IT Services  >   Internet Services  >   Portals  >   Enterprise Portals  >  

Business to Employee

RSS Feed    Add to Google    Add to My Yahoo!
Business to Employee Reports
 
IBM Named a Leader in 2014 Gartner Magic Quadrant for Horizontal Portals
sponsored by IBM
WHITE PAPER: This report from Gartner takes a look at the horizon portal solution vendors you should be aware of, providing an in-depth breakdown of the pros and cons of each.
Posted: 20 Jan 2015 | Published: 01 Oct 2014

IBM

Evaluating RMM Solutions Three key criteria for growth-oriented MSPs
sponsored by Solarwinds N-able
WHITE PAPER: This guide gives you three criteria to consider when choosing the RMM solution that's best for your business.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

Solarwinds N-able

5 Reasons to Buy – Not Build – Backup Capabilities
sponsored by Datto, Inc.
WHITE PAPER: Read this white paper to discover five reasons why buying backup may be a better idea than building your own, and how you can take the first steps in purchasing a reliable backup solution for your clients.
Posted: 11 Jun 2015 | Published: 11 Jun 2015

Datto, Inc.

An All-In-One Solution For Better Monitoring, Management And Support
sponsored by Solarwinds N-able
WHITE PAPER: This white paper describes how your IT services  business can provide reliable support, automated maintenance and more with the right tools and software.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

Solarwinds N-able

The cultural shift - Why IT needs to move
sponsored by USU AG
EGUIDE: With IT budgets moving out of the IT department, this e-guide provides the best practices to help put your IT organization in a better position to compete with outside IT services companies. Read now to learn about the common ground between embedded IT and central IT and the emergence of shadow IT.
Posted: 28 Jul 2015 | Published: 28 Jul 2015

USU AG

Improving IT Service Performance with Predictive Workload Analytics
sponsored by CA Technologies.
RESOURCE: This quick resource explores a predictive workload analytics solution that leverages critical, real-time enterprise data so you can more effectively respond to shifting priorities.
Posted: 09 Jul 2015 | Published: 31 Dec 2014

CA Technologies.

Network Access Control: Navigating the Crowded Market
sponsored by ForeScout Technologies, Inc.
ANALYST REPORT: This analyst report from Gartner evaluates and compares 10 top network access control (NAC) vendors. Read on to learn the strengths and weaknesses of each vendor in order to discover which NAC vendor is the best fit for your enterprise's network security needs.
Posted: 16 Feb 2015 | Published: 10 Dec 2014

ForeScout Technologies, Inc.

Project Team Member Performance
sponsored by Global Knowledge
WHITE PAPER: Most project team members report to a functional manager who controls their assignments, performance appraisals, raises, bonuses, etc. Until recently, project managers (PMs) had little input into any of these processes. In this paper, learn how a PM working in a functional or matrix organizational structure can get team members to perform.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Global Knowledge

Think of Your Service Desk as a Competitive Advantage
sponsored by Novell Ltd.
WHITE PAPER: In this white paper, find out how you can maximize your service desk to its fullest potential.
Posted: 25 Mar 2015 | Published: 25 Mar 2015

Novell Ltd.

Benefits Management: How to increase the business value of your IT projects
sponsored by ComputerWeekly.com
BOOK: This book extract explains how organisation can uses benefits management techniques to increase the value of IT projects to the business.
Posted: 15 Feb 2013 | Published: 15 Feb 2013

ComputerWeekly.com

Video Conferencing: The Key to Successful DR?
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com describes how businesses of all sizes can benefit from video conferencing technology. View now to learn the increasing role video is playing in not only collaboration and connectivity but also disaster recovery initiatives and maintaining business continuity.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

SearchSecurity.com

Technology, innovation and change: the IT department's view
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This exclusive report, based on a survey of UK IT professionals, assesses how CIOs and IT departments are adapting to the challenges of innovation.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

ComputerWeekly.com

Tablets in the enterprise: five steps for successful adoption
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Tablet devices will give enterprises a competitive advantage according to this in-depth report from Booz&Co.
Posted: 27 Jun 2012 | Published: 27 Jun 2012

ComputerWeekly.com

Small and Midsize Business guide to Mobile Security
sponsored by SearchSecurity.com
WHITE PAPER: In this mobile security FAQ for small to midsize businesses, hear the answers to all of your pressing questions about the mobile threat landscape and what you can do to protect your mobile workforce. Discover how vulnerable SMBs are to mobile threats, tips for evaluating your solution options, and more.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

SearchSecurity.com

Building a Business Case
sponsored by SearchSecurity.com
WHITE PAPER: Small to midsize organizations that fail to adopt adequate mobile security measures may soon be out of business. This expert white paper outlines the business case for mobile security among SMBs; also inside, discover the key features your solution needs, and the benefits of a cloud-based approach to mobile security.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

SearchSecurity.com

The Deloitte CIO Survey 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This ground breaking study from Deloitte, based on a survey of 700 CIOs world wide, gives you the latest trends in IT spending, technology and business priorities and CIO's career aspirations.
Posted: 08 Nov 2013 | Published: 08 Nov 2013

ComputerWeekly.com

Harnessing Business-Led IT
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: CIOs should treat business-led IT ("Shadow IT") as another, often better, way to achieve the core goals of Corporate IT, this report from CEB argues
Posted: 22 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

Stories That Move Mountains: Improve your presentation skills
sponsored by ComputerWeekly.com
BOOK: Learn how to make your presentation stand out from the crowd and make 'death by slide presentation' a thing of the past with this book extract especially written for IT professionals.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

ComputerWeekly.com

Leaders and Laggards in the Digital Economy
sponsored by ComputerWeekly.com
IT BRIEFING: The digitisation index from Booz & Co reveals the business leaders and laggards in the digital technology and explains why it is vital to embrace it.
Posted: 28 Mar 2012 | Published: 28 Mar 2012

ComputerWeekly.com

Gartner: The rise of the Chief Data Officer and what it means for IT leaders
sponsored by ComputerWeekly.com
ANALYST BRIEF: CIOs should view the Chief Data Officer as a peer and a partner who will enable them to focus on the job they already have, says Gartner analyst Debra Logan.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

ComputerWeekly.com

CIO insights: Moving from the back office to the front line
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This major global C-level survey from IBM examines the changing role of the CIO and makes recommendations for CIOs who want to move from the back office to the front line of the business.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

RSA's Digital Journey
sponsored by ComputerWeekly.com
PRESENTATION: Ian Hood, Group Digital Director of RSA, tells the story of one of the UK's largest insurers journey to digital technology in this presentation.
Posted: 22 Aug 2014 | Published: 22 Aug 2014

ComputerWeekly.com

5 Ways to Mobilize Windows Apps
sponsored by Citrix
WHITE PAPER: Learn how to boost employee productivity with Windows apps on demand. Meet the needs of today's modern workforce and empower your users with on-demand self-service to your enterprise apps.
Posted: 22 Jun 2015 | Published: 31 Jan 2014

Citrix

Accenture Technology Vision 2013
sponsored by ComputerWeekly.com
IT BRIEFING: Accenture's technology vision assesses the impact of digital technology on the enterprise in 2013 and offers action points for CIOs and business leaders.
Posted: 19 Feb 2013 | Published: 19 Feb 2013

ComputerWeekly.com

Geospatial Analytics
sponsored by IBM
SOFTWARE DOWNLOAD: Discover how you can leverage real-time geospatial analytics to track when devices enter or leave defined regions with this trial software. Explore the capability of monitoring device locations in real time, and control region monitoring using geospatial ATI.
Posted: 01 May 2015 | Premiered: 18 Dec 2014

IBM

Big Data analytics: Adoption and employment trends
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The report is first of its kind to identify current and future adoption rates for big data by type and size of organisation in the UK with information supplied by 1,000 businesses across the country.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

Strategic IT
sponsored by ComputerWeekly.com
BOOK: Find out how two leading CIOs have enabled their organisations to use information technology as strategic driver, in this extract from the book Strategic IT.
Posted: 19 May 2014 | Published: 19 May 2014

ComputerWeekly.com

Executing your strategy 4: Synthesis
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This is the fourth of six part guide which explains the key steps of the Strategic Execution Framework, developed by the Stanford Advanced Management Programme.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

How Mobility and Analytics Are Redefining Business
sponsored by IBM
WHITE PAPER: This resource explains how the convergence of mobility and analytics within modern enterprises can improve decision-making, enable collaboration, drive faster results, and more.
Posted: 02 Jul 2015 | Published: 31 Jul 2014

IBM

Ensuring the security of your mobile business intelligence
sponsored by IBM
WHITE PAPER: Organizations need to know that when their employees access BI applications from their mobile devices, whether from a native application or the web, that security measures are in place to ensure their BI data is protected and safe from hackers or if a device is ever lost or stolen. Read to find strategies on how to best secure BI on mobile devices.
Posted: 24 Sep 2012 | Published: 24 Sep 2012

IBM

Innovative business technologies in a converging world
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This independently researched report investigates converging business technologies, including cloud computing, big data analytics and business intelligence.  
Posted: 18 Feb 2013 | Published: 18 Feb 2013

ComputerWeekly.com

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Advance Your Cybersecurity Career with Unique Online Cybersecurity Graduate Program
sponsored by Mission Critical Institute
WHITE PAPER: This resource introduces the expert faculty in the online cybersecurity MBA program offered through Concordia St. Paul. Take a look to determine if these staff members could help you reach your further education goals.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Mission Critical Institute
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement