Social Networking Reports

Unified Communications Trends and Challenges: How to Stay on Top
sponsored by TechTarget Security
EGUIDE: This e-guide discusses the top trends affecting the unified communication's (UC) market as well as potential UC and IP telephony challenges. Learn what you can do to tackle these issues and stay ahead of the competition.
Posted: 06 Apr 2011 | Published: 06 Apr 2011

TechTarget Security

IBM DeveloperWorks
sponsored by IBM
SOFTWARE DOWNLOAD: The Internet provides great opportunities for networking and learning – and IT is no different. Register now for developerWorks and create your profile for access, not only to articles, webcasts and software downloads, but also a wealth of other IT professionals.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011

IBM

The State of Data Security
sponsored by Sophos
WHITE PAPER: Recognize how your data can become vulnerable and understand the compliance issues involved. This paper identifies data protection strategies you can use to keep your organization's information both safe and compliant.
Posted: 26 May 2011 | Published: 26 May 2011

Sophos

True Profiles: A Contemporary Method for Managing Customer Data
sponsored by Unica Corporation - An IBM Company
WHITE PAPER: As the internet changes the way of traditional marketing and communication, discover a “True Profile” as a means of understanding customer behavior, actions and preferences using analytics. Learn the 4 key components of True Profiles and the business benefits included.
Posted: 04 May 2011 | Published: 04 May 2011

Unica Corporation - An IBM Company

Social Networking in the Enterprise: Benefits and Inhibitors
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper reveals the primary considerations for social networking, such as: business value and strategic relevance, adoption trends and concerns, and strategic considerations for ESS deployment.
Posted: 20 Apr 2011 | Published: 01 Jun 2010

Cisco Systems, Inc.

What's your Customer Experience Advantage?
sponsored by SAP America, Inc.
WHITE PAPER: SAP Insider Article covering new SAP CRM innovations which help companies empower their employees, substantially improve the customer experience, and thereby achieve a competitive advantage.
Posted: 23 Mar 2011 | Published: 23 Mar 2011

SAP America, Inc.

Leveraging the Power of Social Media
sponsored by Oracle Corporation
WHITE PAPER: Download this free white paper and find out how to "Drive Sales Effectiveness with Enterprise-Ready Web 2.0Solutions," "Harvest Social Knowledge for Customer Service," and learn how "Social CRM Turns Customers into Competitive Advantage."
Posted: 21 Mar 2011 | Published: 03 Aug 2009

Oracle Corporation

How Application Intelligence and Control enables network security in the wake of Web 2.0, Cloud Computing and Mobility
sponsored by SonicWALL
EBOOK: This paper explores how innovations such as mobility, Web 2.0, social media and cloud computing have dramatically changed the IT landscape and introduced new security threats into corporate and government networks.
Posted: 25 Feb 2011 | Published: 25 Feb 2011

SonicWALL

Editorial Tip: CRM Expert Predictions for 2011
sponsored by Infor
EGUIDE: With 2010 behind us, SearchCRM.com asked some industry experts what they see in store for 2011. It's clear that CRM practitioners can look forward to a heavy dose of social CRM, mobile requirements and a continued emphasis on the customer experience.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

Infor

Editorial Tip: Measuring the ROI of Social CRM: No easy task
sponsored by Infor
EGUIDE: As more organizations invest in social channels, the question of value becomes increasingly important. In social media, ROI alone may not tell the value of the effort, and benefits to the business from the customer service approach could be gauged by a variety of factors. Uncover how to measure the real value of an investment in social CRM.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

Infor

Sophos Security Threat Report 2011
sponsored by Sophos
WHITE PAPER: Let our new 2011 Security Threat Report be your weapon in the battle against malware. It describes the significant threats of 2010, what to watch for in 2011, and more importantly, what you need to do to get ahead of them.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

Sophos

Presentation Transcript: 'Social Email' Drives 4th Generation Collaboration Solutions
sponsored by Mainsoft Corporation
PRESENTATION TRANSCRIPT: How do we overcome the enterprise 2.0 adoption gap and get people to use document collaboration tools, social networks, and more? And, what can we do today to realize the so-called 4th generation workspace, especially when we have a mixed IT environment? Read this presentation transcript with the two leading experts on collaboration to find out.
Posted: 01 Feb 2011 | Published: 01 Feb 2011

Mainsoft Corporation

IBM Perspective on Cloud Computing
sponsored by IBM
WHITE PAPER: Cloud computing has created a lot of buzz in the marketplace, as well as confusion about its benefits. This free white paper is geared for both IT and business leaders. Read an overview of what cloud computing is, the types of "clouds" and examples of how clients are using cloud computing to reduce costs and increase efficiencies
Posted: 17 Jan 2011 | Published: 17 Jan 2011

IBM

The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape
sponsored by ESET
PODCAST: In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more. 
Posted: 02 Dec 2010 | Premiered: Dec 2, 2010

ESET

Presentation Transcript: Challenges of Securing a Smarter Planet
sponsored by IBM
PRESENTATION TRANSCRIPT: In this presentation transcript of the webcast “Challenges of Securing a Smarter Planet,” IBM Rational's Worldwide Security Executive, Jack Danahy, discusses the changing security landscape and offers guidance to teams looking for the right place to start, and missteps to avoid.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

IBM

Top 10 Tips to Keep Your Small Business Safe
sponsored by Trend Micro, Inc.
WHITE PAPER: Read this paper to learn the top ten ways to protect your small business against web threats. Learn what you need to know about security and what are the key elements to address.
Posted: 19 Nov 2010 | Published: 17 Nov 2010

Trend Micro, Inc.

Your Small Business Security Questions Answered: SocialNetworks, SensitiveData, Business Banking
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: This white paper answers your most critical small business security questions. Social networks, sensitive data, and business banking are all topics covered in this security guide. Read this paper now to learn more.
Posted: 05 Nov 2010 | Published: 05 Nov 2010

AVG Technologies USA, Inc.

E-Book: Next Steps and Trends in Enterprise Content Management Technology
sponsored by SpringCM
EBOOK: ECM is a long-established market, but ECM technology is changing, evolving and taking on increased importance to organizations as they look to gain more value and insight from documents, emails, blogs etc. Through this e-book you will obtain an expert overview of ECM and an in-depth look at where this market is headed.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

SpringCM

Threat Containment for Facebook
sponsored by BlueCoat
WHITE PAPER: This technical brief discusses multiple Blue Coat solutions to address malicious content control, enforce acceptable use policies, prevent sensitive information leakage and enhance user productivity on Facebook.
Posted: 08 Oct 2010 | Published: 08 Oct 2010

BlueCoat

E-Book: Leveraging Web 2.0 and Social Media in CRM Programs
sponsored by SAP America, Inc.
EBOOK: You’ve heard the buzz about Web 2.0 and social CRM, but where to start? In this eBook, find out more about Web 2.0 and social media in the context of CRM. Learn more about using Web 2.0 to build customer loyalty and get expert insight into the role that social CRM may play in the future.
Posted: 05 Oct 2010 | Published: 05 Oct 2010

SAP America, Inc.

E-Book: Leveraging CRM to Increase Sales Effectiveness in a Challenging Economy
sponsored by SugarCRM
EBOOK: This e-book will explore the methods for optimizing sales efforts and working smarter to meet business needs in today’s economy. Continue reading to learn methodologies for increasing sales effectiveness and making this year a successful one for your organization.
Posted: 22 Sep 2010 | Published: 22 Sep 2010

SugarCRM

Your September Issue of Information Security Magazine– Readers’ Choice Awards
sponsored by Information Security Magazine
EGUIDE: In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
Posted: 10 Sep 2010 | Published: 10 Sep 2010

Information Security Magazine

IT Connects Customers to Brands
sponsored by Cisco Systems, Inc.
VIDEO: Paul Gillin, author of three social media marketing books, reveals how CIOs are becoming the designated guardians of intellectual property. As the use of social media tools grows, Gillen recommends how a CIO can stay in front of the widespread access and create enhanced customer experiences.
Posted: 16 Aug 2010 | Premiered: 16 Aug 2010

Cisco Systems, Inc.

The Impact of Business Analytics on Performance and Profitability
sponsored by SAS
WHITE PAPER: Let it be stated plainly: Business analytics are the key to achieving these challenging objectives. Our world generated more data in 2009 than in the previous recorded history of mankind. A good deal of this data can be converted into useful information and competitive advantage – by applying the right analytics.
Posted: 30 Jul 2010 | Published: 30 Jul 2010

SAS

The Application Usage and Risk Report
sponsored by Palo Alto Networks
WHITE PAPER: The latest edition of the Application Usage and Risk Report (Spring 2010) covers a sample size that has grown more than 15 fold to 347 and is truly global. Since the Spring 2008 Report, the number of applications Palo Alto Networks identifies has grown to nearly 1,000 with nearly 750 of them found during the six month period.
Posted: 30 Jun 2010 | Published: 30 Jun 2010

Palo Alto Networks