PatriotGrid White Papers

(View All Report Types)
Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER: Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Infographic: Bridging the Gap Between Business and IT
sponsored by IBM
WHITE PAPER: This infographic illustrates the necessity of integration between business and IT, as well as the fundamental disagreements that exist between the two groups.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

IBM

Using enterprise architecture to develop a blueprint for improving your energy efficiency and reducing your carbon footprint
sponsored by IBM
WHITE PAPER: This whitepaper is about enterprise architecture as it pertains to finding and maximizing the business value in greener operations. Higher energy efficiency and a smaller carbon footprint are obvious areas of interest for any business, but how do you balance these goals with productivity, customer service, and all your other business concerns?
Posted: 09 Apr 2009 | Published: 31 Dec 2008

IBM

Advancing Healthcare through the Application of Predictive Knowledge Management
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper examines how the health care industry can proactively support patient-focused care through the use of technology services that enable predictive analysis.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

IBM Business Process Manager -- Powerfully Simple
sponsored by IBM
WHITE PAPER: IBM Business Process Manager provides the simplicity, efficiency, visibility and collaboration needed to manage highly dynamic and networked business environments. IBM Business Process Manager is easy to deploy and use straight out of the box or in an easily customizable configuration - providing rapid time to value and improved user productivity.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

IBM

Expanding Active Decision-Making: The Power of Integrating Business Rules and Events
sponsored by Red Hat and JBoss
WHITE PAPER: This white paper demonstrates how using JBoss Enterprise BRMS, business analysts, developers, and integrators can create and manage rules and events in a single product using a shared set of authoring tools.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

Red Hat and JBoss

Using Case Management to Empower Employees and transform Customer Service
sponsored by Kofax, Inc.
WHITE PAPER: This white paper demonstrates how empowering your employees can lead to significantly improved customer service. Learn how dynamic case management applications can assist in delivering employee empowerment and transform the customer experience.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Kofax, Inc.

Transforming Healthcare Delivery with Analytics
sponsored by IBM
WHITE PAPER: In this white paper, learn how data mining and statistical analysis can dramatically improve patient care and satisfaction without stretching your budget.
Posted: 13 Aug 2012 | Published: 13 Aug 2012

IBM

The Social Enterprise: Using Social Enterprise Applications to Enable the Next Wave of Knowledge Worker Productivity
sponsored by Oracle Corporation
WHITE PAPER: Enterprise social applications are the next generation of collaboration and productivity tools, capturing the interpersonal knowledge of workers and the implicit connections among people, systems, and data.
Posted: 16 Oct 2008 | Published: 16 Oct 2008

Oracle Corporation

Global Security Report 2011
sponsored by Trustwave
WHITE PAPER: In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.
Posted: 27 Jan 2011 | Published: 26 Jan 2011

Trustwave