Vendors Making WhatWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Vendors Making What returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Storage Management
 •   Backup Systems and Services
 •   Enterprise Systems Management
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Data Center Management
 •   Storage Security
 •   Data Security
 •   Disk-based Backup & Storage/ RAID
 •   Technology Planning and Analysis

Related Searches
 •   Compare Vendors Making What
 •   Information About Vendors Making What
 •   Issues On Vendors Making
 •   Vendors General
 •   Vendors Making Computing
 •   Vendors Making Louisiana
 •   Vendors Making Outsourcing
 •   Vendors Making What Chart
 •   Vendors Making What Note
 •   Vendors Wisconsin
Advertisement

ALL RESULTS
1 - 25 of 434 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Presentation Transcript: Online Backup FAQ by i365, makers of Evault

November 09, 2009 - (Free Research)
Trying to decide if online backup, or backup as a service, will be beneficial to your small or midsized business? Check out this presentation transcript, where you’ll learn the benefits and drawbacks of online backup, the major players in online backup today, what to look for when evaluating online backup options, and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

An Overview of the Cloud Market Vendor Landscape for Enterprise Users by VMware, Inc.

September 30, 2012 - (Free Research)
This market profile provides an objective review of 11 leading cloud vendors and public cloud service provides and includes key takeaways for IT leaders to consider when selecting a vendor. 
(WHITE PAPER) READ ABSTRACT |

The Importance of Securing Mobile Device Platforms by Dell Software

September 30, 2013 - (Free Research)
Access this informative resource to discover which mobile security solutions are recommended for Apple, Android and Microsoft Windows devices. 
(WHITE PAPER) READ ABSTRACT |

Server Virtualization Basics: Understanding the Virtualization Market by SearchServerVirtualization

May 29, 2013 - (Free Research)
This expert e-book examines the players in today's virtualization market and the ways in which the market continues to grow and evolve. 
(EBOOK) READ ABSTRACT |

The Elephant in the Room - Cloud Security and what Vendors and Customers Need to do to Stay Secure by Rackspace Hosting

May 31, 2011 - (Free Research)
Both vendors and customers share the responsibility of cloud security, and each have their own part to play. This white paper highlights a non-profit organization's findings on the most typical security practices across the cloud computing industry. 
(WHITE PAPER) READ ABSTRACT |

Smartself-service – a guide for buyers by ComputerWeekly.com

March 04, 2013 - (Free Research)
Analysts Rob Bamforth and Clive Longbottom offer a checklist for assessing suppliers for smart-self service projects. 
(ANALYST REPORT) READ ABSTRACT |

ERP Assessment and Selection: Get It Right the First Time by Panorama Consulting Group

September 14, 2009 - (Free Research)
Read this white paper for several great tips for selecting the right ERP vendor for your organization. This paper breaks the process down into easy-to-follow steps, beginning with the basic questions decision-makers should ask. 
(WHITE PAPER) READ ABSTRACT |

Virtualization Security: Achieving Compliance for the Virtual Infrastructure by Trend Micro

December 01, 2009 - (Free Research)
What’s top of mind for enterprise IT practitioners is compliance, yet most VirtSec vendors aren't articulating the ways in which their products can help enterprises address compliance concerns. Read this paper to learn about top trends in virtualization security, how virtualization poses unique challenges to compliance, and more! 
(WHITE PAPER) READ ABSTRACT |

Discover What Makes CommVault a Leader in Enterprise Backup and Recovery by CommVault Systems, Inc.

June 28, 2013 - (Free Research)
Check out this informative resource to uncover the key features of CommVault's backup and recovery solution, as well as its current offerings, strategies and market presence. 
(RESOURCE) READ ABSTRACT |

SSG Report: Dell #1 Vendor of Choice for SSDs by Dell, Inc.

December 16, 2013 - (Free Research)
This report delves into the use cases where solid state storage has tremendous performance advantages and can produce reduced costs due to performance or enable applications that have been near to impossible using HDD technology. 
(WHITE PAPER) READ ABSTRACT |

Open Solutions for the Private Cloud by Xsigo Systems

May 09, 2011 - (Free Research)
The cloud isn’t tied to as specific set of equipment or software, no matter what the vendors say. This white paper strips away the hype to answer the tricky question “what is cloud computing anyway?” and reveals cost-saving multi-vendor solutions. 
(WHITE PAPER) READ ABSTRACT |

Understanding the Total Cost of Ownership for Endpoint Security Solutions by Sophos, Inc.

March 24, 2009 - (Free Research)
When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison. 
(ANALYST REPORT) READ ABSTRACT |

Best Practice for NDMP Backup Veritas NetBackup by Symantec Corporation

January 05, 2009 - (Free Research)
Customers are confronting the confusing number of options and configurations when it comes to backing up and restoring their network attached storage servers. This paper addresses this by describing the best practices for protecting and recovering NAS devices utilizing the Network Data Management Protocol. 
(WHITE PAPER) READ ABSTRACT |

The Great Software Mind Meld: How “The Cloud” Is Helping Vendors Peer Inside the Heads of Prospective Buyers by Runaware

June 30, 2011 - (Free Research)
The difference between intriguing software and best-selling software is customer insight from feedback. Read this white paper to learn about a cloud-based analytics solution that for the first time allows software vendors to cull actionable intelligence from reliable, untainted customer feedback. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Making Time for Endpoint Security by BigFix

November 29, 2010 - (Free Research)
This presentation transcript discusses the importance of performance considerations when buying endpoint security suites. You’ll gain insight on how to improve the performance of security and configurations in order to keep downtime to an absolute minimum. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

ESG: Market Landscape Report: Storage Tiering by DataCore Software Corporation

September 19, 2011 - (Free Research)
It's almost impossible to conduct a conversation with a storage vendor without raising the topic of "storage tiering." Along with "virtualisation" and "cloud," it's one of those de rigueur phrases. And, like those other two, storage tiering suffers from an over-exposure that can assume familiarity and understanding where it does not exist. 
(WHITE PAPER) READ ABSTRACT |

Understanding the Total Cost of Ownership for Endpoint Security Solutions by Sophos, Inc.

March 24, 2009 - (Free Research)
When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison. 
(ANALYST REPORT)

Presentation Transcript: Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions by Sunbelt Software

August 18, 2009 - (Free Research)
In this presentation transcript of the webinar "Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions" you’ll learn why "bigger isn't necessarily better" when it comes to selecting an antivirus vendor. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Storage Virtualization – What to Know and What to Look For by Hitachi Data Systems

August 14, 2011 - (Free Research)
This paper covers the real value of storage virtualization from both business and IT perspectives, and offers explanations of the varying storage virtualization approaches with advice on how to make a technology and vendor decision. 
(WHITE PAPER) READ ABSTRACT |

How Successful Manufacturing ERP Selections Are Made: The Top Things to Look for, Look at, and Look beyond When Evaluating an ERP Purchase by IQMS

December 2008 - (Free Research)
This paper examines the major considerations manufacturers looking to add, upgrade of replace Enterprise Resource Planning (ERP) software should be aware of. By being cognizant of these aspects you'll ensure that you'll be able to select a solution that best fits your needs, both now and in the future. 
(WHITE PAPER) READ ABSTRACT |

Starters guide to VNA by BridgeHead Software

December 2012 - (Free Research)
In this white paper, Sturdy Memorial's PACS administrator shares insight on their experience implementing a vendor neutral archiving (VNA) equipped with image protection capabilities. Learn what you should look for when choosing a VNA solution. 
(WHITE PAPER) READ ABSTRACT |

Define What's Valued Online - A Webcast Presented by KnowledgeStorm by KnowledgeStorm Webinars (E-mail this company)

September 2005 - (Free Research)
The CMO Council and KnowledgeStorm have partnered to explore the relationship between online technology researchers and IT vendors. Join KnowledgeStorm in this Webcast replay to learn what over 1,400 survey respondents said about online technology content usage and its influence on IT buying. 
(WEBCAST) READ ABSTRACT |

Dedupe Simply – Presentation transcript by EMC Backup and Recovery Solutions

September 2009 - (Free Research)
Please read this presentation transcript in which Brian Biles, VP of Product Management and the Co-founder of Data Domain, discusses data deduplication. And, why is it important? What exactly is it? What are the things that make different implementations different? Learn the questions you should be asking. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript - Unique Considerations for ISVs Moving to a SaaS Application Model: Part Two by SAP America, Inc.

November 2012 - (Free Research)
Amidst the wealth of literature aimed at enterprises hoping to leverage Software as a Service (SaaS) applications it can be difficult for independent software vendors (ISVs) to find useful information and best practices to ease their transition to cloud delivery. Read this in-depth presentation transcript to find out what ISVs need to know. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Handle with Care: Calculating and managing risk is tricky business by SearchSecurity.co.UK

March 2011 - (Free Research)
In this inaugural issue of Information Security Europe, our cover story dives-deep into the difficult task of calculating and managing risk in the ever-changing European threat landscape. 
(EZINE)

1 - 25 of 434 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts