CXO

Find out what technology leaders are doing to explore IT challenges and gain the insights that will drive technology transformation in business.

  • White Papers // May 2015

    State of security operations: 2015 report of capabilities and maturity of cyber defense organizations

    Your ability to detect and stop cyber attacks depends on the effectiveness of your security operations team. How does yours stack up to the best? And what should you do to improve? HP Security Intelligence and Operations Consulting has assessed the capabilities of 87 security operations centers worldwide. This...

    Sponsored By Hewlett-Packard (HP)

  • Downloads // May 2015

    Managing Virtualised Environments? Check VM Health in Minutes

    Reduce downtime up to 53%* and time spent troubleshooting by 59%* by proactively analysing and alerting on VM performance. See relationships of active and pending alerts that identify hypervisor specific issues on VMs, hosts, datastores, & clusters. Proactively alert on VMware & Hyper-V performance with SolarWinds Virtualization Manager. Download a...

    Sponsored By SolarWinds

  • White Papers // May 2015

    The Best Practice Security in a Cloud-Enabled World

    This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realized, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.

    Sponsored By IBM

  • Research // Apr 2015

    Handbook - Learn to Lead Right

    What makes a great leader? Don’t wait to become the leader you were born to be. "A leader provides the necessary framework and makes it available to employees so they can perform their tasks independently and efficiently." This handbook reveals the new meaning of leadership, exploring how you can better...

    Sponsored By Citrix Systems

  • White Papers // Apr 2015

    Top 10 Criteria for Selecting a Managed Services Provider

    When you’re faced with growing expectations to create business value with limited resources, where can you turn? Increasingly, IT organizations are looking to trusted IT services providers like IBM to help reduce cost, manage complexity, maintain leading-edge skills and adopt technology innovation. Read the white paper to find out how...

    Sponsored By IBM

  • White Papers // Mar 2015

    Modernize Your SMB

    By modernizing your SMB with Windows Server 2012 R2 running on Intel Xeon processor-based servers, you can maximize performance, security, and compliance. If you’re ready to take your business to the next level, consider a powerful new Intel Xeon Processor E5-based platform that will enable you to respond rapidly to...

    Sponsored By Intel/Microsoft

  • White Papers // Mar 2015

    Planning Guide: Modernizing Servers and Software

    Many companies today are simply “getting by” with their existing IT infrastructure. If you’re one of those companies, you know that this can mean something as simple as slower performance or as complex as needing a workaround for service delivery. Organizations are now moving toward virtualization and modern cloud options,...

    Sponsored By Intel/Microsoft

  • White Papers // Mar 2015

    Modernize Your Data Centre

    As of July 2015, support for Windows Server 2003 will end. Organisations who don’t act now will be at risk, whether from compromised applications, data theft, or failure to meet regulatory requirements. Compliance – Failure to meet compliance requirements from HIPAA, Sarbanes-Oxley, PCI, and others can bring workflows to a...

    Sponsored By Intel/Microsoft

  • White Papers // Mar 2015

    SMB Planning Guide: Modernizing Servers and Software

    To maintain your lead in today’s business environment, you need to get the most out of every investment. Virtualization gives you the capability to run more applications on a single server, helping you save on hardware costs and power bills This report will examine how SMBs today are capitalising on...

    Sponsored By Intel/Microsoft

  • White Papers // Mar 2015

    5 Must-Haves for Highly Manageable Infrastructure

    IT leaders are constantly thinking about ways to decrease costs. When InformationWeek recently asked IT executives about the primary ways they planned to innovate this year, the most common answer was “lower IT costs or business costs.” And the pressure to spend less appears to be growing. Yet, in the...

    Sponsored By Dell and Intel

  • White Papers // Mar 2015

    The Risk of “Free” Endpoint Security

    Everything in life comes at a price, even “free” endpoint protection. Every organisation has anti-virus/anti-malware solutions deployed, but how much have you actually reduced your risk? Read this insightful report by Aberdeen Group to understand the true risk of “free” endpoint protection.

    Sponsored By Intel Security

  • White Papers // Mar 2015

    State of Public Cloud Security

    The majority of organisations using the cloud today don’t understand their shared security responsibilities, according to a recent survey by Forrester Consulting. This finding is alarming, especially with the constant revelations of major data breaches. Whether you’re just starting your cloud journey and want to know how others are approaching...

    Sponsored By Trend Micro Australia

  • White Papers // Mar 2015

    Cloud Security Best practices

    In this whitepaper Best Practices for Public Cloud Security, Forrester shares cloud security survey results and best practices for addressing shared security responsibility. Forrester advocates a three-part model to secure data and applications in the cloud and specifically discusses how to achieve each recommendation: Verify and secure all resources Limit...

    Sponsored By Trend Micro Australia

  • White Papers // Mar 2015

    Fortifying for the future: Insights from the 2014 IBM Chief Information Security Officer Assessment

    IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more...

    Sponsored By IBM

  • White Papers // Mar 2015

    M-Trends 2015 - A View from the Front Lines

    While we have seen modest gains in organizations’ ability to overcome the security gap, advanced (and not-so advanced) threat actors continue to evolve their tactics to find a way through it. The M-ternds report by Mandiant, provides a brief overview of the how attackers’ motives and tactics changed in 2014....

    Sponsored By FireEye

  • White Papers // Mar 2015

    Top 10 Tips for Cyber Resilience

    Symantec has identified the top 10 tips to secure your business against cyber risk and threats. Read this one page report to get insights and recommendation from one of the most trusted brands in Cyber Security - Symantec.

    Sponsored By Symantec

  • White Papers // Mar 2015

    The Cyber-Resilient Enterprise - Harnessing Your Security Intelligence

    An important shift has occurred in the security landscape of late. To keep pace in an ever more competitive world, businesses are adopting new ways of doing business, making them more dependent than ever on connected services and exposing them to new security challenges This paper details to IT leadership...

    Sponsored By Symantec

  • Videos // Mar 2015

    Cyber Resilient Blueprint - Videos

    Security - we know its important! But the problem with security is we never know if we have the right security until we have been hit! View the videos from Symantec to understand the Cyber Resilient Blueprint - enterprise wide, integrated and solution that utilizes threat intelligence. They also describe...

    Sponsored By Symantec

  • White Papers // Mar 2015

    IDC: Capturing the $1.6 Trillion Data Dividend

    In recent years, the promise and, in some cases, the hype of big data have produced plenty of critics who doubt the benefits of big data or point to the potential pitfalls facing organisations engaged in big data and analytics projects. This white paper provides the results of an IDC...

    Sponsored By Microsoft

  • White Papers // Mar 2015

    Forrester: Total Economic Impact™ Of Microsoft SQL Server

    From the information obtained through interviews with six organisations and surveys collected from 48 more, Forrester has constructed a Total Economic Impact (TEI) framework outlining the implementation of Microsoft SQL Server 2012 and/or Microsoft SQL Server 2014. The objective of the framework is to identify the cost, benefit, flexibility, and...

    Sponsored By Microsoft

  • White Papers // Mar 2015

    Aberdeen Checklist - How B2B Salespeople Learn to Love Their Data

    In a recent study, Aberdeen provided a data and performance-driven bridge between two unlikely enterprise business partners: Sales Leadership and the IT team. The common ground here is sales analytics, or the business intelligence tools that leader companies more effectively leverage to support better sales forecasting, deal-making, and closing activities...

    Sponsored By QlikTech

  • eBooks // Mar 2015

    CITO Research E-Book - Empowering Sales with Self Service BI

    Read this e-book and learn how to empower sales with self-service business intelligence in order to gain better insight into your pipeline, get to know your customers better, close bigger deals faster, and uncover better cross-sell and up-sell opportunities with less effort. Download this e-book to learn more.

    Sponsored By QlikTech

  • White Papers // Mar 2015

    The Fundamental Five: Mapping the cloud maturity curve

    Cloud computing has become a business-critical issue, and organisations must take a methodical approach if they are to get the business benefits they have been told—and sold—to expect. This Report will take you through a 5 step approach to get the most out of your cloud.

    Sponsored By IBM

  • Live Event // Mar 2015

    IBM MobileFirst Roundtable: Creating Exceptional Mobile Experiences - Invitation

    A good app can increase traffic, sales, employee productivity and brand satisfaction. A good mobile app strategy including right design, development, integration, and management, enables businesses to maintain their competitiveness and reduce costs. A bad App strategy will do the opposite. Join us at this complimentary roundtable and take control...

    Sponsored By IBM

  • White Papers // Mar 2015

    Endpoint Buyers Guide

    Evaluating the many components that make up an endpoint security solution can be overwhelming. This buyers guide provides independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.

    Sponsored By Sophos

  • White Papers // Mar 2015

    End of life for BYOD products- Webinar

    Join us on Tuesday, 24 March at 11:00am EST to learn more about what you can do to when your devices reach the end of their life. As personal electronic devices gain more access to corporate data, whether through internal email, software, or files stored on the cloud, security is...

    Sponsored By Dell and Intel

  • White Papers // Feb 2015

    Surviving Disruption

    Disruption is coming. Are you ready? It's not enough to know that a threat is coming. You need to know whether it's coming right for you. In this spotlight on managing disruption that first appeared in the Harvard Business Review, industry leaders Maxwell Wessel and Clayton Christensen propose a systematic...

    Sponsored By Jama Software

  • White Papers // Feb 2015

    The State of Modern Product Delivery

    Are you delivering products that your customers really need, or what they say they want? According to fresh research from Jama and Forrester Consulting, 50% of business leaders are giving customers what they think they want but that fail to meet their real needs. Knowing the difference can be what...

    Sponsored By Jama Software

  • Downloads // Feb 2015

    Check Virtualization Health in Minutes. It's FREE!

    It's time for your FREE VMware & Hyper-V Healthcheck with Virtualization Manager. So much change occurs in your VM environment, it can be hard to stay ahead of potential problems like: Storage I/O bottlenecks Memory & CPU over-utilization VM sprawl wasting resources Capacity shortfalls Over & undersized VMs And on...

    Sponsored By Solarwinds APAC

  • Downloads // Feb 2015

    Download - FREE Trial of IP Address Manager from SolarWinds!

    Are you still using spreadsheets to manage your IP space? The explosion of IP-enabled devices in corporate networks has increased the complexity of IP space management beyond what can be handled with spreadsheets or other home-grown tools. SolarWinds IP Address Manager makes it easier than ever to manage and...

    Sponsored By Solarwinds APAC

  • Downloads // Feb 2015

    Download a FREE Trial of IP Address Manager from SolarWinds!

    Are you still using spreadsheets to manage your IP space? The explosion of IP-enabled devices in corporate networks has increased the complexity of IP space management beyond what can be handled with spreadsheets or other home-grown tools. SolarWinds IP Address Manager makes it easier than ever to manage and...

    Sponsored By Solarwinds APAC

  • Downloads // Feb 2015

    Check VM Health in Minutes. It's FREE!

    It's time for your FREE VMware & Hyper-V Healthcheck with Virtualization Manager. So much change occurs in your VM environment, it can be hard to stay ahead of potential problems like: Storage I/O bottlenecks Memory & CPU over-utilization VM sprawl wasting resources Capacity shortfalls Over & undersized VMs And on...

    Sponsored By Solarwinds APAC

  • White Papers // Feb 2015

    The Future of Convergence Is Here

    Discover the major problems that have been facing today’s IT world. The changing landscape of IT over the past decade has seen more and more computer, network and storage solutions, creating a complicated web of siloed technologies that drive up costs and create headaches for those in charge of support....

    Sponsored By Hitachi Data Systems

  • White Papers // Feb 2015

    10 Reasons to Choose Hitachi UCP

    Sit back as we reveal the 10 reason that IT professionals choose Hitachi UCP. Find out how other IT specialists and their organisations have used UCP to support and improve their VMware and vSphere environments with reliability and agility.

    Sponsored By Hitachi Data Systems

  • White Papers // Feb 2015

    A Roadmap to Converged Infrastructure

    Take a trip through the steps of creating and implementing a converged infrastructure. Simplify your management and support resources into one platform with zero worries. Give yourself the ability to manage all your processes with single-pane visibility, keeping the technology costs low and the complexity lower. Let’s Go!

    Sponsored By Hitachi Data Systems

  • White Papers // Feb 2015

    Accelerate your IT Services: Dell Red Hat Cloud Solutions

    This white paper provides an overview of Dell Red Hat Enterprise Cloud Solutions and the benefits of cloud computing, specifically private cloud deployments. Learn about the different configuration options available from Dell and Red Hat to address your organization's specific needs. Intel Inside®. Powerful Data Center Outside.

    Sponsored By Dell

  • White Papers // Feb 2015

    Private cloud infrastructure – Do you have what it takes?

    As more organizations establish a goal of building out internal cloud services, it becomes clear that every organization has a unique environment and goals. This paper discusses how, even with this situation, the right infrastructure can deliver essential cloud capabilities that will facilitate the transition to cloud cloud-ready IT. ...

    Sponsored By Dell

  • White Papers // Feb 2015

    Using Data Replication to Upgrade Your Oracle Database with Minimal Downtime and Risk

    Phasing out older hardware, operating systems or eliminating outdated versions of Oracle® that may require expensive extended support contracts can be an effective way to control operational costs, but can also present a new set of challenges. Learn how you can ensure migration success by following the established best practices...

    Sponsored By Dell Software

  • White Papers // Feb 2015

    Improving analytics and reporting with near real-time data replication

    Your business relies on data analytics for business intelligence, but if the data isn't up to date, the analytics are worthless. In this technical brief, see how to replicate real-time data, whether it’s onsite, remote or cloud.

    Sponsored By Dell Software

  • White Papers // Feb 2015

    Security on System z eGuide

    IBM System z security provides a core set of robust services such as cryptographic hardware, system integrity, EAL5 certification and more. While it might be the perfect place to store sensitive data and perform business critical transactions and analytics it can also be a target for would-be cyber criminal and...

    Sponsored By IBM

  • eBooks // Dec 2014

    eBook: Becoming a Leader People Want to Follow

    Are you truly leading your team or simply managing them? Organizations need leaders and your team needs someone to follow. With some ongoing development, you could become that leader. Learn the top leadership qualities that inspire others to want to follow you and the direction of your company.

    Sponsored By ConnectWise

  • White Papers // Oct 2013

    Top 6 Project Breakdowns (and How to Fix Them)

    Project management is either one of those things that you are really good at, and you can breeze right through without any issues, or it's something that drives you crazy. Every business owner has experienced some form of project failure, but why? Study the top reasons that projects fail to...

    Sponsored By ConnectWise

  • White Papers // Feb 2015

    Surviving Disruption

    Disruption is coming. Are you ready? It's not enough to know that a threat is coming. You need to know whether it's coming right for you. In this spotlight on managing disruption that first appeared in the Harvard Business Review, industry leaders Maxwell Wessel and Clayton Christensen propose a systematic...

    Sponsored By Jama Software

  • White Papers // Feb 2015

    The State of Modern Product Delivery

    Are you delivering products that your customers really need, or what they say they want? According to fresh research from Jama and Forrester Consulting, 50% of business leaders are giving customers what they think they want but that fail to meet their real needs. Knowing the difference can be what...

    Sponsored By Jama Software

  • White Papers // Mar 2015

    The Fundamental Five: Mapping the cloud maturity curve

    Cloud computing has become a business-critical issue, and organisations must take a methodical approach if they are to get the business benefits they have been told—and sold—to expect. This Report will take you through a 5 step approach to get the most out of your cloud.

    Sponsored By IBM

  • White Papers // Feb 2015

    A Roadmap to Converged Infrastructure

    Take a trip through the steps of creating and implementing a converged infrastructure. Simplify your management and support resources into one platform with zero worries. Give yourself the ability to manage all your processes with single-pane visibility, keeping the technology costs low and the complexity lower. Let’s Go!

    Sponsored By Hitachi Data Systems

  • White Papers // Mar 2015

    Top 10 Tips for Cyber Resilience

    Symantec has identified the top 10 tips to secure your business against cyber risk and threats. Read this one page report to get insights and recommendation from one of the most trusted brands in Cyber Security - Symantec.

    Sponsored By Symantec

  • White Papers // May 2015

    The Best Practice Security in a Cloud-Enabled World

    This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realized, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.

    Sponsored By IBM

  • White Papers // Nov 2014

    Case Study: How one MSP leaned on a community of peers to transform their business

    Growing an IT Services business in an unstable economy is challenging, but for one MSP, the key to success was the right partnership and business support from a group of peers. See how Wisconsin-based ITConnexx leveraged ConnectWise and their engaged community to transform their business from break-fix to managed services.

    Sponsored By ConnectWise

  • White Papers // Nov 2014

    How to Sell Clients on Co-Managed IT Services

    Offering co-managed IT can be profitable, but is often difficult to sell clients on. The business owner is weary of adding IT costs and the IT Manager is worried about his job being outsourced. Learn how to educate each of them on your value and overcome these roadblocks in the...

    Sponsored By ConnectWise

  • White Papers // Feb 2015

    Top 5 Risks of Delaying Migration to Cloud

    The time is now - to adopt Cloud A recent IDC study showed that cloud solutions offer an average payback period of 7.1 months and 5-year average ROI of 626%, a level that few other investments can equal. Precipitous drops in the cost of cloud computing are making it difficult...

    Sponsored By Infor

  • White Papers // Jan 2015

    TSIA 2014 Remote Support Trends

    Based on information gathered in TSIA’s annual Global Technology Survey, this report will look at the trend of remote support services being adopted over many different industry types. Through the continued improvement of remote control, desktop sharing and web collaboration, companies are able to use these capabilities to increase productivity...

    Sponsored By LogMeIn Australia

  • Videos // Mar 2015

    Cyber Resilient Blueprint - Videos

    Security - we know its important! But the problem with security is we never know if we have the right security until we have been hit! View the videos from Symantec to understand the Cyber Resilient Blueprint - enterprise wide, integrated and solution that utilizes threat intelligence. They also describe...

    Sponsored By Symantec

  • Research // Nov 2014

    IDG Report 2014 - Mobile Security - Confidence ebbs as BYOD booms

    The recent IDG Research Services survey of IT and business professionals involved with mobile security purchases identifies the main vulnerabilities of mobile devices, as well as strategies taken to counter those vulnerabilities. Mobile device security is a moving target, and requires organizations to stay up-to-date on not just the threats,...

    Sponsored By Dell and Intel

  • White Papers // Dec 2014

    IT Security: Midsize Businesses Face Enterprise-Caliber Threats

    The number of cyber attacks against midsize companies has doubled in the last year. And cost per employee is more than three times that of larger companies. While midsize organisations often lack the sophisticated defenses of large enterprises, many fail to recognise their vulnerability and are overconfident in their ability...

    Sponsored By HP

  • White Papers // Feb 2015

    Checklist: Characteristics of a Successful DevOps Team

    No matter how you’re using DevOps practices — whether your company has a DevOps department or cross-functional teams that share DevOps tools and practices — there are distinct characteristics of DevOps teams that align with high IT performance.

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    Improving analytics and reporting with near real-time data replication

    Your business relies on data analytics for business intelligence, but if the data isn't up to date, the analytics are worthless. In this technical brief, see how to replicate real-time data, whether it’s onsite, remote or cloud.

    Sponsored By Dell Software

  • White Papers // Feb 2015

    The Future of Convergence Is Here

    Discover the major problems that have been facing today’s IT world. The changing landscape of IT over the past decade has seen more and more computer, network and storage solutions, creating a complicated web of siloed technologies that drive up costs and create headaches for those in charge of support....

    Sponsored By Hitachi Data Systems

  • Research // Apr 2015

    Handbook - Learn to Lead Right

    What makes a great leader? Don’t wait to become the leader you were born to be. "A leader provides the necessary framework and makes it available to employees so they can perform their tasks independently and efficiently." This handbook reveals the new meaning of leadership, exploring how you can better...

    Sponsored By Citrix Systems

  • White Papers // Mar 2015

    5 Must-Haves for Highly Manageable Infrastructure

    IT leaders are constantly thinking about ways to decrease costs. When InformationWeek recently asked IT executives about the primary ways they planned to innovate this year, the most common answer was “lower IT costs or business costs.” And the pressure to spend less appears to be growing. Yet, in the...

    Sponsored By Dell and Intel

  • White Papers // Nov 2014

    Tailoring Enterprise Applications for Mobile Environments

    The rapid expansion of workplace mobility is driving a rise in the variety of devices and locations that require mobile services. More end users require more data on more devices in more places. Learn how using app development and desktop virtualization can transform your mobile enterprise to improve efficiency. It...

    Sponsored By Dell and Intel

  • White Papers // Feb 2015

    Private cloud infrastructure – Do you have what it takes?

    As more organizations establish a goal of building out internal cloud services, it becomes clear that every organization has a unique environment and goals. This paper discusses how, even with this situation, the right infrastructure can deliver essential cloud capabilities that will facilitate the transition to cloud cloud-ready IT. ...

    Sponsored By Dell

  • White Papers // May 2014

    Exploiting Innovative Technologies in BI and Big Data Analytics

    This infographic presents Forrester survey findings that correlate overall company success with adoption of innovative BI, analytics, and big data tools. It also provides a comprehensive list of benefits that advanced BI tools bring to the business and IT sides of any operation.

    Sponsored By SAP

  • White Papers // May 2014

    Predictive Analytics: Improving Performance by Making the Future More Visible

    This report details the findings of a comprehensive Ventana Research survey of some 2,600 organizations. Find out how use of predictive analytics breaks down across company sizes and industries, and learn the challenges and benefits of adopting this critical technology.

    Sponsored By SAP

  • White Papers // Aug 2014

    Best Practices for Secure Mobile Access

    Organizations today are eager to reap the benefits of a mobile workforce but cannot afford to sacrifice security. Learn how you can implement secure mobile access in a controlled, step-by-step manner, so you can empower your mobile workforce while ensuring the security of your enterprise. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Frost & Sullivan awards IBM 2014 Customer Value Leadership Award for Mobile Identity and Access Management Solution

    This Frost & Sullivan best practices research paper details why IBM have been provided their 2014 Customer Value Leadership in the Mobile Identity and Access Management because of IBM's outstanding performance.

    Sponsored By IBM

  • White Papers // Nov 2014

    Protect Critical Healthcare Data

    Protecting healthcare data is more important—and more challenging—than ever before. With most patient information now residing in digital format, healthcare organizations must rely on IT solutions to protect patient privacy and safeguard against disasters that may cause physical damage to patient information. In 1996, the Health Insurance Portability and Accountability...

    Sponsored By HP

  • Videos // Nov 2014

    Video - HP LiveVault

    This video is a demonstration of how LiveVault, a cloud-based server data protection solution from HP Autonomy, can be used to protect critical file data stored on a HP StoreEasy Storage appliance.

    Sponsored By HP

  • White Papers // Nov 2014

    How to Measure the ROI of Cloud Data Protection

    This white paper helps managers demonstrate the profitability of reducing operational costs in server backup and recovery through investment in cloud server data protection (subscription), rather than traditional backup methods. Comparative cost categories used in calculating this ROI are summarized in a convenient checklist. These include capital costs of hardware...

    Sponsored By HP

  • White Papers // Feb 2015

    Puppet Labs DevOps Salary Report

    The 2014 State of DevOps Report revealed strong correlations between DevOps practices and strong IT performance, and also showed that high-performing IT teams have a beneficial impact on the business performance of the organizations they belong to. Among our questions about tools & practices, location, industry and company size,...

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    The Business Case for IT Automation

    System administrators and IT practitioners spend as much as 50% of their time on routine, repetitive tasks. Quite simply, manual configurations, custom scripts and legacy tools just don't cut it anymore. Enter Puppet Enterprise, the leading IT automation software in the market today. Puppet Enterprise lets you manage IT...

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    What Windows Admins Need from Configuration Management

    Windows system administrators use a wide variety of tools to do their work. But with Microsoft’s vision of a mobile-first, cloud-first world, Windows admins need a unified toolset to manage all their environments — Windows and not. This handbook describes what to look for in a configuration management tool, and...

    Sponsored By Puppet Labs

  • White Papers // Nov 2014

    The Forrester Wave™: SaaS HR Management Systems

    Forrester Inc. recently released a report on Software-as-a-Service (SaaS) HR management systems. The report explores how enterprise businesses are moving to SaaS HR systems to drive efficiency and an evaluation overview from Forrester on: • How SaaS HRMS are growing rapidly as a migration path from on-premises systems • The...

    Sponsored By Workday

  • White Papers // Dec 2013

    Cloud Federation for Identity and Access Security

    The shift to a cloud-based enterprise IT architecture is a foregone conclusion for organizations across a wide range of company sizes and verticals. However, many organizations are still approaching this shift with trepidation because security and compliance concerns can slow or block many enterprise cloud initiatives in terms of both...

    Sponsored By F5

  • White Papers // Apr 2014

    Fight Malware, Malfeasance and Malingering

    Every year brings an even more extreme set of threats to the enterprise than the last. Spam email used to be the number one headache. Now it’s been replaced with malware, spear phishing, and the infamous spin-off of the two, the advanced persistent threat (APT). Employee internet usage is also...

    Sponsored By F5

  • Case Studies // Apr 2014

    Cisco Case Study

    Using IBM Security AppScan Enterprise, Cisco empowered its developers and QA personnel to find and fix application security issues before deployment. It’s helped drive a 33 percent decrease in security issues and reduced post-deployment remediation costs significantly.

    Sponsored By IBM

  • White Papers // Aug 2014

    Gartner Predicts 2014: Identity and Access Management

    Industry analyst firm Gartner, Inc. reviews how the Nexus of Forces is driving complex shifts in identity and access management. Download the Nov. 2013 Gartner report to learn about the: Impact of cloud and SaaS adoption; Growth of external identity providers; Importance of context-based access.

    Sponsored By IBM

  • White Papers // Jan 2015

    Selecting the Right Remote Support Solution Tool for your company

    This provides an overview of all the questions that need to be asked when looking at your company’s remote support technology. The report will discuss how to maintain flexibility, simplicity and lower costs while ensuring that your remote support solution allows your support agents to perform advance support tasks quickly...

    Sponsored By LogMeIn Australia

  • White Papers // Feb 2015

    Four Tools to Capture DDoS Attacks in Monitoring

    Most cloud DDoS mitigation services are offered on-demand, meaning that customers can enable the service when they are the victim of a DDoS attack. But how can a company find out - quickly - that it is under attack? Sometimes it is difficult to know. This piece lists four monitoring...

    Sponsored By Neustar

  • White Papers // Feb 2015

    Don't Let Your DDoS Defense Fall Behind

    Today’s DDoS incidents tend to be briefer and some can be as much as 100 times larger than even just a few years ago. Sometimes criminals use a DDoS attack as a smokescreen to distract IT security teams from other multivector attacks aimed at stealing funds, customer data and intellectual...

    Sponsored By Neustar