White Papers


Displaying 195–210 (of 1864)

Popularity is determined by a calculation of page views and community comments.

Title Date
Andritz Powers up Global Data Protection Summary
Learn how a geographically dispersed IT team manages a worldwide backup lifecycle with a cloud-based solution.

sponsored by: Druva Software
Cloud Data Protection for Remote and Branch Offices Summary
Overcome your ROBO backup challenges, improve business agility and reduce costs with cloud-based data protection.

sponsored by: Druva Software
2017 Outlook Report for Cloud Backup and Recovery Summary
Cloud-based backup and recovery solutions offer cost savings without limiting data protection capabilities. Learn more.

sponsored by: Druva Software
Shifting Data Protection Strategies to the Cloud Summary
With the rise of ROBO locations comes data protection challenges. Learn how to effectively protect your remote data.

sponsored by: Druva Software
Cloud Data Protection for VMware Environments Summary
Learn how you can achieve one-click simplicity for your VMware environment with seamless backup, archival, & DR using the cloud.

sponsored by: Druva Software
Extending the Skype Experience to Every Meeting Room Summary
The next generation of Skype for Business meeting room systems promises to provide users the communications tools they need to effectively collaborate and meet in any meeting room. But can you really believe these promises? This Frost & Sullivan white paper demystifies the capabilities of a new Skype for Business meeting room system.

sponsored by: Logitech Inc.
How to Tackle Endpoint Defense Issues Summary
Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.

sponsored by: Carbon Black
Are you one eDiscovery away from a budgetary meltdown? Summary
Using an online object storage platform with global namespaces can provide full data protection, high availability and easily managed eDiscovery in a way that fully supports the business, say analysts Clive Longbottom and Marcus Austin.

sponsored by: ComputerWeekly.com
When Cyberthieves Attack, Technologies Have Your Back Summary
Access this issue of Pulse e-zine now to gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot to help prevent cyberthieves from stealing patient data. Also in this issue, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.

sponsored by: SearchHealthIT.com
2017 IT Priorities APAC - Survey Results Summary
Every year, Computer Weekly asks CIOs and senior IT decision-makers about the technologies and initiatives they will be investing in over the next 12 months. Here you can read the results from over 1000 responses in APAC and see how your 2017 plans compare.

sponsored by: ComputerWeekly.com
Qualify The Tangible Business Value of BI Summary
This report presents strategies for building your BI business case. Learn how to answer 3 key questions about the state of your business and its potential to benefit from BI before you get started.

sponsored by: Yellowfin
For CFOs, the Time to Deploy Procure-to-Pay Software is Now Summary
This expert 3-part handbook examines the many facets of procurement management software as it becomes more sophisticated via advanced financing and analytics features. Gain expert tips on implementing procure-to-pay software to lower costs, improve cash management, and mitigate risk.

sponsored by: SearchHRSoftware
A Risk-Driven Identity And Access Management Process Framework Summary
This Forrester Research report outlines how to use behavior-based trending methods in your identity and access management strategy to reduce security exposures and improve the user experience.

sponsored by: Microsoft
The Impact of SharePoint: Executive Summary Summary
This research report explores the latest trends in SharePoint integration into ECM and document management strategies. Access now to find out what organizations say make or break their SharePoint deployments, how SharePoint 2016 is viewed vs. earlier versions, how it's viewed as a tool for file sharing vs. collaboration, and more.

sponsored by: K2
Information Lifecycle Management Best Practices Guide Summary
Find out how to improve your understanding of the market, your customers, and your product development with information lifecycle management best practices for Oracle database environments.

sponsored by: Cintra

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>