• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

document

Results 76 - 100 of 999Sort Results By: Published Date | Title | Company Name
By: Aerohive     Published Date: Jun 15, 2015
Ce document explique comment éliminer la complexité et les coûts des réseaux sans fil traditionnels et créer un réseau prêt pour la mobilité.
Tags : 
mobility, wireless, wlan, wi-fi, mobile applications, mobile users, networks, wireless networks
    
Aerohive
By: Aerohive     Published Date: Jun 15, 2015
Ce document apporte des conseils permettant d’évaluer les réseaux Wi-Fi d’entreprise grâce à l’étude des exigences clés, des considérations de l’architecture, des 10 éléments inhérents à un réseau Wi-Fi et de l’utilisation du processus DDP pour sélectionner un fournisseur.
Tags : 
wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks
    
Aerohive
By: Ahead     Published Date: Oct 23, 2018
In this document, we will review ideal use cases for VMware on AWS (VMC).
Tags : 
    
Ahead
By: Ahead     Published Date: Nov 15, 2018
Many enterprises have successfully integrated VMware tools into their environments and are now looking to reap the benefits of the cloud. But this migration isn’t as easy as flipping a switch, especially if you’re looking to continue running your VMware environment. The ability to utilize your existing VMware tools on an AWS platform can result in a more cost-effective, simplified cloud experience, allowing organizations to begin their cloud journey by moving workloads closer to native cloud services. In this document, we will review ideal use cases for VMware on AWS (VMC).
Tags : 
    
Ahead
By: AirDefense     Published Date: Apr 24, 2007
This document outlines how hackers are exploiting vulnerabilities in 802.11 wireless LANs and describes the widely available hacking tools. As a collection of already published risks to wireless LANs, this white paper is written to inform IT security managers of what they are up against.
Tags : 
hackers, hacker, hacker detection, intrusion prevention, wireless security, wlan, wlans, 802.11
    
AirDefense
By: ALE     Published Date: Jan 10, 2019
The purpose of this design guide is to present the requirements and considerations relevant to the transportation vertical along with design options, best practices and configuration guidelines. While this design guide is focused on Shortest Path Bridging (SPB-M) based networks, it also addresses data networking solutions applicable for this transportation vertical. Although several modes of transport exist, this document focuses on rail (metro, heavy, light) and road transport. More specifically, this document focuses on the fixed network infrastructure underpinning the multiple systems that enable the safe and reliable operation of rail and intelligent transport systems. To find out more download this whitepaper today.
Tags : 
    
ALE
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts,risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, rackspace, pci, pci dss, payment security, compliance, cloud pci, security
    
Alert Logic and Rackspace
By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, cloud pci, security
    
Alert Logic and Sungard Availability Services
By: AlienVault     Published Date: Oct 21, 2014
The Public Services Network (PSN) is a programme intended to improve communication services across the UK government by reducing the cost and complexity of digital communication across the public sector. The PSN will create one logical network, based on industry standards, thus improving performance and security. The PSN is a replacement to the GSi (Government Secured Intranet), and all Public Sector agencies must migrate to the PSN by 31 October 2014. AlienVault’s Unified Security Management (USM) platform can provide you with the single solution you need to address many of the network- and security-related questions required to complete your PSN IA documentation.
Tags : 
communication, government, reducing cost, digital, network, public sector, logical, industry
    
AlienVault
By: AlienVault     Published Date: Mar 30, 2016
The CIS Critical Security Controls (CSCs) provide 20 controls that organizations of any size can use to improve their security posture and reduce the risk of cyber threats to critical assets, data, and network infrastructure. The AlienVault USM platform, with its built-in essential security capabilities and integrated threat intelligence, can help organizations implement these controls quickly and effectively. This document describes how the AlienVault USM platform maps to each of the CIS CSCs.
Tags : 
    
AlienVault
By: AlienVault     Published Date: Oct 05, 2016
Use this checklist to help you document: Network information Logging devices Contact information Priority escalation contacts Scheduled events Download this whitepaper now to help lay the foundation for a successful MSSP implementation.
Tags : 
    
AlienVault
By: AlienVault     Published Date: Oct 20, 2017
When you're starting service with a customer, setting the tone early on is very important. That's why we've created a checklist to help you stay organized from the start and implement smart process around your Managed Security Service Provider (MSSP) service. Feel free to use it but most importantly modify it. Use this checklist to help you document: • Network information • Logging devices • Contact information • Priority escalation contacts • Scheduled events Download this whitepaper now to help lay the foundation for a successful MSSP implementation.
Tags : 
    
AlienVault
By: ALL ICT Ltd     Published Date: Mar 26, 2008
The aim of this document is to assist organizations protecting their assets – tangible and intangible – through a Security Management Program. This program provides a holistic, hands-on, and consistent approach for securing the organization against serious security breaches, such as data leakage, while providing the organization with the required flexibility to adapt itself to the business needs and to remain competitive in the market.
Tags : 
allict, all ict, security management, security, network security, intrusion prevention, data protection
    
ALL ICT Ltd
By: Amazon Web Services     Published Date: Jul 25, 2018
La plupart des entreprises ont investi considérablement dans le stockage de leurs données, avec un coût de gestion continu en termes de licences logicielles, frais de maintenance, coûts opérationnels et matériel. Est-il plus judicieux d'opter pour une solution cloud ? Quels en sont les coûts et les avantages ? En combien de temps un tel choix est-il rentabilisé? Découvrez, dans ce document, la synthèse de l’enquête IDC sur le retour d'expérience de 8 entreprises utilisant Amazon Redshift.
Tags : 
    
Amazon Web Services
By: Amazon Web Services APAC     Published Date: Sep 19, 2019
This document provides information to assist customers who want to use AWS to store or process content containing personal data, in the context of common privacy and data protection considerations. It will help customers understand: the way AWS services operate, including how customers can address security and encrypt their content, the geographic locations where customers can choose to store content, and the respective roles the customer and AWS each play in managing and securing content stored on AWS services.
Tags : 
    
Amazon Web Services APAC
By: Amazon Web Services EMEA     Published Date: Sep 09, 2019
This document provides information to assist customers who want to use AWS to store or process content containing personal data, in the context of common privacy and data protection considerations. It will help customers understand:
Tags : 
    
Amazon Web Services EMEA
By: AppDynamics     Published Date: Feb 08, 2018
The primary intended audience for this document is any expert in professional services who needs to assure the health of SharePoint and systems connected to it. If you’re a systems architect, you can gain understanding of SharePoint components and how other applications can take advantage of SharePoint. If you’re an independent consultant, you’ll learn about the elements of comprehensive coverage and total visibility into operations with prebuilt monitoring configurations.
Tags : 
    
AppDynamics
By: AppDynamics     Published Date: Sep 20, 2017
Azure has been through many rounds of changes that have significantly affected the ways in which .NET and other developers interact with the platform. The shift in strategy has been rocky at times. In 2011, technology reviewers described Microsoft Azure as a confusing platform with a difficult to use web-based interface and incomprehensible documentation. Since then, the teams working on the platform have gradually improved it, resulting in a much more user-friendly platform that offers a well-organized array of services.
Tags : 
mobile developers, microsoft azure, xamarin, it operations, developer market, container
    
AppDynamics
By: Apple Corporation     Published Date: Feb 26, 2015
See how you can be more productive in meetings. Innovative apps make it simple and quick to collaborate in real time. Discuss a document with a your team, start a new video conference on the fly, even brainstorm ideas with colleagues. Communicate in new ways on iPad with brilliant detail and immediate impacts.
Tags : 
    
Apple Corporation
By: Apple Corporation     Published Date: Feb 26, 2015
Whether you need to view and approve, update and share, or create content from scratch, there are powerful apps that let you work on demand without skipping a beat in your business.
Tags : 
    
Apple Corporation
By: Aprimo, Inc.     Published Date: Dec 23, 2008
Aprimo manages the financial aspects of your marketing process and captures information about each marketing project, which facilitates Sarbanes-Oxley compliance. It puts into place detailed procedures to manage access rights, to create and document business rules that apply to marketing projects and to ensure appropriate review and approval.
Tags : 
aprimo, marketing process, financial control, digital asset management, data management, knowledge management, marketing automation, system management software
    
Aprimo, Inc.
By: ArcSight     Published Date: Mar 03, 2009
This document provides an overview of the drivers for Log Management scalability and outlines the key requirements to consider as part of the evaluation process.
Tags : 
log management, security, fraud, insider threat, suspicious network activity, pci dss, hipaa, sox
    
ArcSight
By: ArcSight     Published Date: Mar 04, 2009
This document will outline the requirements for an effective fraud mitigation solution. It will detail a solution that considers the entirety of an organization’s fraud mitigation strategy.
Tags : 
fraud, siem, arcsight, mitigating fraud, intrusion prevention systems, fraudsters, fraud policy, insider threats
    
ArcSight
By: Aruba Networks     Published Date: Nov 15, 2013
El lugar de trabajo de la próxima generación se centra totalmente en la movilidad. En este año 2013 hay más dispositivos móviles con conexión a Internet que personas en el planeta, de modo que la tecnología informática debe proporcionar una conectividad sin restricciones a cada tipo de usuario —trabajadores, contratistas, invitados e incluso clientes— apropiada para la función de cada uno y el tipo de dispositivo que utiliza. Se pone de manifiesto que la movilidad en el lugar de trabajo no es sólo para el beneficio propio del usuario y de la productividad. La migración hacia la movilidad genera varias ventajas en TI. Descárguese este documento técnico para descubrir las ventajas....
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs
    
Aruba Networks
By: ARX (Algorithmic Research)     Published Date: Feb 14, 2008
As the traditional “paper-based” world gives way to digital documentation and transactions, enterprises are demanding innovative solutions for digitally signing and authenticating such documents, files, and forms with iron-clad protection against forgery. Solutions must guarantee non-repudiation and promise the same level of security and trust that exists with conventional documentation. At the same time, such a solution should be simple to use, easy to deploy and offer a rapid ROI.
Tags : 
digital signature, electronic signature, digital signatures, electronic signatures, digital signature, arx, algorithmic research, pki
    
ARX (Algorithmic Research)
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter