• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

system

Results 76 - 100 of 6302Sort Results By: Published Date | Title | Company Name
By: Blue Coat Systems     Published Date: Jun 30, 2011
This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, anti virus, application security, email security, hacker detection, internet security, intrusion detection, intrusion prevention, web service security
    
Blue Coat Systems
By: SumTotal     Published Date: May 24, 2013
Forrester Research, Inc.’s 2013 evaluation of Talent Management vendors against 57 criteria named SumTotal Systems a Leader and “the largest of the pure-play talent management vendors” (The Forrester Wave™: Talent Management, Q1 2013). Download the full report to jump-start your knowledge of the talent management solution landscape.
Tags : 
forrester, talent management, talent management solutions, talent management systems
    
SumTotal
By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking, wireless
    
Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss, anti spam, anti virus, application security, email security, internet security, network security appliance
    
Blue Coat Systems
By: Oracle     Published Date: Apr 22, 2014
This document focuses on the trends that are driving decision-making on cloud including the growing connection between cloud, mobility, and data; cloud services governance and integration; and continuing development of cloud ecosystems among vendors.
Tags : 
cloud services, trends, cloud services, oracle, customer interaction service, customer relationship management, customer satisfaction, customer service
    
Oracle
By: CompareBusinessProducts     Published Date: Feb 27, 2015
Read on to discover revealing points on the climate of phone systems in 2015
Tags : 
phone system, the cloud, byod, identity phone, integration, business tools, communication value, value pyramid, mobility, wireless, cloud computing
    
CompareBusinessProducts
By: TheMarketingScope     Published Date: Jan 22, 2015
A results-focused, visual buyer’s guide that ranks the top vendors in the Content Management System industry.
Tags : 
bridgeline digital, bridgeline, cms, content management system, engagement, cms software, it spending, marketing automation, return on investment, sales & marketing software, content integration, secure content management
    
TheMarketingScope
By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.
Tags : 
citrix, cyberthreat, report, defense, network security, email security, firewalls, network security appliance
    
Citrix Systems, Inc.
By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Get an overview of the cyberthreat landscape and see key findings from the “2015 Cyberthreat Defense Report.”
Tags : 
citrix, cyberthreat, infographic, 2015 report, application security, firewalls, hacker detection, intrusion prevention, data protection, secure content management
    
Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Take a deep dive into survey data and findings, learn about the evolution of cyberthreats, and find out how you can prepare for cyberattacks in 2015.
Tags : 
citrix, cyberthreat defense, report, 2015, network security, anti virus, compliance, identity management, security management, wireless security, best practices
    
Citrix Systems, Inc.
By: Cisco     Published Date: Dec 04, 2015
Group video systems primarily serve the need for high-quality video interaction across a range of meeting room sizes.
Tags : 
video, system, high quality interaction, sip, network management, network performance, network security, wide area networks, best practices
    
Cisco
By: Cisco     Published Date: Feb 12, 2016
Contact center infrastructure vendors continue to expand their solution offerings to include broader feature sets, including omnichannel routing, and alternative delivery models. Companies should evaluate vendors' technology and ability to deliver in relevant regions.
Tags : 
gardner magic quadrant, cisco, contact center, omnichannel routing, best practices, cloud computing, application performance management, business activity monitoring, business analytics, business process automation
    
Cisco
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.
Tags : 
citrix, gartner, enterprise, mobility, management, mobility, ip telephony, network security, email security, hacker detection, mobile computing, smart phones, wifi, wireless phones, wireless security, data protection, collaboration, secure content management
    
Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
The enterprise mobility landscape is changing and you need a solution that has you covered no matter what the future brings. Read the report to find out why Citrix has been named a leader.
Tags : 
citrix, gartner, magic quadrant, enterprise, mobility, hacker detection, intrusion prevention, business management
    
Citrix Systems, Inc.
By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM Security as a leader in providing Intrusion Prevention Systems (IPS) appliances in the newly published Gartner Magic Quadrant for IPS technology.
Tags : 
ibm, security, network protection, ibm security network protection, intrusion prevention systems, ips, gartner, networking, enterprise applications
    
IBM
By: Cisco     Published Date: Nov 17, 2015
The introduction of innovative new form factors, software infrastructure and cloud services is reshaping enterprise video collaboration. The following vendors offer potential for greater reach, scale and interoperability while addressing the most critical video use cases.
Tags : 
cisco, gartner, magic quadrant, video collaboration, enterprise videos, it management, enterprise applications, electronics
    
Cisco
By: Polycom     Published Date: Jun 08, 2016
"Over the years, the features, functions, and capabilities offered by group video conferencing systems have expanded and evolved. And the requirements and expectations of collaboration users have changed along with them. This 2016 Buyers Guide helps end users understand the features and functions needed to collaboration-enable five of the most common spaces found in enterprises of all sizes; - small (huddle) rooms - teaming spaces - standard meeting rooms - executive boardrooms - reconfigurable (and perhaps divisible) spaces Download the ""2016 Buyers Guide: Making Smart Group Video Collaboration Decisions"" by Wainhouse Research that will help you make informed decisions regarding your video collaboration strategy."
Tags : 
best practices, budget, business optimization, business management, collaboration, business intelligence
    
Polycom
By: Citrix Systems     Published Date: Jul 25, 2016
Take a deep dive into survey data and findings, learn about the evolution of cyberthreats, and find out how you can prepare for cyberattacks in 2016.
Tags : 
    
Citrix Systems
By: Citrix Systems     Published Date: Jul 25, 2016
Get an overview of the cyberthreat landscape and see key findings from the “2016 Cyberthreat Defense Report.”
Tags : 
    
Citrix Systems
By: CloudEndure     Published Date: Mar 23, 2016
In January 2016, 141 professionals — directors, CIOs and managers of large, small and mid-sized companies — were surveyed for a comprehensive disaster recovery (DR) survey. The results of this survey reveal some important truths about DR, backup, availability goals, downtime costs, and responses. For instance, did you know the top risk to system availability continues to be human error? This benchmark survey report reviews the challenges and best practices of companies using or looking to implement DR solutions. Read this report to compare your DR experiences with those of your peers.
Tags : 
cloudendure, disaster recovery, best practices, disaster recovery survey, cloud computing
    
CloudEndure
By: Marketo     Published Date: Nov 14, 2016
Read this complimentary copy of the Gartner Magic Quadrant for CRM Lead Management, and find out why Marketo was named a leader based on lead management functionality, thriving partner ecosystem, and roadmap.
Tags : 
marketo, gartner, magic quadrant, crm, lead management, b2b
    
Marketo
By: Marketo     Published Date: Dec 12, 2016
Read this complimentary copy of the Gartner Magic Quadrant for CRM Lead Management, and find out why Marketo was named a leader based on lead management functionality, thriving partner ecosystem, and roadmap.
Tags : 
marketo, gartner, magic quadrant, crm, lead management, b2b
    
Marketo
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter