overview

Results 151 - 175 of 679Sort Results By: Published Date | Title | Company Name
Published By: MarkLogic     Published Date: Jun 09, 2017
NoSQL means a release from the constraints imposed on database management systems by the relational database model. This quick, concise eBook provides an overview of NoSQL technology, when you should consider using a NoSQL database over a relational one (and when to use both). In addition, this book introduces Enterprise NoSQL and shows how it differs from other NoSQL systems. You’ll also learn the NoSQL lingo, which customers are already using it and why, and tips to find the right NoSQL database for you.
Tags : 
    
MarkLogic
Published By: NetApp     Published Date: Jun 01, 2017
This SolidFire Definitive Guide provides an overview on storage Quality of Service and its importance in the Next Generation Data Center.
Tags : 
netapp, solidfire, next generation data center
    
NetApp
Published By: NetApp     Published Date: Jun 01, 2017
This eBook provides an overview of cloud-integrated backup solutions. It shows how you can improve your backup performance and reduce IT costs without sacrificing security.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: IBM     Published Date: May 26, 2017
This white paper is intended for: • Potential users such as analysts and investigators who want information about i2 Analyst’s Notebook Premium and the benefits it provides • System administrators who wish to gain a high-level understanding of the product and the system prerequisites that are needed to install and run the application • Users who wish to learn how to exploit the maximum value of i2 Analyst’s Notebook Premium This document provides an overview of the i2 Analyst’s Notebook Premium product.
Tags : 
ibm, ibm i2, ibm i2 analyst, notebook premium
    
IBM
Published By: Spectrum Enterprise     Published Date: May 15, 2017
This guide gives you an overview of the steps you need to build a foundation for sustainable growth -- the kinds of investments, drivers, and differentiators that are involved.
Tags : 
    
Spectrum Enterprise
Published By: VMware     Published Date: May 10, 2017
VMware® Workspace™ ONE™ is VMware’s digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. Download this white paper to discover the objectives that drove VMware’s decisions of how and when to deploy, plus an overview of the business results achieved so far.
Tags : 
    
VMware
Published By: Microsoft     Published Date: May 04, 2017
If you’re looking for a simpler, less costly approach to phone and business communications, E5’s voice capabilities can help you reduce office space, host larger meetings and collaborate more effectively. Here’s an overview of the benefits.
Tags : 
microsoft office, 365, enterprise, business communications, collaboration
    
Microsoft
Published By: Mimecast     Published Date: Apr 18, 2017
451 Research independent analysts review Mimecast’s Targeted Threat Protection suite of email security services. This report provides detailed descriptions of the various email threat vectors: attachments, links and phishing and how Mimecast email security services work to thwart these attacks. The report covers an overview of the market and specifics on Mimecast services: Impersonation Protect, Attachment Protect, and URL Protect.
Tags : 
email fraud, threat protection, mimecast, cyber security, email security
    
Mimecast
Published By: DocuSign     Published Date: Apr 12, 2017
Every day, all over the world, businesses and individuals are forgoing paper and signing important business and personal documents online. From signing a vendor contract, to signing a home mortgage, and everything in between. This white paper gives an overview on how you can use electronic signatures to sign and send documents digitally to keep life and business moving forward.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 12, 2017
Electronic signatures have become common practice in the United States, but confusion still persists regarding the law at a state and federal level. This whitepaper provides an overview covering: 1) the legislation enabling electronic signature usage, and 2) the key legal factors arising in electronic transactions.
Tags : 
    
DocuSign
Published By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, it discusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : 
cloud security, cloud, private cloud, security technology
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, itdiscusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : 
cloud security, cloud, private cloud, security technology
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, it discusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : 
cloud security, cloud, private cloud, security technology
    
McAfee
Published By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : 
network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection
    
Sophos
Published By: Lookout     Published Date: Mar 29, 2017
Read the Gartner report for an overview of the mobile threat defense market (MTD), including detailed reviews, analyses, and recommendations and an assessment of 17 leading MTD vendors.
Tags : 
gartner, mobile, threat, defense, solutions, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
As the mobile workforce continues to expand, so do risks to enterprise security. Read the Lookout whitepaper for an overview of the current state of mobile security, including market analysis, current threats, and gaps in existing technology.
Tags : 
idg, mobile workforce, analysis, technology, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
As the mobile workforce continues to expand, so do risks to enterprise security. Read the Lookout whitepaper for an overview of the current state of mobile security, including market analysis, current threats, and gaps in existing technology.
Tags : 
    
Lookout
Published By: MobileIron     Published Date: Mar 16, 2017
This paper provides an in-depth overview of the security features of both iOS and MobileIron EMM. It also explains how, working together, they enable organizations to deploy a highly secure fleet of iOS devices that are easy to configure, secure, and maintain with the most current security policies and app updates.
Tags : 
    
MobileIron
Published By: DigiCert     Published Date: Mar 16, 2017
This webinar provides an overview from both a healthcare provider organization and medical device manufacturer perspective.
Tags : 
internet of things, healthcare, cybersecurity, medical devices, risk assessment
    
DigiCert
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Workspace™ ONE™ is VMware’s digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMware’s decisions of how and when to deploy, plus an overview of the business results we’ve achieved so far.
Tags : 
    
VMware AirWatch
Published By: VMware     Published Date: Feb 24, 2017
Workspace™ ONE™ is VMware’s digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMware’s decisions of how and when to deploy, plus an overview of the business results we’ve achieved so far.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
With Windows 10, Microsoft introduces a consolidated operating system (OS) platform that changes how organizations treat the management of End-User Computing (EUC) environments. This new way of managing Windows is more closely aligned to the enterprise mobile management (EMM) based approaches found in mobile management tools today. This whitepaper provides an overview of how Windows management evolved from a rigid and disruptive PC-centric approach to one offering a flexible and light-touch model. It will also delve into the specific management technologies that Windows 10 introduces, as well as leveraging conventional Windows management tools that are in use today.
Tags : 
    
VMware
Published By: Okta     Published Date: Feb 22, 2017
This white paper offers an overview of Okta’s solutions. Read it now and take one step closer to true enterprise security.
Tags : 
    
Okta
Published By: Okta     Published Date: Feb 22, 2017
Read this whitepaper to learn how Okta eliminates the pitfalls that come with trying to build and manage multiple on-premises active directory integrations yourself.
Tags : 
    
Okta
Published By: DocuSign     Published Date: Feb 13, 2017
Watch this on-demand webinar for an overview of the latest trends and practices regarding the adoption, use, and verification of digital and electronic signatures for 2016 and beyond.
Tags : 
    
DocuSign
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.