Vertical Industries  >   Market Segments  >  

Enterprise Businesses

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise BusinessesReports
 
Scaling Analytics to Meet Real-Time Threats in Large Enterprises: A Deep Dive into LogRhythm’s Security Analytics Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this resource for in-depth information about the need for higher security information and event management (SIEM) capacity due to the increasing number of advanced persistent threats (APTs) organizations face.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

LogRhythm, Inc.

The Digital Enterprise
sponsored by ComputerWeekly.com
BOOK: Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

The work/life report: The Hybrid Organisation: Technology
sponsored by ComputerWeekly.com
WHITE PAPER: The enterprise must be ready to embrace technologies that facilitate the blurring of the boundaries between work and life, in order to maximise the productivity, insight, innovation and collaboration gained from investments in its people, as well as technology itself.
Posted: 24 Oct 2011 | Published: 15 Jun 2010

ComputerWeekly.com

Top-of-Mind Time for In-Memory Databases
sponsored by SearchDataManagement
EBOOK: With promises of application speed-up and optimized organization of data, in-memory databases have the attention of IT professionals. Now, the technology has to deliver.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

SearchDataManagement

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones
sponsored by Citrix
WHITE PAPER: A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption.
Posted: 12 Aug 2012 | Published: 07 Aug 2012

Citrix

Exploring the Fundamental Differences Between Network Memory and Application
sponsored by Silver Peak
WHITE PAPER: This white paper will address these issues and offer a solution that addresses these enterprise requirements. The result is a complete solution for improved application delivery across a distributed enterprise environment.
Posted: 29 Oct 2013 | Published: 21 Aug 2013

Silver Peak

Data Deduping & Backup: A best practice guide – Part 2
sponsored by FalconStor Software
EGUIDE: In part two of this data deduplication technology tutorial, we look at all of those alternatives and take a look at some of the most significant deduplication backup products. Learn about global data deduplication, what to look for in a data deduplication product, inline vs. post-processing deduplication, and more.
Posted: 20 May 2011 | Published: 20 May 2011

FalconStor Software

How to Migrate from VMware to Red Hat Enterprise Virtualization
sponsored by Red Hat and JBoss
WEBCAST: This webcast provides an introduction to Red Hat Enterprise Virtualization. Watch now to discover the whys of migration - the technical benefits and cost savings of RHEV - as well as the hows - the latest tools and services available for your use.
Posted: 02 Jun 2011 | Premiered: Jun 1, 2011

Red Hat and JBoss

Presentation Transcript: Managing Red Hat Enterprise Linux in an Increasingly Virutal World Webcast
sponsored by Red Hat.
PRESENTATION TRANSCRIPT: Interest in cloud computing has grown rapidly over the past year, with enterprises turning to cloud solutions to reduce costs and increase flexibility. Your journey starts with Red Hat Enterprise Virtualization. Discover how to take your virtualization initiatives to the next level and make cloud computing a reality in your IT infrastructure today.
Posted: 23 May 2011 | Published: 23 May 2011

Red Hat.

HP Fortify Software Security Center- Proactively Eliminate Risk in Software
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn how HP can transform your enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research, you can ensure unparalleled visibility across security assets. With over 90 percent of vulnerabilities in software, this is a resource you certainly don't want to overlook.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement