Reports AWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Reports A returned the following results.
RSS What is RSS?
Related Categories

 •   Business Process Management (BPM)
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Business Intelligence Solutions
 •   Network Security
 •   Storage Security
 •   Data Security
 •   Operational BI
 •   Technology ROI Tools
 •   Enterprise Performance Management/ Balanced Scorecard
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Financial Reports A
 •   Impact Of Reports A
 •   Organization Reports A
 •   Productivity Reports A
 •   Reports A Demonstration
 •   Reports A Own
 •   Reports Industry
 •   Sql Reports A
 •   Standards Reports A
 •   Test Reports A
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Analyst report: A Forrester Total Economic Impact Study - IBM Rational solution for Collaborative Lifecycle Management (June 2013) by IBM

June 30, 2013 - (Free Research)
This informative Forrester report explores the economic impact and ROI of a collaborative lifecycle management tool that improves software quality and delivery. Read now to learn how this technology encourages collaboration between software development and deployment teams, and explore the cost, benefits, and risk of deploying this toolset. 
(WHITE PAPER) READ ABSTRACT |

Maximizing Value Report: A Benefits Analysis of 100 SAP Customers Worldwide by Mainstay Partners

December 01, 2006 - (Free Research)
In this paper, Mainstay Partners analyzes 100 SAP customer case studies and success stories found in the book, "Maximizing Value – 100 Customer Successes" published in 2006. Learn the results of these 'best practice' companies. 
(WHITE PAPER) READ ABSTRACT |

EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager by IBM

July 03, 2013 - (Free Research)
Many security teams struggle with the limitations of traditional, isolated security tools. For today's complex IT infrastructure, you need a comprehensive, integrated way to manage the security of your applications, network, and data. 
(WHITE PAPER) READ ABSTRACT |

The Future of Financial Reporting: A Market Perspective by Oracle Corporation

December 20, 2010 - (Free Research)
Following on the heels of corporate scandals at Enron, WorldCom, and others, global investors are demanding stricter corporate governance and compliance requirements for publicly held companies. Read this whitepaper to learn more about the issues, principles, and technologies underlying new requirements in corporate governance. 
(WHITE PAPER) READ ABSTRACT |

The Future of Financial Reporting: A Market Perspective by Oracle Corporation UK Ltd

July 01, 2008 - (Free Research)
Following on the heels of corporate scandals at Enron, WorldCom, and others, global investors are demanding stricter corporate governance and compliance requirements for publicly held companies. Read this whitepaper to learn more about the issues, principles, and technologies underlying new requirements in corporate governance. 
(WHITE PAPER) READ ABSTRACT |

IDC Report: An ROI Analysis of FalconStor Storage Management Solutions by FalconStor Software

August 01, 2009 - (Free Research)
IDC interviewed eight FalconStor customers that had deployed at least one or a combination of the following FalconStor storage management solutions: Virtual Tape Library (VTL), Network Storage Server (NSS), and Continuous Data Protector (CDP). 
(ANALYST REPORT) READ ABSTRACT |

CW+: Quocirca Report: A gift from IT to the business by ComputerWeekly.com

July 29, 2010 - (Free Research)
IT managers that fail to embrace on-demand services will hold back the organisation they are supposed to be supporting. Such services can save costs within IT, as well as provide new capabilities to the business that have previously been unavailable or unaffordable. 
(WHITE PAPER) READ ABSTRACT |

BI software users report a sharp rise in data integration challenges by IBM

January 12, 2012 - (Free Research)
With business intelligence (BI) software programs expanding in size and scope -- and more rank-and-file business users creating reports than ever before -- organizations are growing increasingly concerned about the data integration challenges of BI projects, according to the results of a new searchBusinessAnalytics.com survey. 
(EGUIDE) READ ABSTRACT |

DATA Act Protection: Effects of a Federal Breach Notification Law by CDW Corporation

December 07, 2010 - (Free Research)
This E-Guide examines new reporting requirements and how your organization will have to report a breach to the FTC and what new steps you’ll have to institute to comply. 
(EGUIDE) READ ABSTRACT |

Salary Report: Trends in IT Compensation and Certifications by Global Knowledge Network, Inc.

May 2006 - (Free Research)
Global Knowledge keeps up to date with trends in IT careers, certifications, and compensation. In this, our inaugural quarterly report, we offer a look at salaries for the top 25 IT jobs, organized by region. We also offer a look at the top certifications and in-depth analysis from our resident market research analyst. 
(ANALYST REPORT) READ ABSTRACT |

Winning the Paper Wars by ComputerWeekly.com

August 2013 - (Free Research)
This report from AIIM, a global community of IT professionals, assess the ROI of paper free projects, the drivers for eliminating paper, and the hurdles. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Mobile working in business - the facts. by ComputerWeekly.com

November 2010 - (Free Research)
The tech chasm that has allegedly formed in the workforce created by a cross-generational 1divide  – between those who grew-up with technology and those that didn’t – is vastly overstated. 
(WHITE PAPER) READ ABSTRACT |

Lumension Vulnerability Management - Automating the Vulnerability Management Lifecycle by Lumension

November 2008 - (Free Research)
Learn how Lumension Vulnerability Management enables organizations to mitigate their critical risk by integrating the five phases of vulnerability management: discovering assets, assessing vulnerabilities and misconfigurations, prioritizing risks, remediating vulnerabilities and continuous reporting. 
(WHITE PAPER) READ ABSTRACT |

Debunking the Myth of the Single-Vendor Network by Juniper Networks, Inc.

December 2010 - (Free Research)
Read this analyst report to see why most organizations should consider a dual-vendor or multivendor solution as a viable approach to building their network.  Not only are significant cost savings achievable with no increase in network complexity, but there is also an improvement in focus on meeting business requirements. 
(ANALYST REPORT) READ ABSTRACT |

It’s All About the App: Mobile Security That Helps Enable the Business by CA Technologies.

November 2013 - (Free Research)
With mobility strategies quickly becoming a priority for the majority of organizations, this informative guide provides information on mobile security strategies that every business needs to learn more about. 
(WHITE PAPER) READ ABSTRACT |

E-book: Key trends in SAP managed hosting environments - is your provider keeping pace? by Freudenberg IT

December 2009 - (Free Research)
In this e-book, learn more about key trends affecting SAP managed hosting environments. Find out how the emergence of cloud computing is impacting the managed hosting market. Learn more about virtualization and find out important considerations when assessing managed hosting providers. 
(EBOOK) READ ABSTRACT |

Streamline Compliance Reporting to Effectively Meet Requirements by APTARE

June 2013 - (Free Research)
Uncover key compliance requirements you should address in your backup strategy and learn how a central reporting tool can help you streamline compliance reporting, ensure data is protected throughout its entire lifecycle, and produce reports to quickly and accurately demonstrate compliance. 
(WHITE PAPER) READ ABSTRACT |

Storage Chargeback: Critical Metrics and Real-world Examples by APTARE

October 2013 - (Free Research)
In this case study, learn how an automated strategy for reporting on storage utilization and the resulting charges enabled one organization to streamline the chargeback reporting process, improve productivity, increase storage utilization, and more. 
(CASE STUDY) READ ABSTRACT |

Best Practices in Audit and Compliance Reporting for IBM System i (AS/400) by PowerTech

November 2007 - (Free Research)
Compliance with regulations such as Sarbanes-Oxley, PCI, HIPAA and GLBA requires regular audit reporting against critical information technology (IT) assets. This paper outlines various audit items that should be reviewed on a regular basis... 
(WHITE PAPER) READ ABSTRACT |

Workflow, governance and reporting – Solvency II by IBM

May 2014 - (Free Research)
The following white paper provides readers with industry-leading insights into the key challenges and issues arising when managing all 3 pillars of Solvency II. Learn how to manage workflow around internal models, which process surround reporting and the integration with risk modeling, and more. 
(WHITE PAPER) READ ABSTRACT |

LogRhythm and PCI Compliance by LogRhythm, Inc.

September 2009 - (Free Research)
LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs. This paper illustrates and discusses the 6 domains of PCI DSS requirements as well as uses tables to outline how LogRhythm supports PCI compliance. 
(WHITE PAPER) READ ABSTRACT |

Virtual Criminology Report 2009 -- Virtually Here: The Age of Cyber Warfare by McAfee, Inc.

December 2009 - (Free Research)
Is the “Age of Cyber War” at hand? Since our 2007 report, there have been increasing reports of cyber attacks and network infiltrations that appear to be linked to nation-states and political goals. We decided it was time to further examine whether cyber warfare is now a part of human conflict that we should get used to seeing more often. 
(WHITE PAPER) READ ABSTRACT |

The MSP Report Advantage by N-able Technologies

December 2012 - (Free Research)
Discover why professional, standardized reports have emerged as a key success factor for many MSPs and IT services providers, helping prove relevance and demonstrate the value of service delivered to their clients. View now to learn how such reporting can help you gain the title of "Trusted Advisor." 
(WHITE PAPER) READ ABSTRACT |

Automating Tax and Statutory Reporting Processes by IBM

November 2013 - (Free Research)
This video explains a method organizations can adopt in order to provide consistency and automation to their tax and statutory reporting. 
(VIDEO) READ ABSTRACT |

Wayne Eckerson E-Book: Strategies and Techniques for Effective Reporting and Analysis by Tableau Software

June 2011 - (Free Research)
For more than two decades, business intelligence (BI) professionals have tried to shoehorn all reporting and analysis tasks into the same BI toolset and architecture, often with disappointing results. Is there a real solution? Read this eBook by Wayne Eckerson, Director of Research for TechTarget, for the answer. 
(EBOOK)

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts