Information Technology


The Changing Face of Collaboration in the Enterprise

Collaboration technologies and the use of social solutions to augment an organization\'s communications environment have grown in acceptance over...

Five Ways Box Makes SharePoint Better

Businesses around the world have made significant investments in Microsoft SharePoint at the core of their content management systems....

Migrating to the Cloud: When Should Your Business Make the Move?

Information technology is undergoing rapid change as organizations of all types begin to embrace the idea of moving...

The Cloud Is Your Key To Customer Satisfaction

Find out how the cloud can be your key to increased customer satisfaction in this Service Cloud eBook. Specifically,...

Decoding Software Defined Networking

For the past year, software-defined networking (SDN) has been the buzz of the networking world. But in many ways,...

IT Security by the Numbers: Calculating the Total Cost of Protection

Cloud computing, mobile devices, web applications, virtualization. It seems there are backdoors into your systems from every direction....

Cloud and Security Virtualization for Dummies

Virtualization technologies are being adopted today at a tremendous rate. Although the benefits of virtualization outweigh its challenges, it...

The Custom Defense Against Targeted Attacks

Advanced persistent threats (APTs) and targeted attacks have clearly proven their ability to penetrate standard security defenses and remain...

Mitigating Targeted Attacks Requires An Integrated Solution

Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to...

Five Ways Box Makes SharePoint Better

Businesses around the world have made significant investments in Microsoft SharePoint at the core of their content management systems....

File Sharing: Risk or Remedy?

Despite the need for effective document collaboration in the enterprise, many organizations are failing to provide their employees with...

Mobile Content, Collaboration & IDCs 3rd IT Platform: The Next Frontier for the Mobile Enterprise

This IDC White Paper outlines the next frontier for the mobile enterprise: mobile content and collaboration in the context...

Driving Enterprise Transformation with Box and Office 365

Today, we all expect the applications we use at work to be as simple and effortless as the apps...

Power to the People: Identify and Empower Your Mobile Workforce

One-in-two mobile owners in the US owns a smartphone, and many more own tablets. As most of these same...

Cloud and Virtualization Security for Dummies

Virtualization technologies are being adopted today at a tremendous rate. Although the benefits of virtualization outweigh its challenges, it...

Advanced Persistent Threat Awareness

Advanced persistent threat (APT) has been a term used frequently during security threat discussion; however, confusion exists as to...

The Custom Defense Against Targeted Attacks

Advanced persistent threats (APTs) and targeted attacks have clearly proven their ability to penetrate standard security defenses and remain...

Mitigating Targeted Attacks Requires An Integrated Solution

Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to...

Protection for Every Enterprise: How BlackBerry Security Works

If you’re choosing a platform for enterprise-grade Mobile Device Management, security is probably near the top of your list...

Federated Zero Knowledge File Sharing: Moving Beyond Encryption

The movement and storage of sensitive files outside the organization has become a business requirement, but it also creates...
 
Page 134 of 152«132133134135136»