White Papers by Topic: Technology business

Resources available: 178

Finance - Interactive eGuide

In this e-Guide, Computerworld, IDG News Service and IT World examine software-defined data centers, customer experience tools, and security issues that are top of mind for financial services companies today.

The 3 Cs of Secure Mobility

This whitepaper describes the Three C's of Secure Mobility - content, credentials, and configurations - and containerization's role in mitigating native vulnerabilities.

Anatomy Of A CyberAttack

As the number and severity of cyber-crimes continues to grow, it's important to understand the steps cyber-criminals take to attack your network, the types of malware they use, and the tools you need to stop them.

Securing the Small Business Network

This ebook examines eight network security challenges that small businesses face today, and offers easy and effective solutions. Dell SonicWALL offers the comprehensive protection your small business needs, priced within your budget.

Infographic: SaaS Takes Center Stage

SaaS continued its impressive growth cycle in 2013, delivering value across the enterprise. Learn how subsricption-based business applications are expected to make an even bigger impact in 2014 and beyond.

Real-world Identity and Access Management for Unix Systems

Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.

eBook: IAM for the Real World: Privileged Account Management

Read this e-book for essential information on the common security issues with privileged account management - and how you can minimize or eliminate them.

Controlling & Managing Super User Access

Every business needs privileged account users. Unfortunately, most operating systems offer all-or-nothing solutions. This white paper explores the risks associated with privileged accounts, and explains how Dell solutions can mitigate those risks.

Is Your Middleware Sapping Performance?

Middleware systems play a critical role in delivering business data and are now an essential part of every IT environment. These tools keep data flowing, prevent problems, streamline, troubleshoot, guide administration and empower user self-service.

Cloud Encryption Handbook: Schemes, Strengths and Weaknesses

As you increase encryption strength, you often sacrifice application functionality. This guide reviews encryption/functionality trade-offs and a framework for selecting the right scheme.

©1994-2014 Infoworld, Inc.