whitepaper

Results 1626 - 1650 of 2074Sort Results By: Published Date | Title | Company Name
Published By: HP - Intel®     Published Date: Oct 05, 2012
This whitepaper is a rich media document, and includes industry viewpoints, multimedia content, and up to three detailed customer case studies embedded within this single dossier.
Tags : 
security, security practices, enterprise security, security information management, government, application security, security services
    
HP - Intel®
Published By: HP - Intel®     Published Date: Oct 05, 2012
This whitepaper addresses customer pain points, and addresses Disaster Readiness, Operational Efficiency and solutions that can help improve Business Protection.
Tags : 
servers, server data, downtime, management software, networking and systems management, disaster recovery, disaster readiness
    
HP - Intel®
Published By: BlackBerry     Published Date: Oct 03, 2012
In this Yankee Group whitepaper, find out why creating an enterprise-class tablet environment should be at the top of the list for every security-conscious organization.
Tags : 
tablet environments, security, application security, corporate tablet use
    
BlackBerry
Published By: HP-Intel®     Published Date: Oct 03, 2012
Healthcare Disaster Recovery Whitepaper
Tags : 
healthcare, disaster recovery, bridgehead software, electronic patient data
    
HP-Intel®
Published By: HP-Intel®     Published Date: Oct 03, 2012
IDC Business Protection Whitepaper
Tags : 
technology, operational efficiency, operations, idc, smb organizations, operational efficiency
    
HP-Intel®
Published By: Blackberry     Published Date: Oct 03, 2012
In this Yankee Group whitepaper, find out why creating an enterprise-class tablet environment should be at the top of the list for every security-conscious organization.
Tags : 
tablet environments, security, application security, corporate tablet use
    
Blackberry
Published By: Oracle Corp     Published Date: Oct 02, 2012
Customer Experiences that Engage and Convert : An Oracle Whitepaper
Tags : 
oracle, experiences, mobile, convert, multichannel, integration, crm, customer care
    
Oracle Corp
Published By: Symantec     Published Date: Oct 02, 2012
Protect Your Applications- and Reputation-with Symantec EV Code Signing : A whitepaper
Tags : 
symantec, code, signing malware, attacks
    
Symantec
Published By: Oracle Corp     Published Date: Oct 02, 2012
An oracle Whitepaper
Tags : 
oracle, consumers, rightnow, branding, consumers, relationships, crm, customer care
    
Oracle Corp
Published By: Achievers     Published Date: Oct 01, 2012
The key to success is driving employee performance, through recognizing the right behaviors that impact the big picture. Read Paul Hebert's whitepaper to learn how one recognition platform can help you cut costs and increase efficiency.
Tags : 
employee recognition, employee engagement, employee rewards, hr trends, generation, gen x, gen y, millennials
    
Achievers
Published By: IBM     Published Date: Oct 01, 2012
CMOs must orchestrate their digital strategy using our connect-the-dots framework. Their objective: Elevate digital to the highest level of business strategy.
Tags : 
branding, brand experience, user experience, digital branding, digital branded content, content management, content delivery
    
IBM
Published By: Good Technology     Published Date: Sep 27, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
    
Good Technology
Published By: Oracle     Published Date: Sep 24, 2012
Download this whitepapers to learn how internal mobility programs can help drive your greatest asset-your employees.
Tags : 
talent management, talent mobility, internal mobility
    
Oracle
Published By: ESET     Published Date: Sep 21, 2012
Cyber-attacks are now about making money. ACAD/Medre.A is a terrifying worm that stole AutoCAD files. This whitepaper shows how industrial espionage is a new threat.
Tags : 
computer worm, espionage, eset, industrial espionage
    
ESET
Published By: Dell     Published Date: Sep 21, 2012
This whitepaper outlines the principal elements of VNA and maps out its principal applications for traditional, virtual and cloud IT environments.
Tags : 
virtualization, dell, network architecture, network virtualization, data center, cloud, cloud computing
    
Dell
Published By: CCMI     Published Date: Sep 19, 2012
In this whitepaper, you'll discover the five essential elements to consider when evaluating tools for telecom management.
Tags : 
information technology, telecommunications, telecom, telecom management
    
CCMI
Published By: Epsilon     Published Date: Sep 18, 2012
To be successful in the current landscape, retail marketers must adapt their marketing messages to match the specific format, time and methods of consumers. Download this whitepaper to learn how retailers are boosting their CEM strategies.
Tags : 
customer experience marketing, real-time messaging, rtm, cem, customers' needs, competitive advantage, customer identification, customer segmentation
    
Epsilon
Published By: Splunk     Published Date: Sep 17, 2012
Download this whitepaper to discover how Ping Identity is using Splunk to gain significant hard and soft ROIs.
Tags : 
cloud, cloud computing, cloud scale, cloud identity security, cloud operations, increase roi
    
Splunk
Published By: Splunk     Published Date: Sep 17, 2012
Read this whitepaper to discover how Cricket Communications sought out Splunk for a combined system that monitored and integrated applications, data and operational business intelligence (BI).
Tags : 
information technology, enterprise management associates, roi, list management, crm, customer relationship management
    
Splunk
Published By: Aberdeen-IBM     Published Date: Sep 12, 2012
In this whitepaper, you will see that the financial benefits of cloud computing are very real, the payback period is characteristically very short and the action steps to obtain these savings are very well defined.
Tags : 
ibm, cloud computing, aberdeen, business technology, business, roi, it environment, application integration
    
Aberdeen-IBM
Published By: SAP     Published Date: Sep 12, 2012
In this whitepaper, you'll learn how SMEs can take a strategic approach to identify which mobile business apps will yield the strongest business value.
Tags : 
mobile solutions, mobile business applications, sme, sap, mobile governance, mobility
    
SAP
Published By: Symantec.cloud     Published Date: Sep 12, 2012
In this whitepaper you'll why it is important to have a backup solution that protects your data - and that can restore it with a minimum of delay at a critical time.
Tags : 
smbs, backup and recovery, data protection, backup solutions, data restoration, symantec
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Sep 12, 2012
Download this whitepaper to discover the four key things you should know about securing small to medium enterprises in the current business landscape.
Tags : 
smb, data security, database security, backup and recovery, data loss, malware
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Sep 12, 2012
In this whitepaper, Symantec offers seven tips for how business owners can beef up and protect their company.
Tags : 
it security, smb, symantec, data security, disaster recovery, backup and recovery, security solutions
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Sep 12, 2012
Download this whitepaper to learn three useful steps to protect your virtual systems. There's no better time than the present to give your virtual systems top-of-the-line backup and restore protection.
Tags : 
virtual systems. virtualization, backup and recovery, backup automation, symantec
    
Symantec.cloud
Start   Previous    59 60 61 62 63 64 65 66 67 68 69 70 71 72 73    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.