Filters:
    Whitepaper|Security
    Posted Date:23/08/2017

    Akamai’s State of the Internet / Security Q2 2017 report

    The Q2 2017 State of the Internet / Security Report represents analysis and research based on data from Akamai’s global infrastructure and routed Distributed Denial of Service (DDoS) solution.

    Whitepaper|Applications
    Posted Date:23/08/2017

    Kendo UI Builder: Datasheet

    An application’s user experience increasingly determines its effectiveness. Particularly with web scale applications, a poor UI/UX can undermine the business benefit of the application. Kendo UI...

    Whitepaper|Applications
    Posted Date:23/08/2017

    Application Evolution

    Capture the Business and Technology Trends of Today and Tomorrow. From modernizing legacy solutions to learning new technology, Progress Services can empower you to evolve your applications to meet...

    Whitepaper|Applications
    Posted Date:22/08/2017

    API Management for the Digital World

    To help application development and delivery (AD&D) pros set their future direction for API management, this report describes this landscape, each vendor’s main strengths and weaknesses, and their...

    Whitepaper|Backup / DR
    Posted Date:22/08/2017

    The One Essential Guide to Disaster Recovery: How to Ensure IT and...

    Download “The One Essential Guide to Disaster Recovery: How to Ensure IT and Business Continuity” to start preparing for planned and unplanned challenges that will test your DR readiness. This guide...

    Whitepaper|Security
    Posted Date:16/08/2017

    RSA - The 7 Building Blocks of Better Threat Visibility

    To see what threats you're up against, you need visibility into all the data available from logs, packets, endpoints and threat intelligence, as well as a complete contextual view across all those...

    Whitepaper|Security
    Posted Date:16/08/2017

    RSA - 3 Keys to Faster Threat Response

    Threats move fast. You have to move faster. Once you detect a threat, there is a clear path to a faster response when you have three key, technology-enabled capabilities. See what capabilities are...

    Whitepaper|Security
    Posted Date:16/08/2017

    Managing the Security Skills Gap: A Force Multiplier for Security...

    Ask any CISO to name the top challenges of the job, and the first response is likely to be the security “skills gap” – the inability to find enough skilled people to handle an organization’s security...

    Whitepaper|Security
    Posted Date:15/08/2017

    Open Banking APIs under PSD2: Security Threats and Solutions

    By downloading this white paper, you’ll discover the PSD2 requirements for open banking APIs, the security and privacy threats against the APIs of banks, how to protect APIs against security threats...

    Whitepaper|Applications
    Posted Date:11/08/2017

    The Forrester Wave™: Digital Process Automation Software, Q3 2017

    Download your complimentary copy of The Forrester Wave™: Digital Process Automation Software, Q3 2017. In this new report, you’ll learn the results of Forrester’s extensive research on the top DPA...

    Whitepaper|Applications
    Posted Date:11/08/2017

    Rocket Software - In the World of Digital Transformation, Data Is Not...

    Digital transformation is opening enterprises to the idea that a pure relational database is not always the way to go in managing data. This Technology Spotlight examines the reemerging area of...

    Whitepaper|Security
    Posted Date:11/08/2017

    Cisco 2017 Midyear Cybersecurity Report

    Hackers have all the time in the world to lay foundations for crippling attacks—which means you have no time to waste in becoming less vulnerable. See how attacks are affecting other...

    Whitepaper|Cloud
    Posted Date:11/08/2017

    Qlik Sense® Enterprise Architecture and Scalability

    This technical white paper provides an overview of Qlik Sense's architecture and scalability and replaces the previous separate documents. It explores some of the core elements that make Qlik Sense a...

    Whitepaper|Backup / DR
    Posted Date:11/08/2017

    Gartner: Magic Quadrant for Data Center Backup and Recovery Software

    Whether you are migrating data to the cloud—or multiple clouds— facing an infrastructure decision, a storage refresh, a rip and replace or even considering new hyperconverged technologies, the Gartner...

    Whitepaper|Cloud
    Posted Date:09/08/2017

    Tibco - Gartner Practical Blockchain: A Gartner Trend Insight Report

    Blockchain technologies show promise, but it can be difficult for organizations to determine how they should be responding to this digital transformation platform. Break through the hype and read what...

    Whitepaper|Security
    Posted Date:08/08/2017

    Mimecast - Protecting Data In The Healthcare Industry

    Research finds that providers have traditionally under invested in IT security, which further compounds the problem. Read the report to learn important cyber security risks, the impact of a data...

    Whitepaper|Applications
    Posted Date:08/08/2017

    HPE Mobile First Campus

    The proliferation of mobile devices is transforming how and where we access applications and services. Users want cloud-based tools that enable collaboration anywhere. And IT consumerization requires...

    Whitepaper|Security
    Posted Date:08/08/2017

    Mimecast - 5 CyberThreats That Healthcare IT Pros Must Tackle

    Learn the biggest threats to your organization and how to improve protection against ransomware such as WannaCry, malicious URLs that entice users to click, bad Attachments that can infect your...

    Whitepaper|Cloud
    Posted Date:04/08/2017

    Operationalizing Social Care: 10 Best Practices You Need to Know Now

    In this paper, Lithium will walk you through the 10 most important best practices that can be enabled by an effective social care solution. They’ll also show you how the right technology can give your...

    Whitepaper|Cloud
    Posted Date:04/08/2017

    Engaging Government and Agency Constituents on Their Terms—and Yours

    This eBook makes the case that program enrollment is a government agency’s most important constituent engagement. It guides the reader through a 7-step assessment of their current program enrollment...

    Your search did not match any content.
    Show More..
    Top
    ITUpdate loading
    Loading...
    ×

    Not yet a member?

    Sign-up! It's Free!!
    × Not a member yet?
    Sign-up Now!
    It's Free!
    Sign-up
    Now!
    × Close
    Register
    Now!