White Papers by Topic: Enterprise architecture

Resources available: 96

Ponemon WW Report

2013 Cost of Cyber Crime Study: Global Report

2014 Trends That Will Reshape Organizational Security

This report provides the background, rationale and advice for realigning organizational security in light of the evolving cybersecurity and business landscape. Security managers should compare these trends against their own environments.

Addressing the Full Attack Continuum: A New Threat-Centric Security Model for Before, During, and After an Attack

Methods that rely exclusively on detection and blocking to prevent cybercrime are no longer adequate. It's time for a new security model to address the full attack continuum - before, during, and after an attack.

10 Essential Elements for a Secure Enterprise Mobility Strategy

Best practices for protecting sensitive business information while making people productive from anywhere.

Enterprise mobility management at your own pace: a three-phase approach

This white paper presents a three-phase plan for mobile empowerment, management and security using the Citrix XenMobile EMM platform.

Protecting DNS Infrastructure--Inside and Out

DNS is a key part of enterprise networks but increasingly targeted by hackers. Traditional security measures such as next-generation firewalls or secure web gateways won't shield your infrastructure from attacks. Learn how to protect your DNS today.

Gartner Positions RSA in Leaders Quadrant for Enterprise Governance, Risk and Compliance

RSA, the security division of EMC, was positioned by Gartner in the Leader's quadrant of the 2013 Magic Quadrant for Enterprise Governance, Risk and Compliance Platforms based on completeness of vision and ability to execute.

GARTNER REPORT | 2014 Gartner MarketScope for IVR Systems and Enterprise Voice Portals

This report discusses goals and strategies for narrowing down your list of Self Service IVR vendors. It also looks at why you should consolidate IVR investments with broader contact center infrastructure investments.

Solution Brief: Are You Ready for the PCI DSS v3 Deadlines?

Are you one of those organizations that meet the new PCI DSS requirements for keys and certificates using internal scripts or manual processes just in time for your next audit? This PCI DSS v3 Solution Brief will outline how to comply with PCI DSS.

EBOOK | 7 Blueprints to Contact Center Modernization

If you are looking to build a modern, multi-channel contact center that meets the needs of the 21st century customer, read this eBook to learn the 7 blueprints to contact center modernization.

©1994-2014 Infoworld, Inc.