Vertical Industries  >   Market Segments  >  

Medium-Sized Businesses

RSS Feed    Add to Google    Add to My Yahoo!
Medium-Sized BusinessesWhite Papers (View All Report Types)
 
Small and Midsize Business guide to Mobile Security
sponsored by SearchSecurity.com
WHITE PAPER: In this mobile security FAQ for small to midsize businesses, hear the answers to all of your pressing questions about the mobile threat landscape and what you can do to protect your mobile workforce. Discover how vulnerable SMBs are to mobile threats, tips for evaluating your solution options, and more.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

SearchSecurity.com

Manufacturing and Supply Chain Success: Tools for SMBs
sponsored by SYSPRO
WHITE PAPER: This resource introduces a family of products designed to meet the unique needs of small and medium-sized businesses (SMBs) in the manufacturing and supply chain industries.
Posted: 10 Apr 2014 | Published: 31 Dec 2013

SYSPRO

Symantec 2011 SMB Disaster Preparedness Survey
sponsored by Symantec Corporation
WHITE PAPER: This white paper features the results of Symantec's second SMB disaster preparedness survey, and provides recommendations to help your organization establish and maintain a successful disaster recovery strategy.
Posted: 22 Nov 2011 | Published: 22 Nov 2011

Symantec Corporation

Top 6 "Must-Have" Technologies for Small and Midsize Manufacturers
sponsored by Epicor Software Corporation
WHITE PAPER: This valuable resource counts down six critical manufacturing technologies that every small and midsize organization should have.
Posted: 14 Mar 2014 | Published: 30 Jun 2013

Epicor Software Corporation

What’s New with IP Office 8.1
sponsored by Avaya
WHITE PAPER: This brief guide details the new features and improvements of the communications system IP Office 8.1, explaining how this tool can help you support increased scalability, integrated video collaboration, increased mobility, and more.
Posted: 18 Jun 2013 | Published: 31 Dec 2012

Avaya

How much security does your SMB need?
sponsored by IBM
WHITE PAPER: This resource is an essential guide for SMBs looking to make the right investments in security to ensure optimum protection.
Posted: 14 Feb 2014 | Published: 14 Feb 2014

IBM

Drive growth and value with proven BPM solutions from IBM
sponsored by IBM
WHITE PAPER: Read this white paper to learn how to ensure a successful BPM initiative within your midsized organization.
Posted: 03 Nov 2011 | Published: 03 Nov 2011

IBM

IT Security. Fighting the Silent Threat
sponsored by Kaspersky Lab
WHITE PAPER: Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Kaspersky Lab

ESG: Nexsan’s Flexible Storage System
sponsored by Nexsan
WHITE PAPER: Although it’s a commonly used term, "midmarket" has no standard definition; however, it can usefully be given some specific context and parameters if looked at from the perspective of some common attributes that exist within and across its three sub-tiers: the bottom, middle, and top.
Posted: 22 Sep 2011 | Published: 22 Sep 2011

Nexsan

Midrange Unified Storage Array Buyer's Guide
sponsored by NetApp
WHITE PAPER: This buyer's guide equips you in two key ways – helping you evaluate midrange unified storage arrays – and providing a set of scores and rankings across the multiple features on each product as well as data sheet for each midrange unified storage array.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

NetApp
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement