Whitepapers


Sort by: Date | Company | Title


10 Best Practices: Controlling Smartphone Access to Corporate Networks
By SonicWall | 11/2/2011

A universal, platform-agnostic approach to security best practices, which treats all smartphones as uncontrolled endpoints.

Download this now


10 Cooling Solutions to Support High-density Server Deployment
By APC by Schneider Electric | 16/11/2010

This paper provides 10 approaches for increasing cooling eficiency, cooling capacity, and power density in existing data centres.

Download this now


10 essential elements for a secure enterprise mobility strategy
By Citrix Systems Asia Pacific | 25/3/2014

Best practices for protecting sensitive business information while making people productive from anywhere.

Download this now


10 Essential Steps to Email Security
By Clearswift Asia Pacific | 3/11/2011

Modern business is reliant on email. All organisations using email need to answer the following questions: How do we control spam volumes without the risk of trapping a business email? How do we prevent infections from email-borne viruses? How do we stop leakage of confidential information? Can we detect and stop exploitation from phishing attacks? How do we control brand damage from occurring due to employee misuse? How do we prevent inappropriate content from being circulated?

Download this now


10 Essential Steps to Email Security
By Clearswift Asia Pacific | 2/8/2013

The web is a highly interactive, sophisticated and increasingly mission-critical platform. As online collaboration has matured and become more and more integral to many people’s lives, companies are increasingly using such technologies to connect more effectively with their customers, suppliers and partners. This short guide outlines 10 simple steps to best practice in web security. Find out how to stay in-front of your competitors. Click to Download!

Download this now


10 Essential Steps to Web Security
By Clearswift Asia Pacific | 3/11/2011

This short guide outlines 10 simple steps to best practice in web security. Follow them all to step up your organisation’s information security and stay ahead of your competitors. But remember that the target never stands still. Focus on the principles behind the steps – policy, vigilance, simplification, automation and transparency – to keep your information security bang up to date.

Download this now


10 Essential Steps to Web Security
By Clearswift Asia Pacific | 2/8/2013

The web is a highly interactive, sophisticated and increasingly mission-critical platform. As online collaboration has matured and become more and more integral to many people’s lives, companies are increasingly using such technologies to connect more effectively with their customers, suppliers and partners. This short guide outlines 10 simple steps to best practice in web security. Find out how to stay in-front of your competitors

Download this now


10 Mobile Security Requirements for the Bring Your Own Device (BYOD) Enterprise
By Accellion | 3/4/2012

An enterprise mobility strategy needs to include more than the provisioning and security services available through mobile application and MDM solutions. To meet the mobility and security requirements of mobile users, enterprises need to look at deploying a solution for mobile content management (MCM) that supports BYOD policies. Read this whitepaper to learn: Why provisioning for mobile users has become more complex; Ten requirements to consider when selecting a mobile content security solution.

Download this now


10 Things Your Next Firewall Must Do
By Palo Alto Networks | 24/1/2012

While the next-generation firewall (NGFW) is well defined by Gartner as something new, enterprisefocused, and distinct, many network security vendors are claiming NGFW is a subset of other functions (e.g. UTM or IPS). Most traditional network security vendors are attempting to provide application visibility and control by using a limited number of application signatures supported in their IPS or other external database. But underneath, these capabilities are poorly integrated and their products are still based on legacy port-blocking technology, not NGFW technology. Read on.

Download this now


10 Tips for Better Project Estimates
By Planview | 28/8/2013

A key success factor for projects is accurate estimation. However, poor estimation ability remains one of the most cited problems that organizations face today. Poor estimation is the leading cause of project delays; continued crisis mode operation; resources being shifted haphazardly; and other common business risks. In this whitepaper, find out the top 10 tips for better project estimations!

Download this now

Most Popular Reviews

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Latest News Articles

Resources

PCW Evaluation Team

Cate Bacon

Aruba Instant On AP11D

The strength of the Aruba Instant On AP11D is that the design and feature set support the modern, flexible, and mobile way of working.

Dr Prabigya Shiwakoti

Aruba Instant On AP11D

Aruba backs the AP11D up with a two-year warranty and 24/7 phone support.

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers

MSI P65

This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang

MSI GT76

It really doesn’t get more “gaming laptop” than this.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?