PR Firms Reports

eGuide:Mitigating malicious advertisement malware
sponsored by TechTarget Security
EGUIDE: More than one million websites were infected by malicious advertisements, also known as malvertisements, in the last quarter of 2010. This expert guide explains why and how this form of attack is quickly spreading and offers technical advice on how to avoid infection.
Posted: 24 Jun 2011 | Published: 24 Jun 2011

TechTarget Security

Addressable Advertising Opportunities for Network Operators
sponsored by Motorola, Inc.
WHITE PAPER: This paper provides an overview of advanced advertising opportunities and outlines Motorola's commitment to targeted video advertising.
Posted: 05 Jan 2009 | Published: 23 Dec 2008

Motorola, Inc.

Scan a Mobile Barcode, Unlock a New Brand Experience: AT&T Mobile Barcode Services
sponsored by AT&T Corp
WHITE PAPER: Turn a static advertisement into an immersive experience with AT&T Mobile Barcode Services. Mobile barcodes give brands the opportunity to reach consumers directly on their smartphones, delivering information, promotions, coupons and more to customers’ fingertips.
Posted: 28 Oct 2011 | Published: 28 Oct 2011

AT&T Corp

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

TechTarget ComputerWeekly.com

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021

TechTarget ComputerWeekly.com

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

IT Infrastructure at Your Service: Today’s challenging business climate is driving a move toward delivering IT functions as a service
sponsored by NTT America, Inc.
WHITE PAPER: This white paper examines many of the key considerations organizations must understand and assess before adopting IaaS.
Posted: 13 Jan 2010 | Published: 13 Jan 2010

NTT America, Inc.

Extend your Professional Services Capabilities with IM Virtualization Health Check
sponsored by Ingram Micro
WEBCAST: This webcast covers the importance of having a trusted partner as you work your way through the professional service market. It also features information on a virtual environment health check process.
Posted: 11 Dec 2013 | Premiered: Oct 16, 2013

Ingram Micro

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

eBook: Compliance for the Midmarket: Governance, Risk and Technology
sponsored by TechTarget CIO
EBOOK: Read this E-book to learn about how you can take a proactive approach to regulatory compliance. Rather than waste time and resources tackling one regulation at a time, find out how companies are looking at the big picture and forming security strategies based on their needs. Sponsored By: Imperva and StoredIQ
Posted: 09 Jun 2009 | Published: 09 Jun 2009

TechTarget CIO

Practical tips for deploying sustainable supply chains
sponsored by IQMS
EGUIDE: In this e-guide, explore expert tips for developing an effective sustainability model for your supply chain, factors and obstacles you'll need to consider, and two case studies detailing the real-world challenges and successes of manufacturers identified as "leaders in sustainability" by the analyst firm IDC Manufacturing Insights.
Posted: 16 Jan 2013 | Published: 08 Jan 2013

IQMS

A Case Study On How Subrosa Assisted A Global Marketing Agency In Managing And Assessing Vendor Risk
sponsored by SubRosa
CASE STUDY: In this case study, a global PR and marketing company partnered with Subrosa to address concerns of GDPR data management requirements. Open your copy to learn how Subrosa’s in-depth risk assessment provided 3 key direct impacts on vendor risk management.
Posted: 20 Jun 2022 | Published: 21 Jun 2022

TOPICS:  .NET
SubRosa

Balancing Fraud Prevention With the Customer Experience
sponsored by F5 Inc.
ANALYST REPORT: While the financial services industry is experiencing a surge in online and mobile banking usage, criminal organizations continue to refine and improve their abilities to exploit FIs’ vulnerabilities. Dig into this report to learn how you can enhance both security and customer experience for users of all levels of sophistication.
Posted: 04 Mar 2022 | Published: 04 Mar 2022

TOPICS:  .NET
F5 Inc.

6 Crucial Incident Response Policy Mistakes to Avoid
sponsored by Delta Risk
EGUIDE: Discover how to avoid 6 common pitfalls of a modern incident response policy as shared by expert Kevin Beaver. Access now before your policy's weaknesses make you – and your company – look bad.
Posted: 20 Sep 2016 | Published: 16 Sep 2016

Delta Risk

What’s the value of unified communications?
sponsored by Plantronics
EGUIDE: In this expert E-Guide, uncover a list of important questions that should be asked of you and your organization when you are considering a UC implementation. Explore seven phases of implementation for the analysis of the value of UC in each.
Posted: 05 Jul 2011 | Published: 05 Jul 2011

Plantronics

Green Manufacturing, Good Business
sponsored by TechTarget ERP
EBOOK: Organizations looking to green manufacturing processes understand that the practice isn't just about public relations; it's about tangible improvements to the bottom line.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

TechTarget ERP

What is the Value of Unified Communications?
sponsored by TechTarget Security
EGUIDE: The benefits of unified communications are apparent to network managers, but how can you figure out the value it will add to your organization?
Posted: 16 Nov 2011 | Published: 16 Nov 2011

TechTarget Security

E-Book: Leveraging Web 2.0 and Social Media in CRM Programs
sponsored by SAP America, Inc.
EBOOK: You’ve heard the buzz about Web 2.0 and social CRM, but where to start? In this eBook, find out more about Web 2.0 and social media in the context of CRM. Learn more about using Web 2.0 to build customer loyalty and get expert insight into the role that social CRM may play in the future.
Posted: 05 Oct 2010 | Published: 05 Oct 2010

SAP America, Inc.

Zero trust is the foundation for securing fiserv and fintech
sponsored by Menlo Security
EBOOK: The financial services (Fiserv) industry transformed dramatically over the past decade, the era of online banking has paved the way for digital disruptors, like Fintech organizations. Read this e-book for a deep dive into the financial services industry, including a closer look at common barriers, attack vectors, Zero Trust, and more.
Posted: 03 Jun 2021 | Published: 03 Jun 2021

TOPICS:  Cybersecurity
Menlo Security

Information Security ASEAN March 2015
sponsored by TechTarget Security
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

Think Big (Data)
sponsored by TechTarget IT Channel
EBOOK: For IT solution providers looking to build a big data practice, we investigate the areas that experts predict will be the most fruitful. And we take a look at how some Microsoft partners are already making money on big data.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

TechTarget IT Channel

How to Move from Opt-Out to Community Relevance: 31 Keys to Success in the SAP Ecosystem
sponsored by JonERP
WHITE PAPER: In this resource, find 31 tips for inbound content marketing to the SAP community. This fresh approach to marketing engages prospects on social channels while also attracting search traffic via compelling content. Read more inside to learn how to target the SAP ecosystem and become a relevant vendor in the market.
Posted: 18 May 2012 | Published: 18 May 2012

JonERP

The Industrialization of Fraud: Fighting Fire With Fire
sponsored by F5 Inc.
WHITE PAPER: This white paper, The Industrialization of Fraud: Fighting Fire with Fire, provides exclusive insight into sophisticated fraud strategies and tactics, as well as a series of best practices that can be implemented to thwart fraud attempts. Read on to learn more.
Posted: 31 Mar 2021 | Published: 30 Nov 2020

TOPICS:  Cybersecurity
F5 Inc.

Storage Magazine * April 2010: Primary Storage Dishes Up Dedupe
sponsored by TechTarget Storage
EZINE: Read the April 2010 edition of Storage magazine for details on how and where deduplication and data reduction technologies are being used in primary storage – beyond previous advances in backup systems.
Posted: 06 Apr 2010 | Published: 06 Apr 2010

TechTarget Storage

CeBIT: 26-30 March 2015
sponsored by CeBIT
EVENT: Be our guest at CeBIT 2015 - Visit the world's leading IT trade show and conference for professionals.
Posted: 13 Jan 2015 | Published: 13 Jan 2015

All resources sponsored by CeBIT

How to Get a Handle on Your App Landscape
sponsored by Veracode, Inc.
WHITE PAPER: Discover the three things you need to do to get the visibility application security requires.
Posted: 12 Jun 2017 | Published: 12 Jun 2017

TOPICS:  IT Management
Veracode, Inc.

Information Security ANZ March 2015
sponsored by TechTarget Security
EZINE: Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

Storage Magazine: July-August 2010
sponsored by TechTarget Storage
ESSENTIAL GUIDE: To realize the full benefits of vSphere, you need networked storage. And when it comes to virtualized servers, iSCSI is viewed as the top choice over Fibre Channel. In this month's cover story, Eric Siebert goes under the hood of VMware vSphere to show you how to make iSCSI work for virtual machines plus other essential and informative articles.
Posted: 06 Aug 2010 | Published: 06 Aug 2010

TechTarget Storage

Data Privacy e-Book
sponsored by TechTarget ComputerWeekly.com 
TECHNICAL ARTICLE: SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

TechTarget ComputerWeekly.com 

Storage Magazine June 2010: Solid State vs. Disk
sponsored by TechTarget Storage
EZINE: The June 2010 cover story of Storage magazine provided insights on where solid state makes sense in today’s storage environments. This month’s issue also reveals the winners of our latest Quality Awards survey for backup and recovery software, best practices from W. Curtis Preston for backing up Microsoft SharePoint and much more.
Posted: 07 Jun 2010 | Published: 07 Jun 2010

TechTarget Storage

Storage Magazine * February 2010: Products of the Year winners and more
sponsored by TechTarget Storage
EZINE: The February 2010 issue of Storage magazine online unveils the 2009 Storage Products of the Year. 3 winners are named in 5 categories – Backup and DR Hardware, Backup and DR Software and Services, Disks and Disk Subsystems, Storage Management Tools and Storage Networking Equipment.
Posted: 04 Feb 2010 | Published: 04 Feb 2010

TechTarget Storage

SUPPLY CHAIN CONVERGENCE IN A DISRUPTIVE ENVIRONMENT
sponsored by GEP
RESEARCH CONTENT: This paper is a must-read for supply chain and procurement leaders who are looking to fortify their supply chains with greater resilience against disruption. Access your copy to learn how technology can mend concerning supply chain gaps through visibility and collaboration.
Posted: 13 May 2022 | Published: 13 May 2022

TOPICS:  .NET
GEP

Storage Magazine: September 2010
sponsored by TechTarget Storage
EDITORIAL RESOURCE GUIDE: In this month's cover story, Jacob Gsoedl explores how unstructured data became one of the top challenges in today’s organizations and highlights how file/NAS virtualization allows for future growth.
Posted: 02 Sep 2010 | Published: 02 Sep 2010

TechTarget Storage

Adobe Commerce is Perfect for B2B Sellers for 10 Reasons.
sponsored by Adobe Systems Incorporated
EBOOK: Finding success in today’s thriving B2B ecommerce space requires you to provide buyers with a feature-rich, digital environment. Find out how upgrading to Adobe Commerce can elevate your business model and transform the way you sell online. Discover 10 ways Adobe Commerce is great for today’s B2B seller in this e-book.
Posted: 05 Jan 2023 | Published: 05 Jan 2023

TOPICS:  .NET
Adobe Systems Incorporated