NSP Reports

Essential Guide: Securing hybrid IT infrastructure
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.
Posted: 08 Feb 2021 | Published: 16 Nov 2017

TechTarget ComputerWeekly.com

Transitioning to LTE: Business and Technical Considerations
sponsored by Alcatel-Lucent
PRESENTATION TRANSCRIPT: LTE evolution is more than a move to a new technology. It encompasses a shift in the service provider’s business model to a more sustainable and profitable one. Read this presentation transcript to learn more!Trackback URL
Posted: 10 Nov 2010 | Published: 30 Nov 2010

Alcatel-Lucent

SharePoint E-Zine Volume 7: Who Is Allowed to Customize SharePoint?
sponsored by TechTarget Search Windows Server
EZINE: Find out how to incorporate governance into SharePoint customization to empower users while setting boundaries.
Posted: 25 Aug 2012 | Published: 16 Feb 2009

TechTarget Search Windows Server

E-Guide: Increase your Revenues and Profits by Offering Managed Voice
sponsored by Cisco Systems, Inc.
EGUIDE: Offering hosted unified communications and VoIP services is a strong opportunity for service providers. How do you know which customized plan is right for your specific business needs? Read this E-Guide to learn pros and cons, as well as which questions to ask potential clients to ensure that you are delivering the solution that’s right for them.
Posted: 14 Mar 2011 | Published: 14 Mar 2011

Cisco Systems, Inc.

A Golden Age Dawns for Network Services
sponsored by TechTarget Networking
EBOOK: Advanced network technology options have expanded, offering enterprises better, cheaper, options for network services. This three part guide is designed to help you understand the ongoing evolution of network services and the connectivity technologies needed to access them.
Posted: 17 Oct 2016 | Published: 17 Oct 2016

TechTarget Networking

Hosted VoIP Savings Calculator
sponsored by Polycom, Inc.
ASSESSMENT TOOL: To see how much your company can save by implementing a Hosted VoIP solution, try this free, easy-to-use tool that requires just a few user inputs to quickly assess your potential savings. Businesses can now visualize the immediate and long-term cost savings and have a sound financial validation for moving forward with Hosted VoIP.
Posted: 14 Jun 2010 | Published: 14 Jun 2010

Polycom, Inc.

Wireless Solutions for High Density Wireless
sponsored by Xirrus
WHITE PAPER: This brief resource outlines a smarter solution for high-density wireless networking that can scale to support thousands of simultaneous users and an ever-increasing range of wireless devices. Read on now to learn about the capabilities that make this solution a perfect fit for high-density environments.
Posted: 02 Aug 2013 | Published: 31 Dec 2011

Xirrus

Threat Intelligence Services: An Introduction
sponsored by Cisco Umbrella
EGUIDE: Improve your enterprise security with threat intelligence services, as presented in this e-guide, and learn what you can expect when you hire an incident response provider to handle your ongoing crisis.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

Cisco Umbrella

The Problem Facing Advanced Threat Defense
sponsored by UnitedLex
EGUIDE: The biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Information Security Magazine – July/August 2013
sponsored by TechTarget Security
EZINE: This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

TechTarget Security