Microsoft

  • Webcasts // Aug 2015

    Live Webcats: Rumors Vs. Reality: What to Know About Windows 10

    Join longtime Windows watcher, Ed Bott for this live webinar as he sorts through the myths and misinformation to get the facts straight on Windows 10. Topic: Rumors Vs. Reality: What to Know About Windows 10 Date: Wednesday, August 12 Time: 10 AM (PDT) / 1 PM (EDT) Speaker:...

    Sponsored By Citrix Online

  • White Papers // May 2015

    State of Cloud Adoption

    Based on the latest research from CBS Interactive, this infographic illustrates prevailing attitudes toward cloud services, including SaaS, IaaS, and PaaS. It will present adoption statistics, use cases, and even satisfaction levels with multifarious public, private, and hybrid environments

    Sponsored By Microsoft Networks

  • White Papers // May 2015

    Next-gen cloud migration strategies

    Most enterprises have embraced the "low-hanging fruit" of cloud services, phasing in SaaS applications and creating IaaS environments for testing and development. As cloud technologies have matured, however, businesses are considering the transfer of more mission-critical systems to cloud resources. This white paper outlines the current state and future plans...

    Sponsored By Microsoft

  • White Papers // Apr 2015

    Enterprise Mobility Management: The Big Bang Theory

    Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.

    Sponsored By IBM

  • White Papers // Mar 2015

    Modernize Your SMB

    By modernizing your SMB with Windows Server 2012 R2 running on Intel Xeon processor-based servers, you can maximize performance, security, and compliance. If you’re ready to take your business to the next level, consider a powerful new Intel Xeon Processor E5-based platform that will enable you to respond rapidly to...

    Sponsored By Intel/Microsoft

  • White Papers // Mar 2015

    Modernize Your Data Centre

    As of July 2015, support for Windows Server 2003 will end. Organisations who don’t act now will be at risk, whether from compromised applications, data theft, or failure to meet regulatory requirements. Compliance – Failure to meet compliance requirements from HIPAA, Sarbanes-Oxley, PCI, and others can bring workflows to a...

    Sponsored By Intel/Microsoft

  • White Papers // Mar 2015

    IDC: Capturing the $1.6 Trillion Data Dividend

    In recent years, the promise and, in some cases, the hype of big data have produced plenty of critics who doubt the benefits of big data or point to the potential pitfalls facing organisations engaged in big data and analytics projects. This white paper provides the results of an IDC...

    Sponsored By Microsoft

  • White Papers // Mar 2015

    Forrester: Total Economic Impact™ Of Microsoft SQL Server

    From the information obtained through interviews with six organisations and surveys collected from 48 more, Forrester has constructed a Total Economic Impact (TEI) framework outlining the implementation of Microsoft SQL Server 2012 and/or Microsoft SQL Server 2014. The objective of the framework is to identify the cost, benefit, flexibility, and...

    Sponsored By Microsoft

  • White Papers // Feb 2015

    Puppet Labs DevOps Salary Report

    The 2014 State of DevOps Report revealed strong correlations between DevOps practices and strong IT performance, and also showed that high-performing IT teams have a beneficial impact on the business performance of the organizations they belong to. Among our questions about tools & practices, location, industry and company size,...

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    Checklist: Characteristics of a Successful DevOps Team

    No matter how you’re using DevOps practices — whether your company has a DevOps department or cross-functional teams that share DevOps tools and practices — there are distinct characteristics of DevOps teams that align with high IT performance.

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    9 (+1) Ways IT Automation Will Make Your Organization More Successful

    With the right automation in place, your IT infrastructure can become a strategic asset to get your company out ahead of competitors. Thoughtfully chosen automation tools can enable IT operations to manage IT infrastructure for: higher availability and reliability; faster recovery from outages; better scalability; better auditability; more frequent delivery...

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    What Windows Admins Need from Configuration Management

    Windows system administrators use a wide variety of tools to do their work. But with Microsoft’s vision of a mobile-first, cloud-first world, Windows admins need a unified toolset to manage all their environments — Windows and not. This handbook describes what to look for in a configuration management tool, and...

    Sponsored By Puppet Labs

  • White Papers // Feb 2015

    Four Tools to Capture DDoS Attacks in Monitoring

    Most cloud DDoS mitigation services are offered on-demand, meaning that customers can enable the service when they are the victim of a DDoS attack. But how can a company find out - quickly - that it is under attack? Sometimes it is difficult to know. This piece lists four monitoring...

    Sponsored By Neustar

  • White Papers // Jan 2015

    Five Things you need to know about Migrating from Windows Server 2003

    With Microsoft's Windows Server 2003 end of support, server migration is not a matter of it, it is a matter of when. The time to begin the process is now. Don't put your business at risk of a last minute fire-drill or any unnecessary downtime. Download this white paper and...

    Sponsored By HP

  • White Papers // Dec 2014

    IDC Report: The Business Value of IBM zEnterprise System Deployments

    On a Smarter Planet, information-centric processes are exploding in growth. In order to excel in today’s competitive environment, businesses need to support these processes, and efficiently manage the massive volumes of data they drive, with minimal risk. The mainframe has always been the IT industry's leading platform for transaction processing,...

    Sponsored By IBM

  • White Papers // Oct 2014

    Why Cloud Backup? Top 10 Reasons HP Autonomy Solutions

    Download this white paper to discover the top 10 reasons why organisations are turning to cloud server backup. Learn how you can reduce costs and free your IT staff to focus on more mission-critical projects.

    Sponsored By HP

  • eBooks // Mar 2014

    Integrating and governing big data

    While the term 'big data' has only recently come into vogue, IBM has designed solutions capable of handling very large quantities of data for decades. IBM InfoSphere Information Server is designed to help organizations understand, cleanse, monitor, transform and deliver data.

    Sponsored By IBM

  • Tools & Templates // May 2015

    Sample files: Random time values, conditional formatting, and a PivotTable solution

    These files demonstrate the techniques explained in the article Office Q&A: Random time values, conditional formatting, and a PivotTable solution.

    Provided By TechRepublic

  • White Papers // Mar 2015

    Greater Strategic Effectiveness through Perpetual Planning

    Businesses face volatility everywhere they look. Increasing globalization is a major factor, with economic and environmental issues in one part of the world readily impacting supply and demand elsewhere. Making a successful shift to perpetual planning helps employees bridge the gap between innovation and your ability to support related efforts....

    Provided By CA Technologies

  • White Papers // Mar 2015

    Defending against malware: A holistic approach to one of today's biggest IT risk

    Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection. Read More.....

    Provided By IBM

  • Webcasts // Mar 2015

    Reverse Engineering with Powershell

    Whether the users are performing incident response, black box code analysis, or analyzing malicious code, PowerShell is a powerful tool to add to the users reverse engineering tool arsenal. In this webcast, the presenter will explain how to use PowerShell to analyze binary file formats and reverse engineer managed and...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Monitoring Using Powershell

    In this webcast, the presenter will give real world examples of how to use PowerShell for monitoring servers, websites, active directory, exchange, DNS, DHCP, anti-virus, WSUS patching, and notification using email and websites.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Advanced Powershell Threat - Lethal Client Side Attacks Using Powershell

    Powershell is an ideal platform for client side attacks as it is available on all the Windows machines. The presenter would see how easy and effective it is to use Powershell for various client side attacks like drive-by-downloads, malicious attachments, Java applets, human interface devices etc.

    Provided By SecurityTube.net

  • White Papers // Feb 2015

    Reduce backup costs with high-density energy-smart storage

    Bottom line—your IT infrastructure simply has to work, despite constrained budgets and constant data growth. Fortunately, virtualization has driven sweeping change, making deployments simpler, more scalable and agile regardless of the data center’s size. Discover how best-of-breed storage solutions are maximizing the benefits of virtualization by creating quantifiable improvements in...

    Provided By Nexsan by Imation

  • Webcasts // Feb 2015

    The Panasonic Toughpad FZ-E1

    The Panasonic Toughpad tablets help drive efficiency and productivity in ways that were never previously possible. It’s capable of operating outdoors in a variety of extreme and remote environments and it brings together the best of handheld, smartphone and barcode reader functionality into a single rugged and hard working tablet....

    Provided By Panasonic

  • White Papers // Feb 2015

    ESG: Public Cloud Trends

    Early server virtualization was based on consolidation and cost containment. Today, automation, elasticity, and usage-based tracking is transforming virtualized data centers into private cloud infrastructures.

    Provided By NetApp

  • White Papers // Feb 2015

    Stepping up the Battle Against Advanced Threats WP

    The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection...

    Provided By IBM

  • White Papers // Feb 2015

    IBM Security AppScan Mobile Analyzer

    IBM Security AppScan® Mobile Analyzer is designed to help secure your organization’s mobile applications, by detecting dozens of today’s most pervasive published security vulnerabilities. Now available for general availability IBM Security AppScan Mobile Analyzer: Scans mobile applications at the appropriate stage of your development lifecycle, Identifies security vulnerabilities to malware...

    Provided By IBM

  • White Papers // Feb 2015

    Protecting Your Critical Data with Integrated Security Intelligence

    By combining the industry-leading security intelligence capabilities of IBM QRadar Security Intelligence Platform with the robust data security capabilities of IBM InfoSphere Guardium, organizations can help prevent attacks, ensure compliance and reduce costs of security management.

    Provided By IBM

  • White Papers // Feb 2015

    A Managed File Transfer Center of Excellence

    Are you a visual thinker? This graphic representation provides the big picture for choosing the right person-centric file transfer solution for your organization. Read More..

    Provided By IBM

  • White Papers // Feb 2015

    5 Things you need to know about Migrating from Windows Server 2003

    With Microsoft's Windows Server 2003 end of support, server migration is not a matter of it, it is a matter of when. The time to begin the process is now. Don't put your business at risk of a last minute fire-drill or any unnecessary downtime. Download this white paper...

    Provided By HP

  • White Papers // Feb 2015

    Migrate to the New Style of IT

    Microsoft Windows Server 2003 Migration Program for enterprise businesses Microsoft will end support for Windows Server 2003 on 14 July 2015. This will have a dramatic impact on your business, and every moment you wait to begin your migration increases the costs, risks, and complexities you face. Read...

    Provided By HP

  • Webcasts // Jan 2015

    Powershell and You: Using Microsoft's Incident Response Language

    Anyone can write useful security tools in PowerShell. With just a little bit of knowledge the user can automate almost anything. From advanced post-exploitation tasks to incident response tools, they can do it with PowerShell. This webcast will explain why they should learn a new language and cover the basics...

    Provided By SecurityTube.net

  • White Papers // Jan 2015

    Getting The Most From Your Virtualized Data Center With Converged Systems

    In this paper, we look at the greatest challenges faced by IT departments, and how traditional processes and organizations are poorly-equipped to handle today's workplace. We discuss the benefits of converged systems that are engineered to handle virtualised workloads. Finally, we look at HP ConvergedSystem for Virtualisation as a simple...

    Provided By HP and Intel UK

  • White Papers // Jan 2015

    Avoiding the Stall: Riding the Momentum of the Next Levels of Datacenter Virtualisation — A Business Value Perspective (IDC)

    This document discusses the results that more comprehensive datacenter virtualisation delivers, and it lays out both the promises and the potential pitfalls of the journey through successive stages of datacenter virtualisation. Read more... Brought to you by HP and Intel® :

    Provided By HP and Intel UK

  • White Papers // Jan 2015

    Improving the cost and management of mirroring data with a Stretched Cluster Solution

    In today’s world, storage and performance requirements are growing faster than ever before and the costs of managing this growth are eating up more and more of the typical IT budget. With the Software Defined Data Centre (SDDC) four core elements of IT Infrastructure – networking, CPU, storage and security–...

    Provided By Tectrade

  • Webcasts // Dec 2014

    Extreme Privilege Escalation on Windows 8/UEFI Systems

    It has come to light that state actors install implants in the BIOS. Let no one ever again question whether BIOS malware is practical or present in the wild. However, in practice attackers can install such implants without ever having physical access to the box. Exploits against the BIOS can...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse

    Windows APIs are often a blackbox with poor documentation, taking input and spewing output with little visibility on what actually happens in the background. By analyzing (and abusing) the underlying functionality of these seemingly benign APIs, the presenter can effectively manipulate Windows into performing stealthy custom attacks bypassing the latest...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    What Happens in Windows 8 Stays in Windows 8

    Systems evolve over time, patches are applied, holes are fixed and new features are added. Windows 10 is the new flagship product of Microsoft, and as prepared as it can be for a world of white-, grey- and black-hat hackers.

    Provided By SecurityTube.net

  • Case Studies // Dec 2014

    Kent County Council Set to Save Over £2.7 Million While Fast Tracking XP Migration with VMware

    Kent County Council is able to rapidly accelerate the migration of its 4,000 devices away from Microsoft XP - saving over £560,000 in the process and causing minimal disruption to staff. Their challenges are to improve mobility, working flexibility, information security and business agility, migrating away from its aging Windows...

    Provided By VMware