Secure eCommerce White Papers

(View All Report Types)
Broadcast Delivery of Multimedia Content to Mobile Users
sponsored by QUALCOMM Incorporated
WHITE PAPER: Discover how a broadcast delivery can help you overcome the issues with the currently used HTTP delivery method. Avoid bottlenecks and improve user-experience, all in a cost-effective manner.
Posted: 27 Feb 2012 | Published: 24 Feb 2012

QUALCOMM Incorporated

Global Threat Research Report: Russia
sponsored by VeriSign, Inc
WHITE PAPER: This report takes an in-depth look at the security threat the Russian Business Network (RBN) is to North American-based enterprise businesses. Learn more about their current infrastructure, its corruption, and the impact the RBN has on business today.
Posted: 16 Nov 2007 | Published: 10 Jan 2007

VeriSign, Inc

 The Social Business - Advent of a new age
sponsored by IBM
WHITE PAPER: This white paper discusses the ins and outs of social businesses, uncovering what it means, the value it brings, and what you should expect for the future.
Posted: 23 Jun 2011 | Published: 22 Jun 2011

IBM

Software Compliance Management: Automating License Compliance in the New, Mixed-IP Development World
sponsored by Black Duck Software
WHITE PAPER: Software compliance management systems help ensure enterprises achieve the business acceleration they want from software reuse, while meeting the stringent requirements of shareholders, regulators and customers for proper management of company.
Posted: 13 Oct 2008 | Published: 01 Jul 2008

Black Duck Software

IBM Business Process Manager -- Powerfully Simple
sponsored by IBM
WHITE PAPER: IBM Business Process Manager provides the simplicity, efficiency, visibility and collaboration needed to manage highly dynamic and networked business environments. IBM Business Process Manager is easy to deploy and use straight out of the box or in an easily customizable configuration - providing rapid time to value and improved user productivity.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

IBM

Data Monetization Strategies: Make and Save Money With Data and Analytics
sponsored by Information Builders
WHITE PAPER: Are you sitting on your data with no plan? Do you know how to capitalize on information you already have? This whitepaper dives into the world of profiting from data. Access now to discover 4 essential steps to getting started, as well as challenges to overcome and a discussion on the importance of data integrity.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Information Builders

Lower business risk and increase IT productivity with a managed file transfer solution for SOA
sponsored by IBM
WHITE PAPER: This IBM white paper provides an introduction to the managed file transfer topic and IBM WebSphere MQ File Transfer Edition. WebSphere MQ File Transfer Edition is designed to address the needs of organizations that rely on the transfer of files as well as organizations that want more control, manageability and auditability.
Posted: 30 Sep 2010 | Published: 30 Sep 2010

IBM

IT Transformation Consulting Services: Align your technology direction
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This brief resource introduces an IT transformation consulting service as a means of achieving effective, value-driven change. Read on now to learn how you can ensure business and IT alignment, spur business growth, and more.
Posted: 09 Oct 2013 | Published: 31 May 2012

Hewlett Packard Enterprise

The Trouble Heading for Your Business 2013
sponsored by Trend Micro
WHITE PAPER: This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.
Posted: 16 Apr 2013 | Published: 28 Feb 2013

Trend Micro

What's Behind a Cyber Attack?
sponsored by IBM
WHITE PAPER: This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

IBM