P Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
P Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
 

Private Cloud — It’s More Than Just Virtualization by  NetApp


October 18, 2013 - This exclusive report reveals findings from a survey of 265 enterprise IT decision-makers that have private cloud deployments. Read on to learn 3 practices to get the most out of your private cloud; Sneak peek: here is one now: don't reinvent the wheel.

 

Private Cloud: Management Prerequisites by  Hewlett-Packard Company


October 04, 2010 - By implementing a private cloud computing environment, your IT organization can deliver services to the business with greater speed and agility. This paper, targeted at chief information officers and director-level IT professionals, explores key considerations for moving toward a public cloud computing model.

 

Private Clouds: Best Practices for CIOs by  Dell, Inc. and Intel®


March 06, 2013 - This e-guide offers the top five best practices for successfully deploying a private cloud. Discover the pitfalls poorly prepared IT staff commonly face and advice for avoiding these roadblocks as you implement your private cloud project.

 

Private Cloud—Efficiency and Flexibility to Advance Business Innovation by  Cisco Systems, Inc.


June 01, 2011 - This white paper explores the reasons why many companies are considering a move to the private cloud. Determine whether your organization is ready for this significant change and find out what stages you should factor into your plan.

 

Private vs. Hybrid Cloud Adoption: Expert Comparison and Analyst Key Findings by  NetApp


November 06, 2013 - This expert e-guide cites key cloud findings from a recent Gartner report and explains why costs are not the only factor to consider when evaluating these types of services. Read on to learn how to lay a technology foundation that offers room for expansion and read about one company's success story using a hybrid cloud.

 

Privilege Made Simple: Privilege Identity Management (PIM) Demystified by  BeyondTrust Corporation


March 26, 2010 - This white paper will discuss how your enterprise can empower IT to eliminate the risk of intentional, accidental and indirect misuse of privileges on desktops and servers using globally proven solutions that increase security and compliance without impacting productivity. Read this paper to find out more.

 

Privileged user management: It's time to take control by  CA Technologies


October 01, 2009 - IT managers everywhere feel overwhelmed with the rising tide of security threats in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant to themselves and/or their colleagues in order to do their jobs.

 

Proactive data security, audit and compliance solutions by  IBM


April 30, 2013 - Access this white paper for key information about a data management solution that supports enterprises in their entirety, and ensures automated, integrated compliance and security across all platforms.

 

Proactive Monitoring and Management by  Aspect


March 31, 2014 - Investing in the right technology is a critical component of ensuring top-notch customer experience in the contact center, but that's all for nothing if your tools aren't performing properly. Wouldn't it be great to eliminate IT concerns and know you'll always have maximum performance, so all you have to worry about is your customer?

 

Proactive Network Monitoring and Management by  Nimsoft, Inc.


January 05, 2012 - Uncover how monitoring technology can equip network administrators with the vital insights needed to govern and ensure availability of servers and applications, whether managed locally or in the cloud.

 

Proactive PC Support Improves Service and Lowers Total Cost of Ownership by  Intel Corporation


January 01, 2009 - Read this brief paper to learn about a new IT support delivery tool that reduces response time, boosts employee satisfaction and decreases operating costs. Reduce total cost of ownership using Intel's self-service PC Health Check utility.

 

Proactive Service Assurance for Mobile Data Services by  InfoVista Corporation


February 26, 2009 - Until very recently, customer volume for data services was so low that service providers couldn't justify investment in robust, end-to-end service assurance solutions for mobile data services. Now, with the volume of data services on mobile networks growing, the business case for such an investment is clear. Read on to learn more.

 

Proactive technical support: the overlooked essential in business resilience: Combine hardware and software technical support with business continuity and disaster recovery plans by  IBM


October 25, 2011 - Read this white paper and discover how IBM tech support solutions fit into every good resiliency plan and what to look for in a good business resilience vendor.

 

Proactively Track and Maintain Assets to Keep Operations Running Smoothly by  Kony


December 31, 2012 - This white paper introduces a mobile application for Enterprise Asset Management (EAM) that offers a comprehensive and consolidated view into all inventory and the condition of resources, so that you can make informed decisions on capital and operational investments.

 

Problematic - Unloved - Argumentative (PUA): What is a potentially unwanted app by  ESET


November 04, 2011 - In this paper, discover what is a Potentially Unwanted Application (PUA) and explore the differences between threats posed by malicious types of software such as computer viruses and worms, and those which are classified as being potentially unwanted.

 

Process and document management flexibility by  IBM


July 07, 2011 - Integrated process solution automated several hundred business processes Replaced several legacy systems with redundant workflow capabilities Key centerpiece of enterprise architecture.

 

Process Automation for the Twenty-Ten Decade: The Automation of Business Technology by  Network Automation, Inc


October 27, 2010 - This paper discusses the need for business process automation and how it can make your company vastly more efficient. Continue reading to learn how to stay ahead of the curve on process automation during the twenty-ten decade.

 

Process Automation With VMware by  UC4 Software, Inc


February 08, 2010 - In this white paper, you’ll discover how to grapple virtualization's complexities by automating time drains like on/off control, making backups and snapshots, and provisioning resources (virtual machines).

 

Process Complexity: How to reduce it with Decision Management by  IBM


March 07, 2012 - Read this presentation transcript as industry visionary James Taylor discusses BPM and the causes of complexity. Learn about decision management and its role in eliminating some of the complexity, decision management systems, business rules, predictive analytics and finally how all of this impacts your customers and the customer experience.

 

Process-Centred Government - The Road to 2010 by  Metastorm


February 20, 2008 - This paper argues that the i2010 programme needs to go further, and deeper, in its thinking on how to reengineer Europe's government machine for the twenty-first century global economy.

 

Process-Driven BI: Building Smarter Business Processes by  Information Builders


May 01, 2013 - View this white paper to find out how you can improve efficiency while also saving money and giving your business the competitive advantage it needs. By looking at business intelligence as a fundamental aspect of operational business, you can improve processes that do not work efficiently.

 

Process-driven Business Intelligence: Building Smarter Business Processes by  Information Builders


November 01, 2006 - The concept of BAM revolved around the notion that data could be gathered at critical points and information produced that could give businesses the ability to make better decisions on a near-real-time basis.

 

Process-Driven Business Intelligence: Building Smarter Business Processes by  Information Builders Inc.


November 01, 2006 - Most organizations strive for efficiency because it ties to cost savings and better performance, while helping to anchor competitive advantages. However, improving efficiency requires organizations to continually seek new methods of managing increasingly complex business processes.

 

Process-Driven Master Data Management for Dummies by  Software AG


March 19, 2012 - This comprehensive guide covers topics from data governance and reference data to big data and cloud-enablement, uncovers MDM myths, and looks at new trends in MDM methodology.

 

Procurement Lessons Learned from the Economic Downturn (SAP Insider Article) by  SAP America, Inc.


September 30, 2011 - Read this paper to discover the top four tactics employed by best-in-class companies of varied sizes and industries to elevate procurement proficiencies in today's recalcitrant economy, along with the metrics they use to measure their success.

 

Procurement Technology for Today's Manufacturers by  SearchManufacturingERP


April 14, 2014 - E-sourcing and e-procurement technology have created new opportunities to save money, improve supplier performance -- even make better products.

 

Producing to Order: Discrete Manufacturers and Customer Demand by  SAP America, Inc.


August 07, 2009 - Find out how discrete manufacturers are becoming truly customer-centric by pursuing or planning a variety of initiatives, including the improvement of customer service and the closer integration of customers into product design. The greatest impact is expected from plans to implement demand-driven manufacturing.

 

Product Demonstration: Idera Server Backup by  Idera


December 17, 2013 - Watch this in-depth webcast to find out about the key features and benefits of this server backup, including a full demonstration.

 

Product Demonstration:  Dell EqualLogic PS Series Demonstration for SQL Server Protection and Rapid Recovery by  Dell, Inc.


July 13, 2011 - Join Dell for a one-hour live presentation and demonstration of the EqualLogic Auto-Snapshot Manager / Microsoft Edition. See how ASM/ME with Smart Copy functionality provides storage administrators comprehensive SQL Server database protection, rapid recovery and high availability.

 

Product Overview: IBM XIV Storage System by  IBM


November 17, 2010 - This product overview examines IBM XIV® Storage System, a groundbreaking, high-end, open disk system designed to support business requirements for a highly available information infrastructure. Read this overview and learn about the features and benefits of IBM XIV® Storage System.

 

Product Preview: Big Data Analytics by  Workday


March 21, 2014 - View the following video to get a firsthand look at a big data analytics solution that can integrate, analyze, and visualize big data that can allow you to identify root causes, detect patterns in trends, and predict outcomes.

 

Productionizing Hadoop: Seven Architectural Best Practices by  Cisco Systems, Inc.


August 28, 2013 - Check out this informative resource to learn what you should consider when choosing architecture for your big data project. Discover the seven top architectural qualities of big data production platforms, and one delivery platform that automates big data workflow for more efficient, effective processing.

 

Productivity Squared: The Benefits of Exchange and Lync Server 2013 Integration by  Global Knowledge


September 06, 2013 - Significant changes in the architectures of and a wide array of new features in the Wave 15 versions of Lync 2013 and Exchange 2013 make these innovative products with industry-changing consequences. This white paper discusses the specific features and enhancements that complement both of the products and facilitate integration.

 

Productivity, Internet Abuse, and How to Improve One by Eliminating the Other by  Bloxx, Inc.


September 05, 2008 - This white paper explains the effect of Internet abuse on employee productivity, which is huge and not fully appreciated.

 

Productivity, Mobility and Efficiency: Keeping Your Devices Secure by  Cisco Systems, Inc.


November 07, 2012 - In this research report, uncover how organizations are – or should be – responding to the invasion of mobile devices in the workplace, the emerging trends in enterprise mobility today, best practices for ensuring effective mobile policies, and much more!

 

Professional Services White Paper: Growth Strategies in Uncertain Times by  Microsoft Dynamics


June 01, 2008 - In uncertain economic times, professional service companies can win by focusing on the basics, such as building lasting client relationships.

 

Profit Magazine: Everything You Know About Sales is Wrong by  Oracle Corporation


April 07, 2014 - Business and technology expert, Daniel Pink, shares his research on the secrets of selling in this informative Q&A. Delve into Pink's exploration of what makes sales people tick and which traits allow the best sellers to be successful in today's marketplace.

 

Profit Magazine: Everything You Know About Sales is Wrong by  Oracle Corporation


July 31, 2013 - Some say that there are sales reps that can "just sell anything" -- but is that really true? What skills do sales reps really need to close the deal? Check out this interview with author of the book To Sell is Human, Daniel Pink, as he explores what makes sales people tick and what separates the great sales reps from the rest of the pack.

 

Profitability Analysis & Optimization: Gaining a competitive edge by  IBM


February 08, 2012 - Improved business processes, powered by optimized technology, can help many companies significantly improve their profitability. Read this paper released by BPM Partners to see how a business can take advantage of new trends and tools for profitability.

 

Profitable Innovation:  Medical Device Business Model for Growth by  Sage North America


December 09, 2010 - This Sage ERP Accpac white paper focuses on innovations in the medical device field and how these innovative solutions affect the bottom line. Read this white paper to learn more.

 

Profitably Improving Site Infrastructure Energy Efficiency by  Upsite Technologies, Inc.


October 01, 2008 - Learn about the causes of energy overconsumption and how to improve your organization's overall energy efficiency, resulting in huge cost savings.

 

Profiting from Absence Management: How to Cut the Costs of Employee Absences by  Infor


December 05, 2008 - This paper explains how a decisive strategy and integrated systems will enable you to surmount the costly barriers now associated with employee absence management.

 

Profiting from PCI Compliance by  IBM


September 01, 2007 - This paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications.

 

Profiting on Sustainability through Smart Demand-Supply Networks by  E2open


March 06, 2009 - In this white paper, learn how manufacturers can gain visibility and control over their products' lifecycles, reduce the carbon and energy footprints of their trading partners, and attain brand and cost leadership in an increasingly environmentally-conscious business climate by employing a Smart Demand-Supply Network.

 

Program and Project Management Services: Trusted Advisors and Proven Leadership for your SAP® Solutions by  SAP America, Inc.


September 20, 2010 - This paper explores SAP Project Management Services. Read on to learn how comprehensive project management services from SAP Consulting reduce total cost of ownership, accelerate time to value, and unleash the full potential of SAP investments, whether you’re introducing or upgrading SAP software or rolling out new functionality.

 

Programmer’s Guide: Using LucidWorks Enterprise to add search to your Web Application by  Lucid Works


December 21, 2010 - This step-by-step guide shows a programmatic approach to working with LucidWorks Enterprise, the search solution from LucidWorks Enterprise built on Apache Solr. We’ll show how to add content, index it, create a web page (with example PHP code) to send search requests and display results, and more. 

 

Project and Portfolio Management eBook by  CA Technologies.


August 21, 2008 - To better understand how to take your organization to the next level of PPM maturity, view this eBook, Project and Portfolio Management Maturity Model to obtain a higher level of Project and Portfolio Management performance.

 

Project and Portfolio Management: A key tool for success in a tough economy by  CA Technologies.


April 05, 2010 - This e-guide demonstrates how companies are reaping the benefits Project and Portfolio Management software and succeeding during the economic downturn.

 

Project and Portfolio Management: Analyzing Business Project needs by  SearchSoftwareQuality.com


October 03, 2013 - Without proper sequencing, marketing a software project will quickly spin out of control. PPM can organize the chaos—if you begin with the right tools.

 

Project Informatica Demonstrates Mobile Technology Expertise by  Intel


May 30, 2013 - This case study examines how a systems integrator was able to increase mobility, flexibility and efficiency by providing their workforce with the latest tablet technology.

 

Project Management & Business Skills Training Catalog by  Global Knowledge


December 08, 2009 - Throughout the following pages, you can read about our approach, solutions, methodology, and courses - the sum of our vast resources - all designed to promote your pursuit of superior personal and business performance through rapid skills development.

 

Project Management Best Practices by  iRise


March 14, 2013 - This expert e-guide gives advice from the pros on how to successfully execute project management, with emphasis on best practices and how to improve your abilities.

 

Project Management for the Modern Age by  Citrix Online UK


September 07, 2010 - This e-book will show you how to implement virtual collaboration tools throughout the life cycle of a project to leverage the benefits of collaboration and partnership.

 

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle by  Global Knowledge Network, Inc.


December 01, 2005 - This white paper will help you better understand the Project Management Life Cycle by introducing the Project Management Network Diagram (PM Network Diagram) from Global Knowledge. This diagram provides a visual illustration of the life cycle and can help you prepare for the PMP exam.

 

Project Management with QuickBase -- Working Together Made Easy (tm) by  Intuit QuickBase


August 01, 2005 - In just a half hour, we can show you how the web-based QuickBase from Intuit offers a refreshingly powerful, flexible and affordable solution for busy teams to better manage projects, information and processes.

 

Project Management, ITIL, & Professional Skills Training by  Global Knowledge Network, Inc.


February 01, 2006 - Now is a great time to train yourself or your team. Choose from over 30 eligible courses from our Project Management and Professional Skills line.

 

Project Manager Toolkit by  AtTask


January 19, 2012 - Learn what other project managers are doing to increase team productivity and maximize resources by downloading this free toolkit from AtTask.  This collection of whitepapers, webcasts, and success stories will provide you with insights and best practices to help you increase productivity, reduce costs, and ensure project success.

 

Project Performance Scorecard by  Mainstay Partners


February 01, 2008 - The Project Performance Scorecard is a tool that can be used to communicate the status and monitor the progress of an organization's top business and IT projects.

 

Project Portfolio Management in the Public Sector: Benefits, Challenges, Best Practices and Gotchas by  Oracle Corporation


November 13, 2013 - As federal government programs have dramatically increased in number and complexity, more agencies have turned to project portfolio management (PPM). This helpful white paper provides an overview of the key things federal agency officials need to know about PPM, as well as best practices to follow and pitfalls to avoid with PPM implementation.

 

Project Scoring & Prioritization for Maximum Results by  Innotas


February 29, 2012 - This e-book highlights the importance and benefits of scoring and prioritizing all IT projects as they enter the IT pipeline. Additionally, the e-book presents a three-step framework for approaching scoring and prioritization and a use case for a scoring model.

 

Proliferation of devices at mid-size businesses impacts change in IT development by  Cisco Systems, Inc.


July 16, 2013 - This helpful infographic demonstrates today's mobility trends so that you can get a firm understanding on where specifically organizations are looking to boost their mobility and where they already have.

 

Proofpoint Messaging Security Gateway Virtual Edition by  Proofpoint, Inc.


November 17, 2006 - VMware virtualization products require alternative messaging security solutions than those that support physical server software. This free trial download provides best-in-class messaging security designed specifically to support VMware products.

 

Proofpoint TechBrief: Email Archiving and Exchange 2010 by  Proofpoint, Inc.


March 09, 2010 - Proofpoint ARCHIVE™ greatly extends the email retention features promised in Exchange 2010, delivers the robust features and performance that enterprises truly require and makes those features available today, without requiring an upgrade to the 2010 platform. Read this techbrief to learn more!

 

Proper Application of 415V Systems in North American Data Centers by  Emerson Network Power


December 15, 2010 - Increasing pressure to reduce operating expenses and be more accountable for energy usage has pushed many data center owners to take steps to maximize efficiency while maintaining the availability required for their business-critical data centers. Read this paper now to learn more.

 

Proper use of VPN and RPC/HTTPS by  F5 Networks


November 12, 2012 - Consult this expert E-guide to find out more about the possible options to connect Outlook to Exchange, and you can find the right match for your organization. Weigh the advantages of VPN or RPC/HTTPS by reading this resource now.

 

Proper Virtual Storage Management by  Dell Compellent


August 08, 2011 - Virtual data center managers must keep storage capacity and performance within acceptable parameters as business conditions change. Examine the nuances of virtual storage, including provisioning, performance and remote storage methods and ensure that you allocate the right amount of storage for each application.

 

PropertyRoom.com Elevates Online Auction Business with Savvis Symphony by  SAVVIS


June 10, 2013 - Explore this case study to realize how one organization deployed a private cloud infrastructure specifically designed to provide dedicated, secure, virtualized hosting. Realize how they were able to reduce physical servers by 65 % with this advance virtualization strategy.

 

Pros & Cons of Scale-out and Scale-up NAS by  Red Hat


January 31, 2012 - This E-Guide is here to help walk you through the decision-making process and determine which NAS solution is right for you. In this guide you'll learn the pros and cons of scale-out and scale-up NAS options, discover six industries that should always use scale-out systems and more.

 

Pros and Cons of Multiple Hypervisor Environments by  Red Hat


January 24, 2013 - This exclusive e-guide discusses the benefits and drawbacks of deploying multiple hypervisors in your IT environment. Read on to learn how this approach can impact your infrastructure and discover the role it can play in your virtualization initiatives.

 

Pros and cons of the new desktop management: Six sound bites on VDI by  VMware, Inc.


April 24, 2013 - Access this expert guide to learn six different perspectives on today's desktop management from CTOs and VDI administrators. Discover how technologies such as virtualization and mobile devices have changed the face of enterprise desktop management.

 

Pros and cons of WFM in the call center by  Infor WFM Workbrain


January 05, 2012 - The market for workforce management (WFM) software in the contact center saw double-digit growth last year, but the technology still needs work, according to experts. In this e-guide you’ll explore the pros and cons of WFM.

 

ProStor InfiniVault SEC 17a-4(f) Compliance Assessment by  ProStor Systems


December 22, 2007 - Download this white paper to learn how ProStor's InfiniVault data archiving system complies with an array of government requirements, which regulate the storage, retrieval and management of electronic records.

 

Protect & Manage VMware Environments Datasheet by  CommVault Systems, Inc.


February 25, 2013 - Take a look at this informative data sheet for a complete list about the various key capabilities and benefits for each data management solution option for VMware deployments.

 

PROTECT - Bringing the edge to the data center - a data protection strategy for small & midsize companies with remote offices by  HP & Intel®


February 17, 2011 - Learn how midsize businesses or enterprises with regional data centers or remote offices can effectively address data protection challenges by implementing solutions that help store and protect business critical data, cut costs and improve efficiency and reliability.

 

Protect and Perform: Ensuring Online Business in Asia-Pacific by  Akamai Technologies


December 31, 2013 - This white paper underscores the importance of cyber-attack prevention, which can be attended to by a third-party supplier. Learn from those who have come before you as you read about a low-cost airline that found a third-party solution for their security needs.

 

Protect citizen data with IBM Rational software by  IBM


July 24, 2012 - Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data.

 

Protect data & client trust: an end to end approach to protecting your applications & organization by  IBM


December 06, 2010 - This presentation outlines the people, process, and products that should be leveraged to enhance security throughout your applications and organization.

 

Protect Data in VMware-Based Environments with IBM Tivoli Solutions by  IBM


July 31, 2013 - This brief resource examines the challenges of traditional backup and storage approaches in virtual environments, and introduces a unified platform that enables your organization to meet these challenges and effectively store, analyze, manage, and protect data.

 

Protect Identities in the Cloud Secure access to SaaS applications made easier by  McAfee, Inc.


August 02, 2013 - This informative paper examines how your organization can best manage and protect your SaaS applications, discussing common management problems and an advanced security solution that can help secure all aspects of web traffic.

 

Protect people, processes and technology from web application threats by  IBM


November 30, 2013 - This resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.

 

Protect Profit Margins with Automated Chargeback Management by  SAP America, Inc.


June 27, 2012 - This paper outlines how wholesale distributors can vastly improve their profit margins by accurately tracking and filing chargeback claims with various manufacturers. Read on to learn how deploying an automated chargeback management solution can help you save money and reduce supplier inefficiencies.

 

Protect Sensitive Data on Laptops - Even for Disconnected Users by  Citrix Systems, Inc.


August 02, 2012 - Securing corporate data is a top IT imperative and with more employees working from alternative locations, the mobile security challenge has become a critical focus for IT.  Read this white paper to understand how local virtual desktops based on Citrix XenClient should be a part of your security strategy.

 

Protect sensitive data with multiple layers of loss protection by  CDW Healthcare


April 12, 2011 - This healthcare white paper from CDW focuses on the ever-increasing need to protect digital data records with effective data loss management strategies. Read on to learn more.

 

Protect sensitive data with multiple layers of loss protection by  CDW Healthcare


July 26, 2011 - An array of threats — from internal and external breaches to lost or stolen equipment, viruses, hackers and more — put hospital networks and patient data at risk. Learn about a comprehensive data security approach that offers improved methods for discovering, monitoring and protecting sensitive information.

 

Protect sensitive data with multiple layers of loss protection by  CDW Healthcare


March 04, 2011 - This healthcare white paper from CDW focuses on the ever-increasing need to protect digital data records with effective data loss management strategies. Read on to learn more.

 

Protect Your Brand By Improving Quality And Compliance by  Apriso Corporation


May 13, 2011 - Today's businesses need to make their brand unique-- but with all the challenges they face regarding supply chain management, what is the solution?

 

Protect your business brochure by  Hewlett-Packard Company


September 29, 2012 - Check out this exclusive resource to find out about the 7 key areas you need to consider before choosing a support provide.

 

Protect your business: Know the difference between authorized and unauthorized support providers by  Hewlett-Packard Company


September 30, 2012 - Check out this exclusive resource to find out about the 7 key areas you need to consider before choosing a support provide.

 

Protect Your Customer Data for Peace of Mind by  Cisco Systems, Inc.


February 01, 2008 - When dealing with something as invaluable as customer data, think about creating a unified strategy that incorporates the network, people, and tools. Read this paper for advice on how to protect your customers data for piece of mind.

 

Protect Your Data from Endpoint to the Cloud by  Trend Micro, Inc.


March 21, 2011 - Trend Micro Data Protection rises to the occasion with a robust solution that ensures the availability, integrity, and confidentiality of your business information. This comprehensive solution keeps your data safe from intentional or unintentional harm wherever it resides, protecting it against damage, loss, and unauthorized access. 

 

Protect Your Data like a Fortune 500 Company by  SafeData, LLC


July 01, 2008 - This white paper explores the types of world-class data protection and business continuity solutions that are available for businesses and how the utility model makes them easy and affordable.

 

Protect Your Hard-Copy Records With Strategies From The Experts by  Iron Mountain


March 09, 2012 - Ensuring your vital hard-copy records are protected as part of your disaster recovery strategy isn't something you should do - it's a must. Check out this SearchDisasterRecovery.com E-Guide for today's best practices for protecting hard-copy documents and a breakdown of several strategies by which you can do so. Read on to learn more.

 

Protect Your IT System with Next Generation Security by  IBM


October 31, 2012 - Read through this exclusive white paper to find out about data breaches and what you can do to protect yourself, as well as three real-life examples of what can happen when your IT systems are attacked.

 

Protect Your IT Systems with Next Generation Security by  IBM


October 31, 2012 - This informative whitepaper covers the constant threat of hackers to the security of your organization and offers a solution to help keep your data safe.

 

Protect Your SharePoint Content: An Overview of SharePoint 2007 Disaster Recovery by  Idera


August 26, 2009 - This whitepaper introduces the broad topic of disaster recovery (DR) and how its principles can be specifically applied to the Microsoft SharePoint 2007 platform.

 

Protect your SharePoint Content: An Overview of SharePoint 2007 Disaster Recovery by  Idera


July 12, 2010 - This whitepaper covers key principles to help you develop a disaster recovery plan that meets the unique requirements of your SharePoint environment.

 

Protect Your Virtualized Environment with VMware vSphere Data Protection - What's New and Technical Walkthrough by  VMware, Inc.


March 04, 2014 - This webcast provides a technical walkthrough that covers the latest features and functionality for a solution purpose built for your small vSphere environment.

 

Protect, Detect, and Correct: What's New in Tripwire Enterprise 8 by  Tripwire, Inc.


February 24, 2011 - Configurations that "drift" from compliance, by the accrual of gradual, sometimes minute changes often lead to exploits, audit failures, and unplanned repair time. Worse still, it takes even more time to bring new, fresh, out-of-the-box servers up to a compliant, audit-passing state—sometimes a half a day or more per machine.

 

Protecting a Paperless office by  Dell | EqualLogic


December 01, 2008 - By working with Dell, the Peterson Sullivan IT group achieved its goals of creating a consolidated and scalable IT environment with strong backup and disaster recovery strategies.

 

Protecting a Paperless Office by  Dell, Inc.


June 05, 2009 - Peterson Sullivan PLLC needed a consolidated yet scalable IT infrastructure. They created just that with VMware software, Dell PowerEdge servers, and Dell EqualLogic storage while enhancing data protection with Auto-Snapshot Manager/VMware Edition software for automated, integrated, and scalable protection of virtual machines.

 

Protecting a Paperless Office by  Dell, Inc.


December 02, 2008 - By working with Dell, the Peterson Sullivan IT group achieved its goals of creating a consolidated and scalable IT environment with strong backup and disaster recovery strategies.

 

Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution by  F5 Networks


August 06, 2013 - This informative resource discusses a solution that can control access, implement challenge/response and anomaly detection engines, and apply the ability to understand application behavior to defend against malicious connections to keep attackers from overwhelming applications.

 

Protecting against modern password cracking by  ComputerWeekly.com


April 24, 2013 - This article in our Royal Holloway Security Thesis series explains just how insecure passwords are and offers advice on alternative methods of security.

 

Protecting Against the New Wave of Malware by  GFI Software


March 11, 2011 - Managing threats to the endpoint infrastructure is becoming increasingly difficult for most organizations. At the same time, many anti-malware defenses are not keeping up with the growing threats posed by malware. This white paper addresses the variety of issues facing organizations today in the context of their system manaagement challenges.

 

Protecting Against the New Wave of Web Threats by  BlueCoat


January 15, 2009 - This Osterman Research White Paper discusses the extent of today's Web threats and provides recommendations on key aspects of a defense against them. It also provides information on Blue Coat's offerings.

 

Protecting and Enhancing SQL Server With Double-Take Availability by  Double-Take Software


October 22, 2009 - Double-Take Software provides organizations with a solution that offers distinct recovery and protection advantages over manual Microsoft SQL built-in replication capabilities: Double-Take Availability saves more data real-time and restores that data in a much faster manner.

 

Protecting and Recovering Virtual Server Environments by  InMage Systems


January 21, 2010 - Server virtualization technology is here to stay. When choosing a server virtualization application, it's important to understand the many facets various solutions have, and the limitations inherant in them. This paper explains the benefits of InMage's software-based solution.

 

Protecting and Securing Privacy Data and Sensitive Information in Today’s Healthcare Organization by  McAfee, Inc.


March 08, 2010 - This document takes a look at several aspects of data protection and HIPAA compliance and explains how a Data Loss Prevention (DLP) solution can help IT professionals discover sensitive data at rest, monitor traffic in real time, and capture events for after-the-fact investigations.

 

Protecting and simplifying access to Electronic Health Records by  DigitalPersona, Inc


June 21, 2011 - Studies show that 85% of healthcare facilities experienced data breaches in the past two years, at an average cost of up to $2 million each. In order to prevent such losses, many hospitals are deploying advanced security systems. In this whitepaper, find a security checklist that provides strategies every healthcare facility should be aware of.

 

Protecting applications and data in a virtual world with AppAssure by  Dell Software


September 04, 2013 - Data protection in a virtual environment often requires strategies and tools different from those utilized in a physical infrastructure. Dell AppAssure provides holistic data protection for both physical and virtual environments, dramatically improving recovery time and recovery point objectives. Read the Brief

 

Protecting Applications and Data in a Virtual World with Dell AppAssure by  Dell Software


October 11, 2013 - Check out this two-page paper to explore a backup and recovery solution built for today's virtual world that allows you to manage your virtual and hybrid environments from a single console, automate testing of every backup on a nightly basis, restore virtual data and apps in minutes and even seconds and much more.

 

Protecting Commercial Online Banking Customers from Next-Generation Malware by  IronKey


November 22, 2010 - Cybercriminals are now using advanced malicious software (malware) to attack the computers of finance professionals in companies and government agencies. Read this paper now to learn how your business can stay protected from these threats.

 

Protecting Confidential Documents in the Extended Enterprise: Common Misconceptions and Best-Practice Strategies by  Brainloop Inc.


February 01, 2008 - This white paper discusses the enormous cost of data breaches, the rising importance of data security, and common misconceptions that exacerbate the problem of protecting your company's most important and confidential information.

 

Protecting Content During Business Disruption: Are You Covered? by  Xerox DocuShare


May 01, 2008 - Explore how you can protect your organizational content and business-critical information from business disruptions such as natural disasters, accidents or human intervention.

 

Protecting Control Networks: Key Considerations For Protection by  Sourcefire


December 31, 2013 - This whitepaper takes a look at how to secure control networks, with strategies before, during and after an attack.

 

Protecting Converged Virtual Infrastructures with Simpana IntelliSnap® Technology by  CDW Corporation


March 06, 2014 - Check out this informative guide to uncover a solution that provides a proven tool and a simple approach that provide agility and automation to how data is protected and managed in your modern data center.

 

Protecting Converged Virtual Infrastructures with Simpana IntelliSnap® Technology by  CommVault Systems, Inc.


March 06, 2014 - Check out this informative guide to uncover a solution that provides a proven tool and a simple approach that provide agility and automation to how data is protected and managed in your modern data center.

 

Protecting CPNI - Top Four Tips for a Successful Security Program Deployment by  RSA, The Security Division of EMC


December 10, 2008 - With the RSA CPNI Solution, telecommunications service providers can rest assured that they will not suffer financial or brand repercussions as a result of unauthorized disclosure of CPNI.

 

Protecting Credit Card Data: How to Achieve PCI Compliance by  Motorola, Inc.


July 01, 2007 - This white paper details the best way to achieve compliance by building a complete end-to-end PCI-capable solution.

 

Protecting Customer Data: Moving Beyond Compliance by  Voltage Security, Inc.


March 29, 2012 - The insurance industry has experienced unprecedented levels of change that has driven the need to secure customer and corporate data – beyond what is required for NAIC compliance. This resource offers key guidance for tackling the security challenges of this changing environment and how to ensure comprehensive data protection.

 

Protecting Data and Enabling the Mobile Enterprise by  Hewlett-Packard Limited


June 30, 2012 - This guide explores best practices for adopting and securing mobility in the workplace, as well as the importance of data protection.

 

Protecting Data at the Edge More Effectively by  CommVault Systems, Inc.


December 31, 2013 - Access this resource to discover a platform that manages and protects all of your data, no matter where it may be in today's fluid business environment.

 

Protecting Data from the Cyber Theft Pandemic by  FireEye


April 20, 2009 - Malware-related data breaches have reached pandemic proportions as criminals discover Internet crime is easy to commit, highly lucrative, and largely under-policed. Learn about advances in security technologies that use multi-phase heuristic and virtual machine analysis to detect and mitigate damages that result from malware-related data thefts.

 

Protecting DNS Infrastructure - Inside and Out by  Infoblox


January 31, 2014 - This guide takes a look at some top threats your network faces and explores the strategies needed to defend yourself against DNS-based attacks.

 

Protecting DNS Infrastructure - Inside and Out by  Infoblox


January 31, 2014 - This guide takes a look at some top threats your network faces and explores the strategies needed to defend yourself against DNS-based attacks.

 

Protecting Essential Information: Securing the Foundation of the Internet Business Platform by  Websense, Inc.


August 18, 2009 - The requirements for Web security, email security, and data loss prevention have changed. Read on to learn where and why traditional approaches fail; how accuracy and context drive effective information-focused security; and what to do to protect essential information and say yes to business processes that take advantage of Web 2.0.

 

Protecting Essential Information: Securing the Foundation of the Internet Business Platform by  Websense, Inc.


July 01, 2008 - Today's threats use Web 2.0 to integrate daily operations which has changed the requirements for web security, email security and data loss prevention. Download this white paper to learn more.

 

Protecting Healthcare Data in the Cloud: GNAX Health & Intel by  Intel


October 17, 2012 - This exclusive resource demonstrates how health care facilities can protect sensitive patient data in the cloud, while preserving the server performance that users require – all while ensuring compliance with HIPAA and HITECH.

 

Protecting Healthcare Organizations from Patient Data Loss by  Code Green Networks, Inc.


September 08, 2009 - Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.

 

Protecting Information from Insider Threats by  McAfee.


January 30, 2012 - Company insiders have what outsiders don’t – trust and legitimate access. Any malicious insider has the ability to steal sensitive data and sabotage assets quickly, easily, and with greater stealth than an external attacker. In this paper, explore best practices and the security controls necessary to combat insider threat.

 

Protecting Lost or Stolen PCs by  Intel


April 22, 2010 - Learn more about how the all new Intel® Core™ vPro™ processor family can better protect lost or stolen PCs.

 

Protecting Microsoft Exchange by  Double-Take Software


October 14, 2009 - Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system.

 

Protecting Microsoft Exchange by  Double-Take Software


July 01, 2008 - Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system.

 

Protecting Mission-Critical, Multi-Tier Business Applications with Neverfail and Virtualization by  Neverfail Group Limited


February 15, 2011 - This white paper outlines many of the common virtualization deployment scenarios organizations face and describes how Neverfail Continuous Availability and virtualization can be used, to deliver a more complete, consistent and cost effective availability solution for mission-critical, business applications.

 

Protecting Patient Data: Tips for The Health IT Pro by  Intel


June 29, 2012 - This E-Book from SearchHealthIT.com provides invaluable tips for health IT leaders who are considering data, hardware, network and backup tape encryption technologies for their organizations.

 

Protecting Reports When Migrating to Oracle E-Business Suite Release 12 by  Noetix Corporation


January 13, 2009 - Oracle E-Business Suite Release 12 contains powerful new technology with geared to facilitate the global management of enterprises with diverse units.

 

Protecting Sensitive Data and Resources Throughout the Organization by  CA (India) Technologies Pvt. Ltd


March 01, 2009 - CA Data & Resource Protection is a family of solutions that provides a proactive approach to securing sensitive information and critical systems without impacting normal business and IT activities. Read this white paper to learn more!

 

Protecting Server Data in Small and Medium-sized Businesses by  Iron Mountain


September 01, 2006 - Read this white paper to learn how to successfully protect server data outside a centralized data center and focus on specific needs and requirements for SMBs.

 

Protecting SharePoint Data Long Term by  Varonis


July 30, 2009 - This paper focuses on SharePoint access control management challenges, identifies best practices that need to be considered, and demonstrates how Varonis can help.

 

Protecting Sharepoint With Double-Take Availability by  Double-Take Software


October 14, 2009 - Double-Take Availability provides the only complete protection solutions for your SharePoint implementations. It protects the data, customizations and Web Parts, SharePoint configuration and the server state. Download this paper to see how Double-Take Availability protects your Sharepoint implementations across the enterprise.

 
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts