• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

white list

Results 1 - 25 of 115Sort Results By: Published Date | Title | Company Name
By: Freshdesk     Published Date: Aug 15, 2016
Choosing the right helpdesk software for your team can be a path so perilous that even Hercules’ labours pale in comparison. But the truth is, if you have the right information, it doesn’t have to be that hard. In this whitepaper, we discuss some of the core things you should know when you shop for a helpdesk solution like: - Why you need support software and why you need just one tool - The advantages of hosted helpdesks over on-premise software - A feature list to help make that shopping experience a little less painful
Tags : 
    
Freshdesk
By: Cisco     Published Date: Jul 08, 2016
This white paper can help you confirm that your small business or distributed enterprise needs to invest in an effective next-generation firewalls (NGFW) solution. For small businesses, the NGFW should provide an affordable and manageable entrée to advanced threat protection. In branch offices and the distributed enterprise, NGFWs should provide a detection and enforcement point, analyzing real-time threats and network traffic at scale and benefiting from an integrated and holistic view of the network of which it is a part. In both use scenarios, the NGFW should help your organization defend against targeted and persistent malware attacks, including emerging threats.
Tags : 
    
Cisco
By: Cisco     Published Date: Jul 08, 2016
When evaluating a next-generation firewall (NGFW) to determine whether the solution can give you comprehensive protection for your entire enterprise, you need to look for seven must-have capabilities. The NGFW should: 1. Integrate security functions tightly to provide effective threat and advanced malware protection 2. Provide complete and unified management 3. Provide actionable indications of compromise to identify malicious activity across networks and endpoints 4. Offer comprehensive network visibility 5. Help reduce complexity and costs 6. Integrate and interface with third-party security solutions 7. Provide investment protection This white paper explains this checklist in depth and provides examples of the benefits a truly effective NGFW solution can deliver.
Tags : 
    
Cisco
By: CrowdStrike     Published Date: Oct 23, 2017
The endpoint security market continues to expand with vendors old and new marketing their solutions as “next generation” game-changers. However, closer inspection reveals that many new solutions have been built on old platforms, many of which still rely heavily on signature-based detection and obsolete architecture. Navigating this crowded vendor landscape can be challenging — how does the buyer find the true next-generation protection today’s targeted, advanced threats demand? A new white paper, “The Five Essential Elements of Next -Generation Endpoint Protection,” offers guidance on how to see through the hype and understand the critical must-have elements that meet true next-generation criteria and set a new standard in EPP. Download the white paper to learn: Details on the five essential capabilities that define true next-generation EPP and why they are so important A matrix that evaluates and compares the potential impact of different solutions A list of top questions to ask ve
Tags : 
    
CrowdStrike
By: DellEMC and Intel®     Published Date: Sep 16, 2016
In diesem Whitepaper werden die Argumente für hyperkonvergente Appliances, und insbesondere die EMC VCE VxRail-Appliance, aus Sicht der Kosten und des messbaren Aufwands betrachtet. Um eine realistische und wiederholbare Analyse zu ermöglichen, wurden statt anekdotischer Beobachtungen oder Kundenzitaten über die Vorteile ausschließlich messbare Ergebnisse herangezogen.
Tags : 
emc vce vxrail, virtualisation, converged infrastructure, hyber-converged infrastructure, infrastructure
    
DellEMC and  Intel®
By: Panaya     Published Date: Aug 26, 2016
In the era of digital transformation, where the speed of change requires business processes to be agile, change with evolving business context and respond to existing and emerging competition - organizational culture and large-scale business processes are still resistant to change. This Panaya whitepaper provides a practical "to-do" list that can help facilitate change and keep your ERP current.
Tags : 
panaya, erp, enterprise resource planning, digital, digital ready, erp systems, digitalization, digital transformation, knowledge management, enterprise applications
    
Panaya
By: Cognizant     Published Date: Oct 23, 2018
As financial services firms embrace digital, they need business assurance strategies that extend conventional quality assurance methods to address the nuances of emerging technologies such as blockchain and advanced artificial intelligence (AI). At the same time, they also need assurance that their strategies can accommodate changes in the ever-shifting regulatory landscape wrought by the acceleration of digital within the core of their businesses. This white paper explores how financial firms can excel in digital by holistically addressing the quality of business processes built on disruptive technologies while assuring compliance to regulations.
Tags : 
cognizant, finance, digital
    
Cognizant
By: EMC     Published Date: Apr 15, 2011
This white paper discusses Unisphere for VNXe. It describes the Unisphere for VNXe interface, and explains how an IT generalist can easily complete storage-related tasks using this intuitive, easy-to-use interface.
Tags : 
emc unisphere, vnxe, storage management, connection utility, configuration wizard, cifs, iscsi, nfs, ip storage, network attached storage, storage area networks
    
EMC
By: Sprinklr     Published Date: Nov 22, 2016
In this social listening whitepaper, you'll learn that listening technology provides brands with the power to reach consumers via the digital platforms where they research, make, and discuss their purchasing decisions.
Tags : 
social listening, value, consumers, purchasing decisions, listening technology, listening, tools, whitepaper
    
Sprinklr
By: CrowdStrike     Published Date: Feb 01, 2017
A large and growing number of security solutions are being touted as the ""next generation"" in cyber defense, and endpoint protection products are no exception. This has led to widespread confusion about which solutions have truly incorporated next-generation technologies and approaches, and which ones are making empty claims or half-hearted attempts. CrowdStrike developed this white paper to help you sift through the hype and uncover the critical elements that a true next-generation endpoint security solution must include. Download this white paper to explore: ? An explanation of the essential elements of Next-Generation Endpoint Protection ? An evaluation matrix for comparing the potential impact of different solutions ? A list of the top questions to ask potential vendors ? Tools to help you measure and compare different solutions
Tags : 
    
CrowdStrike
By: LogMeIn     Published Date: Jan 03, 2013
In this whitepaper, BoldChat® - with thousands of customers across 70 countries - shares analytic techniques, reporting recommendations and realistic timelines for implementing a pro-active chat program. Read on to learn more!
Tags : 
roi, live chat, bold chat, logmein, log me in, enterprise, collaboration, wireless, knowledge management, enterprise applications
    
LogMeIn
By: CareCloud     Published Date: Mar 20, 2015
This white paper outlines three key reasons that outsourcing could be the right move for your medical practice. Download to find out more about the potential financial and efficiency gains for your practice. You’ll learn: • How to calculate potential cost savings • Where up to 65% of practices have a weak revenue cycle spot, according to MGMA • Why outsourcing before October 2015 makes sense Bonus: A handy checklist to help you quickly figure out if now is the right time for your practice to outsource.
Tags : 
carecloud, regulatory burdens, outsourcing, declining reimbursements, administrative burdens, it support, medical billing
    
CareCloud
By: SAP     Published Date: Jul 18, 2016
To determine the status of Analytics and Business Intelligence in the Cloud, Enterprise Management Associates (EMA) embarked on an end-user research study to look at the current state of cloud-based analytics. Read the white paper to discover panelists’ insights on cloud-based analytics, business intelligence strategies, and implementation practices.
Tags : 
    
SAP
By: NAVEX Global     Published Date: Oct 15, 2014
In this whitepaper, Michael Volkov, CEO and owner of the Volkov Law Group shares best practices for building an effective anti-corruption compliance programme with a holistic approach.
Tags : 
anti-bribery programmes, holistic anti-corruption policies, global anti-corruption policy
    
NAVEX Global
By: Imprivata     Published Date: Jun 30, 2014
This IDC Health Insights white paper, sponsored by Imprivata, presents key findings of interviews with three healthcare IT executives at Atlantic Health System, Carolinas Pathology Group, and Beaufort Memorial Hospital regarding the deployment of Imprivata Cortext, a secure communications platform. Consistent findings across the three healthcare organizations are as follows: ease of use leads to quick clinician adoption, there is broad application of secure communication across various hospital workflows, and instant communication can save time for care team members and can improve collaboration. Read this report to learn more about how these organizations streamlined clinical workflows such as patient admission notifications, specialist referrals, pathology consultations and code team activations.
Tags : 
secure, communications, healthcare, hospital, collaboration, it management, platforms
    
Imprivata
By: Macquarie Telecom     Published Date: Mar 30, 2015
This white paper reveals a list of top 10 trends in cloud computing to help you take advantage of all the greatest new innovations in cloud technology.
Tags : 
virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud computing trends, cloud security, cloud performance, mobile cloud computing, disaster recovery, firewalls, mobile computing, data protection
    
Macquarie Telecom
By: Oracle     Published Date: Apr 03, 2012
Download this white paper, Top Reasons to Implement an SOA Governance Strategy: A List for IT Executives, for a guide to governance that will set you on the right path.
Tags : 
soa, service oriented architecture, networking, middleware, weblogic, oracle, information technology, web services, application server, server, sla, maturity model, 10g, jvm, java, data management
    
Oracle
By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection, security
    
Webroot Inc
By: Adobe     Published Date: Apr 30, 2015
Connect the left and right brains of marketing to deliver the most compelling content to the right person at the right time. This white paper will help you reimagine personalization and get a holistic, 360-degree view of your customers.
Tags : 
touchpoint marketing, personalization, contextual intereactions, customer lifecycle, mobility, customer interactions
    
Adobe
By: Arcserve     Published Date: Jul 23, 2010
This white paper describes an approach that provides these performance metrics for specific IT stakeholders, all drawn from data collection and analytics that support a holistic, integrated approach to optimizing IT service delivery.
Tags : 
ca technologies, performance metric, it service, monitoring, productivity, customer retention, service assurance, network performance, application performance management, business activity monitoring, business metrics, customer satisfaction, quality assurance
    
Arcserve
By: McAfee     Published Date: Feb 06, 2013
Protect fixed-function devices from threats, including zero-day attacks and other forms of malware, and prevent system downtime, control costs, and ultimately extend the life of devices.
Tags : 
fixed function device security, fixed function devices, pos systems, pos system security, atm security, medical equipment security, industrial control systems, mobile device security, printer security, automotive system security, aeronautical system security, pci dss, nerc, dynamic whitelisting, zero day attacks, anti spam, anti spyware, anti virus, application security, security management
    
McAfee
By: McAfee     Published Date: Feb 06, 2013
Application whitelisting used in conjunction with existing antivirus solutions provides a strong defense against emerging threats like APT and targeted malware, and also contributes to reduced operational costs by controlling the sprawl of unauthoriz
Tags : 
desktop security, malware, coe security, common image desktops, fixed function desktops, security management, coe environments, whitelisting, application control, antivirus, application whitelisting, global threat intelligence, dynamic whitelisting, anti spam, anti spyware, anti virus, application security, auditing, compliance, hacker detection
    
McAfee
By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits, website filtering, device control, buffer overflow, physical file transfer, desktop firewall, web filtering, email filtering, web gateway, email gateway, application control, application whitelisting, host ips
    
McAfee
Start   Previous   1 2 3 4 5    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter