age

Results 151 - 175 of 21096Sort Results By: Published Date | Title | Company Name
By: Riverbed     Published Date: Jan 28, 2014
Riverbed Cascade provides enterprise-wide network and application visibility with a full set of application-centric, site-centric, and business-centric views. While Cascade can coexist or integrate with a variety of other IT management solutions, it will likely become your first line of defense against application performance problems.
Tags : application performance management, application performance monitoring, big data apm, network performance management, network performance monitoring, network performance troubleshooting, networking, it management
     Riverbed
By: Riverbed     Published Date: Apr 03, 2014
Learn how RiverbedŽ CascadeŽ gives you actionable information for network analysis and optimization, application performance management, acceleration of IT consolidation projects, and security compliance.
Tags : riverbed, applications, apm, compliance, security compliance, network infrastructure, networking, wan optimization
     Riverbed
By: Aerohive Networks     Published Date: May 27, 2014
Learn about the 10 requirements needed for optimizing your network for mobility and see the potential issues IT faces in a mobile-first enterprise and the advantages of framing the problems properly for long-term success and effectiveness.
Tags : aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod
     Aerohive Networks
By: Coupa Software     Published Date: Sep 19, 2012
Strengthen your business from the inside out by taking control of operational expenditures. Download this white paper now and learn the secret strategies to staying recession-proof.
Tags : spending, inventory management, financial stability, business solutions
     Coupa Software
By: StepByStepMarketing.com     Published Date: Jun 06, 2011
In 10 Secrets for Successful Customer Relationship Marketing you'll discover how can you build an emotional bond with your customers in a real, personal, and meaningful way.
Tags : client relationship management, customer relationship building, customer relationship management, relationship marketing
     StepByStepMarketing.com
By: Nuesoft     Published Date: Jan 30, 2013
Download this whitepaper to view 10 simple steps to ensure you find the perfect practice management system that's right for your office.
Tags : practice, management system, solution, priorities, integrated practice
     Nuesoft
By: Mimecast     Published Date: Nov 28, 2017
With the pending EU General Data Protection Regulation (GDPR), your organization must consider a wide variety of changes for compliance if you hold EU resident data. Your organization should look at GDPR as an opportunity to modernize storage, compliance and security needs. But what services should be considered? Download to learn more including: • How the right providers can help you build a business case for GDPR compliance • Ways providers can directly aid in the compliance process • Why the right tools can help with not just technology but process changes as well
Tags : software provider, cloud service provider, gdpr
     Mimecast
By: TrendKite     Published Date: Apr 25, 2018
This informative whitepaper that will help shape your PR decision making. Stats include: 43% of web traffic is driven by search engines 7 in 10 executives reported being more inclined to do business through organizations that are thought leaders Influencer campaigns did not exist 5 years ago...now brands swear by them Download now to learn more!
Tags : pr strategy, marketing, digital age
     TrendKite
By: Skillsoft     Published Date: Jun 25, 2015
This paper takes you step-by-step through the process of addressing your immediate problems, building alliances throughout your organization, and making a successful business case for a learning solution, including: • Analyzing your current processes and identifying your needs • Mapping out the various processes and training requirements • Calculating the financial impact of training • Making the case and managing the project
Tags : learning solution, business case, lms, development, learning management strategy
     Skillsoft
By: SumTotal, a Skillsoft Company     Published Date: Aug 24, 2015
This paper takes you step-by-step through the process of addressing your immediate problems, building alliances throughout your organization, and making a successful business case for a learning solution.
Tags : learning solution, business case, lms, development, learning management strategy
     SumTotal, a Skillsoft Company
By: Clearswift     Published Date: Jun 09, 2008
Every enterprise has to find a balance between security and the ability to carry on conducting business freely. This short guide is about finding that balance. By following some basic principles, there's no reason you can't let legitimate business email move into, out of and within your enterprise while stopping the things that cause damage: viruses, spam, spyware, trojans, phishing, Denial of Service attacks, the loss of sensitive data and the collection of illegal, immoral and just plain offensive material.
Tags : e-mail security, guide, clearswift, clearswift
     Clearswift
By: F5 Networks     Published Date: Mar 18, 2015
The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs, and stay protected in the future.
Tags : f5 networks, ddos, ip security, real time attack, data protection, secure business
     F5 Networks
By: Idera     Published Date: Oct 18, 2012
Download this paper to learn how implementing basic performance enhancements can provide tremendous improvements to the operation and performance of SharePoint within the enterprise.
Tags : sql, servers, database traffic, data connectivity, microsoft sharepoint, data management, data center
     Idera
By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : security, tripwire, security management, security based management, data management, data center
     Tripwire
By: eMC     Published Date: Oct 11, 2010
Learn 10 practical tips on how to make your email messages stand out among the clutter and maximize your results with this FREE white paper!
Tags : napco, emc, email marketing, emarketing, roi, list management, newsletter design
     eMC
By: MobileIron     Published Date: Mar 02, 2015
The Android platform has quickly established itself as a dominant mobile OS for consumers. However, enterprise IT has been slower to adopt Android broadly due to lack of Enterprise Mobility Management capabilities in Android and fragmentation. But the recent release of Android Lollipop reduces fragmentation and when combined with MobileIron enterprise mobility management (EMM) solutions, gives IT the tools needed to easily manage and secure apps and content on all types of Android devices. This will accelerate adoption of Android devices within the enterprise.
Tags : android, apps, vpn, work, multiple devices, emm
     MobileIron
By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate – a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organization’s DevOps practice, Tenable encourages you to read the Gartner report, “10 Things to Get Right for Successful DevSecOps.” Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and miscongurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : secure devops, gartner, analyst report, container security
     Tenable
By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn the 10 strategies for selecting a disaster recovery service provider to ensure that your organization will be better protected should a natural disruption occur.
Tags : sungard, sungard availability services, disaster recovery, disaster recovery provider, disaster recovery service provider, dr plan, drsp, business impact analysis
     SunGard Availability Services
By: Metafuse     Published Date: Aug 21, 2009
Looking for project management software can often be confusing. There are so many choices in the market, how do you narrow your search? This white paper gives you 10 tips to guide your solution search.
Tags : project management, pmp, project planning, project scheduling, scheduling, schedule, it management, pm solution
     Metafuse
By: LockLizard     Published Date: Jun 10, 2009
Is the PDF security software you are looking to purchase really secure? If the PDF security software you are evaluating can be simply broken then you might as well save your money. What PDF security vendors are not telling you about their products and solutions, and what questions you should be asking.
Tags : pdf, pdf security, locklizard, software, cost savings, recovery, passwords, restrictions
     LockLizard
By: Palo Alto Networks     Published Date: Sep 30, 2016
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored.
Tags : palo alto, firewall, applications, ssl, ssh
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting a job.
Tags : firewall, optimization, security risks, business, devices, employees, technology
     Palo Alto Networks
By: Lumesse     Published Date: May 15, 2015
This paper explores how critical it is to have an agile talent management strategy in place. Being mobile and social are key to attracting, developing and retaining the cream of Gen Z.
Tags : gen z, employees, retain talent, talent management, strategy, generation z, workplace, hr trends
     Lumesse
By: AppDynamics     Published Date: Sep 21, 2017
Technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
     AppDynamics
By: CrowdCompass by Cvent     Published Date: Jun 01, 2011
Surveys that not created using a systematic approach, the results can be inconclusive or irrelevant. These ten tips are designed to help create effective surveys that will deliver meaningful business intelligence.
Tags : cvent, web surveys, online surveys, feedback management, enterprise feedback management, create surveys, design surveys, survey design
     CrowdCompass by Cvent
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com