Data Management

The latest white papers, case studies and webcasts to help technology professionals ensure data is safe from risk and disaster with quality back-up, infrastructure and information management.

  • White Papers // Jul 2015

    The Hidden Costs of Self-Signed SSL Certificates ( French)

    Download this white paper, The Hidden Costs of Self-Signed Certificates, to read about the true total cost of ownership for self-signed SSL, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. You'll also learn about risk factors such as how self-signed certificates can increase...

    Sponsored By Symantec

  • White Papers // Jul 2015

    The Hidden Costs Of Self-Signed SSL Certificate (German)

    Download this white paper, The Hidden Costs of Self-Signed Certificates, to read about the true total cost of ownership for self-signed SSL, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. You'll also learn about risk factors such as how self-signed certificates can increase...

    Sponsored By Symantec

  • White Papers // Jul 2015

    Magic Quadrant for Data Centre Infrastructure Management Tools

    Gartner defines the data centre infrastructure management (DCIM) tool market as a space that encompasses tools that monitor, measure, manage and control data centre resources and energy consumption of: • IT-related components, such as servers, storage and network switches • Facilities infrastructure components, such as power distribution units (PDUs) and...

    Sponsored By APC by Schneider Electric

  • White Papers // Jul 2015

    The Evolution of Data Privacy (Spanish)

    Today most organizations handle personal, and other sensitive information. The GDPR will force businesses to take precautions in processing personal data to a new level. It will pay to remember for which data you are Data Controller and Data Processor, bearing in mind you may be both.

    Sponsored By Symantec

  • White Papers // Jul 2015

    The Evolution of Data Privacy (Italian)

    Today most organizations handle personal, and other sensitive information. The GDPR will force businesses to take precautions in processing personal data to a new level. It will pay to remember for which data you are Data Controller and Data Processor, bearing in mind you may be both. Read More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    Symantec: Internet Security Threat Report 2015 (Dutch)

    This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longer adequate for today’s threats. Learn More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    Symantec: Internet Security Threat Report 2015 (Spanish)

    This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longer adequate for today’s threats. Learn More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    Symantec: Internet Security Threat Report 2015 (French)

    This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longer adequate for today’s threats. Learn More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    Symantec: Internet Security Threat Report 2015 (Italian)

    This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longer adequate for today’s threats. Learn More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    Symantec: Internet Security Threat Report 2015 (German)

    This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longer adequate for today’s threats. Learn More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    Web Security Threat Report (Dutch)

    Symantec has the most comprehensive source of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Read More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    Web Security Threat Report (Portuguese)

    Symantec has the most comprehensive source of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Read More

    Sponsored By Symantec

  • White Papers // Jul 2015

    Web Security Threat Report

    Symantec has the most comprehensive source of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Read More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    Always On SSL - Symantec Guide (Portuguese)

    Online attacks are becoming more frequent and increasingly easy to execute. Organisations around the world are under increasing scrutiny, to ensure online transactions involving confidential data are secure. Take your organisation’s security to the next level with Always On SSL.

    Sponsored By Symantec

  • White Papers // Jul 2015

    Solution brief: implementing the right security strategy now

    Recent malware incidents have shown how costly and damaging cyber attacks can be: attacks may not necessarily be successful, but when attackers do find their way inside an organisation’s systems, a swift, well-prepared response can quickly minimise damage and restore systems before significant harm can be caused. In order to...

    Sponsored By Symantec

  • White Papers // Jul 2015

    EU General Data Protection Regulation (Dutch)

    After several years of negotiations, sometime towards the end of 2015 will see the introduction of the most important piece of privacy legislation unveiled by the EU for 20 years, the long-awaited General Data Protection Regulation (GDPR). Officially, it’s an overhaul and extension of rules and principles set out in...

    Sponsored By Symantec

  • White Papers // Jul 2015

    Symantec Identity: Access Manager - Bridging The Gap Between IT & Business

    Single Sign-On with strong authentication, access control, and user management for cloud-based apps. Learn More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    State of Privacy: The Data Trust Gap

    7000 people in Europe were asked about their feelings towards the privacy of their personal data. Learn More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    EU General Data Protection Regulation (German)

    After several years of negotiations, sometime towards the end of 2015 will see the introduction of the most important piece of privacy legislation unveiled by the EU for 20 years, the long-awaited General Data Protection Regulation (GDPR). Officially, it’s an overhaul and extension of rules and principles set out in...

    Sponsored By Symantec

  • White Papers // Jul 2015

    EU General Data Protection Regulation

    After several years of negotiations, sometime towards the end of 2015 will see the introduction of the most important piece of privacy legislation unveiled by the EU for 20 years, the long-awaited General Data Protection Regulation (GDPR). Officially, it’s an overhaul and extension of rules and principles set out in...

    Sponsored By Symantec

  • White Papers // Jul 2015

    EU General Data Protection Regulation (French)

    After several years of negotiations, sometime towards the end of 2015 will see the introduction of the most important piece of privacy legislation unveiled by the EU for 20 years, the long-awaited General Data Protection Regulation (GDPR). Officially, it’s an overhaul and extension of rules and principles set out in...

    Sponsored By Symantec

  • White Papers // Jul 2015

    The Evolution of Data Privacy

    Today most organizations handle personal, and other sensitive information. The GDPR will force businesses to take precautions in processing personal data to a new level. It will pay to remember for which data you are Data Controller and Data Processor, bearing in mind you may be both. Read More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    Hight Availability and Data Protection with EMC Isilon Scale-Out NAS

    This White paper Details how the EMC Isilon OneFS architecture provides high availability and data protection needed to meet the challenges organizations face as they deal with the deluge of digital content and unstructured data and the growing importance of data protection.

    Sponsored By EMC

  • White Papers // Jul 2015

    Defend hidden mobile web properties

    NetScaler helps this invisible layer of infrastructure to perform and communicate, improving security as well as quality of service. And by integrating with XenMobile, you can offer greater support and a better experience for mobile users. Learn more about delivering improved security, reliability and performance through mobile environments by reading...

    Sponsored By Citrix

  • White Papers // Jul 2015

    Citrix NetScaler: A powerful defense against denial of service attacks

    Organizations need a better way to combat and prevent these attacks, and the right ADC can provide the solution. Learn how Citrix NetScaler can help protect against DOS attacks in the report, Citrix NetScaler: A Powerful Defense Against DOS Attacks (link).

    Sponsored By Citrix

  • White Papers // Jul 2015

    Security Against Web Application Vulnerabilities

    Web applications, depending on their specific purpose, regularly interact with customers, partners, and employees. Unfortunately, dependencies and interactions between in-house and third-party resources, objects, and inputs inevitably introduce security holes.

    Sponsored By Trend Micro

  • White Papers // Jul 2015

    Success Story - Navicent Health

    To minimize their risk exposure on non-managed systems and medical devices, Navicent Health implemented Trend Micro’s Deep Discovery Inspector. It offered a cost-efficient solution to track down malware and mitigate its risks, and minimized the IT time required to monitor security.

    Sponsored By Trend Micro

  • White Papers // Jul 2015

    Data Centres That Deliver

    Organisations thrive when applications and information move faster. But most IT staff spend 70 percent of their time maintaining existing systems - leaving only one day per week for initiatives that create competitive advantage. Cisco looks to flip that ratio. Cisco's integrated infrastructure and IT solutions help you simplify application...

    Sponsored By Cisco Systems

  • White Papers // Jul 2015

    Taking the Enterprise Mobile: Executive Checklist

    This white paper reviews the security challenges associated with mobile devices in the enterprise, and provides a checklist to use as you develop policies to maintain control of devices, apps and data.

    Sponsored By Citrix

  • White Papers // Jul 2015

    Three Businesses Share Why They Chose Citrix XenDesktop Over VMware View

    XenDesktop is the only future-proof solution to deliver Windows apps and desktops as secure mobile services from a cloud-ready platform while simplifying management, reducing costs and enhancing security. Following are the customers, like you, that share why they chose XenDesktop over competition.

    Sponsored By Citrix

  • Webcasts // Jul 2015

    Live Webcast: Unlock Data Streams with IBM Streams and Apache Spark Streaming

    Spark is a next-generation framework for large-scale, in-memory distributed data processing, with greater performance and easier to use APIs compared to most big data solutions.  Spark also comes with a stream processing framework called Spark Streaming, which uses a micro-batch concept to process streaming data in near-real-time. During this...

    Sponsored By IBM

  • White Papers // Jul 2015

    10 Elements Of a Smart Sales Call Plan

    Ideally a seller is spending as much time preparing for and executing on the ‘what’ as he is deciding on the ‘who’. After all, no matter how well you have refined your target market, figured out the ideal buyer persona, and sharpened your competitive positioning, nothing happens until you engage...

    Sponsored By TAS Software

  • White Papers // Jul 2015

    TAS: Account Planning In Salesforce

    Companies around the globe are transforming the way they connect with customers. ACCOUNT PLANNING in SALESFORCE contains valuable advice on how to use Account Planning methodology in Salesforce to accelerate revenue growth. It is a great example of how our partners are leveraging the power of the Salesforce platform to...

    Sponsored By TAS Software

  • White Papers // Jul 2015

    Data Governance for Self-Service Analytics

    Almost any organization will say they make decisions based on data, or that they want to. Scratch the surface with a few questions about the quality of that data and confidence vanishes. Move on to discuss data security and see how quickly the subject changes. Data is clearly a key...

    Sponsored By Tableau

  • White Papers // Jul 2015

    Making Flow Happen: How to Build Dashboards That Persuade, Inform and Engage

    In data visualization, flow is crucial. Your audience should smoothly absorb and use the information in a dashboard without distractions or turbulence. Lack of flow means lack of communication, which means failure. So how do you create flow for an audience? Download this resource today and learn the main steps...

    Sponsored By Tableau

  • White Papers // Jul 2015

    The Road Forward: An IT Roadmap for Scaling Self-Service Reporting

    Enabling people to analyse their own data has gone from a trend to a norm. Most IT departments agree that self-service is a superior approach, and are only too happy to get out of the report-writing business. But IT does want to stay in control of critical aspects of the...

    Sponsored By Tableau

  • White Papers // Jul 2015

    How a Data-Driven Culture Improves Organizational Performance

    This white paper, sponsored by Tableau Software, discusses the analytics culture within Asia/Pacific organizations and compares and contrasts organizations that realize higher positive outcomes from their analytics solutions with their peers. We explore why analytics use is important, how to foster analytics use, and why meeting the analytics needs of...

    Sponsored By Tableau

  • White Papers // Jul 2015

    Excel: Great hammer, lousy Screwdriver - 5 needs Excel can’t solve

    Excel’s ubiquity often makes it the default analysis tool of choice. Whether one clamors to swivel pivot tables, build macros or invoke the function wizard, the instinct to turn to Excel for analytical tasks is undeniable. But as useful as it can be, Excel can’t do it all. This report...

    Sponsored By Tableau

  • White Papers // Jul 2015

    Dell: Identity and Access Management for Practical Use

    As you know, identity and access management ( IAM) is an area of continuous change, ever shorter deadlines, low budget, and overburdened staff and with extremely strict guidelines marked. Unfortunately, the conventional approach to identity and access management is to combine solutions with each other, which only partially meet the...

    Sponsored By Dell

  • White Papers // Jul 2015

    HP ArcSight Logger Data Sheet

    Collect logs and machine data from any device, vendor and source with broadest set of data collection comprehensively at high speeds. To learn more, read the data sheet.

    Sponsored By Hewlett-Packard (HP)