Businesses Using Enterprise OwnWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Businesses Using Enterprise Own returned the following results.
RSS What is RSS?
Related Categories

 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Data Security
 •   Virtualization
 •   Security Policies
 •   Endpoint Security
 •   Application Management and Maintenance
 •   Network Security
 •   Managed Security Services
 •   Data and Application Distribution

Related Searches
 •   Audits Businesses Using Enterprise
 •   Businesses Conferences
 •   Businesses Rfi
 •   Businesses Using Capacities
 •   Businesses Using Enterprise Site
 •   Businesses Using Enterprise Storage
 •   Making Businesses Using
 •   Processing Businesses Using Enterprise
 •   Provider Businesses Using
Advertisement

ALL RESULTS
1 - 25 of 448 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Akamai's Application Acceleration Services: Transform the Internet into a Business-Ready Application Delivery Platform by Akamai Technologies

December 2008 - (Free Research)
The Akamai EdgePlatform addresses the root-causes of Internet performance and scale bottlenecks by intelligently placing itself between the end-user and origin data-center as an overlay network to the Internet. 
(WHITE PAPER) READ ABSTRACT |

Email Management in Today's Regulatory Environment by Ontrack® PowerControls™ by Kroll Ontrack

February 2009 - (Free Research)
Many businesses use the Exchange email server because of its full feature set and integration with Microsoft Office via the Outlook email client. But Exchange has one glaring drawback - it is very difficult to restore messages, mailboxes, and other data. Ontrack® PowerControls™ for Microsoft® Exchange Server solves the problem.. 
(WHITE PAPER) READ ABSTRACT |

Adapt to the Speed of Business: Unlock the Value of your SAP and Microsoft Investments by SAP America, Inc.

August 2013 - (Free Research)
In this newsletter from Gartner, learn how IT can securely integrate SAP and Microsoft, so your users can access SAP data and processes from a Microsoft environment, without turning your infrastructure upside-down. 
(NEWSLETTER) READ ABSTRACT |

The ROI for ERP: An Overall Approach by ComputerWeekly.com

September 2012 - (Free Research)
Nucleus Research offers advice on calculating the return on investment (ROI) for enterprise resource planning (ERP) systems. 
(ANALYST REPORT) READ ABSTRACT |

CW+: The Open Group: Strengthening your business case for using cloud by ComputerWeekly.com

July 2010 - (Free Research)
With the rapid emergence of technologies, it is important for business executives and stakeholders to focus on the real business challenges and the needs of the enterprise. This White Paper provides a high-level depiction of real-world business problems that were addressed using Cloud computing. 
(WHITE PAPER) READ ABSTRACT |

CW+: The Open Group: Strengthening your business case for using cloud by ComputerWeekly.com

August 2010 - (Free Research)
What can you, as a buyer do to strengthen your business case for Cloud and keep your company competitive? What are some real-world success stories where companies have applied Cloud to solve specific business challenges? What business risks are clients facing which have influenced Cloud buying decisions? 
(WHITE PAPER) READ ABSTRACT |

Security Gateway Buyer's Guide by Intel

February 2011 - (Free Research)
If you’re currently evaluating Security Gateways, this guide will provide the analysis and decision support that will enable you make an informed choice. The following sections of the guide contain tools you can use to identify the right fit for your security architecture based on business requirements, cost, and complexity. 
(WHITE PAPER) READ ABSTRACT |

Using Web Technology for Competitive Advantage: How Manufacturers Leverage the Web for Internal Efficiency, Enhanced Customer Service and Increased Sales by Bowen & Groves

May 2008 - (Free Research)
More than simply serving a marketing role, a Web presence can boost internal efficiency, enhance customer service and increase sales. 
(WHITE PAPER) READ ABSTRACT |

An Introduction to Sharepoint 2010 by Dell, Inc.

June 2011 - (Free Research)
This paper provides an overview of common business use cases for which SharePoint is a good fit, introduces the services and functionality within SharePoint Server 2010, highlights key changes from MOSS 2007, and helps readers understand the terminology and concepts needed for planning or deploying a SharePoint 2010 farm. 
(WHITE PAPER) READ ABSTRACT |

Managing Security on Mobile Phones by Nokia

January 2008 - (Free Research)
This paper describes the challenges of provisioning and managing security in mobile phone environments and how a well-designed deployment system can alleviate these challenges. 
(ANALYST REPORT) READ ABSTRACT |

Implementing Self-Service BI to Improve Business Decision Making by Intel

May 2013 - (Free Research)
View this white paper to learn more about how to implement self-service business intelligence (BI.) It explores the approach used to help organizations balance the different requirements of BI. By integrating self-service BI with a centralized BI development model, your business can have a more flexible and efficient environment. 
(WHITE PAPER) READ ABSTRACT |

Stepping Up to the Cloud: Managing Changes and Migration for Mid-sized Business by SAP AG

January 2011 - (Free Research)
This paper looks at both the strategic benefits and the strategic challenges of moving to Cloud and SaaS for mid-sized businesses, using insights developed from more than eight years of SaaS and Cloud research among user executives by Saugatuck Technology. 
(WHITE PAPER) READ ABSTRACT |

Android security settings and controls for Android enterprise security by SearchSecurity.com

February 2012 - (Free Research)
With all the security gaps in the Android platform, is it possible to achieve enterprise-level security? In this resource, gain expert insight into enabling effective Android enterprise security. View now to explore Android security settings and control, battling Android malware, and much more. 
(EGUIDE) READ ABSTRACT |

Optimize Your IT Systems with Oracle Optimized Solution for Oracle E-Business Suite by Oracle Corporation

May 2012 - (Free Research)
With the acquisition of Sun, Oracle now provides Oracle Optimized Solutions: a complete applications to disk solution engineered, tested, and certified to work together as a single system. Read this white paper to learn more about Oracle Optimized Solutions and how they can be used to improve Oracle E-Business Suite operations. 
(WHITE PAPER) READ ABSTRACT |

Methodology for Information Quality Management by Harte-Hanks Trillium Software

May 2011 - (Free Research)
This paper discusses how Trillium Software extends that principle to ensure services are driven by data governance defining the criticality and use for the data, and establishing roles and responsibilities within the business and IT to achieve business goals and objectives. 
(WHITE PAPER) READ ABSTRACT |

Trust and security in the cloud by ComputerWeekly.com

February 2011 - (Free Research)
This study from analyst Freeform Dynamics gives guidance on security for organisations considering Software as a service. 
(ANALYST BRIEF) READ ABSTRACT |

Ensuring Service Assurance in the New Normal by CA Technologies.

September 2011 - (Free Research)
Access this white paper to learn about service assurance, the modern IT management solution designed to meet the requirements of a cloud-connected enterprise, whether it is leveraging infrastructure as a service (IaaS), platform as a service (PaaS), software as a service (SaaS), or a combination of the three. 
(WHITE PAPER) READ ABSTRACT |

Top Five Security Issues for Small and Medium-Sized Businesses by Cisco Systems, Inc.

February 2008 - (Free Research)
Small and medium-sized businesses use the Internet and networked applications to reach new customers and serve their existing ones more effectively. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 12 February 2013: Can BlackBerry 10 bridge the business-consumer smartphone divide? by ComputerWeekly.com

February 2013 - (Free Research)
In this week's Computer Weekly, we look at the new smartphone from BlackBerry – it's designed to please both business and consumer users, but is it enough to save the company? We examine the options for using cloud services for disaster recovery. And IT leaders tell us what they think about the future of the data centre. Read the issue now. 
(EZINE) READ ABSTRACT |

FlexiCapture Drives Business For the Insurance Industry by ABBYY

February 2011 - (Free Research)
Insurance agents across the country are saving time, saving money and writing more business using AppReader: The automated form conversion solution that allows applications to upload instantly to carrier systems, regardless of agency management system. Read on and find how how AppReader can benefit your business. 
(WHITE PAPER) READ ABSTRACT |

Attack of the PDF Documents: How Adobe’s PDF Format has become one of the top carriers of malware by Sophos, Inc.

April 2011 - (Free Research)
Since PDF has become so common on the Internet, with nearly every business using it as the document format of choice for delivering forms, articles, and whitepapers, the security problems and malware potential of PDF are far too tempting for the bad guys to ignore. 
(WHITE PAPER) READ ABSTRACT |

How to control abuse of social networking on mobile devices by ComputerWeekly.com

November 2010 - (Free Research)
The numbers of employees using some form of mobile technology while working has soared. The benefits to the organisation are well documented; employees are more contactable, will probably extend their working days and should be more productive. 
(WHITE PAPER) READ ABSTRACT |

Reinventing Branch Office Security: Configuration-less UTM protection for small offices by Astaro

July 2010 - (Free Research)
When it comes to IT security, almost all businesses using IP networks to transmit data will know that they have to protect themselves, and they will have systems in place to keep their data secure. However, this is often focused at the head office. For workers that are not at the central office, the question of security is a harder one to answer. 
(WHITE PAPER) READ ABSTRACT |

Gunner Peterson's Security Gateway Buyer’s Guide by Intel

March 2011 - (Free Research)
Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. This guide describes security architecture capabilities, common business use cases, and deployment considerations. 
(WHITE PAPER) READ ABSTRACT |

The impact of Cloud on IT by ComputerWeekly.com

July 2011 - (Free Research)
This research from Freeform Dynamics assess the impact of the cloud on the IT department and the way the department functions. 
(ANALYST BRIEF) READ ABSTRACT |

1 - 25 of 448 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts