whitepaper

Results 1876 - 1900 of 1998Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Apr 25, 2012
A new approach to security is needed. By adopting a mass security operation model, organizations can deploy and operate enterprise level security with fewer resources. Download this whitepaper to learn more.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2012
The best protection against today's network threats are solutions that are adaptable, dynamic, easily managed, contextually-aware and affordable. Download this whitepaper to learn more.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee
Published By: HP and IntelŽ XeonŽ processors     Published Date: May 08, 2012
Read this whitepaper to learn three simple steps Small to medium size businesses can take to heighten business performance and increase brand office productivity.
Tags : 
trends, performance, customer, customer experiences, flexibility, service, transactions, relationships
    
HP and IntelŽ XeonŽ processors
Published By: HP and IntelŽ XeonŽ processors     Published Date: May 08, 2012
Read this whitepaper to learn the three key factors any IT manager should consider when designing a flexible and scalable network for today's mobile workforce.
Tags : 
smb, mobile, smartphones, employees, wi-fi, text, ipad, cloud computing, social networking, mobile workforce
    
HP and IntelŽ XeonŽ processors
Published By: HP and IntelŽ XeonŽ processors     Published Date: Aug 23, 2012
ESG Whitepaper: HP Virtual Application Networks
Tags : 
virtual applications, networks
    
HP and IntelŽ XeonŽ processors
Published By: HP and IntelŽ XeonŽ processors     Published Date: Dec 20, 2012
Download this rich media whitepaper to learn how and to hear from up to 3 customer references, IDC analysts and access additional reference articles on HP's converged infrastructure and more.
Tags : 
strategy guide, converged government, intel, data management
    
HP and IntelŽ XeonŽ processors
Published By: HP and IntelŽ XeonŽ processors     Published Date: Dec 20, 2012
This whitepaper is a rich media document, and includes industry viewpoints, multimedia content, and up to three detailed customer case studies embedded within this single dossier - mainly about application modernization in government.
Tags : 
application modernization, modernization, government
    
HP and IntelŽ XeonŽ processors
Published By: HP and IntelŽ XeonŽ processors     Published Date: Dec 20, 2012
Download this IDC Whitepaper to learn how using appropriate technology in consistent ways helps SMB organizations mitigate business risk and improve overall business protection by avoiding unplanned downtime.
Tags : 
business risk, effective technology, idc
    
HP and IntelŽ XeonŽ processors
Published By: Infogroup Targeting Solutions     Published Date: Oct 01, 2013
In this whitepaper, learn best practices on how you can better target consumers that are now eligible to receive benefits under the Affordable Care Act.
Tags : 
    
Infogroup Targeting Solutions
Published By: Rocket Fuel     Published Date: Jun 26, 2012
This whitepaper explains how to build a simple digital advertising attribution strategy. The technology is there to run a few simple tests, place a few pixels in the appropriate places, and gain new levels of visibility into whom your ads are reaching and how effectively they're influencing customer actions.
Tags : 
rocketfuel, marketing, mobile, social media, digital marketing, branding, mobile marketing, online video marketing, social media marketing
    
Rocket Fuel
Published By: Infoblox     Published Date: Jun 11, 2012
Companies require products that offload routine functions from the technology staff so that they can focus on more-important tasks. Download this whitepaper to learn what automation can do for you.
Tags : 
infoblox, time, value, network, network automation, automation, tasks, productivity, configuration, infrastructure, enterprise, enterprise network, compliance
    
Infoblox
Published By: Infoblox     Published Date: Dec 28, 2012
Download this whitepaper guide to discover how to design a phased approach for adopting IPv6 on your own network.
Tags : 
ipv6, networks, methodology, success, infoblox, ipv6 adoption
    
Infoblox
Published By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : 
data, identity, security, network, protection, mobile, security, documents, evolution, malware, sql, web, browser, hostile, e-mail, attack, password, lockdown, trusted, dlp
    
CDW Symantec
Published By: Oracle     Published Date: Sep 24, 2012
Download this whitepapers to learn how internal mobility programs can help drive your greatest asset-your employees.
Tags : 
talent management, talent mobility, internal mobility
    
Oracle
Published By: Oracle     Published Date: Dec 03, 2012
This white paper is designed to give you greater insight into the pros and cons of putting your HR applications in the cloud, whether you leverage Oracle's Fusion HCM solutions or other third-party SaaS offerings.
Tags : 
saas, human resources technology, hcm, hr strategy, hr cloud applications, cloud computing
    
Oracle
Published By: Oracle     Published Date: Jan 28, 2013
This whitepaper provides solutions to the challenges companies have in all industries: jobs that must be performed—and performed well—for the companies to succeed.
Tags : 
hiring, onboarding, recruiting, human resources, critical-talent pipelines, talent inventory, retaining talent
    
Oracle
Published By: Arbor Networks     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, cyber attacks, research, enterprise, mobile, cloud, security
    
Arbor Networks
Published By: BlackBerry     Published Date: Oct 03, 2012
In this Yankee Group whitepaper, find out why creating an enterprise-class tablet environment should be at the top of the list for every security-conscious organization.
Tags : 
tablet environments, security, application security, corporate tablet use
    
BlackBerry
Published By: HP-IntelŽ     Published Date: Nov 19, 2012
Why Disaster Recovery is Different in Healthcare
Tags : 
intel, healthcare, disaster recovery, bridgehead software
    
HP-IntelŽ
Published By: HP-IntelŽ     Published Date: Nov 19, 2012
Many customers of x86 servers are facing rising costs for maintenance and management of those servers.
Tags : 
intel, healthcare, idc, smb, business risk
    
HP-IntelŽ
Published By: Blackberry     Published Date: Oct 03, 2012
In this Yankee Group whitepaper, find out why creating an enterprise-class tablet environment should be at the top of the list for every security-conscious organization.
Tags : 
tablet environments, security, application security, corporate tablet use
    
Blackberry
Published By: uberVU via HootSuite     Published Date: Oct 10, 2012
HootSuite's latest whitepaper, 8 Tips for Social Business, will illuminate the correct process by which organizations can successfully implement a successful and scalable social media strategy.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks, emerging marketing, social media, internet marketing
    
uberVU via HootSuite
Published By: Symantec     Published Date: Jul 30, 2013
In this whitepaper we will discuss what to look for in a virtualization protection solution as well as consider the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. Download for more information.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management
    
Symantec
Published By: HP - IntelŽ     Published Date: Nov 13, 2012
This whitepaper defines a best practices reference architecture and detailed implementation guide for building a highly available two node virtualization or private cloud solution ideally suited for mid-sized businesses and branch office deployments.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure
    
HP - IntelŽ
Published By: Sponsored by HP and IntelŽ     Published Date: Nov 14, 2012
This report defines "tier-1" storage in the modern IT world and in the data centers and services that support it.
Tags : 
data centers, data storage, tier one, virtualization, storage tiers
    
Sponsored by HP and IntelŽ
Start   Previous    66 67 68 69 70 71 72 73 74 75 76 77 78 79 80    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.