small

Results 251 - 275 of 1111Sort Results By: Published Date | Title | Company Name
Published By: HPE     Published Date: Jun 06, 2016
This white paper presents a comprehensive guide to improving data backup and recovery, and looks at 5 key considerations for small and midsized businesses when looking at the modernization of different aspects of their production.
Tags : 
data, data recovery, data backup, midsized business
    
HPE
Published By: HP Inc.     Published Date: Mar 04, 2016
IT complexity leads to wasted effort, time, or expense. Drive up productivity with HP ProLiant Gen9 servers for small and midsize businesses to simplify your infrastructure, resulting in better performance and scalability with easier management.
Tags : 
    
HP Inc.
Published By: Carbonite     Published Date: Jan 04, 2018
It’s the moment every IT department dreads: A data loss event takes your business offline and the countdown clock begins. Despite spending countless hours safeguarding against and preparing for this moment, the impact of downtime is immediate and all-consuming. While IT pros can’t always avoid data loss events, they can prepare for them to ensure minimal downtime. To better understand the IT experience during a data disaster, EVault commissioned Spiceworks Voice of IT to survey IT pros regarding disaster recovery practices and perceptions. All survey respondents were based in the U.S. and have influence over backup/disaster recovery purchase decisions. This e-book will explore the impact of downtime and data loss on IT departments for small and midsize businesses.
Tags : 
    
Carbonite
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Businesses today are faced with the almost insurmountable task of complying with a confusing array of laws and regulations relating to data privacy and security. These can come from a variety of sources: local, state, national, and, even, international law makers. This is not just a problem for big businesses. Even a small business with a localised geographic presence may be subject to laws from other states and, possibly, other nations by virtue of having a presence on the internet. In many instances, these laws and regulations are vague and ambiguous, with little specific guidance as to compliance. Worse yet, the laws of different jurisdictions may be, and frequently are, conflicting. One state or country may require security measures that are entirely different from those of another state or country. Reconciling all of these legal obligations can be, at best, a full time job and, at worst, the subject of fines, penalties, and lawsuits.
Tags : 
byod, device discovery, data privacy, data security, it security
    
Kaspersky Lab
Published By: EMC Corporation     Published Date: Jul 07, 2013
Competitive enterprises that embark on big data strategies do so with the expectation that their businesses will transform. They don't just want answers from the data they collect and analyze, they want results. Be it with small, fledgling trials or large, cross-functional efforts, these enterprises want to see clearly how big data can make a difference - with their customers, their processes, their bottom lines and, most important, with growing the business.
Tags : 
storage, enterprises, information management, technology, platform, big data analytics, emc, self service, business intelligence
    
EMC Corporation
Published By: SAP     Published Date: Dec 08, 2011
You're invited to access an exclusive offering called "Interactive Industry Solution Portal for Small and Midsize Businesses" available now. Contained within this portal are 15 separate, industry-specific videos, each with free, downloadable solution offerings.
Tags : 
sap, kit-digital, technology, interactive, software solution
    
SAP
Published By: RES Software     Published Date: Jul 11, 2012
In this web seminar, you'll find ways to achieve better long-term results from Windows migration. Use RES Software to keep risks small, complexity low and productivity high for both you and your users.
Tags : 
res software, healthcare, technology, healthcare it, workspace manager, scripts, clinician productivity, windows migration, desktop migration, dynamic desktop
    
RES Software
Published By: CDW     Published Date: Nov 12, 2012
You've dipped your toe into the virtualization waters, and now you'd like to learn how you can dive in and fully reap the money-saving and business-building advantages.
Tags : 
server virtualization, it infrastructure, virtualization solutions, data center
    
CDW
Published By: Salesforce.com     Published Date: Mar 22, 2013
Just as small businesses come in many varieties, CRM solutions span the spectrum from contact management capabilities all the way to full-featured customer relationship management,
Tags : 
salesforce, crm, crm solutions, crm solutions/software, customer experience/engagement
    
Salesforce.com
Published By: Salesforce.com     Published Date: Mar 25, 2013
A short whitepaper about how small businesses can run their business from the cloud.
Tags : 
salesforce, crm, cloud computing, business in the clouds
    
Salesforce.com
Published By: Salesforce.com     Published Date: Sep 20, 2013
Small businesses define our economy, accounting for over 50% of all private sector jobs in Australia. And to thrive, they need to turn on fast and sustainable business growth. Download the exclusive eBook to see how they -Grew revenue 44% in just 6 months -Increased web traffic by 500% - Reduced project time by 10% And get insights and advice from three successful entrepreneurs: -TripADeal: Norm Black, Founder -Nu-Steel Homes: Ash Richardson, General Manager -Platinum Direct Finance: Richard Kew, Director
Tags : 
small business technology, private sector, business solution, crm, salesforce, australia, best practices, sustainability
    
Salesforce.com
Published By: VMware, Inc     Published Date: Oct 28, 2014
Traditional disaster recovery solutions are expensive and complex. That’s making disaster recovery in the cloud a compelling alternative for many small-to-mid sized companies. Cloud solutions are more affordable, require less commitment, and offer more capacity—an ideal combination for resource-strapped organizations. VMware vCloud® Air™ Disaster Recovery is easy to deploy and offers flexible terms and scalable resource options. It enables you to improve upon your existing disaster recovery plans—or put a new plan into operation—with minimal cost and resources. Here are three great reasons to get started now with vCloud Air Disaster Recovery.
Tags : 
cloud, disaster recovery, alternative, resource-strapped organizations, scalable resource options
    
VMware, Inc
Published By: McAfee     Published Date: Sep 15, 2014
Advanced evasion techniques, or AETs, are delivery mechanisms used to disguise advanced persistent threats (APTs) and permit them to slip through network security undetected. AETs work by splitting up malicious payloads into smaller pieces, disguising them, and delivering them simultaneously across multiple and rarely used protocols. Once inside, AETs reassemble to unleash malware and continue an APT attack.
Tags : 
hacker detection, advanced evasion techniques, network security, it security, security management
    
McAfee
Published By: Workforce Software     Published Date: May 26, 2015
New labor laws are a regular occurrence these days… and yet they’re just a small slice of your compliance demands. To help you stay informed and effective, our Director of Compliance takes an annual look at some of the biggest upcoming challenges and lets you know how to prepare.
Tags : 
workforce software, software, automation, budgets, costs, compliance, visibility, labor, productivity, risk, attendance, work ours, pay rate, absence, alerts, support, policies, integration, cloud, enterprise
    
Workforce Software
Published By: Waterline Data & Research Partners     Published Date: Jun 15, 2015
Information governance and master data management initiatives are complex and require participation from a broad range of enterprise constituents. We focus on five small and innovative vendors that may help information managers reach their information governance and MDM goals.
Tags : 
vendors, governance, information, mdm, management
    
Waterline Data & Research Partners
Published By: Sage     Published Date: Aug 31, 2015
In this report, we will examine all facets of mobile payment processing, beginning with a very brief history of mobile payments and forecasts for the future. We will then explore the benefits of mobility for small and mid-sized businesses, the ease of processing mobile payments, the equipment required and the issues small and mid-sized businesses should take into consideration when taking your business mobile.
Tags : 
sage, mobile payments, business mobile, mobility
    
Sage
Published By: Mitel     Published Date: Jun 27, 2016
Join Mitel and industry experts on this webcast and learn how Mitel is helping SMBs deliver a seamless experience for their mobile customers through cloud. Topics to be covered in this event: • Why today’s technology fails to deliver the experience you want for your customers • What you should expect and receive from your cloud communication provider now and in the future • The impact of the mobile consumer on small and medium business customer engagement strategies • How consumer expectations have changed the workforce Moderator: Elliot Markowitz, Director, Content Marketing Services, Madison Logic
Tags : 
cloud, telephony, mobile consumer, customization, smbs, seamless experience
    
Mitel
Published By: Genesys     Published Date: Nov 17, 2017
This eBook focuses on two profiles for small contact centers, small business and small of large - a small contact center that is part of a much larger enterprise. Get key insights from independent market research that will help you make a case to take your customer communications platform to the cloud. With the right solution, your business can benefit from enterprise-quality capabilities at a price you can afford. And you can realize a return on investment in as little as three months!
Tags : 
ebook, contact centers, cloud, customer experience
    
Genesys
Published By: Hewlett Packard Enterprise     Published Date: Sep 25, 2017
While flash-based storage has been around for years, many organizations, especially small and midsize businesses, have hesitated to deploy it.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Sep 25, 2017
Solid state storage is increasingly deployed in all sizes of datacenters, from the small and medium business to the large enterprise. It comes in many forms including hybrid arrays, direct attached drives, PCIe flash and accelerators that fit somewhere in between servers and storage. With the price of flash continuing to drop, hybrid storage is becoming more compelling to the small and medium business for critical computing applications such as databases and day-to-day operational computing.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Sep 25, 2017
Small and midsize businesses face big IT challenges
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Sep 25, 2017
If you’re running a small to midsize business, you probably already know firsthand how server virtualization can help you compete against the big guys – by reducing costs, lowering risk and increasing agility. Now it’s time to think about storage.
Tags : 
    
Hewlett Packard Enterprise
Published By: Citrix ShareFile     Published Date: Jul 24, 2017
Want to succeed more often as a small business owner, and take your enterprise to the next level? Consistently innovating and evolving business plans, marketing strategies, product lines, and even entire brand images is key to getting ahead in today’s fast-moving, hugely disruptive business world.
Tags : 
business innovation, marketing strategy, small business owner, branding
    
Citrix ShareFile
Published By: Carbonite     Published Date: Jan 04, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually. According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands. No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
For all organizations, server and component-level crises are unfortunate inevitabilities. Likewise, the need of end-users to revert to previous file versions is a common occurrence due to predicaments large and small. Recognizing these realities, ESG consistently recommends that organizations consider an approach to data protection that is broader than what backup alone can provide
Tags : 
    
Carbonite
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.