Magazine Button

Whitepapers

The latest Whitepapers can be found below, if you are looking for something specific, please select the company from the drop down menu below to view their Whitepapers.

Dell Technologies

Advancing Fraud Detection Capabilities at Self-Checkout and Throughout the Retail Store

NEW

Advancing Fraud Detection Capabilities at Self-Checkout and Throughout the Retail Store

Advance your retail data strategy

NEW

Advance your retail data strategy

Modern Work From Home Delivers Higher Productivity and Happier Workers

NEW

Modern Work From Home Delivers Higher Productivity and Happier Workers

Optimize Your Hybrid Workforce With Flexible Work-From-Home Policies And Monitors

NEW

Optimize Your Hybrid Workforce With Flexible Work-From-Home Policies And Monitors

The Future of Work: Accelerating Innovation with Monitors to Drive Business Outcomes

NEW

The Future of Work: Accelerating Innovation with Monitors to Drive Business Outcomes

Transform Your Workforce: Building Blocks to a Unified Workspace

NEW

Transform Your Workforce: Building Blocks to a Unified Workspace

Disguise

Now is the time for xR

NEW

Now is the time for xR

Forcepoint

Which SASE Architecture is Right for You?

NEW

Which SASE Architecture is Right for You?

Quantifying the Benefits of SASE: ESG Research Insights Report

NEW

Quantifying the Benefits of SASE: ESG Research Insights Report

White Paper: Your Executive’s Guide to SASE Success

NEW

White Paper: Your Executive’s Guide to SASE Success

Risk-Adaptive Data Protection: The Behavior-Based Approach

NEW

Risk-Adaptive Data Protection: The Behavior-Based Approach

Enterprise Data Protection Solutions, Explained

NEW

Enterprise Data Protection Solutions, Explained

The Practical Executive’s Guide To Data Loss Prevention

NEW

The Practical Executive’s Guide To Data Loss Prevention

The Rise of the Hybrid Workforce Security—Bringing Security to Users, No Matter Where They Are

NEW

The Rise of the Hybrid Workforce Security—Bringing Security to Users, No Matter Where They Are

Risk-Adaptive Data Protection: Stop Breaches Enable Productivity

NEW

Risk-Adaptive Data Protection: Stop Breaches Enable Productivity

Market Guide for Data Loss Prevention

NEW

Market Guide for Data Loss Prevention

2021 Gartner Strategic Roadmap for SASE Convergence

NEW

2021 Gartner Strategic Roadmap for SASE Convergence

Illumio

Achieve Consistent Visibility Across Your On-Premises and Cloud Environments With Illumio

NEW

Achieve Consistent Visibility Across Your On-Premises and Cloud Environments With Illumio

Curb Malware Spread with Comprehensive Visibility and Allow-List Policy Control

NEW

Curb Malware Spread with Comprehensive Visibility and Allow-List Policy Control

Hi-Temp Insulation Launches Illumio’s Micro-Segmentation Security in Just 30 Minutes

NEW

Hi-Temp Insulation Launches Illumio’s Micro-Segmentation Security in Just 30 Minutes

5 Things You Might Not Know About Cloud Security

NEW

5 Things You Might Not Know About Cloud Security

Gartner® Hype Cycle™ for Cloud Security, 2021

NEW

Gartner® Hype Cycle™ for Cloud Security, 2021

Illumio CloudSecure: Cloud-Native Security Simplified

NEW

Illumio CloudSecure: Cloud-Native Security Simplified

How to Build a Micro-segmentation Strategy

NEW

How to Build a Micro-segmentation Strategy

Segmentation That Isn’t Hard

NEW

Segmentation That Isn’t Hard

Achieving Zero Trust with Illumio

NEW

Achieving Zero Trust with Illumio

Leading Mortgage Financier Secures Move to the Cloud With Illumio

NEW

Leading Mortgage Financier Secures Move to the Cloud With Illumio

Forrester Report: A Practical Guide To A Zero Trust Implementation

NEW

Forrester Report: A Practical Guide To A Zero Trust Implementation

How to Stop Ransomware Attacks

NEW

How to Stop Ransomware Attacks

6 Steps to Implementing a Zero Trust Model

NEW

6 Steps to Implementing a Zero Trust Model

Ivanti

The Perimeter’s Gone. Can Your Security Handle It?

NEW

The Perimeter’s Gone. Can Your Security Handle It?

Simplifying CDM and FISMA reporting requirements with Ivanti

NEW

Simplifying CDM and FISMA reporting requirements with Ivanti

The Ultimate Guide to BYOD

NEW

The Ultimate Guide to BYOD

Liferay

How Manufacturers can Enhance Customer Experience Through Data and Insights

NEW

How Manufacturers can Enhance Customer Experience Through Data and Insights

3 B2B KPIs That Will Make or Break Your Growth

NEW

3 B2B KPIs That Will Make or Break Your Growth

Why Self-Service is Essential for Customer Web Portals

NEW

Why Self-Service is Essential for Customer Web Portals

Plume

The Advantages of OpenSync Over EasyMesh

NEW

The Advantages of OpenSync Over EasyMesh

Innovating to Adapt to 
a Post-Pandemic World

NEW

Innovating to Adapt to 
a Post-Pandemic World

RedHat

Automate your infrastructure workflow

NEW

Automate your infrastructure workflow

A1 Bulgaria updates digital service strategy with Red Hat OpenShift

NEW

A1 Bulgaria updates digital service strategy with Red Hat OpenShift

A balanced diet of Public and Private Cloud

NEW

A balanced diet of Public and Private Cloud

How to Build and Operate at the Edge

NEW

How to Build and Operate at the Edge

Hybrid Cloud Strategy for Dummies

NEW

Hybrid Cloud Strategy for Dummies

Kubernetes 101

NEW

Kubernetes 101

Kubernetes Patterns: Reusable Elements for Designing Cloud-Native Applications

NEW

Kubernetes Patterns: Reusable Elements for Designing Cloud-Native Applications

Open transformation in telecommunications

NEW

Open transformation in telecommunications

Imagine a world where your OSS/BSS supports business expansion

NEW

Imagine a world where your OSS/BSS supports business expansion

The Journey to Virtualized RAN: Insights 2021

NEW

The Journey to Virtualized RAN: Insights 2021

The Telco Ecosystem Evolution

NEW

The Telco Ecosystem Evolution

Tenable

Critical Infrastructure Cyber Security Whitepaper

NEW

Critical Infrastructure Cyber Security Whitepaper

Prediction of an OT Attack

NEW

Prediction of an OT Attack

SANS Guide

NEW

SANS Guide

Accidental Convergence – A Guide To Secured IT/OT Operations

NEW

Accidental Convergence – A Guide To Secured IT/OT Operations

Datasheet – MITRE ATT&CK for ICS

NEW

Datasheet – MITRE ATT&CK for ICS

NSA CSA Brief

NEW

NSA CSA Brief

Mind the Gap: A Roadmap to IT/OT Alignment

NEW

Mind the Gap: A Roadmap to IT/OT Alignment

The ICS Cybersecurity Considerations Checklist

NEW

The ICS Cybersecurity Considerations Checklist

Browse our latest issue

Intelligent CIO North America

View Magazine Archive