Vertical Industries  >   Market Segments  >  

Mid-market Businesses

RSS Feed    Add to Google    Add to My Yahoo!
Mid-market Businesses White Papers (View All Report Types)
 
A Solution for Managing Privileged Access
sponsored by Devolutions
WHITE PAPER: For IT system admins to access remote servers and virtual machines, the amount of security that they have to go through is a time-eater. You need a privileged access management (PAM) tool. Read on to learn what problems PAM solves, how to implement it, real-world use cases, and more.
Posted: 06 Oct 2017 | Published: 06 Oct 2017

Devolutions

CW+: Quocirca report: Valuable business connections – a review for SMEs
sponsored by ComputerWeekly.com
WHITE PAPER: The average small business is becoming highly dependent on multiple forms of digital communications, but the technology choices are increasingly complex and come at a cost.
Posted: 21 Oct 2011 | Published: 25 Aug 2010

ComputerWeekly.com

PowerEdge VRTX – Simplicity, Efficiency and Versatility for ROBO and Small Office IT.
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Discover how Dell PowerEdge VRTX's space-saving design and rapid deployment capabilities can help remote offices/branch offices, or ROBOs, and small to midsized businesses streamline operations.
Posted: 15 Aug 2014 | Published: 11 Jul 2014

Dell, Inc. and Intel®

Building Your Backup and Disaster Recovery Plan 101
sponsored by StorageCraft Technology Corporation
WHITE PAPER: Small and medium businesses cannot afford to lose access for their data. Research shows that even brief server failures lead most smaller businesses to shut their doors for good. In light of this, any business should develop a workable backup and disaster recovery plan.
Posted: 04 Jul 2011 | Published: 30 Jun 2011

StorageCraft Technology Corporation

IT Security. Fighting the Silent Threat
sponsored by Kaspersky Lab
WHITE PAPER: Kaspersky Lab experts are releasing new research designed to assist you in your cybersecurity business decisions. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Kaspersky Lab

How much security do you really need?
sponsored by IBM
WHITE PAPER: Deciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.
Posted: 26 Apr 2012 | Published: 02 May 2011

IBM

Supporting workplace mobility with ERP
sponsored by Sage (UK) Limited
WHITE PAPER: This white paper examines the business impact of mobile enterprise resource planning (ERP) and why mid-size organizations are flocking to this technology. Also inside, uncover key benefits and potential challenges of mobile ERP.
Posted: 20 Dec 2013 | Published: 31 Oct 2013

Sage (UK) Limited

Streamline Your Business, Accelerate Profitable Growth
sponsored by SAP AG
WHITE PAPER: A comprehensive, integrated system that provides support for all of your business functions— including financials, sales, customers, purchasing, inventory,operations, and human resources— can enable small businesses to streamline processes, act on timely, accurate information, and accelerate profitable growth. Read this white paper to learn more.
Posted: 07 Nov 2011 | Published: 31 Dec 2009

SAP AG

IDC Brief: Cloud Computing in the Midmarket: Assessing the options.
sponsored by IBM
WHITE PAPER: This IDC tech brief outlines the basics in cloud computing with a specific focus on midmarket options. Review the strengths and weakness of each cloud model, uncover metrics for evaluating success and discover the 5 essential questions to answer when considering the cloud.
Posted: 15 Jul 2013 | Published: 15 Jul 2013

IBM

Security considerations for small and medium-sized enterprises (SMEs)
sponsored by GFI Software
WHITE PAPER: SMEs are just as vulnerable to security breaches as any other enterprise, but often times they consider security only as an afterthought. View this paper to explore key security challenges for SMEs and the necessary tools and policies for effective protection.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

GFI Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement