BeyeNETWORK business intelligence and data warehousing resources

Research Library



All resources sponsored by:
Hewlett-Packard Company
1 - 15 of 603 Matches
Sort by: Title | Posted Date | Publication Date | Document Type
sponsored by Hewlett-Packard Company

WHITE PAPER - This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.
Posted: April 15, 2014 | Published: April 15, 2014

Get This Now
Topics:  Network Architectures | Network Best Practices | Network Capacity | Network Configuration Management | Network Configuration Management Software | Network Infrastructure | Network Management | Network Performance | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Network Service Providers

sponsored by Hewlett-Packard Company

WHITE PAPER - Modern organizations are seizing technology as a leverage point to develop and maintain a competitive advantage. In this white paper, discover the ways winning organizations are achieving IT-enabled business innovation to move ahead – and stay ahead – of the competition.
Posted: April 11, 2014 | Published: April 10, 2014

Get This Now
Topics:  Application Development | Application Infrastructure | Application Life-Cycle Management | Application Performance Management | Applications Management | IT Management

sponsored by Hewlett-Packard Company

WEBCAST - Check out this video and see if you can recognize each of the types of vulnerabilities inflicted on these mobile users.
Posted: April 8, 2014 | Premiered: April 8, 2014

Get This Now
Topics:  Application Security | Data Security | Mobile Workers | Network Security | Risk Management | Security | Security Management | Security Managers | Security Threats | Vulnerability Management

sponsored by Hewlett-Packard Company

ANALYST REPORT - This SANS report features an automated application security testing solution that identifies known vulnerabilities across multiple sources to keep your networks fully protected.
Posted: April 7, 2014 | Published: September 30, 2013

Get This Now
Topics:  Application Development | Application Life-Cycle Management | Application Security | Risk Management | Security | Security Best Practices | Security Management | Security Managers | Security Systems | Security Threats | Software Development Life-Cycles | Vulnerability Management

sponsored by Hewlett-Packard Company

WEBCAST - Watch this informative webcast to discover how you can lower the risk of adopting more complex IT innovations, such as cloud and virtualization, so your organization can reap the benefits of such technologies without sacrificing security.
Posted: April 7, 2014 | Premiered: April 2, 2014

Get This Now
Topics:  Cloud Computing | Cloud Security | Data Center Design | Data Center Infrastructure Efficiency | Data Center Management | Data Centers | IT Infrastructure | IT Management | Server Virtualization

sponsored by Hewlett-Packard Company

WHITE PAPER - This SANS report pinpoints where the vulnerability gaps lie in today's application security programs. Click through for key recommendations on how to address these issues.
Posted: April 4, 2014 | Published: February 28, 2014

Get This Now
Topics:  Application Security | Security | Security Best Practices | Security Management | Security Managers | Security Threats | Software | Software Viruses | Training | Vulnerability Management

sponsored by Hewlett-Packard Company

WHITE PAPER - In this resource, unveil the major vulnerabilities created when mobile application developers speed through to meet deadlines instead of integrating top security measures.
Posted: April 4, 2014 | Published: February 28, 2014

Get This Now
Topics:  Application Security | Data Security | Mobile Workers | Risk Management | Security | Security Best Practices | Security Management | Security Managers | Security Threats | Smart Phones | Software Development Methodologies | Software Engineers | Vulnerability Management

sponsored by Hewlett-Packard Company

WHITE PAPER - Access this brief white paper to learn the biggest mobile application security shortfalls. Click now to uncover 3 steps to take to help you boost your defenses.
Posted: April 4, 2014 | Published: April 4, 2014

Get This Now
Topics:  Application Security | Mobile Workers | Risk Management | Security | Security Best Practices | Security Management | Security Managers | Security Threats | Smart Phones

sponsored by Hewlett-Packard Company

WHITE PAPER - There are a lot of moving parts in the application development process, which can make collaboration between your delivery teams difficult. Learn how ALM on the HP NZ Cloud can help.
Posted: April 2, 2014 | Published: April 2, 2014

Get This Now
Topics:  Application Development | Application Development and Integration Services | Application Infrastructure | Applications Management | Cloud Computing

sponsored by Hewlett-Packard Company

WHITE PAPER - Read this resource to reveal 3 critical steps to take when building a complete and secure mobile strategy.
Posted: March 25, 2014 | Published: March 13, 2014

Get This Now
Topics:  Data Security | Mobile Device Management | Mobile Workers | Network Security | Smart Phones

sponsored by Hewlett-Packard Company

WHITE PAPER - Access this resource to unveil 10 industry recommendations on how to capitalize on Asia's tech-savvy population and implement enterprise mobility into the workplace.
Posted: March 25, 2014 | Published: February 18, 2014

Get This Now
Topics:  Cloud Computing | Data Security | Endpoint Security | Mobile CRM | Mobile Device Management | Mobile Workers | Network Management | Security | Security Management | Security Managers

sponsored by Hewlett-Packard Company

WEBCAST - This webcast highlights the upgraded applications solution that Vodafone's German retail stores chose to help better manage purchase processes, inventory, and service contracts so that employees could spend more time better servicing customers.
Posted: March 25, 2014 | Premiered: March 25, 2014

Get This Now
Topics:  Application Integration | Applications Management | Business Process Management | Business Processes | Contract Management | CRM | Customer Service | Inventory Management | Purchase Order Management | Retail Channels

sponsored by Hewlett-Packard Company

WHITE PAPER - This informative resource dives deep into 3 articles revolving around the protection of mid-sized business from today's security threats.
Posted: March 18, 2014 | Published: March 18, 2014

Get This Now
Topics:  Compliance Best Practices | Hackers | Security | Security Architectures | Security Best Practices | Security Infrastructure | Security Management | Security Policies | Security Threats | Vulnerability Management

sponsored by Hewlett-Packard Company

WHITE PAPER - Data collection plays a huge role in today's security landscape, and this guide explores 10 ways that you can achieve effective security by utilizing big data analytics.
Posted: March 17, 2014 | Published: January 31, 2014

Get This Now
Topics:  Data Analytics | Data Security | Security | Security Best Practices | Security Event Management | Security Management | Security Systems | Security Threats | Vulnerability Management

sponsored by Hewlett-Packard Company

WHITE PAPER - As cybercriminals are carrying out sophisticated, enterprise-grade attacks on midsize businesses, ensuring system security within those smaller firms is more important than ever. This brief whitepaper explores the flaws in many midmarket organizations' IT security and why they are being targeted.
Posted: March 17, 2014 | Published: March 17, 2014

Get This Now
Topics:  Risk Management | Security | Security Best Practices | Security Event Management | Security Management | Security Systems | Security Threats | Vulnerability Management

1 - 15 of 603 Matches
Page: 2 3 4 5 6 7 8 9 10 11 


Partner with Us
Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other
What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics |
Business Intelligence Network Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com