Share Business Whitepapers and Research Papers.

Join the community of professionals just like you.

Featured Whitepaper

The Custom Defense Against Targeted Attacks

Advanced persistent threats (APTs) and targeted attacks have clearly proven their ability to penetrate standard security defenses and remain...

Mitigating Targeted Attacks Requires An Integrated Solution

Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to...

Myth Busters: A Helpful Guide to Busting Business Expenses, VAT Reclaim, Travel and Mileage Myths in the UK

Want to know about common mileage myths? Not sure whether the government will accept digital copies of receipts or...

Five Ways Box Makes SharePoint Better

Businesses around the world have made significant investments in Microsoft SharePoint at the core of their content management systems....

File Sharing: Risk or Remedy?

Despite the need for effective document collaboration in the enterprise, many organizations are failing to provide their employees with...

Mobile Content, Collaboration & IDCs 3rd IT Platform: The Next Frontier for the Mobile Enterprise

This IDC White Paper outlines the next frontier for the mobile enterprise: mobile content and collaboration in the context...

Driving Enterprise Transformation with Box and Office 365

Today, we all expect the applications we use at work to be as simple and effortless as the apps...

Power to the People: Identify and Empower Your Mobile Workforce

One-in-two mobile owners in the US owns a smartphone, and many more own tablets. As most of these same...

Cloud and Virtualization Security for Dummies

Virtualization technologies are being adopted today at a tremendous rate. Although the benefits of virtualization outweigh its challenges, it...

Advanced Persistent Threat Awareness

Advanced persistent threat (APT) has been a term used frequently during security threat discussion; however, confusion exists as to...

The Custom Defense Against Targeted Attacks

Advanced persistent threats (APTs) and targeted attacks have clearly proven their ability to penetrate standard security defenses and remain...

Mitigating Targeted Attacks Requires An Integrated Solution

Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to...

Protection for Every Enterprise: How BlackBerry Security Works

If you’re choosing a platform for enterprise-grade Mobile Device Management, security is probably near the top of your list...

Federated Zero Knowledge File Sharing: Moving Beyond Encryption

The movement and storage of sensitive files outside the organization has become a business requirement, but it also creates...

Driving Education Enrollment Through Agile Content Management

Your website’s goal above all others is to attract students and get them to apply, visit, or request more...

[CaseStudy] Sony Electronics Implementation of Ensighten Tag Management

Sony Electronics’ implementation of Ensighten tag management system at store.sony.com ranked as one of ...

Redefine The Office

The ability to use mobile devices for business anywhere, anytime has truly changed how we work. Download this whitepaper...

Your New EMM Platform: How to Streamline the Migration

As enterprises decide on an EMM solution, many gloss over the implementation stage. And it’s a factor that needs...

The Total Economic Impact of Ensighten For Enterprise Data and Tag Management

Forrester interviewed four Fortune 500 brands who are currently Ensighten customers to examine the ROI enterprises may realize by...

How to get People to Love (and Make Money from) Your APIs

Every time someone says, “There’s an app for that,” there must also be, behind the scenes, an API for...
 
Page 316 of 347«314315316317318»