CIO Decisions Ezine Volume 4: Disaster Recovery and Unified Communications
By: CIO Decisions View more from CIO Decisions >>
Download this next:
Managing the iPad in the Enterprise
By: TechTarget Security
Type: Essential Guide
Mobile strategies are becoming largely dictated by employees. The manageability, cost, and actual business benefits are being trumped by the employees pressuring their businesses to be allowed to work on consumer mobile devices, mainly for convenience.
Access this Tech Guide to learn more about BYOD, analyzing a business process and figuring out how mobile devices provide a competitive edge vital to your enterprise strategy. Articles include:
- In Building a Mobility Strategy, What the Employee Says Goes
- CIOs Looking for Ways to Say Yes to the iPad in the Enterprise
- Bringing BYOD to your Enterprise
These are also closely related to: "CIO Decisions Ezine Volume 4: Disaster Recovery and Unified Communications"
-
Jargon Buster Guide to Unified Communications
By: TechTarget ComputerWeekly.com
Type: eGuide
As an industry buzzword, unified communications (UC) had its day several years ago. The integration of multiple communication tools – such as voice, video, instant messaging and presence technology – in the service of collaboration within the business is something that virtually every enterprise is now doing.
Yet despite its mainstream status, the UC market continues to evolve as the digitisation of the enterprise gathers pace and new modes of doing business demand new modes of communicating and collaborating.
In this e-guide, we will explore and define some of the key elements of a UC deployment, and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives: Paul Clarke from UC provider 3CX argues that the technology is still far from ubiquity, particularly when it comes to mobile deployments within the enterprise, while Sandra Gittlen delves a little deeper into this topic, and we will also find out how to consolidate disparate UC deployments within the business.
Meanwhile, at Gitex 2017, the Middle East’s largest technology show, we met with Avaya, which is turning its focus back on its core UC business, and considering how UC can play a role in supporting projects that involve some more up-and-coming technologies, such as artificial intelligence, and even blockchain.
-
Communication and Collaboration in 2020: Inside UC’s Faster Future
By: TechTarget Security
Type: eGuide
Appliances such as smartphones and their advanced features – from keyboards to touch-screen – have revolutionized the world of collaboration and communication in a few short years. So what will it be like in the future?
In this E-Guide from SearchUnifiedCommunications.com, we take a trip to the year 2020 in an attempt to uncover how unified communications and collaboration (UCC) will evolve and what it will mean for your organization. View now to learn more!
Find more content like what you just read:
-
DR Planning: Top 10 tips
By: TechTarget Storage
Type: eGuide
This expert E-Guide explores the top ten DR tips from John Toigo to help navigate DR planning more efficiently and shows you how to justify your DR initiatives by analyzing critical DR data.
-
The growth of cloud-based networking: What to expect in 2022 and beyond
By: TechTarget ComputerWeekly.com
Type: eBook
By upgrading to advanced network infrastructure, firms can deliver mission-critical services through cloud providers and through their own cloud resources. These increased capacity need has seen deployment of optical networking and advanced network solution such as software-defined wide area network (SD-WAN). Read more in our exclusive e-guide.
-
Why automation is critical for midmarket success
By: Red Hat
Type: Research Content
Midmarket firms need to be nimble and far-sighted in navigating today’s fluid, complex world of IT-inclusive business strategy to compete effectively with market behemoths. Read on to learn why executives must balance both IT and business strategy as they aim to maximize revenue, contain cost, and develop the agility needed to stay competitive.
-
Expert Checklist: 11 Steps for Aligning Your BC/DR Program with Business Needs
By: TechTarget Storage
Type: eGuide
This e-guide provides an expert checklist for developing a successful business continuity program, designed with the specific needs of your organization in mind.
-
Expert Steps for Testing DR Effectiveness
By: TechTarget Storage
Type: eGuide
This E-Guide outlines three key phases of DR performance evaluation and provides two examples of how conducting a business impact analysis can minimize the effects of a disruption.
-
The 4 key phases of cyberthreat defense
By: ServiceNow
Type: ESG White Paper
See how to protect your entire enterprise by shifting from a tactical to a strategic approach in this white paper. Discover the 4 key phases of cyberthreat defense and how ServiceNow’s portfolio of SecOps and risk management tools is here to help.
-
Disaster recovery and business continuity: Essential guide
By: TechTarget ComputerWeekly.com
Type: eGuide
Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.
-
State of GenAI: Enterprise Strategy Group report
By: Enterprise Strategy Group
Type: ESG Research Report
As the generative AI (GenAI) market accelerates, your business, like every business, is pressured to keep up. To strengthen your understanding of the present state of GenAI – including challenge areas, use cases and budget strategies – review this report by TechTarget’s Enterprise Strategy Group (ESG).
-
Enterprise CIO Decisions: Managing the Mobile Workforce
By: TechTarget Security
Type: Ezine
Read this exclusive CIO Enterprise Decisions E-Zine for case studies and expert insight into some of the most prevalent mobile issues facing CIOs today.
-
E-Zine: Enterprise CIO Decisions: Running Lean in 2010
By: TechTarget CIO
Type: Ezine
Technology decision makers in the enterprise are under pressure to deliver results on tight budgets while streamlining efficiency, cutting costs, and reducing risk for their organizations. Read this E-Zine from Enterprise CIO Decisions to find out how ITSM, outsourcing and technology are combining to make IT a lean, mean fighting machine in 2010.
-
E-Guide: Selecting a SIM for midmarket business
By: TechTarget Security
Type: eGuide
This expert E-Guide discusses the evolvement of SIM tools, differences in deployment processes and top requirements you should consider before making a decision.
-
Lean ITSM Methods in Lean Times
By: TechTarget CIO
Type: eBook
As IT shops continue to look for ways to cut costs, increase efficiency and improve service, many turn to IT Service Management frameworks for guidance. Learn how to adopt or advance your use of ITSM practices to streamline IT and build an efficient, service-oriented organization.
-
CIO’s Definitive Guide to Achieving Secure Cloud Networking
By: CBTS
Type: eBook
CIOs and IT departments are rapidly turning to cloud networking in the face of increased technology demand to deliver improved flexibility, efficiency and security. Download this guide to learn about several cloud-based networking solutions – such as SD-WAN-as-a-Service and Network-as-a-Service – to help you set up your enterprise for the future.
-
3 pillars of a trusted data center
By: FCN
Type: White Paper
Tap into this white paper to unlock best practices for establishing a trusted data center and storage infrastructure.
-
Top 3 Drivers for Flexible UC Reference Architecture
By: TechTarget Security
Type: eGuide
This E-Guide from SearchUnifiedCommunications.com offers insight into creating a unified communications architecture that fulfills today's requirements and is flexible enough to adapt to the needs of tomorrow.
-
CW ASEAN: Connect your people
By: TechTarget ComputerWeekly.com
Type: Ezine
Unified collaboration (UC) is transforming the way business is done globally. In this issue of CW ASEAN, we take a closer look at how ASEAN enterprises are embracing UC tools, factors that organizations should consider when developing a UC strategy, and the emergence of startups that have been shaking up the marketplace.
-
MSSP landscape: The leaders, their capabilities & more
By: Trustwave
Type: Analyst Report
Review this “ISG Provider Lens Quadrant” report to compare the strengths, challenges and capabilities of 20 top MSSPs for midsize enterprises.
-
Cybersecurity vs. cyber resilience: what's the difference?
By: ServiceNow
Type: eGuide
Dive into this e-guide for a comprehensive look at cybersecurity, cyber resilience, and why your organization needs a good handle on both if it is to survive the modern threat landscape.
-
Information technology skills guide
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Author and IT consultant, Terry Critchley, looks at potential solutions to the apparent skills crisis facing the IT industry, in this special guide for Computer Weekly.
-
Multi cloud backup and recovery best practices
By: TechTarget ComputerWeekly.com
Type: eGuide
User concerns about data availability and safety continue to grow. And despite being in the early phases of the multi-cloud movement, experts have provided some good guidelines to users to help them implement this additional layer of protection. This guide details multi-cloud backup and recovery best practices, and presents potential pain points.
-
E-Book: Technical Guide on Web Application Firewalls
By: TechTarget Security
Type: eBook
Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
-
Buyers guide for budgeting and planning solutions
By: Wolters Kluwer
Type: Buyer's Guide
Use this buyer’s guide to understand what you should expect from a modern budgeting and planning solution and see what vendors you should consider. Access the buyer’s guide.
-
Buyer’s guide for financial consolidation, close, and reporting solutions
By: Wolters Kluwer
Type: Buyer's Guide
Financial consolidation, close and reporting solutions are a key component of performance management systems. This buyer’s guide is designed to help you better understand the current state of this rapidly evolving solution area and teach you what to look for in an offering. Access the buyer’s guide.
-
IT Definitions: Storage Special
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we have put together a list of key definitions in storage and data protection to help you make sense of the fast-evolving storage technology landscape. From software-defined storage to non-volatile memory express (NVMe), we hope this extensive list of definitions will help you succeed in an increasingly data-driven world.
-
Key considerations for mainframe modernization
By: Ensono Limited
Type: Analyst Report
Mainframes often support the most critical business functions, yet many companies still choose to carry outdated and limited legacy mainframes. Learn key considerations for mainframe modernization using data from this analyst report to reduce your complexity, risk and running cost of IT.
-
Disaster recovery has never been so easy or important
By: TechTarget ComputerWeekly.com
Type: eGuide
Disaster recovery has never been more important because at the same time that digital transformation has made most modern enterprises entirely dependent on their IT systems to function, cyber attackers have stepped up their capabilities to go after sensitive data wherever it is found, with most IT leaders reporting major systems outages.
-
Focus: Disaster recovery planning and virtualisation
By: TechTarget ComputerWeekly.com
Type: eGuide
We take a good look at how features and functionality built into popular virtualisation environments can help with disaster recovery planning, testing and execution.
-
ESG Showcase report: MDR for offensive & defensive security
By: CyberMaxx
Type: ESG Showcase
In the face of abounding security risks, many organizations are turning to managed detection and response (MDR) providers for help. To understand how MDR can support both offensive and defensive security, download this report by TechTarget’s Enterprise Strategy Group (ESG).
-
Large Enterprises: Consider Your MSSP Options
By: Trustwave
Type: Analyst Report
Take a look through this “ISG Provider Lens Quadrant” report to learn about 27 MSSPs that can support the needs of large enterprises.
-
Modern Infrastructure e-zine CIO edition: Managing the next-generation data center
By: TechTarget CIO
Type: Ezine
This special CIO edition of Modern Infrastructure e-zine demonstrates how today's data center technologies are fully intertwined with business strategies. Read now to uncover why CIOs should be considering cloud computing and data center transformation as a business issue first, and a technology issue second.
-
Desktop virtualization: Streamline deployment without extra costs
By: TechTarget Data Center
Type: eGuide
Access this expert e-guide to learn how to assess your IT infrastructure to ensure a fast and cost-effective desktop virtualization process.
-
Why you should have a disaster recovery testing plan in place
By: TechTarget ComputerWeekly.com
Type: eGuide
With this guide, gain a better understanding of why a disaster recovery testing plan is important, how to efficiently conduct tests, and some tools and terms that you will encounter along the way.
-
WebRTC Primer: How It's Being Used And Its Impact On The Network
By: TechTarget Security
Type: eGuide
This expert guide from SearchUnifiedCommunications.com explores what WebRTC is, how it's being used, its potential impact on the network, and standards under development. Read on to find out if this new technology is a fit for your organization.
-
What to think about when utilizing endpoint securities
By: TechTarget Security
Type: eGuide
There’s a lot to consider when establishing a proper endpoint security plan for your organization. And with so many tools available today, it is easy to forget the very basics of security. View this e-guide to help you refocus on the priorities and discover how to choose, keep or upgrade your endpoint security systems.
-
MicroScope - January 2020: SMEs and managed services
By: TechTarget ComputerWeekly.com
Type: Ezine
In this issue of MicroScope, we look at the channel opportunity in the SME customer base as they look for managed services support, our roundtable discussion looks at the transformative appeal of unified communications, and consider why software development houses are switching to no-code. Read the issue now.
-
DRaas and the key decision points in DR-as-a-service
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we look at the key decisions you'll need to make about the blend of DRaas your organisation wants, which of the key cloud providers are best for which elements of DR service delivery, the pros and cons of moving elements of disaster recovery to the cloud and which to keep closer to home, and the 12 key steps to DRaas deployment.
-
How cloud & SD-WAN are revolutionizing retail
By: CBTS
Type: eBook
Access this e-book to learn how the increased flexibility of Network-as-a-Service (NaaS), Unified-Communications-as-a-Service (UCaaS) and SD-WAN can all help retailers achieve maximum customer satisfaction.
-
How has COVID-19 affected your company?
By: TechTarget
Type: Resource
Have your storage priorities shifted as the year progresses during the COVID-19 pandemic? Let us know in our multiple-choice storage survey and you'll get access to 5 free guides on topics like the hybrid cloud, NVMe, multi-cloud management, and more.
-
Is proving short-term unified communications ROI really necessary?
By: TechTarget Security
Type: eGuide
This expert E-Guide takes a close look at the different ways ROI can be determined. Uncover how UC is being justified in organizations, how to take full advantage of its benefits and what you can expect from UC in the future.
-
MicroScope – September 2021: Stepping forward after Covid
By: MicroScope
Type: Ezine
In this issue, discover what the lasting impact of Covid-19 is likely to be as the channel emerges into a post-pandemic world. Also discover more about disaster recovery for SMEs and how best to make a plan to protect your business, and read about an uptick in cloud-based contact centre-as-a-service solutions
-
E-Brief: Capacity Planning for Virtualized Infrastructure
By: TechTarget Data Center
Type: EBRIEF
Explore current trends and tools for capacity planning in this e-brief. Discover how you can maximize server space and overcome top challenges of capacity planning to increase server utilization and ROI these tips from virtualization pro David Davis.
-
A Computer Weekly Buyer's Guide to Hyper Converged Infrastructure
By: TechTarget ComputerWeekly.com
Type: eBook
Hyper-convergence has become a buzzword for bringing together hardware and software for multiple tasks. In this 12-page buyer's guide, Computer Weekly looks at tips for buying hyper-convergedsystems, what the technologies can do for your organisation, and how the market is shaping up.
-
CW APAC, November 2021: Expert guide to storage management
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, Computer Weekly looks at how firms are rising to the storage challenge and Lenovo's viewpoint on the Asia-Pacific region's market opportunities
-
Case Study: UC Davis Health Network Upgrade
By: Panduit
Type: Case Study
As technology expands more into healthcare, the advances are coming faster than ever before. With patients having sensors and wearables, to surgical robots and even telehealth, technology is now a necessity. If organizations cannot keep up with the growing demands for connected building systems, they could risk failing. Read on to see why.
-
CW ANZ: Australian firms connect people in new ways
By: TechTarget ComputerWeekly.com
Type: Ezine
Australian organisations such as BPay are turning to unified communications (UC) to create workplaces where employees operate in a flexible and open work environment. In this issue of CW ANZ, we look at how companies are approaching UC, the state of the market and what organisations need to do to be successful in rolling out UC tools.
-
Computer Weekly – 14 March 2017: UK digital strategy lacks vision and ambition
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we examine the UK government's new digital economy strategy and hear why critics labelled it unambitious and lacking imagination. The recent AWS cloud outage puts the spotlight on cloud and disaster recovery. And we look at the next generation of storage technology. Read the issue now.
-
CIO Trends #8
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, take a look at some of our most popular articles on issues faced by IT decision makers, such as how to create a strategy that works for the business in a digital age and tips on how to take advantage of opportunities to lead your organization to unprecedented success.