idera

Results 526 - 550 of 791Sort Results By: Published Date | Title | Company Name

Best Practices in Selecting and Deploying Document Management Solutions

Published By: Solgenia     Published Date: Jun 07, 2013
This White Paper outlines best practices and practical considerations that help ensure successful selection and implementation of document management solutions.
Tags : 
document management, best practices, implementation, deployments, automation, collaboration, cloud
    
Solgenia

5 Step Roadmap for Evaluating Ad Hoc Reporting Tools

Published By: GrapeCity, Inc.     Published Date: Feb 25, 2013
Since business-wide deployment of ad hoc reporting tools can be a resource-intensive process, this white paper offers five-step roadmap of evaluation steps to help fully assess the quality of the products under consideration.
Tags : 
ad hoc reporting, ad hoc report designer, self-service bi, business intelligence, reporting, activereports, web-based reporting, mobile bi, end user reporting, dashboards, data visualization, charts, reports, analytics, multi-tenant, self-service reporting, crystal
    
GrapeCity, Inc.

Breaking Bad: The Risks of Unsecure File Sharing

Published By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : 
file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations, security, enterprise applications, business technology
    
Intralinks

Three Reasons To Augment APM/NPM Tools With Internet Performance Management Solutions

Published By: Dyn     Published Date: Jul 29, 2015
This whitepaper reviews three fundamental reasons to add IPM services to your performance management arsenal including: • Performance management considerations for websites and cloud-based services • The role APM and NPM solutions can play in optimizing code and enterprise IT infrastructure • How complementary IPM services can help you make educated cloud and network service provider partnering decisions to improve user experiences, customer interactions, and business outcomes
Tags : 
apm, npm, internet performance management, application performance management, network performance management, enterprise it infrastructure, user experience, customer interactions
    
Dyn

Understanding Network Design Considerations for 802.11ac Gigabit Speed Wi-Fi

Published By: Aerohive Networks     Published Date: May 27, 2014
Learn about two approaches for efficient WLAN design and see how you can seamlessly integrate 802.11ac into your WLAN in order to lay the foundation for the future of high-speed technologies.
Tags : 
aerohive, wi-fi, wlan, wireless lan, 802.11ac, gigabit speed wi-fi, cloud, byod, mobile device management, mdm, mobility, access point, aps, controllers, wireless, pos, cloud managed, guest access, software development, it management
    
Aerohive Networks

Take Meeting Collaboration to the Next Level with Microsoft Lync Room System

Published By: Polycom     Published Date: Oct 31, 2014
Description: Learn how the Polycom® CX8000 and Polycom® CX5100, the 360-degree panoramic room view camera with HD active speaker tracking for Lync 2013, are designed to extend the familiar desktop Lync collaboration experience into the conference room making meetings more effective and engaging. Topics covered were: How to tell if your company is ready for a Microsoft Lync Room System, what Polycom’s new Microsoft Lync Room System solution adds to a Lync deployment and how Polycom’s CX8000 and CX5100 are different than other Microsoft Lync Room Systems.
Tags : 
best practices, network, services, topics, architects, video-enabling, lync, environment, considerations, presence, webinar, customer, success, enterprise, deployment, organization, software development, enterprise applications
    
Polycom

How to Ensure a Successful Deployment of Microsoft Lync Video

Published By: Polycom     Published Date: Oct 31, 2014
Description: Lync expert and blogger Jeff Schertz presented about deploying video for Microsoft Lync and preparing for a Lync Room System. You have questions and Jeff Schertz has the answers when it comes to anything Lync, including video implementation. Jeff led a technical discussion on how to deploy video for Lync and what you need for the Microsoft Lync Room System.
Tags : 
best practices, network, services, topics, architects, video-enabling, lync, environment, considerations, presence, webinar, customer, success, enterprise, deployment, organization, software development, enterprise applications
    
Polycom

Best Practices for Video-Enabling Your Lync Environment

Published By: Polycom     Published Date: Oct 31, 2014
Description: Microsoft Solution Architects discuss the top considerations when adding Microsoft Lync video to your network. You have Microsoft Lync for IM and Presence. Maybe you also use Lync for Enterprise Voice. Video is a logical next step. This webinar will cover how to prepare your network and your organization for Lync video. Topics covered were: What to consider when deploying video, learn about real customer successes and missteps with Lync video deployment and services available to assist with the readiness of your network.
Tags : 
best practices, network, services, topics, architects, video-enabling, lync, environment, considerations, presence, webinar, customer, success, enterprise, deployment, organization, software development, enterprise applications
    
Polycom

Security Architecture Guide

Published By: Soonr     Published Date: Jul 30, 2014
Soonr takes a holistic approach towards security, incorporating a variety of structures and mechanisms at various layers within the Soonr service architecture. The following descriptions convey the breadth and depth of security considerations that have become a cornerstone of the Soonr Workplace service.
Tags : 
soonr, security architecture guide, security, workplace service, it management
    
Soonr

Webinar Preparation Guide

Published By: ReadyTalk     Published Date: Jul 07, 2016
Welcome to the first installment in Making a Great Webinar. To succeed in hosting a great webinar, you need to plan for a great webinar. From scheduling to registration considerations, this step is crucial for all presentations. So why do so many companies skip it? Two reasons: They think good material is all it takes, and they’ve never read this guide.
Tags : 
best practices, business optimization, business management, productivity, business intelligence
    
ReadyTalk

Catch the Forrester Wave™ for Crystal Clear Mobility Management Insight

Published By: IBM MaaS360     Published Date: Oct 27, 2014
Mobile productivity is a must. Be sure you’ve addressed key mobile security considerations--read The Forrester Wave: Enterprise Mobile Management, Q3 2014.
Tags : 
maas360, fiberlink, ibm, enterprise mobile management, enterprise mobile, emm, mobile management strategy, mobile device management, mdm, mobile device management solutions, application management, it management, enterprise applications
    
IBM MaaS360

IoT Risks & Rewards: What Every CXO Should Know

Published By: Great Bay Software     Published Date: Jan 24, 2018
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
iot, security, security systems, iot deployments
    
Great Bay Software

Key RFP Considerations for Desktop and Application Virtualization Solutions

Published By: VMware AirWatch     Published Date: Dec 09, 2016
When employees have the ability to access their apps anytime, anywhere, and on any device, employee satisfaction improves and employees become more productive. Workspace transformation with virtual desktops and applications offers employees the access that they require, but choosing amongst a wide range of solutions can be a demanding task. This guide is designed to help create a Request for Proposal (RFP) in support of virtual desktop and application delivery. Read on and explore three key areas to a successful workspace transformation – people, process, and technology – and important questions to keep in mind when looking at each area.
Tags : 
    
VMware AirWatch

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch

Building a business case for Talent Analytics

Published By: IBM     Published Date: Mar 28, 2016
A successful business case is one that enables your organisation’s business leaders to make the right decision about a Talent Analytics investment. In this report we highlight the key aspects you need to think about as you create your own business case for Talent Analytics, starting with getting a clear handle on why it is a worthwhile investment for your organisation, but also addressing considerations such as budget and resourcing concerns, how you can measure the success of your initiative and demonstrate ROI, and the major risks you need to bear in mind over the lifetime of the initiative.
Tags : 
ibm, mwd advisors, talent analytics, human resource technology
    
IBM

Right Mix Security – 451 Whitepaper

Published By: Hewlett Packard Enterprise     Published Date: Jul 20, 2016
The evolution of cloud infrastructures toward hybrid cloud models is inexorable, driven both by the requirement of greater IT agility and by financial pressures. A study by 451 Research reveals that the greatest barrier to cloud migrations is the twin challenges of security and compliance in the hybrid cloud space. Organizations are struggling with practical considerations, which can prevent them from achieving some of the most important and valuable benefits of hybrid cloud deployments. This report details a number of steps that organizations can take to set themselves squarely on a path to a secure and compliant hybrid cloud.
Tags : 
security, compliance, hybrid cloud, best practices, cloud security, business intelligence, business management, business technology, cloud computing
    
Hewlett Packard Enterprise

Right Mix Security – 451 Whitepaper

Published By: HPE_OMG_7.16     Published Date: Jul 22, 2016
The evolution of cloud infrastructures toward hybrid cloud models is inexorable, driven both by the requirement of greater IT agility and by financial pressures. A study by 451 Research reveals that the greatest barrier to cloud migrations is the twin challenges of security and compliance in the hybrid cloud space. Organizations are struggling with practical considerations, which can prevent them from achieving some of the most important and valuable benefits of hybrid cloud deployments. This report details a number of steps that organizations can take to set themselves squarely on a path to a secure and compliant hybrid cloud.
Tags : 
security, compliance, hybrid cloud, best practices, cloud security, business intelligence, business management, cloud computing
    
HPE_OMG_7.16

10 Ways to Modernize Your Managed File Transfer

Published By: Cleo     Published Date: Jan 03, 2017
Modern MFT is designed to connect all of your information sources and consumers in a way that drives business agility with a simple user experience to manage data movement across your organization and beyond. With legacy and outsourced MFT technologies, companies are at a disadvantage when it comes to managing business-critical file transfers. Read this white paper to learn 10 considerations when evaluating the capabilities of your existing MFT solution or a replacement to help your business better meet existing and future use-case requirement.
Tags : 
cleo, mft, mft technology, file transfer, b2b integration, enterprise applications, business technology
    
Cleo

Saugatuck Technology: ERP for Small and Mid-sized Companies: Time for a Decision

Published By: SAP     Published Date: Aug 03, 2010
Today, the ERP reality is very different, and much more beneficial, for smaller firms. A variety of options have emerged to address and overcome the key concerns and obstacles of the past. Learn about the drivers that force these executives to address an ERP decision, the considerations involved in those decisions, and critical implementation factors once an ERP decision is made.
Tags : 
sap, business intelligence, erp, sme, shipping, transportation, enterprise applications, smb, saas, cloud, business intelligence, crm, business activity monitoring, enterprise resource planning
    
SAP

The Age of Compliance: Preparing for a Riskier and More Regulated World

Published By: SAP     Published Date: Aug 17, 2010
Most organizations find managing risk and compliance a challenge - but the rewards for doing so well can be considerable. By putting the right processes, systems and controls in place, you can gain visibility into decisions taken all across the enterprise - and protect both corporate performance and reputation.
Tags : 
sap, risk, regulation, grc, risk, compliance, governance, erm, enterprise risk management, business management, hipaa compliance, risk management
    
SAP

Cloud Computing: Considerations and Next Steps

Published By: HP & Intel     Published Date: Oct 04, 2011
Read this whitepaper to understand Intel's Cloud vision for evolving cloud infrastructures to be more secure, simplified,and built and open standards.
Tags : 
network architecture, cloud computing, virtualization, infrastructure, design and facilities
    
HP & Intel
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.