Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

report

Results 26 - 50 of 4539Sort Results By: Published Date | Title | Company Name
Published By: GreenSQL     Published Date: Nov 11, 2014
This report provides the 10 essential SQL server security tasks
Tags : 
sql server, insider breach, insider threat, firewalls, compliance, pci compliance, sql server best practices, data protection
    
GreenSQL
Published By: NetApp     Published Date: Mar 05, 2018
This independent report addresses some common GDPR myths. Learn the facts about the new obligations and liabilities faced by companies that manage data in the EU and how to assess your risks.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Workfront     Published Date: Jun 25, 2014
Is your IT organization plagued by overburdened resources, too many meetings and work request interruptions? Download this eBook to learn about 10 problems preventing your IT team from doing their best work and how to solve them. Get the eBook now.
Tags : 
at task, it organizations, work requests, technology changes, project updates, status reports, project management, enterprise applications
    
Workfront
Published By: AtTask     Published Date: Jul 17, 2014
Rapid changes in both technology and business mean that IT departments are constantly barraged with new projects whether it's writing a web app or implementing new infrastructure for mobile application. It's a challenge just to stay ahead of the curve. This Whitepaper examines the top 10 every day pains that prevent IT managers from getting work done and offers some new and trusted solutions for improving your productivity.
Tags : 
at task, it organizations, work requests, technology changes, project updates, status reports, project management, enterprise applications
    
AtTask
Published By: TrendKite     Published Date: Apr 25, 2018
This informative whitepaper that will help shape your PR decision making. Stats include: 43% of web traffic is driven by search engines 7 in 10 executives reported being more inclined to do business through organizations that are thought leaders Influencer campaigns did not exist 5 years ago...now brands swear by them Download now to learn more!
Tags : 
pr strategy, marketing, digital age
    
TrendKite
Published By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : 
security, tripwire, security management, security based management, data center
    
Tripwire
Published By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate Ė a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organizationís DevOps practice, Tenable encourages you to read the Gartner report, ď10 Things to Get Right for Successful DevSecOps.Ē Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and misconĀgurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : 
secure devops, gartner, analyst report, container security
    
Tenable
Published By: Oracle     Published Date: Sep 05, 2014
The right message, in the right place, at the right time, to the right audience. Content marketing doesnít have to be painful. Want to know more about ending the chaos of your organizationís content creation, management and measurement? Download this report now!
Tags : 
content marketing, chaos, calm, message, management, measurement, audience, creation
    
Oracle
Published By: Oracle     Published Date: Sep 30, 2014
The right message, in the right place, at the right time, to the right audience. Content marketing doesnít have to be painful. Want to know more about ending the chaos of your organizationís content creation, management and measurement? Download this report now!
Tags : 
oracle, marketing, cloud, content, customer base, networking
    
Oracle
Published By: Focus     Published Date: May 13, 2009
A network upgrade is necessary; however, you need everyone to agree. Get the help to sell it. Download your FREE research report now.
Tags : 
information technology, networking, infrastructure, internetworking hardware
    
Focus
Published By: GrapeCity, Inc.     Published Date: Feb 25, 2013
Encouraging self-service BI adoption is both a technical and a human resource effort. This white paper offers a 10-point checklist for improving this process, and includes these questions and more in this easy-to-read white paper.
Tags : 
ad hoc reporting, ad hoc report designer, self-service bi, business intelligence, reporting, activereports, web-based reporting, mobile bi
    
GrapeCity, Inc.
Published By: McAfee     Published Date: Feb 06, 2013
The move towards multi-faceted protection has been gathering pace, with more technologies coming into play to protect users from the vast and increasing number of threats.
Tags : 
anti malware performance test, security performance test, application control benchmark, anti virus benchmark, hips benchmark, windows 7 anti malware benchmark, anti malware protection comparison, west coast labs
    
McAfee
Published By: Birst     Published Date: Jul 16, 2013
This whitepaper first looks at the fundamental requirements that a BI solution should deliver to your company. Next, this whitepaper covers the 11 Key Questions that you should be asking of a future BI technology partner. When the BI provider can answer Yes to all of these questions, you have BI that is capable of fulfilling your analytical and reporting needs .
Tags : 
business intelligence, agile bi, self service bi, bi in the cloud, unified bi, mobile bi, embedded analytics, business analytics
    
Birst
Published By: Cision     Published Date: May 02, 2016
How can you boost the odds your social media pitches will drive success? These 11 tips will help. Youíll not only pitch well but also build solid media relations and outreach programs.
Tags : 
cision, social media, reporters, social journalism, marketing, social strategy
    
Cision
Published By: InsightSquared     Published Date: May 04, 2016
If you want to improve your sales team's results, you need to start by asking the right questions. Download this new best-practices eBook to learn about the 12 key questions for data-driven Sales Managers. This informative guide will help you: - Determine Key Metrics For Sales Management - Improve Sales Team Productivity - Closed-Won More Deals Download a free copy of "12 Must-Ask Questions for Data-Driven Sales Managers" today.
Tags : 
salesforce reporting, salesforce analytics, sales analytics, sales reporting, sales pipeline, sales forecasting, pipeline management, sales performance
    
InsightSquared
Published By: Hosting.com     Published Date: May 20, 2010
This Cloud Computing Trends Report provided insight into the expectations small, medium and large businesses have of cloud computing, their intended uses, reasons for adopting, and expected time-frames for implementing cloud-based solutions.
Tags : 
hosting.com, cloud, computing, enterprise application, uptime, grid computing, infrastructure, network architecture
    
Hosting.com
Published By: Oce Business Services     Published Date: Jun 22, 2009
This penetrating survey report clarifies how organizations are leveraging document management practices, such as records management and document imaging, to help meet the current economic challenges and gain a competitive edge in the eventual recovery.
Tags : 
oce, business, document management, economy, recession, budget, recovery, office print
    
Oce Business Services
Published By: Business-Software     Published Date: Apr 02, 2009
With help desk automation, companies can increase collaboration and information-sharing among the various departments that play a role in customer satisfaction, including customer service, product development, and quality assurance, as well as field consultants and support staff. Additionally, help desk automation can tightly integrate both internal and external support processes. Learn more today!
Tags : 
itil, itsm, service management, help desk, automation, customer satisfaction, loyalty, retention
    
Business-Software
Published By: Business-Software     Published Date: Mar 30, 2009
If your company is looking to purchase a Manufacturing/ERP software solution, the 2009 Top 10 Manufacturing Software Vendor Report from Business-Software.com can help you find the software that is right for your company. Must Read!
Tags : 
erp, manufacturing, erp software, enterprise resource planning, mrp, manufacturing software, enterprise applications
    
Business-Software
Published By: Business-Software     Published Date: Mar 30, 2009
If your company is looking to purchase a Supply Chain Management (SCM) software solution, the 2009 Top 10 Supply Chain Management Software Vendor Report from Business-Software.com can help you find the software that is right for your company. Must Read!
Tags : 
erp, erp software, enterprise resource planning, supply chain management, scm, enterprise applications
    
Business-Software
Published By: Business-Software     Published Date: Mar 30, 2009
If your company is looking to purchase an Enterprise Resource Planning (ERP) software solution, the 2009 Top 10 ERP Software Vendor Report from Business-Software.com can help you find the software that is right for your company.  Must read!
Tags : 
erp, manufacturing, erp software, enterprise resource planning, mrp, manufacturing software, enterprise applications
    
Business-Software
Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments
    
McAfee
Published By: SHL     Published Date: Dec 13, 2011
47 business outcome studies were conducted for clients across multiple industries for the 2011 Business Outcomes Studies Report. It demonstrates the value of online talent measurement solutions against metrics specific to the goals of each organization.
Tags : 
bos, business outcomes study, business outcomes, outcomes study, business study, business objectives, people intelligence, outcomes report
    
SHL
Published By: SHL     Published Date: Dec 13, 2011
SHL's Global Assessment Trends Report provides human resources professionals and those interested in learning about global assessment practices a comprehensive look at how organizations around the world measure talent.
Tags : 
gatr, trends, trends report, global assessment trends, global assessment trends report, global assessments, talent measurement practices, talent measurement trends
    
SHL
Published By: Blue Coat Systems     Published Date: Jul 07, 2011
This report examines the interactions of malware ecosystems, including user behavior, malware hosting sites and delivery networks and offers effective strategies to build better defenses.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
Blue Coat Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.