Enterprise Whitepapers


Sort by: Date | Company | Title


Securing remote vendor access with privileged account security
By CyberArk | 26/8/2015
Remote, external users accessing your network from third-party organisations introduce a risk that can be mitigated. This whitepaper looks at how organisations can minimise the risk of unauthorised users exploiting accounts by implementing a control strategy that still enables businesses to partner effectively with outside parties while maintaining the same security standards across the entire organisation.
Download this now


Scan your network with CyberArk
By CyberArk | 26/8/2015
Privileged accounts are the pathway to a company’s most valuable data and are therefore compromised in the majority of advanced and internal attacks. Find out how you can use CyberArk to scan your network and discover where privileged accounts exist, assess security risks, identify and collect reliable and comprehensive information.
Download this now


Privileged account security solution
By CyberArk | 26/8/2015
Best practices dictate that privileged accounts should be incorporated into an organisation’s core security strategy. Privileged accounts are a security problem and need singular controls put in place to protect, monitor, detect and respond to all privileged account activity. This whitepaper looks at which security solution can protect you the best.
Download this now


Global financial services firm overcomes operational complexity
By CyberArk | 26/8/2015
This case study looks at how one of the oldest global financial services firms in the US overcame operational complexity by adopting a privileged identity management solution. They were able to drive down costs to lines of business through better use of automation and centralisation of databases.
Download this now


Case study: BT depends on CyberArk to secure and monitor privileged accounts
By CyberArk | 26/8/2015
This case study looks at how BT, one of the world’s leading communications services companies, implemented CyberArk to manage privileged accounts - going from a fragmented, un-scalable mix of solutions to one, streamlined solution that met all their goals in the short and long term.
Download this now


7 Things to consider when evaluating privileged account security solutions
By CyberArk | 26/8/2015
You’re convinced that protecting privileged accounts is paramount in your security strategy, But how do you go about selecting the right solutions from the right provider? You need a guide to know what to expect, and what to look for as you evaluate potential privileged account security solutions. To help you make informed decisions, this guide will give you the seven questions to ask every potential vendor.
Download this now


Global growing pains: tapping into B2B Integration Services to overcome global expansion challenges
By OpenText | 11/8/2015
Although the barriers to international expansion have been lowered by advancing and increasingly pervasive technologies, many challenges still remain just beneath the surface. This whitepaper looks at the growing pains that many companies face when expanding internationally and how to overcome the challenges with a partnered B2B Integration Service.
Download this now


Finding your way around B2B Integration: a field guide
By OpenText | 10/8/2015
While data flows at the speed of light within the four walls of a corporation, the information flowing between the firewalls of business partners often moves at a snail’s pace. This guide looks at the fours steps to B2B integration and explains the how you can utilise B2B integration to speed interactions and increase efficiency in plain english.
Download this now


Sharpening your competitive edge with B2B Managed Services
By OpenText | 10/8/2015
The ability to maintain a competitive edge in today’s marketplace is often driven by a company’s ability to match IT capabilities with its business strategy and processes. The potential benefits of B2B e-commerce solutions to increase the speed, accuracy, and flexibility of operations and improve visibility in the supply chain are well known, but many companies struggle to achieve them. This white paper shows how B2B managed services can improve the capabilities of your business and helps you ask the right questions and understand the answers when choosing a services provider.
Download this now


IDC: Critical need for edge data protection
By CommVault | 24/6/2015
Many firms are acutely aware of the costs and risks associated with lost or unrecoverable data on employee devices, including desktops, laptops, and mobile devices and while mobility initiatives, including bring your own device (BYOD), are gaining popularity, IDC has discovered that many firms do not have adequate protection, recovery policies or tools in place to manage their ever-increasing volumes of data. Read why IDC believes the need to protect sensitive data residing on desktops, laptops, and mobile devices is more critical than ever and how CommVault Edge can meet end user demands by delivering a solution that is secure and allows users access to their data anywhere and at any time.
Download this now