Latest items posted in White Papers Library
Application Whitelisting is one of the latest tools offered to enhance your "Defense in Depth" security strategy. With increasing numbers of attempted intrusions, cautionary tales of security breaches and the potential for resulting damages at your site, Application Whitelisting can be an important addition to your security arsenal.
Middle East:
Tuesday, January 29 - 2013 at 12:45
The following whitepaper developed by Honeywell Process Solution discusses how industrial organizations can operate effectively in an increasingly complex and distributed environment with multiple production facilities operation processes.
Middle East:
Tuesday, January 29 - 2013 at 11:16
SAP and Honeywell have defined a vision for Collaborative Performance Management to leverage rich sources of information, provide tools to gain improved insights, and support action to drive value. Customers and industry analysts play a significant role in shaping this vision. Analysts paint a picture of the practices that best-in-class companies employ and describe the nirvana of Collaborative Performance Management, Enterprise Reliability, etc.
Middle East:
Wednesday, November 21 - 2012 at 12:21
This white paper provides an open and frank perspective of Huawei's viewpoints regarding cyber security and the overall ramifications and impact it has on technology, society and our daily life. Within the piece Huawei provides an overview of the current state of cyber security in terms of historical context, the players, and the unique challenges that the ever-expanding global supply chain poses for all of us.
Middle East:
Wednesday, November 14 - 2012 at 12:58
Networks are evolving constantly. The number of subscribers is increasing and new services reqire more network capacity. Higher capacity demands are tackled with network re-segmentation and node splitting, which in practice leads to laborious and costly on-site re-adjustment of network devices. Not only will it result in increased risk for human errros and network unreliability, but also higher operating costs.
Middle East:
Tuesday, November 13 - 2012 at 15:10
The Teleste White paper looks at Data over Coax - quality service at lower costs. With the growing popularity of OTT video services and high definition video formats, broadband users will need significantly higher bandwidth in the future.
Middle East:
Monday, November 12 - 2012 at 15:05
Recognizing that securing your critical infrastructure is an evolving process is a key element in the development of a logical programme that will ensure safety, security and effectiveness. There are four logical phases in this process, with defined actions that can be measured and coordinated. Understanding the risks and how to address them is the first step in customizing the phases to meet your particular requirements. In this white paper, we'll discuss the four phases—assess, remediate, manage, and assure—and give examples of how this approach can ensure the security of your critical infrastructure.
Middle East:
Tuesday, October 09 - 2012 at 11:05
In a competitive global marketplace, there is a need for businesses to ensure continual improvement. Manufacturing companies are under growing pressure to boost quality, increase productivity, and reduce costs with limited resources. Service organizations must shorten response time, eliminate errors, and ensure customer satisfaction.
Middle East:
Monday, October 08 - 2012 at 15:39