Research

Results 126 - 150 of 205Sort Results By: Published Date | Title | Company Name
White Paper Published By: Skillsoft     Published Date: Mar 05, 2014
This paper explains how embedding 7 key skills within your IT team can keep your organisation’s data safe and its employees productive.
Tags : 
it skills, data storage, data management, it issues, research
    
Skillsoft
White Paper Published By: join.me     Published Date: Jan 29, 2014
eMarketer reports on multichannel customer services and provides best practices for building retail loyalty
Tags : 
multichannel customer services, best practices, customer, customer service, retail
    
join.me
White Paper Published By: McAfee     Published Date: Jan 28, 2014
NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.
Tags : 
epp, endpoint, protection, threats, malware
    
McAfee
White Paper Published By: McAfee     Published Date: Jan 28, 2014
Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for six consecutive years.
Tags : 
gartner, endpoint protection, research
    
McAfee
White Paper Published By: Adobe     Published Date: Jan 27, 2014
Best practices, tips and examples for understanding responsive web design and its optimization.
Tags : 
technology, responsive web design, web design, responsive design, research
    
Adobe
White Paper Published By: IBM     Published Date: Oct 10, 2013
As your employees bring their own smartphones and tablets to the workplace, you need to create a flexible mobile environment that allows personally owned and corporate-issued devices to co-exist. IBM Mobile Enterprise Services for managed mobility is designed to help reduce the complexity that comes with multiple mobile platforms. IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program. In this report, you’ll learn how these companies: Increased employee productivity and satisfaction; expanded revenues from improved sales mobility, and decreased replacement, mobility infrastructure and support costs.
Tags : 
managed mobility, byod, michelle evangelista, bring your own device, mobile
    
IBM
White Paper Published By: Wheelhouse     Published Date: Aug 09, 2013
Unified Communications, or UC, has no official or even widely accepted definition. Pundits, analysts and journalists all have their own descriptions. So do vendors – theirs just happen to fit their own products perfectly. But this lack of consensus doesn’t mean the term is meaningless. In fact, unified communications is a complex but very real phenomenon. And this phenomenon has the potential to radically improve businesses’ ability to communicate.
Tags : 
unified communications, communications, business technology, telecom, research
    
Wheelhouse
White Paper Published By: BlackBerry     Published Date: Mar 11, 2013
This whitepaper reveals research findings on the total cost of ownership (TCO) and security for the major mobile platforms: Apple iOS, Google Android™, BlackBerry®, Windows Phone and Nokia Symbian.
Tags : 
tco, security of enterprise grade mobility, blackberry, total cost of ownership, major mobile platforms
    
BlackBerry
White Paper Published By: Forrester (Presented by Brother)     Published Date: Feb 22, 2013
In this exclusive 31-page Forrester report brought to you by Brother, you will see why smart companies view customer empowerment as an opportunity to grow revenues by deepening customer relationships.
Tags : 
customer empowerment, opportunity, grow, revenue, influence
    
Forrester (Presented by Brother)
White Paper Published By: McAfee     Published Date: Feb 06, 2013
This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.
Tags : 
big data, big security data, mcafee siem, intrusion detection systems, security monitoring
    
McAfee
White Paper Published By: HP     Published Date: Dec 04, 2012
If your company already uses Microsoft Lync for instant messaging, web presence and conferencing, you probably know that unified communications and collaboration (UC&C) means running all communications vehicles on a single, common, unified platform.
Tags : 
collaboration, productivity, conferencing, unified, common
    
HP
White Paper Published By: HP     Published Date: Dec 04, 2012
By combining communications tools such as instant messaging, presence, telephony, unified messaging, video conferencing, data sharing, and email, the technology known as unified communications (UC) lets your employees communicate and collaborate,
Tags : 
communications, video conferencing, collaborate, unified messaging, decisions
    
HP
White Paper Published By: ShoreTel     Published Date: Oct 26, 2012
Total cost of ownership is a key metric for assessing costs, benefits and risks of a UC solution, enabling organizations to properly evaluate competing solutions. This white paper examines the total cost of ownership measured in different ways.
Tags : 
shoretel, unified communications solutions, ucs, total cost of ownership, telecom
    
ShoreTel
White Paper Published By: ShoreTel     Published Date: Oct 26, 2012
Compared with Cisco products, ShoreTel UC can offer numerous advantages, including streamlined deployment and management, easier scalability, and a significantly lower total cost of ownership (TCO).
Tags : 
shoretel, unified communications solutions, ucs, total cost of ownership, telecom
    
ShoreTel
White Paper Published By: ShoreTel     Published Date: Oct 26, 2012
Whether you need to build a business case for a UC system, or are ready to select a new solution, this white paper offers a thorough, side-by-side comparison of ShoreTel and Avaya offerings to help you make informed decisions.
Tags : 
unified communications, shoretel, all in one ip, telecom, enterprise applications
    
ShoreTel
White Paper Published By: Symantec     Published Date: Oct 25, 2012
Symantec commissioned Applied Research to field the 2012 Endpoint Security Best Practices Survey to see how more than 1,400 IT professionals around the world are coping with endpoint security.
Tags : 
symantec, security, best practices, endpoint security, security detection
    
Symantec
White Paper Published By: Symantec     Published Date: Oct 25, 2012
PassMark Software conducted objective performance testing on five publicly available Enterprise Endpoint Protection products. This report presents our results from these performance tests.
Tags : 
endpoint security, endpoint protection products, symantec, technology security, data security
    
Symantec
White Paper Published By: Intralinks     Published Date: Oct 02, 2012
Trends in the market show that buyers are coming back, albeit with a far more selective and cautious approach following months of economic volatility.
Tags : 
marketing and advertising, research, deal flow, economics, deal volume
    
Intralinks
White Paper Published By: hybris software     Published Date: Aug 23, 2012
Globalization; social and mobile commerce; and site replacements, upgrades and new launches are driving e-commerce product evaluation and selection. Use this Magic Quadrant as a guide during the vendor evaluation and selection process.
Tags : 
ecommerce, globalization, social commerce, mobile commerce, product evaluation
    
hybris software
White Paper Published By: CDW Symantec     Published Date: Aug 02, 2012
Read the results of Symantec's research on the psychology behind intellectual property theft by corporate insiders. This report addresses the organizational anxiety surrounding potential theft of critical data by employees and describes what is known about the people and conditions that contribute.
Tags : 
indicators, intellectual, property, theft, symantec
    
CDW Symantec
White Paper Published By: Limelight     Published Date: Jul 31, 2012
How to Master the Art of Content Marketing will show you best practices, tips, and solutions for turning content assets into online customer engagement and higher web conversion rates.
Tags : 
limelight, networks, content marketing, content, marketing
    
Limelight
White Paper Published By: Aternity     Published Date: Jul 20, 2012
Read in only 5 pages about how Global 2000 organizations are monitoring end user behavior in physical and virtual desktop environments with Aternity's Frontline Performance Intelligence Platform. Monitor the Cloud, drive SLAs, Citrix/VDI monitoring, and much more.
Tags : 
technology, help desk, management, it management, business technology
    
Aternity
White Paper Published By: Aternity     Published Date: Jul 20, 2012
This essential resource highlights a groundbreaking end user experience (EUE) management platform that can help organizations enable unparalleled application performance and user experience across physical, virtual and mobile environments. Discover how the extensive monitoring, reporting and analysis tools included in this platform are helping organizations overcome common mobile computing challenges.
Tags : 
technology, user, experience, management, enterprise
    
Aternity
White Paper Published By: Aternity     Published Date: Jul 20, 2012
Forrester Research projects that by 2016, 350 million employees will have smartphones, prompting businesses to drastically increase spending on mobile projects to meet the flexibility demands of increasingly tech-savvy employees. This exclusive resource describes how businesses can support mobile technologies from virtual desktops to application development with comprehensive end-user experience (EUE) management tools. Find out how this platform proactively detects performance and availability issues to help IT professionals troubleshoot and improve application performance for end-users.
Tags : 
technology, mobile, management tools, end-user experience, eue
    
Aternity
White Paper Published By: Qualys     Published Date: Jul 20, 2012
Vulnerability Management (VM) means systematically finding and eliminating network vulnerabilities. Choosing a solution for VM is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security. This checklist from Qualys provides a 12 point shortlist of considerations to determine what solutions will work best for your organization.
Tags : 
technology, security, vulnerabilities, internet, virus
    
Qualys
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.