Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

ids

Results 326 - 350 of 509Sort Results By: Published Date | Title | Company Name
Published By: Double-Take Software     Published Date: Jun 26, 2009
Just because your business is small, doesn't mean your data isn't just as critical as your Fortune 500 competitors. Like major corporations, small and midsize businesses are increasingly reliant on the critical data stored on their servers.
Tags : 
double-take, smbs, server, midsize, backup, vulnerability, small business networks, storage virtualization, security management, vulnerability management
    
Double-Take Software
Published By: Vision Solutions     Published Date: Jun 26, 2009
Just because your business is small, doesn't mean your data isn't just as critical as your Fortune 500 competitors. Like major corporations, small and midsize businesses are increasingly reliant on the critical data stored on their servers.
Tags : 
double-take, smbs, server, midsize, backup, vulnerability, vision, small business networks, storage management, storage virtualization, vulnerability management
    
Vision Solutions
Published By: Focus CRM     Published Date: Jan 13, 2011
Before you implement CRM at your growing company, learn more about the real-world issues that accompany such growth, and how to apply systems and systematic thinking when dealing with those issues.
Tags : 
midsize companies, mitch lieberman, contact management, experts guide, mark tamis, brian vellmure, crm adoption, paul greenberg, customer relationship management, crm solutions, crm professionals, sales professionals, marketing professionals, enterprise decision makers, smb decision makers, it professionals, cxos, call center management, call center software, customer interaction service
    
Focus CRM
Published By: McAfee Inc     Published Date: Oct 26, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, security, cyberattacks, midsize, cyberthreats, compliance, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security, anti spam, anti spyware, ddos, encryption, hacker detection, identity management
    
McAfee Inc
Published By: McAfee Inc     Published Date: Aug 19, 2009
If you're in IT, you understand all too well the challenge of competing priorities. Security is important-but so are all of your other jobs. That's why McAfee offers a practical approach to managing security and lays out an approach for managing security in just 15 minutes a day. Read more.
Tags : 
mcafee, security, pci, hipaa, epolicy orchestrator, the eu directive, compliance, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security, access control, application security, high availability, policy based management, security management
    
McAfee Inc
Published By: McAfee Inc     Published Date: Aug 19, 2009
Data is a company's most precious asset-and maintaining secure access for a mobile workforce is vital for midsize organizations. This brief explains the key benefits of implementing a data security solution with McAfee. Read more.
Tags : 
mcafee, security, data protection, compliance, cyber criminals, midmarket, encryption, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security, anti spam, application security, authentication, ddos, disaster recovery
    
McAfee Inc
Published By: McAfee Inc     Published Date: Aug 19, 2009
Anti-virus by itself is no longer enough to protect endpoints, especially in this age of mobile devices and business users on the go. This brief explains the key benefits of implementing an endpoint security solution with McAfee. Read more.
Tags : 
mcafee, security, malware, compliance, cyber criminals, midmarket, encryption, security tools, sans, data protection, security center, total security, dlp, midmarket, compliance, availability, email security, anti spam, anti spyware, anti virus
    
McAfee Inc
Published By: McAfee Inc     Published Date: Aug 19, 2009
Email is an indispensible tool for businesses today, but it's also a favorite vehicle for spammers and cybercriminals. This brief explains the key benefits of implementing an email security solution with McAfee. Read more.
Tags : 
mcafee, email protection, midsize, global threat intelligence, security, data protection, email security, encryption, security management, security policies, risk management
    
McAfee Inc
Published By: McAfee Inc     Published Date: Aug 19, 2009
Most midsized businesses aren't fully aware of the number of vulnerabilities that exist on their networks. Is it possible to address them all? This brief explains the key benefits of implementing a network security solution with McAfee. Read more.
Tags : 
mcafee, email protection, midsize, hackers, security, data protection, email security, encryption, policy based management, security management, security policies, risk management, vulnerability management
    
McAfee Inc
Published By: McAfee Inc     Published Date: Oct 30, 2009
Browsers are the least-protected and therefore easiest medium for transferring malware, which is why protecting your company against web-borne threats should be part of a total security solution. This brief explains the key benefits of implementing a web security solution with McAfee. Read more.
Tags : 
mcafee, email protection, midsize, global threat intelligence, security, data protection, spam, anti spam, anti spyware, anti virus, application security, hacker detection, security management, security policies
    
McAfee Inc
Published By: McAfee Inc     Published Date: Nov 16, 2009
With all the benefits and opportunities the Internet provides, it can also be a very inhospitable place, requiring organizations' constant vigilance to protect themselves from attack. To better understand important security issues affecting organizations today, IDC recently completed a survey of more than 260 IT and Firewall managers and executives in the US and Europe that aimed to profile their organization's firewall deployments.
Tags : 
mcafee, email protection, firewall, it security, midsize, global threat intelligence, security, data protection, anti spam, anti spyware, anti virus, application security, firewalls, internet security, intrusion detection, intrusion prevention, security management, security policies
    
McAfee Inc
Published By: Pillar Data Systems     Published Date: Apr 20, 2010
This paper will examine the 5 ways storage waste is persisting and growing in the midst of Green IT initiatives and how to end storage waste.
Tags : 
pillar data systems, storage waste, green it, server virtualization, data center, san, production deployment, storage virtualization, green computing, data center design and management
    
Pillar Data Systems
Published By: DoubleTake     Published Date: Jul 14, 2010
SMBs in regulated industries are also subject to the same data availability and data protection requirements as large corporations for regulations such as HIPAA, FDA Part 11, Sarbanes-Oxley and SEC Rule 17, but without the budgets necessary to meet these requirements. This whitepaper provides six tips for an SMB approach to protecting data, such as confidential employee information, so download now to learn how keep your SMB protected from this critical loss of data.
Tags : 
double-take, smbs, server, midsize, backup, vulnerability
    
DoubleTake
Published By: SAP     Published Date: Jul 29, 2010
Improving your company's efficiency and effectiveness, no matter its size. This white paper from SAP offers guidance on how to improve the efficiency and effectiveness of your company with business intelligence.
Tags : 
sap, business intelligence, smb, midsized companies, streamlining operation, production reporting technology, analytics, data warehouse, operational system, small business networks, business analytics, analytical applications, data warehousing
    
SAP
Published By: SAP     Published Date: Aug 11, 2010
This paper will examine how you can gain reliable, accessible information from efficient, integrated IT systems - and use that information to make faster, smarter decisions.
Tags : 
sap sme, information management, integrated it system, business management solutions, smb, small midsized business, business integration, business intelligence, business management
    
SAP
Published By: SAP     Published Date: Aug 11, 2010
The CFO needs a unified view that integrates multiple data sources and KPIs, and places them in the context of strategic goals.
Tags : 
sap sme, information management, integrated it system, business management solutions, smb, small midsized business, finance, cfo, roi, business analytics, business integration, business intelligence, business management, business process management, return on investment
    
SAP
Published By: SAS     Published Date: Aug 27, 2010
This research program is an online survey of C-level executives at leading large and midsize companies who are members of the BusinessWeek Market Advisory Board, an online panel of 20,000+ business leaders and executives.
Tags : 
sas, customer relationship, crm, business analytics, c-level executives, businessweek, customer interaction service, customer relationship management, customer satisfaction, customer service, analytical applications
    
SAS
Published By: SAS     Published Date: Jul 02, 2012
In this special Insights report, we highlight growing businesses that once thought the only analysis they could do was on a spreadsheet and that analytics was something for large companies.
Tags : 
small business, big data, risk management, sas
    
SAS
Published By: SAS     Published Date: Mar 14, 2014
This paper will discuss the barriers to data-driven decision making for midsized businesses, and how experts and non-experts alike can use SAS Visual Analytics to unlock the value of data – including big data – to increase revenue, cut operational costs and better manage their business.
Tags : 
sas, bottom line, midsized businesses, leveraging data, data management, internal and external, decision making, big data, operational costs, decision support, operational execution, strategic analysis, predictive analytics, data landscape, real-time data, interactivity, data democracy, visual analytics, best practices, business intelligence
    
SAS
Published By: IBM     Published Date: Sep 03, 2013
This paper describes how workgroups and midsize companies can transform their spreadsheet-only process to create flexible and timely plans, budgets and forecasts. It outlines recommendations for implementing a complete performance management system, using IBM Cognos Express, an integrated reporting, analysis and planning solution purpose-built for workgroups and midsize companies.
Tags : 
transforming spreadsheets, planning, budgeting, forecasting, midsize companies, cognos express, management system, ibm, knowledge management, enterprise applications
    
IBM
Published By: Cisco     Published Date: Sep 07, 2016
This white paper displays the top unified communications trends for midsize businesses.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 08, 2016
The following questions in this white paper were posed by Cisco to Nolan Greene, research analyst with IDC's Network Infrastructure group, on behalf of Cisco's SMB customers.
Tags : 
    
Cisco
Published By: Exablox     Published Date: Jan 27, 2015
Traditional storage management can be complex, confusing, and and configuration involved can be overwhelming. Scaling and replication can often be time consuming and frustrating, if not practically impossible. The time and complexity required can drive small and midsize businesses to engage expert consultants just to manage their data storage solution and optimize it for their application requests. You’ve got more on your plate to manage than just storage. In this third of a series of informative e-books from Exablox, we take a look at the difficulties of traditional storage approaches, and offer simple, practical ways to make your data storage easier to manage.
Tags : 
data management, data storage solution, new storage approach, storage management, simple data storage management, exablox, oneblox
    
Exablox
Published By: Exablox     Published Date: Jan 27, 2015
When it comes to the increasingly complex task of managing data storage, many small and midsize organizations face even greater challenges than large, global enterprises. Small and midsize companies have ever-increasing volumes of information to manage and secure, and they are confronting a number of difficulties when it comes to storage. Among the biggest hurdles: ›› Scaling storage as the business grows rapidly ›› Meeting the rising expense of data storage capacity ›› Dealing with the complexity of management and architecture ›› Devoting precious staff time managing storage and data backup Whereas larger organizations have significant IT budgets and staff to handle storage-related challenges, small and midsize companies lack the IT resources to dedicate to storage management. Fortunately, there are new approaches to data storage on the market that can help such companies address their data storage needs without requiring dedicated storage management resources, while at the same ti
Tags : 
scaling storage, data storage capacity, data backup, data protection, data management, exablox, oneblox, storage management
    
Exablox
Published By: Telx     Published Date: Mar 22, 2016
For many midsize companies, the Cloud may not seem error-proof due to a growing list of challenges—technical, financial, and personnel. So, how can IT pros today deliver on the value of Cloud services and applications, while mitigating these resource constraints?
Tags : 
cloud, services, applications, it management, knowledge management, mobile computing, mobile data systems, wireless communications, cloud computing
    
Telx
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search