Information Technology


Ensuring IT Reliability and Efficiency to Maintain Business Continuity

This Skillsoft® Books24x7® ExecBlueprint™ provides guidance for CIOs on how to manage these overlapping responsibilities to ensure that users’...

Gartner Magic Quadrant for Intrusion Prevention Systems

Gartner issued its latest “Magic Quadrant for Intrusion Prevention Systems” and the leading industry analyst firm has placed Sourcefire...

Enterprise Backup in the Age of IT Consumerization

While consumerization offers many benefits for both end users and the enterprise in terms of convenience, efficiency and productivity,...

Making the Right Virtual Server Backup Software Buying Decision

Many small and midsized businesses are at a crossroads when it comes to selecting the right backup solution to...

Achieving Straight Through Processing with Electronic Signature

Financial institutions require a significant amount of documentation and security for every transaction. This makes straight-through processing an ideal...

How IT Can Prepare the Company’s Infrastructure for Increased Use of Media-Rich Content

Media-rich content is quickly becoming a cornerstone of both external marketing and internal communication. Employees and customers alike expect...

BYOD Can be Impossible to Keep Up With. Simplify It.

Users seem determined to embrace BYOD even if the IT department doesn’t. Yet IT admins know that with mobile...

Can You Shut Down an Advanced Persistent Threat Before It’s Too Late?

Sophisticated hacks, known as advanced persistent threats (APTs), often use stolen credentials to evade security measures. So how can...

Microsoft Hosted Exchange Providers: Who’s Leading the Pack?

Are you looking for a Microsoft Hosted Exchange Provider? Want to see how the providers in this space stack...

Cloud Business Email: The Market Leaders

Who are the current leaders in the business email market? The Radicati Group, a technology market research firm, said...

The Total Economic Impact of Polycom Voice Solutions for Microsoft Lync

Download this study to learn how one organization with 24,000 Polycom voice devices and Lync Enterprise Voice achieved a...

How to Future-Proof Your Business Communications Strategy

In our newest business communications white paper, our telephony experts detail which new developments and applications are changing the...

Nortel CS 1000 Rejuvenation

Extend the life of your Nortel Communication Server 1000 with GENBAND’s EXPERiUS™ Application Server. EXPERiUS shares its heritage with...

Driving a Next Generation Architecture

Fueled by data growth and technology advancement, such as virtualization, current architectures come up short in a number of...

The Critical Incident Response Maturity Journey

RSA White Paper: As organizations rebalance their security defenses to combat today\'s sophisticated threats, they\'re recognizing that centralized incident...

Five Strategies for Email Data Loss Prevention

Are you looking to enhance security and regulatory compliance around email, without having to add staff? SilverSky offers a...

BYOD: The Opportunities and Challenges of Supporting Personal Devices

Allowing employees - and your company leaders - to use diverse devices to perform the company’s business can spark...

Staying Ahead of the Curve: How to Ensure Your IT Organization Is in Touch with the Latest Industry Developments

New technology comes out daily; the key for every company is to determine when exactly to start using it....

LMN Architects Achieves 3X the Capacity in Half the Rack Space with ioControl

LMN architects uses ioControl hybrid storage to get the capacity and performance. Its graphically-intensive environment needs in a small...

Vodafone Ireland implements world-class service excellence with HP BSM

Learn how business service management helped Vodafone Ireland transform from a reactive to a proactive IT Operations function. ...
 
Page 130 of 162«128129130131132»