IT Systems  >   Communications Systems  >  

Enterprise Systems

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise SystemsReports
51 - 75 of 277 Matches Previous Page  | Next Page
Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Citrix Systems, Inc.
WHITE PAPER: Businesses can't afford not to make mobile governance and security a top priority. Read this mobility whitepaper to learn the critical facts about mobile security and management, and what you can do to keep your organization secure.
Posted: 26 Feb 2013 | Published: 26 Feb 2013

Citrix Systems, Inc.

World-Class EA: The Agile Enterprise
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Agile is about more than software development, it's a mindset. This report from the Open Group explains how to apply agile techniques and best practices to the enterprise.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

ComputerWeekly.com

3 Keys to a Modern IT Infrastructure
sponsored by IBM
WHITE PAPER: Access this white paper to find out why it is imperative for enterprise IT infrastructures to adapt to modern challenges by utilizing cloud computing and taking new approaches to analytics and security.
Posted: 06 Dec 2012 | Published: 07 May 2013

IBM

Connected enterprise is the key to collaboration and cutting costs
sponsored by ComputerWeekly.com
WHITE PAPER: This six-page Buyer’s Guide to Connected Enterprise explains how CIOs and senior IT professionals can harness connected enterprise to make their organisations more competitive through better responsiveness and decision making.
Posted: 29 Nov 2012 | Published: 19 Jan 2011

ComputerWeekly.com

Ensuring Your SAP Infrastructure is Cloud-Enabled
sponsored by IBM
WHITE PAPER: SAP users face many challenges and economic conditions reinforce pressures to cut or at least contain growth in costs. Check out this white paper to understand the reasons behind this, with two new solutions to address the challenges that are holding people back.
Posted: 16 Oct 2012 | Published: 30 Apr 2012

IBM

E-Guide: Configure Outbound Firewall Rules for Data Protection
sponsored by SearchSecurity.com
EGUIDE: A new form of firewall was recently developed in order to withstand more sophisticated threats. Consult this expert E-guide to learn more about the value of application firewalls and how they can benefit the security of your business.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

SearchSecurity.com

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones
sponsored by Citrix
WHITE PAPER: A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption.
Posted: 12 Aug 2012 | Published: 07 Aug 2012

Citrix

The Cloud: Time for Delivery
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from Capgemini, shows how organisations can navigate around ‘cloud confusion’  from suppliers pushing products rather than business solutions.
Posted: 28 Feb 2012 | Published: 28 Feb 2012

ComputerWeekly.com

3 Things Business Decision Makers Need To Know About SOA
sponsored by IFS
WHITE PAPER: In this white paper, uncover the three most important things you should know about service-oriented architecture (SOA) in order to be sure you are getting the most efficient and effective performance out of your enterprise application architecture.
Posted: 18 Jan 2012 | Published: 18 Jan 2012

IFS

Expert Strategies for Virtual Machine Performance Monitoring
sponsored by ORSYP
EGUIDE: This expert e-guide explores top strategies and tools for successfully monitoring virtual machine (VM) performance. Included are details concerning why performance data retrieved from within the VM may not always be accurate, and how the right performance monitoring tool can resolve any discrepancy in performance numbers.
Posted: 05 Feb 2013 | Published: 05 Feb 2013

ORSYP

Intel vPro technology resource kit
sponsored by Intel
SOFTWARE DOWNLOAD: With this free download of the Intel® vPro™ technology resource kit, learn firsthand the value of this security and management solution, find step-by-step instructions for implementing and configuring Intel vPro technology, and more – click through to download now and get started!
Posted: 31 Dec 2012 | Premiered: 18 May 2012

Intel

HP Fortify on Demand - Enterprise Software Security in the Cloud
sponsored by Hewlett-Packard Company
WHITE PAPER: HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.
Posted: 24 Aug 2012 | Published: 31 May 2012

Hewlett-Packard Company

HP Fortify Software Security Center- Proactively Eliminate Risk in Software
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn how HP can transform your enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research, you can ensure unparalleled visibility across security assets. With over 90 percent of vulnerabilities in software, this is a resource you certainly don't want to overlook.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Hewlett-Packard Company

Solutions to Meet your PCI Compliance Needs
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn more about the capabilities of seven HP products in achieving Payment Card Industry (PCI) Data Security Standard (DSS) compliance. Ensure that compliance isn't a business inhibitor for your organization by consulting this informative resource.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Hewlett-Packard Company

August Technical Guide on Authentication
sponsored by SearchSecurity.com
WHITE PAPER: This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

SearchSecurity.com

The Ten Must Haves for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER: Businesses are changing their traditions as employees continue to adopt mobile phone practices. Enterprise mobility may be efficient, but it can also put important company data at risk. Learn more about how you can have secure mobile device management with this valuable resource.
Posted: 01 Aug 2012 | Published: 01 Aug 2012

Zenprise

July Technical Guide on Network Security
sponsored by SearchSecurity.com
WHITE PAPER: Attackers moving from server to server on your network can be difficult to detect, especially if they develop code that evades detection. Network threat detection is more complex and important than ever with attackers stealing payment information or other valuable data. This informative white paper outlines how to better safeguard your network.
Posted: 23 Jul 2012 | Published: 18 Jul 2012

SearchSecurity.com

Enterprise Antivirus Security: How Does Your Solution Stack Up?
sponsored by Webroot
WHITE PAPER: Thousands of malware attacks occur on a daily basis, and businesses are always searching for a solution to these threats. Inside, access a survey that explores anti-virus solutions and how each measures up. Check out the results to see if your security is up to date.
Posted: 20 Jul 2012 | Published: 30 Mar 2012

Webroot

Thinking strategically about mobility and enterprise data
sponsored by AppSense
WHITE PAPER: IT professionals face new governance challenges as a result of the transformation of enterprise computing. The demand for mobile productivity is constantly growing, and IT leaders need to find solutions for mobility without sacrificing efficiency or governance.
Posted: 09 Jul 2012 | Published: 09 Jul 2012

AppSense

SUSE Linux Enterprise Point of Service Data Sheet
sponsored by SUSE
WHITE PAPER: This white paper outlines an enterprise-class Linux operating system that increases the flexibility and reliability of your IT environment. Inside, discover the top benefits of this system that is tailored specifically to meet your needs.
Posted: 07 Jun 2012 | Published: 07 Jun 2012

SUSE

Success Story: The New South Wales Fire Brigades
sponsored by SUSE
WHITE PAPER: In this resource, learn how one organization moved its SAP applications to a virtualized SUSE Linux Enterprise Server to improve the availability and performance of mission-critical services while significantly reducing infrastructure costs.
Posted: 31 Mar 2012 | Published: 27 Mar 2012

SUSE

Getting ROI Out of Your ERP system
sponsored by IFS
EGUIDE: In this e-guide, readers will learn more about the basics of ERP and how to reduce maintenance and support costs for these systems.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

IFS

Successful WFM Software Implementation Strategies
sponsored by Infor WFM Workbrain
EGUIDE: Explore this expertly-compiled e-guide to find out how support for mobile devices and Software as a Service (SaaS) WFM could expand the use of  workforce management (WFM) software and help position it as a core enterprise platform.
Posted: 09 Jan 2012 | Published: 05 Jan 2012

Infor WFM Workbrain

How to Choose a Manufacturing System
sponsored by Sage Software
WHITE PAPER: In this white paper, learn how Sage Software has successfully structured their manufacturing system to deliver useful information to enterprises needing to upgrade from legacy and manual systems.
Posted: 06 Jan 2012 | Published: 06 Jan 2012

Sage Software

Riverbed Stingray Traffic Manager VA Performance on vSphere 4
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Cloud infrastructure platforms like VMware vSphere 4.0 can benefit from load balancers that connect users to the most suitable datacenter. This white paper outlines how the Riverbed Stingray Traffic Manager Virtual Appliance (VA) improves traffic performance compared to a Linux install.
Posted: 05 Jan 2012 | Published: 04 Jan 2012

Riverbed Technology, Inc.
51 - 75 of 277 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement