date: 2019-06-17
PDF   White Paper 
 

145) Data Governance, Data Quality and Artificial Intelligence In the Supply Chain, White Paper (White Paper)
Source: North Carolina State University
Category:Operations
Author: Rob Handfield, Balaji Soundararajan, Joseph Yacura, IBM
Posting Date: 2019-06-17
Publish Date: 2019-06-17
PDF   White Paper 
 

146) The Complete Guide To IT Monitoring (White Paper)
Source: TechWorld
Category:Operations
Posting Date: 2019-06-12
Publish Date: 2019-05-15
PDF   White Paper 
 

147) The Power of Predictive IT, White Paper (White Paper)
Source: Harvard Business Review
Category:Operations
Posting Date: 2019-06-12
Publish Date: 2019-05-15
PDF   White Paper 
 

148) Get Better, Faster, Cheaper IT Service Through AI Capabilities, White Paper (White Paper)
Source: servicenow
Category:Operations
Posting Date: 2019-06-12
Publish Date: 2019-05-15
PDF   White Paper 
 

149) How a Healthy CMDB Helps You to Deliver Great Business Service Quality, White Paper (White Paper)
Source: servicenow
Category:Operations
Posting Date: 2019-06-12
Publish Date: 2019-05-15
PDF   White Paper 
 

150) Achieving Maximum Uptime Isn't Glamorous: Testing, Planning, Security Help Ensure Ops Success, White (White Paper)
Source: Rhythmic
Category:Operations
Posting Date: 2019-06-12
Publish Date: 2019-05-23
PDF   White Paper 
 

151) Top 6 Cloud Backup Benefits, White Paper (White Paper)
Source: Veeam
Category:Operations
Posting Date: 2019-06-01
Publish Date: 2019-05-29
PDF   White Paper 
 

152) 20 Point Checklist for Vetting Hosting Options, White Paper, (White Paper)
Source: Liquid Web
Category:Operations
Posting Date: 2019-06-01
Publish Date: 2019-06-03
PDF   White Paper 
 

153) 4 Business Continuity Planning Essentials, White Paper (White Paper)
Source: Datto
Category:Operations
Posting Date: 2019-05-16
Publish Date: 2019-05-12
PDF   White Paper 
 

154) Threats to Manufacturing Environments in the Era of Industry 4.0, White Paper (White Paper)
Source: Trend Micro
Category:Operations
Posting Date: 2019-04-10
Publish Date: 2019-04-17
PDF   White Paper 
 

155) The Do's and Don'ts of Establishing SLAs (White Paper)
Source: ConnectWise
Category:Operations
Posting Date: 2019-03-11
Publish Date: 2019-03-13
PDF   White Paper 
 

156) Backup vs. Business Continuity (White Paper)
Source: Datto
Category:Operations
Posting Date: 2019-03-11
Publish Date: 2019-03-13
PDF   White Paper 
 

157) Relationship Between Virtualization & HCI, White Paper (White Paper)
Source: Hitachi
Category:Operations
Posting Date: 2019-03-11
Publish Date: 2019-03-20
PDF   White Paper 
 

158) Moving your Infrastructure to the Cloud (White Paper)
Source: Diversity Limited
Category:Operations
Posting Date: 2019-01-15
Publish Date: 2019-01-13
PDF   White Paper 
 

159) The Complete Guide to Hyperconverged Infrastructure (White Paper)
Source: TechWorld
Category:Operations
Posting Date: 2019-01-15
Publish Date: 2019-01-09
PDF   White Paper 
 

160) The Complete Guide To: Hyperconverged Infrastructure (White Paper)
Source: TechWorld
Category:Operations
Posting Date: 2018-12-24
Publish Date: 2018-12-17
PDF   White Paper 
 

161) Data Center Power Distribution and Capacity Planning (White Paper)
Source: Raritan
Category:Operations
Posting Date: 2018-11-02
Publish Date: 2018-11-22
PDF   White Paper 
 

162) Bridging the Divide between Software Developers and Operators using Logs (White Paper)
Source: Queen’s University, Canada
Category:Operations
Posting Date: 2018-11-02
Publish Date: 2018-11-17
PDF   White Paper 
 

163) A 6-Step Approach For ITSM And ITOM To Work Better Together (White Paper)
Source: servicenow
Category:Operations
Posting Date: 2018-11-02
Publish Date: 2018-11-08
PDF   White Paper 
 

164) Infrastructure Monitoring Software: Can You Afford It? (White Paper)
Source: NetApp
Category:Operations
Posting Date: 2018-11-02
Publish Date: 2018-10-31
PDF   White Paper 
 

165) Hyperconverged Infrastructure as a Catalyst for Change (White Paper)
Source: Freeform Dynamics/VMware
Category:Operations
Posting Date: 2018-11-02
Publish Date: 2018-10-31
PDF   White Paper 
 

166) Software-Defined Data Center - Get The Most Out of Today's Infrastructure (White Paper)
Source: IBM
Category:Operations
Posting Date: 2018-10-23
Publish Date: 2018-10-25
PDF   White Paper 
 

167) Edge Data Centers (White Paper)
Source: TIA
Category:Operations
Posting Date: 2018-10-23
Publish Date: 2018-10-25
PDF   White Paper 
 

168) With New Dynamic Capabilities, Will Whitelisting Finally Catch on? (White Paper)
Source: IT World
Category:Potpourri
Posting Date: 2017-06-12
Publish Date: 2017-06-19
PDF   White Paper 
 

169) Is There a White-Box Switch In Your Future? (White Paper)
Source: Network World
Category:Potpourri
Posting Date: 2015-10-23
Publish Date: 2015-10-12
PDF   White Paper 
 

170) World's First White Lasers Demonstrated (White Paper)
Source: Science Daily
Category:Potpourri
Posting Date: 2015-08-01
Publish Date: 2015-07-29
PDF   White Paper 
 

171) Inside White-Box Switches (White Paper)
Source: NetworkComputing
Category:Potpourri
Posting Date: 2014-08-01
Publish Date: 2014-08-13
PDF   White Paper 
 

172) Preparing For a Data Breach: Not If, But When (White Paper)
Source: A-LIGN
Category:Security
Author: Petar Besalev, SVP Cybersecurity and Privacy Services @ A-LIGN
Posting Date: 2019-12-13
Publish Date: 2019-07-11
PDF   White Paper 
 

173) The Cybersecurity Insight Report (White Paper)
Source: CDW
Category:Security
Posting Date: 2019-12-07
Publish Date: 2018-12-07
PDF   White Paper 
 

174) How Ransomware Attacks (White Paper)
Source: Sophos
Category:Security
Author: Mark Loman, Director, Engineering @ Sophos
Posting Date: 2019-11-16
Publish Date: 2019-11-16
PDF   White Paper 
 

175) 2019 Insider Threat Report (White Paper)
Source: Haystax
Category:Security
Posting Date: 2019-11-09
Publish Date: 2019-11-09
PDF   White Paper 
 

176) Five Steps to a Zero Trust Security Strategy (White Paper)
Source: IONIC
Category:Security
Author: Stephanie Balaouras, Forreste VP Research Director for Security
Posting Date: 2019-11-08
Publish Date: 2019-11-08
PDF   White Paper 
 

177) The Ultimate Guide to CISSP (White Paper)
Source: (ISC)²
Category:Security
Posting Date: 2019-10-30
Publish Date: 2019-10-30
PDF   White Paper 
 

178) The Threat Intelligence Handbook: Moving Toward a Security Intelligence Program.” (White Paper)
Source: WebRoot
Category:Security
Author: Gartner
Posting Date: 2019-10-29
Publish Date: 2019-10-29
PDF   White Paper 
 

179) Endpoint Security Report (White Paper)
Source: NYOTRON
Category:Security
Author: Holger Schulze, Founder & CEO @ Cybersecurity Insiders
Posting Date: 2019-10-28
Publish Date: 2018-10-28
PDF   White Paper 
 

180) Managed Detection and Response (MDR) Services (White Paper)
Source: AT&T Cybersecurity
Category:Security
Posting Date: 2019-10-25
Publish Date: 2019-10-25
PDF   White Paper 
 

181) Stratis Blockchain Solutions (White Paper)
Source: Stratis Platform
Category:Security
Author: Chris Trew, Guy Brandon and Nicolas Dorier
Posting Date: 2019-10-25
Publish Date: 2019-10-25
PDF   White Paper 
 

182) Datto’s Global State of the Channel Ransomware Report (White Paper)
Source: Datto
Category:Security
Posting Date: 2019-10-24
Publish Date: 2019-10-24
PDF   White Paper 
 

183) Streamlining the Major Incident Resolution Process: Define, Plan, Staff and Communicate (White Paper)
Source: everbridge
Category:Security
Posting Date: 2019-10-24
Publish Date: 2019-10-24
PDF   White Paper 
 

184) The Essential Cybersecurity Toolkit for SMBs (White Paper)
Source: Datto
Category:Security
Posting Date: 2019-10-22
Publish Date: 2019-10-22
PDF   White Paper 
 

185) CIS Controls Version 7 (White Paper)
Source: Center for Internet Security
Category:Security
Posting Date: 2019-10-20
Publish Date: 2019-10-20
PDF   White Paper 
 

186) CIS 20 (White Paper)
Source: Center for Internet Security
Category:Security
Posting Date: 2019-10-20
Publish Date: 2019-10-20
PDF   White Paper 
 

187) Securing the Digital Business (White Paper)
Source: RSA
Category:Security
Author: Gartner, Inc.
Posting Date: 2019-10-09
Publish Date: 2019-10-09
PDF   White Paper 
 

188) There is No Peacetime from Advanced DDoS Attacks (White Paper)
Source: NetScout Systems
Category:Security
Posting Date: 2019-10-09
Publish Date: 2018-09-18
PDF   White Paper 
 

189) The Fundamental Guide to Building a Better Security Operation Center (White Paper)
Source: Cisco Systems
Category:Security
Posting Date: 2019-10-07
Publish Date: 2015-09-10
PDF   White Paper 
 

190) The US Department of Homeland Security's Office 365 Security Best Practices (White Paper)
Source: ManageEngine
Category:Security
Posting Date: 2019-10-03
Publish Date: 2019-10-03
PDF   White Paper 
 

191) Guide to Cybersecurity (White Paper)
Source: Law Society of Scotland
Category:Security
Posting Date: 2019-10-03
Publish Date: 2019-10-03
PDF   White Paper 
 

192) SIEM +Threat Intelligence: Quickly Identify the Threats that Matter to You (White Paper)
Source: ThreatConnect
Category:Security
Posting Date: 2019-10-01
Publish Date: 2019-10-01
PDF   White Paper 
 

193) Market Guide for User and Entity Behavior Analytics (White Paper)
Source: Gartner
Category:Security
Author: Gorka Sadowski, Avivah Litan, Toby Bussa, Tricia Phillips
Posting Date: 2019-09-27
Publish Date: 2018-04-23
PDF   White Paper 
 

194) Streamlining Threat Detection Through User Behavior Analytics (White Paper)
Source: ADAudit Plus
Category:Security
Posting Date: 2019-09-24
Publish Date: 2019-09-24
PDF   White Paper 
 

195) Our Own Worst Enemy: Tackling the Social Engineering Problem (White Paper)
Source: RSA Conference
Category:Security
Author: Ira Winkler, Lance Hayden, Britta Glade, Dr Hugh Thompson
Posting Date: 2019-09-16
Publish Date: 2018-12-18
PDF   White Paper 
 

196) Your First IT Security Job: Three Things that Might Surprise You (White Paper)
Source: Hewlett Packard Enterprise
Category:Security
Author: Josh Fruhlinger, Contributing Writer
Posting Date: 2019-09-16
Publish Date: 2019-07-19
PDF   White Paper 
 

197) Enterprise Endpoint Protection Buyers Guide (White Paper)
Source: Malwarebytes
Category:Security
Posting Date: 2019-09-13
Publish Date: 2019-09-13
PDF   White Paper 
 

198) Everything You Always Wanted to Know About Security at the Edge But Were Afraid to Ask (White Paper)
Source: Akamai
Category:Security
Posting Date: 2019-09-13
Publish Date: 2019-05-13
PDF   White Paper 
 

199) How To Develop the Best Plan of Attack™ (White Paper)
Source: Endgame
Category:Security
Author: Mark Dufresne, VP of Research @ Endgame
Posting Date: 2019-09-04
Publish Date: 2019-09-04
PDF   White Paper 
 

200) Peer-to-Peer Financial Protection based on Blockchain Technology (White Paper)
Source: Sagittae
Category:Security
Author: Robert Volkert, CEO & Founder @ Sagittae
Posting Date: 2019-09-02
Publish Date: 2019-09-27
PDF   White Paper 
 

201) Cognitions of a Cybercriminal (White Paper)
Source: Carbon Black
Category:Security
Author: Tom Kellermann Cybersecurity Officer@ Carbon Black
Posting Date: 2019-08-30
Publish Date: 2019-07-31
PDF   White Paper 
 

202) 8 Types of Digital Risk and How to Manage Them (White Paper)
Source: RSA
Category:Security
Posting Date: 2019-08-28
Publish Date: 2019-08-28
PDF   White Paper 
 

203) Improving the Effectiveness of the Security Operations Center (White Paper)
Source: Ponemon Institute
Category:Security
Author: Devo Technology
Posting Date: 2019-08-26
Publish Date: 2019-06-12
PDF   White Paper 
 

204) 3 Ways to Fight Fraud (White Paper)
Source: Vantiv
Category:Security
Posting Date: 2019-08-24
Publish Date: 2016-08-24
PDF   White Paper 
 

205) Countering Escalating Cyberthreats with a New Security Architecture (White Paper)
Source: Gigamon
Category:Security
Posting Date: 2019-08-21
Publish Date: 2019-08-21
PDF   White Paper 
 

206) Framework for Improving Critical Infrastructure Cybersecurity (White Paper)
Source: NIST
Category:Security
Posting Date: 2019-08-20
Publish Date: 2018-04-16
PDF   White Paper 
 

207) The Sharing Economy – The Seven Challenges of Online Identity Verification (White Paper)
Source: EVIDENT
Category:Security
Posting Date: 2019-08-19
Publish Date: 2019-08-19
PDF   White Paper 
 

208) The Threat Intelligence Handbook (White Paper)
Source: WebRoot
Category:Security
Author: Gartner
Posting Date: 2019-08-15
Publish Date: 2019-08-15
PDF   White Paper 
 

209) Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security (White Paper)
Source: CrowdStrike
Category:Security
Posting Date: 2019-08-13
Publish Date: 2017-08-16
PDF   White Paper 
 

210) Identity Powered Security (White Paper)
Source: APORETO
Category:Security
Posting Date: 2019-08-12
Publish Date: 2019-08-12
PDF   White Paper 
 

211) What Every Security Leader Needs to Know Handbook (White Paper)
Source: HackerOne
Category:Security
Posting Date: 2019-08-12
Publish Date: 2019-08-12
PDF   White Paper 
 

212) Manage Risk By Protecting Apps, Data and Usage (White Paper)
Source: Citrixx
Category:Security
Posting Date: 2019-08-04
Publish Date: 2015-08-04
PDF   White Paper 
 

213) Buyers Guide: Identity, Access and API Management Solutions (White Paper)
Source: CA Technologies
Category:Security
Author: Steve Firestone
Posting Date: 2019-07-12
Publish Date: 2019-07-12
PDF   White Paper 
 

214) APAC Guide Yo Plugging Endpoint Security Gaps (White Paper)
Source: ComputerWeekly
Category:Security
Posting Date: 2019-07-11
Publish Date: 2019-07-11
PDF   White Paper 
 

215) Data-at-rest Encryption (White Paper)
Source: DATACORE SOFTWARE
Category:Security
Posting Date: 2019-07-09
Publish Date: 2019-07-09
PDF   White Paper 
 

216) Why, When & How to Implement Employee Monitoring (White Paper)
Source: Interfocus
Category:Security
Posting Date: 2019-07-09
Publish Date: 2019-07-09
PDF   White Paper 
 

217) Zero Trust Security: A New Paradigm for a Changing World (White Paper)
Source: CENTRIFY
Category:Security
Posting Date: 2019-07-09
Publish Date: 2019-07-09
PDF   White Paper 
 

218) Law Firm CyberSecurity (White Paper)
Source: Discovery Computers and Forensic
Category:Security
Author: Rod Mac Kenzie
Posting Date: 2019-07-08
Publish Date: 2019-07-08
PDF   White Paper 
 

219) Ransomware To Pay Or Not To Pay (White Paper)
Source: JLT Specialty Limited
Category:Security
Author: Sarah Stephens
Posting Date: 2019-07-06
Publish Date: 2019-02-28
PDF   White Paper 
 

220) Cyber Security Report (White Paper)
Source: CSC
Category:Security
Author: Ken Linscott, Quinn Taggart, Letitia Thian
Posting Date: 2019-07-05
Publish Date: 2019-06-26
PDF   White Paper 
 

221) Ransomware: to Pay Or Not to Pay (White Paper)
Source: JLT Specialty Limited
Category:Security
Author: Sarah Stephens
Posting Date: 2019-06-17
Publish Date: 2019-06-17
PDF   White Paper 
 

222) 7 Experts on Threat and Vulnerability Management, White Paper (White Paper)
Source: RiskSense, Inc
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-16
PDF   White Paper 
 

223) Medical Device Encryption & Security, White Paper (White Paper)
Source: NetLib Security
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-08
PDF   White Paper 
 

224) The Growing Consequences of Security Breaches, White Paper (White Paper)
Source: Rhythmic
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-23
PDF   White Paper 
 

225) Beginners Guide to Encryption and Key Management, White Paper (White Paper)
Source: NetLib Security
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-23
PDF   White Paper 
 

226) NIST Recommendation for Key Management: Part 2: Best Practices, White Paper (White Paper)
Source: NIST
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-27
PDF   White Paper 
 

227) NIST Recommendation for Key Management Part 1: General, White Paper (White Paper)
Source: NIST
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-26
PDF   White Paper 
 

228) NIST Recommendation for Key Management Part 3: Application-Specific, White Paper (White Paper)
Source: NIST
Category:Security
Posting Date: 2019-06-12
Publish Date: 2019-05-27
PDF   White Paper 
 

229) Choosing the Right Security Orchestration, Automation, and Response Platform, White Paper (White Paper)
Source: Splunk
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-31
PDF   White Paper 
 

230) Evaluating Identity Verification Solutions, White Paper (White Paper)
Source: onfido
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-01
PDF   White Paper 
 

231) Learning to Rank Strings Output for Speedier Malware Analysis, Blog (White Paper)
Source: Fireeye
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-02
PDF   White Paper 
 

232) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 1, What Is Securit (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-08
PDF   White Paper 
 

233) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 2 - Usability and (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

234) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 3 - Protocols, Whi (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

235) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 4 - Access Control (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

236) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 6 - Distributed Sy (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

237) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 5 - Cryptography, (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

238) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 7 - Economics, Whi (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

239) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 8 - Multilevel Sec (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

240) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 9 - Multilateral S (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

241) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 10 - Banking and B (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

242) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 11 - Physical Secu (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

243) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 12 - Monitoring an (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

244) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 13 - Nuclear Comma (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

245) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 14 - Security Prin (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

246) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 15 - Biometrics, W (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

247) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 16 - Physical Tamp (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

248) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 17 - Emission Secu (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

249) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 18 - API Attacks, (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

250) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 19 - Electronic an (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

251) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 20 - Telecom Syste (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

252) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 21, Network Attack (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

253) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 22 - Copyright and (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

254) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 23 - The Bleeding (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

255) Security Engineering: A Guide to Building Dependable Distributed Systems, 3 Chapter 24 - Terror, Jus (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

256) The Smarter SMB's Guide to Ransomware, White Paper (White Paper)
Source: Barracuda
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-06
PDF   White Paper 
 

257) A Beginner's Guide To Ransomware, White Paper (White Paper)
Source: Unitrends
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-06
PDF   White Paper 
 

258) The Comprehensive Guide to Ransomware Protection, White Paper (White Paper)
Source: Invenio IT
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-06
PDF   White Paper 
 

259) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 25 - Managing the (White Paper)
Source: University of Cambridge
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

260) Defending Against Crypto-Ransomware, White Paper (White Paper)
Source: netwrix
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-11
PDF   White Paper 
 

261) Fighting ATO Attacks, White Paper (White Paper)
Source: riskified
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-12
PDF   White Paper 
 

262) Understanding DNS: Essential Knowledge for All IT Professionals, White Paper (White Paper)
Source: AppliedTrust
Category:Security
Posting Date: 2019-06-01
Publish Date: 2019-06-13
PDF   White Paper 
 

263) Encryption: A Guide for Business Leaders. White Paper (White Paper)
Source: TechRepublic
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-04-29
PDF   White Paper 
 

264) Security as a Service Has Arrived, White Paper (White Paper)
Source: Armour
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-05-01
PDF   White Paper 
 

265) Authentication for Your Ever-Changing Needs, White Paper (White Paper)
Source: Micro Focus
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-05-01
PDF   White Paper 
 

266) 2019 Webroot Threat Report, White Paper (White Paper)
Source: WebRoot
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-05-03
PDF   White Paper 
 

267) Explore Why Identity Proofing is Key to Avoiding Identity Theft, White Paper (White Paper)
Source: Evident
Category:Security
Posting Date: 2019-05-16
Publish Date: 2019-05-06
PDF   White Paper 
 

268) Why Security Awareness Training is an Essential Part of Your Security Strategy (White Paper)
Source: WebRoot
Category:Security
Posting Date: 2019-04-10
Publish Date: 2019-03-25
PDF   White Paper 
 

269) A Guide To Assessing Security Maturity, White Paper (White Paper)
Source: InformationWeek
Category:Security
Posting Date: 2019-04-10
Publish Date: 2019-04-09
PDF   White Paper 
 

270) Becoming the Security Team Your Business Needs, White Paper (White Paper)
Source: BAE Systems
Category:Security
Posting Date: 2019-04-10
Publish Date: 2019-04-30
PDF   White Paper 
 

271) Blockchain White Paper (White Paper)
Source: National Archives
Category:Security
Posting Date: 2019-03-11
Publish Date: 2019-03-05
PDF   White Paper 
 

272) Distributed Denial Of Service Threats: Risks, Mitigation, and Best Practices (White Paper)
Source: Cisco Systems
Category:Security
Posting Date: 2019-03-11
Publish Date: 2019-03-21
PDF   White Paper 
 

273) Security Orchestration and Incident Response (White Paper)
Source: TechRepublic
Category:Security
Posting Date: 2019-02-12
Publish Date: 2019-02-15
PDF   White Paper 
 

274) Investigation or Exasperation? The State of Security Operations (White Paper)
Source: IDC
Category:Security
Posting Date: 2019-02-12
Publish Date: 2019-02-04
PDF   White Paper 
 

275) 15 Skills You Need to Be a Whitehat Hacker And Make Up to $145K Per Year (White Paper)
Source: TechRepublic
Category:Security
Posting Date: 2018-12-24
Publish Date: 2018-12-15
PDF   White Paper 
 

276) The State Of Email Security (White Paper)
Source: Mimecast Limited
Category:Security
Posting Date: 2018-12-24
Publish Date: 2018-12-14
PDF   White Paper 
 

277) Blockchain Applications for Identity Verification (White Paper)
Source: Evident
Category:Security
Posting Date: 2018-12-24
Publish Date: 2018-11-28
PDF   White Paper 
 

278) Fundamental Concepts of Cyber Resilience: Introduction and Overview (White Paper)
Source: US Army R&D Center
Category:Security
Posting Date: 2018-12-24
Publish Date: 2018-11-26
PDF   White Paper 
 

279) Would You Know if You've Been Breached? (White Paper)
Source: thycotic
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-11-18
PDF   White Paper 
 

280) AI and Cybersecurity for Dummies (White Paper)
Source: IBM
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-11-16
PDF   White Paper 
 

281) Zero Trust Security For Dummies (White Paper)
Source: Centrify
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-11-09
PDF   White Paper 
 

282) Gaining Ground On The Cyber Attacker (White Paper)
Source: Accenture
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-11-04
PDF   White Paper 
 

283) Internet Security Threat Report (White Paper)
Source: Symantec
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-10-29
PDF   White Paper 
 

284) The Changing Face of Cyber Attacks (White Paper)
Source: Neustar, Inc.
Category:Security
Posting Date: 2018-11-02
Publish Date: 2018-10-29
PDF   White Paper 
 

285) The Five News Headlines You Don't Want to Be About YOUR Organization (White Paper)
Source: Juniper Networks
Category:Security
Posting Date: 2018-10-23
Publish Date: 2018-10-25
PDF   White Paper 
 

286) Collaborating for Change in Cybersecurity (White Paper)
Source: ATLAS Council
Category:Security
Posting Date: 2018-10-23
Publish Date: 2018-10-12
PDF   White Paper 
 

287) Vendor Security Assessment: 40 Questions To Address (White Paper)
Source: BitSight Technologies
Category:Security
Posting Date: 2018-10-23
Publish Date: 2018-10-10
PDF   White Paper 
 

288) IoT Security Needs a White Knight (White Paper)
Source: Network World
Category:Security
Posting Date: 2018-01-15
Publish Date: 2018-01-15
PDF   White Paper 
 

289) Quantum Computing Has the Cybersecurity World White-Knuckled (White Paper)
Source: ComputerWorld
Category:Security
Posting Date: 2016-09-19
Publish Date: 2016-09-07
PDF   White Paper 
 

290) At What Point Do White Hat Hackers Cross the Ethical Line? (White Paper)
Source: Network World
Category:Security
Posting Date: 2015-08-01
Publish Date: 2015-08-14
PDF   White Paper 
 

291) CISOs Look to Hire White Hat Hackers to Head Off Security Breaches (White Paper)
Source: IT World
Category:Security
Posting Date: 2014-06-12
Publish Date: 2014-06-04
PDF   White Paper 
 

292) Gartner: Magic Quadrant for Distributed File Systems and Object Storage (White Paper)
Source: Gartner
Category:Storage
Author: Analysts Julia Palmer, Raj Bala, Chandra Mukhyala @ Gartner
Posting Date: 2019-11-08
Publish Date: 2019-09-30
PDF   White Paper 
 

293) Block-Level Tiering vs. File-Level Tiering (White Paper)
Source: Storage Newsletter
Category:Storage
Author: Komprise, Inc.
Posting Date: 2019-10-31
Publish Date: 2019-10-31
PDF   White Paper 
 

294) An Introduction to NVMe (White Paper)
Source: SEAGATE
Category:Storage
Author: Hermann Strass
Posting Date: 2019-08-18
Publish Date: 2016-08-18
PDF   White Paper 
 

295) Agility, Efficiency, Flexibility: Mid-Market Businesses Take Advantage of Flash Storage (White Paper)
Source: IBM
Category:Storage
Posting Date: 2019-07-22
Publish Date: 2019-07-22
PDF   White Paper 
 

296) Security Engineering: A Guide to Building Dependable Distributed Systems, Chapter 27 - Conclusions, (White Paper)
Source: University of Cambridge
Category:Storage
Posting Date: 2019-06-01
Publish Date: 2019-05-30
PDF   White Paper 
 

297) NVM PM Remote Access for High Availability, White Paper (White Paper)
Source: SNIA
Category:Storage
Posting Date: 2019-06-01
Publish Date: 2019-06-12
PDF   White Paper 
 

298) An Introduction to NVMe, White Paper (White Paper)
Source: Seagate
Category:Storage
Posting Date: 2019-04-10
Publish Date: 2019-04-11
PDF   White Paper 
 

299) The State of Software-Defined Storage, Hyperconverged and Cloud Storage (White Paper)
Source: DataCore Software
Category:Storage
Posting Date: 2019-02-12
Publish Date: 2019-01-28
PDF   White Paper 
 

300) NVMe Over Fabrics Agenda (White Paper)
Source: nvm EXPRESS
Category:Storage
Posting Date: 2019-01-15
Publish Date: 2019-01-16
PDF   White Paper 
 


73 Articles Added in the Last 7 Days
14,897 Articles with 16,199 subscribers
3,894 C-Level and 8,591 LinkedIn Connections


"Never let anyone tell you no who doesn't have the power to say yes."
- Eleanor Roosevelt, UN diplomat, Humanitarian, US First Lady (1884-1962) -
The only IT and Data Center Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT and DC Professionals at all levels. We harvest and compile 40+ of the absolute best technical articles with no pop-up ads or sales angles. We address everyday IT and Data Center issues involving:
  • Reducing Business and IT Risk
  • Improving Infrastructure Quality of Service
  • Increasing Availability and Reliability
  • Reducing Application Response Time
  • Increasing Business Productivity and Agility
  • Improving Server, Storage and Networks
  • Improving Security and Compliance
  • Protecting, Preserving and Restoring Data
  • Improving Regulatory Compliance
  • Reducing Audit Errors
  • Reducing IT and DC Costs
  • Developing Proactive Business Solutions
Header
Copyright © 2019 Promethean Data Solutions, Inc.   -   Warren Avery   -   602-463-6558   -   wavery@ITWeeklyNewsletter.com