White Papers by Topic: Business intelligence

Resources available: 181

Case Study: Six Billion Slurpees and Counting

Read how 2800 new laptops were deployed in 30 days reducing help desk calls by 67%, decreasing management costs by 81% and increasing productivity by 30%.

Golden Rules: Here’s How To Buy That First Server

Independent experts have made the decision of whom to buy from an easy one.

Integrated Security for Broad Protection, Swift Response

Find out the cost savings and protection benefits that are achieved when you take a methodical approach to closing your security gaps.

The Security Paradox

The First Global Study that Quantifies the Cost of Reactive Versus Proactive Security in a Midsize Organization

File Transfer: It’s Not What it Used to Be

This report examines how Best in Class organizations benefit from managed file transfer solutions, and recommends steps to success for all organizations.

Solving IT Challenges with Managed File Transfer

This paper presents a case for a managed file transfer solution that is easy to use, integrates with email clients and applications found on the end user’s desktop, and which provides IT and the organization with the security and accountability needed in today’s business climate.

Virtualization: Get Ready For The Next Step

If you haven't already started virtualizing your infrastructure, what are you waiting for? Read this InfoWorld IT Strategy Guide, sponsored by HP, to learn more.

Your Browser Wears No Clothes – Why Fully Patched Browsers Remain Vulnerable

This ISSA Journal article discusses the different types of attacks even when the browser is fully patched and hardened and offers guidance on ways in which organizations can revisit Web security.

Outdated Browsers and Zscaler: An Overview

In this white paper, learn which browsers are most vulnerable and how to gain control over those most at risk.

How Zscaler Tackles Emerging Web Threats with High Speed, Real-Time Content Inspection in the Cloud

With the ability to conduct bi-directional, real-time inspection, emerging threats can be addressed without the need to deploy and manage software internally.

©1994-2014 Infoworld, Inc.