Information Technology Industry White Papers

(View All Report Types)
MSP’s Single Most Important Marketing Message
sponsored by GFI Software
WHITE PAPER: In this article Chris Martin discusses the importance of marketing yourself to your clients and how you should do it.
Posted: 22 Dec 2010 | Published: 22 Dec 2010

GFI Software

The Citrix Desktop Transformation Model
sponsored by Citrix
WHITE PAPER: Desktop virtualization initiatives are topping the priority lists of most IT managers. Learn more about this key strategic directive and the steps to getting started in your organization. Download the white paper from ESG now.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

Citrix

Journal of Management Excellence: The Value of Information
sponsored by Oracle Corporation
WHITE PAPER: In this issue, our authors have done an outstanding job of exploring many facets of VOI. Robert Shimp discusses the shift in the economy from that of a services economy to an information management economy.
Posted: 09 May 2011 | Published: 31 Mar 2011

Oracle Corporation

Storage: Economics Remains Crucial
sponsored by IBM
WHITE PAPER: Read this informative resource to find out what characteristics drive IT.
Posted: 14 Apr 2014 | Published: 31 Oct 2012

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM