I Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
I Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
 

Increase Visibility Into Virtual Infrastructures With a Layered Security Strategy by  CA Technologies.


March 30, 2012 - Brought to you by SearchNetworking.com, this expert E-Guide unveils how you can increase your visibility with a layered security strategy.

 

Increase Your Company IQ with Web-Based Reporting by  Business Objects


August 01, 2007 - Intranets and portals are too complex for everyone in your company to adopt - not to mention the costs to build and maintain them. This webcast explains how to store your critical business information in one location, share confidential information with the right people, and empower business users with the ability to access the data they need.

 

Increase Your Earning Potential with Cisco Network Design Certifications and Skills by  Global Knowledge


October 31, 2013 - If you are an experienced network engineer, and you are thinking about making more money, one way to do that is by obtaining additional Cisco certifications and the associated skills in network design in order to receive higher compensation without changing jobs or careers.

 

Increased Effectiveness through Intentionally Designed Culture by  Ivar Jacobson Consulting


June 01, 2008 - Intentionally Designed Culture (IDC) is the systematic approach to identifying, effecting, and tracking the necessary behavioral changes in an organization.

 

Increased Productivity, Decreased Cost, Happier Employees: First American Meets Its Goals with TechExcel HelpDesk by  TechExcel


August 01, 2008 - TechExcel's HelpDesk application is unique in the industry, offering a combination of intuitive interfaces, sustainable performance, and total customizability for a reasonable price.

 

Increased Use of Diagnostic Tests Needs Imaging Data Storage Plans by  BridgeHead Software


April 28, 2014 - This expert e-guide from SearchHealthIT.com shares key tips on how to develop a scalable storage strategy given the explosion in imaging data.

 

Increasing agility and reducing cost for private and hybrid cloud computing by  Hewlett-Packard Limited


April 30, 2012 - IT organisations are now responsible for managing public clouds, private clouds, and a mixture of both in addition to controlling traditional IT applications. This white paper discusses the challenges and benefits of these new hybrid infrastructures and how cloud service automation can be a vital tool in overcoming management challenges.

 

Increasing Availability and Improving Performance of Your WebSphere Infrastructure by  CA Technologies.


November 01, 2008 - Companies are successfully leveraging IBM's Smart SOA™ Approach based on IBM's experience of working with more than 6550 customers worldwide.

 

Increasing Business Efficiency and End-User Productivity by  Oracle Corporation


July 01, 2009 - The following report features Michael Fauscette, group vice president of IDC's Software Business Solutions research, answering questions posed by Oracle's customers regarding business efficiency and end-user productivity.

 

Increasing Business Performance: Using Virtualization for SAP Applications on IBM System p Servers by  IBM


June 16, 2010 - This white paper captures the experiences of six large companies running SAP applications using IBM® System p™ virtualization.

 

Increasing Competitiveness and Reducing Costs in Today's Economy by  Microsoft Corporation India Pvt Ltd


November 24, 2009 - This paper outlines the Microsoft Business Productivity Online Suite, illustrates its relevance to small and midsized business customers, and provides the resources to help you evaluate how your business might benefit from the service.

 

Increasing Data Center Density While Driving down Power and Cooling Costs by  Intel Corporation


July 01, 2008 - This paper discusses various technologies that can help IT managers plan and implement a more comprehensive and effective strategy for expanding data center capabilities while reducing power consumption.

 

Increasing Data Center Efficiency by Using Improved High Density Power Distribution by  APC by Schneider Electric


January 01, 2006 - A new approach to power distribution for high density server installations saves floor space, simplifies power cabling, saves capital cost, reduces weight, and increases electrical efficiency. This paper describes this distribution architecture and quantifies the benefits.

 

Increasing Data Center Efficiency with Server Power Measurements by  Intel


April 09, 2010 - Learn how Intel IT defined methods for analyzing computing energy efficiency within our design computing environment, using measurements of actual server power consumption and utilization.

 

Increasing EDA Throughput with Intel Xeon Processor 5600 Series by  Intel


April 09, 2010 - Read about Intel IT's testing of the Intel Xeon processor 5600 series that delivered up to 17.3X throughput improvements compared with single-core Intel Xeon processors and up to a 15:1 consolidation ratio by replacing servers based on single-core Intel Xeon processors.

 

Increasing Energy Efficiency with x86 Servers by  IBM


September 23, 2009 - Increasing energy efficiency with x86 servers. Robert Frances Group (RFG) explains why Intel/IBM is a winning combination.

 

Increasing Enterprise Data Warehouse Performance, Longevity and ROI with the Vertica® Analytic Database by  Vertica Systems


April 22, 2009 - Today EDWs are commonplace and a necessity if an organization is to remain competitive and successful. This paper describes how its possible to increase the performance and longevity of the Enterprise Data Warehouse by offloading certain analytic workloads from an existing EDW to a Vertica® Analytic Database.

 

Increasing IT Efficiency in a Dynamic Data Center by  Dell Compellent


April 01, 2010 - This white paper provides a blueprint for a highly efficient and dynamic datacenter using Microsoft® and Compellent technologies. The solution is enabled by Microsoft Virtualisation and the Compellent® Storage Center SAN™ solution.

 

Increasing Operational Agility: BPM in Telecommunications by  Oracle Corporation


October 31, 2012 - Efficient business processes are the key to success for any company, especially in the telecommunications (Telco) industry. In this informative resource, learn how you can improve Telco business processes and discover the BPM tools necessary to close process gaps.

 

Increasing Operational Efficiency: enabling end-to-end change by  CA Technologies.


September 01, 2010 - Development and change within the IT infrastructure can be a very demanding and frustrating task. Access this exclusive resource now to learn the value of an automated and centralized end-to-end change management application.

 

Increasing Performance, Security, and Manageability on Desktops and Notebooks with Intel® Core™2 Processor with vPro™ Technology and Windows® 7 by  Dell, Inc. and Intel®


October 16, 2009 - Technical decision makers are faced with many challenges in today's economy: help users get more work done faster and with fewer difficulties, protect the network and individual systems from attacks or malicious code, and much more. Find out how the Intel Core 2 processor with vPro technology complements the new Windows 7 operating system.

 

Increasing Productivity by Adopting Testing Best Practices by  Fluke Networks


March 28, 2012 - Discover how you can increase productivity and efficiency by adopting testing best practices for your network.

 

Increasing Productivity with Mobile Business PCs by  Dell, Inc. and Intel®


March 09, 2011 - After investigating various options, Intel IT selected mobile PCs as the standard computing platform. Mobile business PCs, by nature, are highly portable and their robust feature set provides productivity advantage to employees, while meeting a majority of the company's diverse requirements.

 

Increasing Profitability with Analytics in Midsize Companies by  IBM


December 26, 2013 - Access the following white paper to uncover a business intelligence and analytics solution that offers the data capabilities of a much large system but only a fraction of the cost. Discover what SMBs stand top gain and how this solution can be deployed quick and efficiently.

 

Increasing SharePoint Adoption: Unleash Content Access Across the Enterprise by  AvePoint, Inc.


February 21, 2011 - This paper examines how organizations are turning to Microsoft SharePoint to connect their knowledge workers, business processes, and enterprise-wide content. New features in SharePoint Server 2010 are aimed at improving the platform’s scalability and usability, inherently driving the SharePoint deployment to evolve and grow as business dictates.

 

Increasing the efficiency of case file coordination in social services by  IBM


June 15, 2011 - Social service agencies are experiencing challenges with manual processes. Advanced case management strategies are being implemented to streamline these processes and foster greater insight, collaboration and decision-making capabilities. This white paper explains how one such solution allows you automate these processes to elevate processing.

 

Increasing the Quality, Efficiency and Accountability of Care: BPM for Health Care Organizations by  Oracle Corporation


April 30, 2013 - BPM helps health plans, healthcare providers, and accountable care organizations (ACOs) manage processes. This solution brief explains how essential business processes such as claims management, eligibility, enrollment, billing, and quality control initiatives can be improved with Oracle BPM technology.

 

Increasing the ROI of Mobility by  Sybase, an SAP company


May 08, 2009 - Read this paper to learn that virtually every organization with a mobile workforce can benefit from Afaria. This powerful and proven technology that is capable of handling large data transfers to and from mobile devices is already delivering notable business benefits to many organizations.

 

Incremental Updates vs. Full Reload Change Data Capture: Minutes vs. Hours by  CONNX Solutions


June 01, 2008 - This white paper discusses the five different ways to move changed data, including a solution that can free up programming resources, save processing time and more.

 

Independent Lab Comparative Review by  Avaya


June 15, 2011 - MierConsulting engineers conducted an hands-on, comparative review of three leading contact center packages, focusing on these products' multimedia, mixed voice and text-based contacts - capabilities.

 

Independent Lab Test Report: Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks by  Cisco Systems, Inc.


May 24, 2004 - Cisco Systems becomes the first, and to date the only, IP-Telephony vendor to earn Miercom's highest rating of Secure for its proven ability to defend an IP phone system against malicious attack.

 

Independent Oracle Users Group: How to Join the Online Storage Community by  Oracle Corporation


June 12, 2014 - This resource center is specifically made for the complete technology and database professional. Click here to gain access to this online storage community to learn about the benefits of Oracle storage, tips and tricks for increasing Oracle database performance, and much more.

 

Independent Research Report: Should Your Email Live In The Cloud? An Infrastructure And Operations Analysis by  Oracle Corporation


January 27, 2009 - This Forrester Research report explains how new cloud and hybrid deployment models can help enterprises cope with the infrastructure challenges created by growing email systems. Understand your options for migrating, consolidating, and upgrading your messaging infrastructure and the real cost of keeping or evolving your current email architecture.

 

Independent Testing Services by  CSC


December 31, 2012 - Application testing is a critical step in the software development lifecycle, especially as application complexity and demand for faster delivery increases. In this resource, discover how end-to-end testing services can provide you with the tools that you need to more efficiently and effectively test your applications.

 

Indian Express Group by  Limelight Networks, Inc.


May 02, 2014 - This guide explores one company's success at increasing their network performance and accelerating their web content delivery.

 

Indiana University Enrolls SAN Storage for Improved Efficiency and Productivity by  Dell, Inc.


September 01, 2011 - Check out this case study to explore how Indiana University lowered the TCO of IT equipment and improved service offerings through server consolidation and SAN storage.

 

Indiana University Virtualizes Mission-Critical Oracle Databases by  VMware, Inc.


August 24, 2011 - Access this resource to learn how the Kelley School of Business at Indiana University used virtualization to decrease server deployment time for faculty special projects; reduce amount of physical hardware; and reduce the power consumption across all infrastructure.

 

Indonesia Stock Exchange halves its hardware investment cost with a Red Hat Solution by  Red Hat and Intel


December 16, 2013 - This brief whitepaper explains how the Indonesian Stock Exchange (IDX) was able to half its hardware costs by leveraging a Linux system to support trading machines, surveillance machines, database engines, and more.

 

Industrial SOA Series by  Oracle Corporation


October 30, 2013 - Access this resource to read a variety of articles on service-oriented architecture (SOA), on topics ranging from SOA blueprints to SOA mobile solutions.

 

Industrialised delivery: The next stage in outsourcing evolution by  Hewlett-Packard Limited


October 25, 2013 - This on-demand webcast explores how your organization can achieve the true scale of outsourcing with industrialized delivery.

 

Industrializing Agile Software Delivery with ALM 2.0+ by  CollabNet


January 19, 2012 - In this webcast learn how  IT departments have increased developer productivity, saved millions, and realized governance by implementing DevOps. ALM 2.0+ fosters integration with operations and accepts tool and platform heterogeneity, helping FT1000 customers worldwide transitioning to DevOps.

 

Industry Analyst Reports - Getting in Front of IT Compliance and Risk Management by  CA Technologies.


July 26, 2010 - Read this Forrester Consulting analyst report to find out about the trends in managing IT compliance and risk. This report discusses the result of an evaluation conducted by Forrester for CA Technologies.

 

Industry Briefs: IBM Smart Analytics System by  IBM


March 18, 2011 - 2-page briefs are available for 6 key industries detailing how IBM Smart Analytics System helps address specific business challenges. A 4-page horizontal overview is also available to use across industries.

 

Industry Intelligence: International Financial Reporting Standards for Hedge Funds by  Advent Software, Inc


January 04, 2010 - This paper introduces hedge funds and hedge fund service providers to IFRS.

 

Industry Perspectives: The Impact of HIPAA and HITECH by  Symantec Corporation


June 30, 2011 - This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.

 

Industry Trends & Perspectives - Data Protection for Virtual Server Environments by  Quantum Corporation


August 01, 2008 - This webcast by Quantum technologies highlights the challenges of integrating server virtualization into an existing computing environment and shows you solutions for dramatically improving the efficiency of your backup operation.

 

InfiniBand Software and Protocols Enable Seamless Off-the-shelf Applications Deployment by  Mellanox Technologies


March 01, 2008 - The focus of this article is to discuss what application developers need to know to enable their IP, SCSI, iSCSI, sockets or file system based applications to operate over InfiniBand.

 

Infoblox Integrated IP Address Management Solution by  Infoblox


February 26, 2007 - In this paper, we will explain the importance of IP address management, discuss the different approaches to implementing IP address management solutions.

 

Infographic - Taking Flight with Converged Infrastructure by  Dell, Inc. and Intel®


August 31, 2013 - Learn how Indianapolis Airport Authority leveraged Dell's Active Infrastructure solution to drive IT efficiencies and new growth opportunities.

 

Infographic: Can you provide continuous availability? by  EMC Corporation


July 11, 2013 - This resource presents tips about new active-active data centers that offer continuous availability architecture for physical, virtualized and cloud-based environments.

 

Infographic: Disaster Recovery Trends in 2013 by  FalconStor Software


April 15, 2013 - Check out this one-page infographic that details the top trends in the realm of disaster recovery in 2013. You'll gain insight into: the current landscape, what the future holds, the importance of automated DR and more.

 

Infographic: Global Payroll Strategy by  Workday


March 24, 2014 - Payroll is a huge challenge for today's global companies. Check out the infographic to learn how the cloud can totally transform your payroll for the best and why there's no better time than now to do it.

 

Infographic: Storage success in the age of big data by  IBM


September 26, 2013 - This valuable infographic takes a statistical look at big data, and introduces a highly efficient, virtualized and flash optimized storage tool that can help you effectively manage rapid data growth.

 

Infographic: The Effects of Mobile on the Enterprise by  Accellion, Inc.


June 02, 2014 - This exclusive resource takes a look at how mobility has impacted organizations today, examining both the benefits and the drawbacks of the trend.

 

Infographics: The Four Fundamentals of Your Workforce by  Workday


March 25, 2014 - For many organizations, more than half of their operating costs are tied to the workforce, yet they don't even have complete data on their own employees. See the infographic to learn how Workday is redefining what it means to manage a global, mobile, and diverse workforce.

 

Infonetics Research Survey Excerpts by  Fortinet, Inc.


October 31, 2013 - This guide explores some key network security strategies and how your data center networks can benefit from these upgrades.

 

Infor - ERP VISUAL by  Infor


September 04, 2008 - Infor ERP VISUAL combines affordability and deep functionality, and is ideal for high growth, mixed-mode manufacturers who need a modular solution. Learn why more than 4,000 businesses trust Infor ERP VISUAL to run their operations.

 

Infor - ERP LN by  Infor


September 04, 2008 - Infor ERP LN is an advanced, easy-to-use ERP solution that brings together a wide range of business functions to serve the needs of leading discrete and project-based manufacturers in industrial industries. Check out this demo for more details.

 

Infor - ERP SyteLine by  Infor


September 04, 2008 - Infor ERP SyteLine spans the business of manufacturing to align supply with demand and support the business and operational challenges of manufacturers. Download this demo to get a better understanding of how this software can benefit your company.

 

Infor CRM Epiphany For Consumer Products by  Infor CRM


July 01, 2009 - Infor CRM Epiphany helps you make the most of customer interactions and improve your sales, marketing, and service operations in order to increase loyalty, enhance brand preference, and boost profitability.

 

Infor CRM Epiphany for Hospitality by  Infor CRM


July 01, 2009 - Infor CRM Epiphany for Hospitality provides the integrated marketing, customer service, and analytics capabilities hotels, casinos, and other hospitality companies need to deliver exceptional service at every touch point.

 

Infor CRM Epiphany for Insurance by  Infor CRM


July 01, 2009 - The market-leading Infor CRM Epiphany suite was designed with the needs of today's insurance companies in mind. It delivers what you need to execute a customer retention and growth strategy by delivering a single view of customer interactions across business.

 

Infor CRM Interaction Advisor by  Infor CRM


July 22, 2009 - Watch this product demo to learn how Infor CRM Interaction Advisor will fuel organic growth by driving lifetime customer loyalty and increase value at every customer touch point without replacing any existing systems.

 

Infor Epiphany Brochure by  Infor


December 31, 2012 - This helpful resource introduces one CRM tool that allows you to optimize your customer interactions across all communication channels and glean deeper insight into your customer base.  Read on to learn about the specific benefits this technology offers businesses across all sectors.

 

Informal Learning: Extending the Impact of Enterprise Ideas and Information by  Adobe Systems, Inc.


April 01, 2008 - Forward-thinking organizations are turning to enterprise learning in their quest to be better informed, better skilled, better supported at the point of need, and more competitive in their respective marketplaces.

 

Informatica B2B Data Transformation and Data Exchange by  Informatica


June 14, 2010 - View this webcast and garner further information on Informatica B2B Data Transformation and Informatica B2B Data Exchange

 

Informatica SWIFT Validation by  Informatica


June 14, 2010 - Financial messages must be validated before being sent across any network for financial data exchange or they may be delayed or rejected. Informatica minimizes these risks with message validation, part of its B2B Data. Use the provided links here to test Informatica SWIFT Validation.

 

Informatica Ultra Messaging by  Informatica


December 08, 2010 - Legacy messaging technologies lack the performance and flexibility necessary to support today’s computing environments. Attend this webinar to learn how Informatica’s Ultra Messaging technology can help realize up to 10x performance improvements over legacy messaging solutions while dramatically reducing costs and improving deployment flexibility.

 

Information Agenda Assessment Tool by  IBM


October 07, 2009 - The cost and complexity of managing increasing volumes of data and content, plus the need to provide trusted information to all users, are driving CIOs to rethink approach to information delivery. This quick self-assessment is the first step to find out how IBM's Info Agenda approach can help your company unlock the business value of information.

 

Information Agenda Assessment Tool by  IBM India Pvt. Ltd


December 13, 2010 - An information agenda can help transform information into a strategic asset to improve business outcomes. This quick self-assessment is the first step to find out how IBM's Information Agenda approach can help your company unlock the business value of information.

 

Information and Analytics: Enabling Business Optimization by  IBM


April 20, 2010 - Read this paper for an examination of the portfolio of offerings IBM has constructed to help its customers gain competitive advantage from their data by creating an information agenda, building an information platform and applying business analytics.

 

Information Archive for Email, Files and eDiscovery Demo by  IBM


December 23, 2010 - This video explains how the IBM Smart Archive Strategy meets these challenges head on. Watch this video to learn how the Smart Archive Strategy is a broad strategy that helps organizations leverage IBM’s capabilities to design specific strategic archiving solutions for their unique needs.

 

Information Classification: Delivering Security and Business Value by  Boldon James


October 10, 2011 - This whitepaper outlines the benefits of Information Classification for information management & security, infrastructure integration and regulatory compliance, as well as provides benchmarks for implementation and classification software.

 

Information Connect: Program Management in the Public Interest - Primavera Enterprise Project Portfolio Management Solutions by  Oracle Corporation


October 08, 2009 - Oracle's Primavera enterprise project portfolio management solutions help organizations effectively and efficiently invest their funds for the good of the public.

 

INFORMATION FOR SUCCESS: Enterprises Standardize on Oracle Database 11g by  Oracle Corporation


September 29, 2011 - This customer reference booklet contains a sample of real business results that organizations around the world, across a variety of industries, have achieved by upgrading and standardizing on Oracle Database 11g.

 

Information Governance - an Enterprise Imperative (Hurwitz & Assoc) by  IBM


March 17, 2011 - Learn why Hurwitz & Associates deems information governance an imperative for the enterprise in this video featuring Marcia Kaufman.  The video was created for the 2010 Virtual IOD event.

 

Information Governance - Information is a Strategic Asset (Telkom SA) by  IBM


March 17, 2011 - Hear Komalin Chetty describe how Telkom SA transformed information into a strategic asset through information governance in this video created for the 2010 Virtual IOD event.  Media library link includes a downloadable file and transcript to facilitate translation.

 

Information Governance for Business Value by  IBM


August 05, 2013 - In this expert e-guide, brought to you by searchCompliance.com, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy.

 

Information Governance in Action: Success Factors and Best Practices by  SearchContentManagement


October 09, 2013 - Consult this expert resource to learn more about information governance. It explains why it's a key component of effective content and data management. It outlines how to make the business case for an information governance initiative.

 

Information Governance Online Symposium 2013 by  SearchCompliance.com


March 07, 2013 - Since corporate data is one of an organization's most valuable assets, it only makes sense to implement an information governance policy. By doing so, IT leaders can reduce legal risks and increase the ability to be more agile. Enter this online learning environment in order to gain information governance advice from several industry experts.

 

Information Governance Perspectives from RSD: E-mail Archiving by  RSD


August 17, 2009 - With the ever increasing compliance regulations in terms of E-mail archiving, It becomes clear that E-mail archiving is an information governance imperative. This paper presents the 3 technical challenges which should be understood when evaluating email archiving solutions

 

Information governance strategy: Developing a roadmap and structure for improving corporate information management by  RSD


June 02, 2011 - Access this eBook for practical advice on developing an information governance strategy, including a checklist of what to do – and what not to do – as part of a successful information governance initiative.

 

Information Governance Survey Results from SearchCompliance.com by  Iron Mountain


April 01, 2012 - Download the results of our 2012 survey on the state of information governance. Find out how decision-makers from IT to records management and compliance rate the value of information governance, the business drivers behind such programs, planned areas of spending and much more.

 

Information Governance: Audit and Protection on the IBM System z Platform by  IBM


November 30, 2011 - Over the last few years, organizations have realized that their ability to manage their business, remain compliant and mitigate risk will be compromised without 'rock solid' data. Read this white paper to discover the importance of protecting your enterprise information through proper management measures.

 

Information Governance: Business Imperative or Technology Asset? by  Iron Mountain


May 01, 2012 - In our expert research brief, discover why the experts believe the key to successful, effective information governance begins with communication and cooperation between IT and business leaders. Gain insight into key findings from our 2012 information governance survey of 233 IT, compliance and records management professionals.

 

Information Governance: Buy Now or Pay Later by  CommVault Systems, Inc.


March 05, 2014 - View the following webcast to hear from Gartner Research Inc. as they reveal why companies need to have an information archiving solution to help maintain compliance, reduce IT costs, and more.

 

Information Governance: Buy Now or Pay Later (6 min clip) by  CommVault Systems, Inc.


February 04, 2014 - View the following webcast to hear from a renowned research firm as they reveal why companies need to have an information archiving solution to help maintain compliance, reduce IT costs, and more.

 

Information Governance: Orchestrate people, processes and technology for success by  IBM


March 17, 2011 - Not every business has a material supply chain, but all organizations have an information supply chain. It runs through applications, databases and servers, and it ends in an array of ever-changing products that are critical to the health of the organization. Read this white paper to learn more today.

 

Information governance: Reduce risk and improve compliance by  Iron Mountain


August 29, 2012 - This white paper highlights the many ways IT leaders can address their own information risk management requirements. Read now for practical advice and best practices to help meet your unique needs.

 

Information Governance: Why It Matters and How to Drive Success by  Hewlett-Packard Limited


October 31, 2013 - This resource describes the need for a proven, holistic approach to information governance. Read on to learn why governance matters, and learn where to start with your governance strategy in order to reduce risk and cost, improve productivity, and more.

 

Information is King: Business Analytics in the Age of the Downturn and the (Re)Emergence of the Customer by  SAS


April 07, 2010 - BusinessWeek Research Services (BWRS) launched a research program in April 2009 to determine the attitudes and opinions of C-level executives with regard to the use and value of business analytics. This paper reviews a portion of the research and provides analysis and insights on the topic of business analytics.

 

Information Lifecycle Governance Dialoginar by  IBM


May 23, 2011 - Soak up valuable Information Lifecycle Governance insights from Randolph Kahn and Frank McGovern.

 

Information Lifecycle Governance Leader Reference Guide by  IBM


April 30, 2013 - Storing data that no longer has any value to the organization is a crippling process that forward-thinking CIOs must begin to shy away from. This white paper provides key insight surrounding the defensible disposal of unnecessary data.

 

Information Lifecycle Management in an SAP Environment by  SAP America, Inc.


March 15, 2010 - SAP provides a comprehensive product offering to support you in your Information Lifecycle Management strategy. Learn more about the three cornerstones of ILM, including data archiving/data management, retention management, and retention warehouse. 

 

Information Management with Oracle Database 11g Release 2 by  Oracle Corporation UK Ltd


October 03, 2011 - In this white paper, learn how to improve your information management, increasing the ability to manage, secure, query, and administer information with high levels of performance. Uncover how Oracle Database 11g Release 2 includes a wide range of capabilities to allow for this intelligent management and analysis.

 

Information Management: The First Step in the Right Direction by  Symantec Corporation


March 16, 2011 - This white paper from Symantec Corporation takes an in-depth look into some of the information management strategies companies are using today, and the inefficiencies inherent in them. Read on to learn more about what your company can accomplish in the data center through e-discovery events.

 

Information Optimization Transformation Experience Workshop by  Hewlett-Packard Company


April 12, 2013 - Many organizations continue to struggle with basic BI competencies, such as information quality, data integration, governance, and accessibility. Read on to learn how you can benefit from an online Big Data workshop where your business and IT leaders can collaborate on the latest strategies and trends about strategic information management.

 

Information Optimization Transformation Experience Workshop by  Hewlett-Packard Limited


January 24, 2013 - Many organizations continue to struggle with basic BI competencies, such as information quality, data integration, governance, and accessibility. Read on to learn how you can benefit from an online Big Data workshop where your business and IT leaders can collaborate on the latest strategies and trends about strategic information management.

 

Information Quality Management (IQM): Assessing Your IQM Practice by  Harte-Hanks Trillium Software


March 17, 2011 - Organizations are starting to see the connection between making information available and leveraging it to be more agile and productive. This paper offers a practical guide to assess your information quality maturity level, and provides a framework to align information quality management practices to business objectives and results.

 

Information Retention and eDiscovery Survey by  Symantec Corporation


October 17, 2011 - This white paper offers greater detail on 3 key findings, plus 5 recommendations about implementing a successful information retention and eDiscovery program.

 

Information Risk: Managing Digital Assets in a new Technology Landscape by  Hewlett-Packard Limited


February 25, 2014 - This in-depth report outlines the current threat landscape, different types of risks, and what you can do to prevent devastating cyber-attacks.

 

Information Security - IT Decision Checklist: Application Security by  Ounce Labs, an IBM Company


December 31, 2009 - Standards such as SOAP and XML have made it easier to test applications for security holes. We'll explain how to go about this process and what tools are available to help you secure the application layer.

 

Information security and compliance services overview by  Dell, Inc.


May 18, 2011 - With new threats emerging and the pressures the meet compliance, your organization is forced to focus more on security and less on strategic projects that drive your business. Access this paper for an overview of security and compliance solutions available to help handle your security issues, freeing your time to focus on growing your business.

 

Information Security and Multi-Compliance: Avoiding Audit Fatigue with a Single IT Compliance Strategy by  Tripwire, Inc.


May 13, 2010 - This Prescriptive Guide provides nine steps that information security managers can use to break the compli­ance blame cycle and build an information security program that more effectively mitigates security risk. Read on to learn more.

 

Information Security ANZ March 2014 by  SearchSecurity.com


March 18, 2014 - This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.

 

Information Security ASEAN March 2014 by  SearchSecurity.com


March 18, 2014 - This ezine looks at the security challenges facing IT security professionals in the ASEAN region with a look at threats and industry trends.

 

Information security breaches survey 2012 by  ComputerWeekly.com


April 24, 2012 - Rising security breaches cost UK billions over the last 12 months as cyber attacks reached record levels, according to the 2012 Information Security Breaches survey.

 

Information Security Emagazine: Best Practices for the Evolving Threat Landscape by  Hewlett-Packard Limited


December 02, 2013 - In this security emagazine, discover a variety of resources that offer exclusive best practices on how to boost security strategies to address the rise in cyber threats.

 

Information Security Essential Guide: Strategies for Tackling BYOD by  SearchSecurity.com


May 31, 2013 - Let this e-book from our independent experts be your guide to all things related to mobile security in the face of the BYOD trend. Inside, you'll get helpful insight that will help you understand the ins and outs of mobile device management technologies, how to tackle the problem of mobile application security, and much more.

 

Information Security Essential Guide: The Evolution of Threat Detection and Management by  SearchSecurity.com


May 31, 2013 - This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.

 

Information Security Ezine- Europe by  SearchSecurity.co.UK


June 02, 2011 - This e-zine presented by SearchSecurity.co.UK will give key tips on how to comply to data protection regulations, and will help you find a product that is right for your business.

 

Information security for SMEs by  ComputerWeekly.com


May 23, 2014 - In this article, from our Royal Holloway Security Thesis series, we propose a simplified implementation approach for an information security management system (ISMS) for SMEs.

 

Information Security IT Decision Checklist: Security Information and Event Management by  ArcSight, an HP Company


July 28, 2011 - This Information Security IT Decision Checklist explores key business and technical areas you should consider before selecting a security information and event management system. Also included in this guide is a list of SIMs and log management vendors to help in your decision process.

 

Information Security Magazine by  SearchSecurity.com


February 03, 2014 - In our inaugural issue of 2014, we look at the top cyberthreats and attack techniques that security professionals are likely to face this year.

 

Information Security Magazine - April 2010: Endpoints on the Loose by  Information Security Magazine


April 07, 2010 - This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.

 

Information Security Magazine - April 2013 by  SearchSecurity.com


April 03, 2013 - This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.

 

Information Security Magazine - December 2009 / January 2010: Basic Database Security by  Information Security Magazine


December 14, 2009 - This issue of information security magazine provides a step-by-step guide to securing database systems, explores the important factors in selecting a SaaS provider, presents a whole new approach to security management that has nothing to do with structure-driven policy architecture, and more.

 

Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession by  Information Security Magazine


February 01, 2009 - Check out this eBook and get expert advice that can help your company successfully improve its threat management posture.

 

Information Security Magazine - February 2010: Under Control by  Information Security Magazine


February 03, 2010 - Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more.

 

Information Security Magazine - February 2013 by  SearchSecurity.com


February 01, 2013 - In this month's issue of Information Security magazine, discover expert advice for navigating the risks and dangers of increased mobility and the bring your own device (BYOD) trend. Learn how you can avoid BYOD pitfalls, improve security with the right policy, and more.

 

Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’ by  Information Security Magazine


March 09, 2010 - This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.

 

Information Security Magazine - March 2013 by  SearchSecurity.com


March 01, 2013 - This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.

 

Information Security Magazine - May 2012 by  SearchSecurity.com


May 01, 2012 - Access this month’s issue to uncover strategies for taming the bring-your-own-device (BYOD) tide. In addition, explore other featured topics including VMware’s security partner program revamp, four keys to data loss prevention (DLP) success, top considerations for information security career recruitment and more.

 

Information Security Magazine - October 2009: Security 7 Awards by  Information Security Magazine


October 13, 2009 - The big news in this month's issue is the announcement of the winners of the fifth annual Security 7 Award. Other featured articles present tips for preventing future incidents and also explain how SOX compliance is hitting smaller public companies harder than the big guys. Read on for these great articles and more.

 

Information Security Magazine - September 2009: Readers’ Choice Awards by  Information Security Magazine


September 15, 2009 - This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.

 

Information Security Magazine November 2009: Stay in Control by  Information Security Magazine


November 16, 2009 - Unmanaged changes to IT systems and networks can recklessly increase risk to enterprises. The key is rolling out an accepted change management process, and sticking to it. Read this magazine and find out how a consistent change management process puts you in charge.

 

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity by  Information Security Magazine


July 21, 2010 - The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.

 

Information Security Magazine September 2011—Reader’s Choice Awards by  Information Security Magazine


September 01, 2011 - Brought to you by SearchSecurity.com, this month’s Information Security Magazine cover story unveils the 2011 Information Security Reader’s Choice Awards. Learn which products your peers voted as the best in the market spanning 14 different categories including; antimalware, mobile data security, vulnerability management and remote access.

 

Information Security Magazine – April 2014 by  SearchSecurity.com


April 01, 2014 - In this issue, we help you assess your mobile security strategy in the face of emerging threats and attackers' use of mobile devices to carry out attacks.

 

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by  Information Security Magazine


December 09, 2010 - This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.

 

Information Security Magazine – July/August 2013 by  SearchSecurity.com


August 06, 2013 - This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.

 

Information Security Magazine – June 2010: Laptop Lockdown by  Information Security Magazine


June 16, 2010 - This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue.

 

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor by  Information Security Magazine


October 07, 2010 - This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.

 

Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee by  Information Security Magazine


January 01, 2009 - This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.

 

Information Security Magazine, July 09: Controlling Privileged Accounts by  Information Security Magazine


July 13, 2009 - This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.

 

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs by  Information Security Magazine


June 10, 2009 - This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.

 

Information Security Magazine, May 2009: Automating Compliance by  Information Security Magazine


May 01, 2009 - This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.

 

Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be? by  Information Security Magazine


April 20, 2009 - This month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology.

 

Information Security Magazine: March 2009 - Sky-High Risk? by  Information Security Magazine


March 20, 2009 - This month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more.

 

Information Security Magazine: May 2010 - Data: Do you know where it’s going? by  Information Security Magazine


May 03, 2010 - This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more.

 
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts