Dell Software – White Papers and Blog Posts

The Dell Software portfolio security products for Windows infrastructure. As part of its lead-generation effort, Dell Software engaged venTAJA to write white papers and blog posts on Shellshock, insider threats and other security topics.

Shellshock and Future Vulnerabilities – Buying Precious Time • Managing the Insider Threat with Active Directory Security – Blog Post

When Salesforce Identity was rated an overall leader in the Consumer Identity and Access Management (CIAM) by KuppingerCole, Salesforce engaged venTAJA to work on a blog post that announced the news and concisely explained the difference between IAM and CIAM.

Salesforce Rated Overall Leader in Consumer Identity and Access Management (CIAM) by KuppingerCole

AimPoint Group — Blog Posts and Articles

AimPoint Group is an agency providing content marketing for cybersecurity companies. The agency engaged venTAJA to work on security-focused blog posts and articles for its clients on topics ranging from penetration testing to zero trust. Beginner’s Guide to Compliance-Driven PentestingNAGRA Kudelski: NexGuard Forensic WatermarkingRecorded Future: Third-Party Risk ManagementSource Defense: Detect-and-Alert in Client-Side Web Attacks

SonicWALL — White Paper and Admin Guide

For its next-generation firewall, SonicWALL engaged venTAJA to write a white paper on insider threats and an administrator guide on deploying, securing and maintaining wireless access points.

The Distributed Enterprise — Building a Coordinated Security Perimeter • Best Practices for Wireless Networks

Tarari – Technology Overview

With IBM, Tarari developed an appliance for its Encoder Accelerator card and IBM’s blade servers and workstations to perform high-speed XML security and deep packet inspection. Tarari then engaged venTAJA to synthesize multiple information sources into a technical overview of the offering, including problems solved, component descriptions and benefits to the user.

XML Security in a Box

Tarari – Product Briefs and Datasheets

Tarari’s marketing team prided itself on rapidly delivering product information for use by account managers, journalists, Web marketing and analysts. The team relied on venTAJA’s ability to translate technical advantages into user benefits and entrusted venTAJA with writing the content for a series of product briefs and datasheets on several lines of acceleration products.

XTM Product Brief Publish/Subscribe Product Brief

Dell Software Group – Email and Landing Pages

Dell Software promotes all of its content marketing assets – webcasts, case studies, white papers, eBooks – through email messages linked to landing pages. The company engaged venTAJA to write email and landing pages for several of its enterprise software products.

Email and Landing Page Suite for White Paper and Webcast

NetMotion Wireless – Partner Solution Brief

In ramping up its partner program, NetMotion Wireless created a series of solution briefs around its enterprise mobility management (EMM) offering. The company engaged venTAJA to write a connectivity-security solution brief aimed at compliance with the Criminal Justice Information System (CJIS) Security Policy.

Connectivity-Security Solution Brief

Tarari – White Papers

Tarari applied its acceleration technology to security at the enterprise network gateway, where it could offload deep packet inspection of large files from the CPU to specialized hardware. Through partnerships with vendors of intrusion prevention, anti-spam and anti-virus products, Tarari marketed an accelerated unified threat management (UTM) platform, and engaged venTAJA for a business-benefit white paper on the product, as well as a technical benefits white paper on the use of XML in the intelligent network.

“Accelerating Unified Threat Management” • “Mainstream Networking Embraces XML”

ForgeRock – White Paper, Blog Posts and Case Study

ForgeRock took its identity access management (IAM) technology into several prominent vertical markets. The company engaged venTAJA to turn a white paper on access management in 5G into a series of blog posts and for IAM-related technology marketing content.

The 5G Trust Equation: Network + Identity = OpportunityHow to Secure User Login With Access ManagementMaking Municipal Services Available Securely in British Columbia