Vertical Industries  >   Market Segments  >  

Enterprise

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Business Enterprises, Enterprise Businesses
DEFINITION: In the computer industry, an enterprise is an organization that uses computers. A word was needed that would encompass corporations, small businesses, non-profit institutions, government bodies, and possibly other kinds of organizations. The term enterprise seemed to do the job. In practice, the term is applied much more often to larger organizations than smaller ones.
EnterpriseReports
126 - 150 of 435 Matches Previous Page  | Next Page
Tips and Techniques for developing an effective ECM
sponsored by SearchContentManagement
EBOOK: View this white paper to uncover important tips and techniques for developing an effective enterprise content management ECM strategy. It helps provide order to chaotic information environments along with many other benefits.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

SearchContentManagement

What is a an Enterprise System and How are they Evolving?
sponsored by IBM
PODCAST: Access this expert podcast to discover what an enterprise class system is and how enterprise systems technologies are evolving to deliver availability, compliance, energy savings and improved user experience to organizations of all sizes.
Posted: 14 Mar 2013 | Premiered: Mar 14, 2013

IBM

Enterprise Mobility University
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: In this Enterprise Mobility University, we focus on key questions infrastructure managers, systems and virtualization administrators, and IT purchases must consider before introducing BYOD into their environments.
Posted: 25 Sep 2012 | Premiered: 26 Sep 2012


Video Conferencing: The Key to Successful DR?
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com describes how businesses of all sizes can benefit from video conferencing technology. View now to learn the increasing role video is playing in not only collaboration and connectivity but also disaster recovery initiatives and maintaining business continuity.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

SearchSecurity.com

E-Guide: Configure Outbound Firewall Rules for Data Protection
sponsored by SearchSecurity.com
EGUIDE: A new form of firewall was recently developed in order to withstand more sophisticated threats. Consult this expert E-guide to learn more about the value of application firewalls and how they can benefit the security of your business.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

SearchSecurity.com

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones
sponsored by Citrix
WHITE PAPER: A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption.
Posted: 12 Aug 2012 | Published: 07 Aug 2012

Citrix

Automated Processing of Vendor Invoices
sponsored by Esker Inc.
WHITE PAPER: View this white paper to learn more about how much your business is spending on the accounts payable document processes. It explores how SAP ERP solutions can improve your accounts payable and lower the cost to your business.
Posted: 10 Jul 2013 | Published: 10 Jul 2013

Esker Inc.

Maximizing ERP Value Requires New Thinking
sponsored by Epicor Software Corporation
WHITE PAPER: Innovation is key to successful business and having an agile technology platform that drives ERP to support and rapidly deploy process changes is necessary. Learn more about how you can go beyond transactional efficiency to improve business performance. It explores the role technology plays in enabling business model innovation.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

Epicor Software Corporation

The New World of Mobility Management
sponsored by Aruba Networks
WHITE PAPER: This resource offers key information IT professionals can use to set their plans for mobility on the right track. Read on to discover the 3 phases to mobilizing a business, the functions of Enterprise Mobility Management, and a Mobile Management needs checklist.
Posted: 23 Apr 2013 | Published: 31 Mar 2013

Aruba Networks

Developing a SharePoint Collaboration Strategy That Gets Results
sponsored by SearchContentManagement
WHITE PAPER: Consult this white paper to determine whether it's time to upgrade to a newer version of SharePoint now that SharePoint 2013 is available. Creating an adaptable strategy is imperative for supporting business goals and enhancing innovation and collaboration. Find out how you can prepare your users for the changes by reading this resource now.
Posted: 30 Jan 2013 | Published: 30 Jan 2013

SearchContentManagement

App stores and developer programs everywhere: What is the right application enablement approach for you?
sponsored by Alcatel-Lucent
WHITE PAPER: A growing number of network providers are investing to speed the delivery of new services to an increasingly more demanding consumer and enterprise market. One strategy is to better support the delivery of third party applications. Read this paper to find out so much more. Read this paper to find out so much more.
Posted: 27 Dec 2012 | Published: 10 Aug 2010

Alcatel-Lucent

Webcast Enterprise Service Architecture: Building a Platform for Strategy-Driven Transformation
sponsored by OpenText
WEBCAST: View this webcast to learn more about building a platform for your strategy-driven transformation. It outlines the goals and objectives you may have and how the services can help you reach these goals and strategies. Uncover some of the key ProVision differentiators as well as other benefits by viewing this resource now.
Posted: 18 Dec 2012 | Premiered: Dec 10, 2012

OpenText

SharePoint Security in Action: Best Practices Drive Secure Collaboration
sponsored by CA Technologies.
WHITE PAPER: Microsoft SharePoint is a widely deployed enterprise content management (ECM) and collaboration system because it delivers a functional user experience. However, it also presents some security concerns. Consult this informative white paper to learn more about some of the challenges and how to remedy these obstacles.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

CA Technologies.

HP Fortify on Demand - Enterprise Software Security in the Cloud
sponsored by Hewlett-Packard Company
WHITE PAPER: HP is changing the enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research and security events and vulnerabilities, they develop an unparalleled visibility. Access this informative white paper to learn more about security-as-a-service (SaaS) and how it can help your organization.
Posted: 24 Aug 2012 | Published: 31 May 2012

Hewlett-Packard Company

HP Fortify Software Security Center- Proactively Eliminate Risk in Software
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn how HP can transform your enterprise security landscape with its Security Intelligence and Risk Management Platform. By using advanced threat research, you can ensure unparalleled visibility across security assets. With over 90 percent of vulnerabilities in software, this is a resource you certainly don't want to overlook.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Hewlett-Packard Company

Solutions to Meet your PCI Compliance Needs
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn more about the capabilities of seven HP products in achieving Payment Card Industry (PCI) Data Security Standard (DSS) compliance. Ensure that compliance isn't a business inhibitor for your organization by consulting this informative resource.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Hewlett-Packard Company

The Business Case for Integrated ERP
sponsored by Scribe Software Corporation
WHITE PAPER: It's critical that your ERP software is integrated and can talk to other business applications and systems. Those who embrace ERP integration will reap lower operation costs, increased customer satisfaction, and a lot of saved time. Read this paper to learn how integrating your ERP software will impact your company's operations and work flow.
Posted: 22 Aug 2012 | Published: 01 Apr 2011

Scribe Software Corporation

August Technical Guide on Authentication
sponsored by SearchSecurity.com
WHITE PAPER: This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

SearchSecurity.com

The Ten Must Haves for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER: Businesses are changing their traditions as employees continue to adopt mobile phone practices. Enterprise mobility may be efficient, but it can also put important company data at risk. Learn more about how you can have secure mobile device management with this valuable resource.
Posted: 01 Aug 2012 | Published: 01 Aug 2012

Zenprise

Provisioning Should Be Simple Why Traditional Provisioning Systems Are No Longer Relevant
sponsored by Aveksa
PRESENTATION TRANSCRIPT: Do you want to improve your provisioning system? In the past provisioning has been expensive and ineffective, but that can all improve with a few changes. Deciding who has access to your business enterprise is one of the first steps to take towards improvement.
Posted: 24 Jul 2012 | Published: 23 Jul 2012

Aveksa

July Technical Guide on Network Security
sponsored by SearchSecurity.com
WHITE PAPER: Attackers moving from server to server on your network can be difficult to detect, especially if they develop code that evades detection. Network threat detection is more complex and important than ever with attackers stealing payment information or other valuable data. This informative white paper outlines how to better safeguard your network.
Posted: 23 Jul 2012 | Published: 18 Jul 2012

SearchSecurity.com

Enterprise Antivirus Security: How Does Your Solution Stack Up?
sponsored by Webroot
WHITE PAPER: Thousands of malware attacks occur on a daily basis, and businesses are always searching for a solution to these threats. Inside, access a survey that explores anti-virus solutions and how each measures up. Check out the results to see if your security is up to date.
Posted: 20 Jul 2012 | Published: 30 Mar 2012

Webroot

Thinking strategically about mobility and enterprise data
sponsored by AppSense
WHITE PAPER: IT professionals face new governance challenges as a result of the transformation of enterprise computing. The demand for mobile productivity is constantly growing, and IT leaders need to find solutions for mobility without sacrificing efficiency or governance.
Posted: 09 Jul 2012 | Published: 09 Jul 2012

AppSense

Mobility Services: VARS Guide to mobile device management
sponsored by LabTech Software
EGUIDE: Access this expert e-guide to discover the opportunities mobile device management presents for resellers. Gain insight into enterprise mobility plans, mobile device management tools, vendors and what this all means for your business.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

LabTech Software

SUSE Linux Enterprise Point of Service Data Sheet
sponsored by SUSE
WHITE PAPER: This white paper outlines an enterprise-class Linux operating system that increases the flexibility and reliability of your IT environment. Inside, discover the top benefits of this system that is tailored specifically to meet your needs.
Posted: 07 Jun 2012 | Published: 07 Jun 2012

SUSE
126 - 150 of 435 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement