Skip to main content
 

solutions

Results 176 - 200 of 4442Sort Results By: Published Date | Title | Company Name
Published By: Commvault     Published Date: Jul 06, 2016
Email is the backbone of today’s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers, vendors, partners and investors. It is arguably today’s most pervasive and critical business application within which is stored the most valuable business content. To protect this vital information while working to eliminate risk, lower management costs and improve business insight, companies require a comprehensive email archiving solution. This solution should not only work to effectively retain email information in a searchable repository, the best email archiving solutions also provide a smarter approach to collecting, retaining and accessing data so that it can deliver true business value.
Tags : 
commvault, email archiving, data protection, email archiving solution, mailbox archiving, reduce bloat, o365
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
Today, nearly every datacenter has become heavily virtualized. In fact, according to Gartner as many as 75% of X86 server workloads are already virtualized in the enterprise datacenter. Yet even with the growth rate of virtual machines outpacing the rate of physical servers, industry wide, most virtual environments continue to be protected by backup systems designed for physical servers, not the virtual infrastructure they are used on. Even still, data protection products that are virtualization-focused may deliver additional support for virtual processes, but there are pitfalls in selecting the right approach. This paper will discuss five common costs that can remain hidden until after a virtualization backup system has been fully deployed.
Tags : 
storage, backup, recovery, best practices
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
Enterprises today increasingly turn to array-based snapshots and replication to augment or replace legacy data protection solutions that have been overwhelmed by data growth. The challenge is that native array snapshot tools – and alternative 3rd party solutions – have varying degrees of functionality, automation, scripting requirements, hardware support and application awareness. These approaches can add risk as well as administrative complexity and make it more difficult to realize the full potential of snapshots – whether in single disk vendor estates or in heterogeneous storage environments. This checklist will enable you to build a shortlist of the 'must have' features needed for snapshots to deliver exactly what you require in your application environment or Private Cloud.
Tags : 
commvault, snapshot management, replication, array based snapshots, data protection solutions, gui driven, intellisnap, no scripting
    
Commvault
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
Technology enables business transformation To thrive in today’s idea economy, small and midsize companies like yours are using technology to transform their business. Like your peers, you know that mobile applications, cloud-based solutions, and advanced analytics can help you increase productivity, reduce costs, and grow your business. Older servers, storage, and networking products weren’t built to handle the exploding amount of data that is being shared today. In order to take advantage of these modern applications, many companies have found that they need to close the gap between what their business demands and what their IT systems can deliver.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, transformation
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
With HPE, you have a trusted partner with flexible, right-sized solutions tailored to your needs.
Tags : 
best practices, business optimization, business management, productivity, storage, growth
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
IT security used to be about keeping intruders out and selectively letting in friendly visitors, which was best accomplished with a range of perimeter security and end-point solutions. Download this asset to learn more how the landscape has fundamentally shifted since, with much of this shift accelerating in the last 2-3 years. Sponsored by: HPE and Intel®
Tags : 
best practices, technology, security, business management, intel, hpe
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 13, 2016
Download this asset to learn CRM and BI solutions can help you deliver insights to meet those expectations. They’re not just for the enterprise anymore – but to make the most of them, you’ll need plenty of compute power and scalable data storage. Sponsored by: HPE and Intel®
Tags : 
best practices, inel, hpe, bi solutions, enterprise, data storage, backup, recovery
    
Hewlett Packard Enterprise
Published By: HP Enterprise Business     Published Date: Jan 20, 2017
The intent of this book is to provide a governance framework that will guide IT organizations in successfully implementing hybrid cloud solutions that drive digital transformation. Download now to learn more.
Tags : 
    
HP Enterprise Business
Published By: Samsung     Published Date: Dec 18, 2015
Download this whitepaper to learn how mobile technology can redefine banking, improve the customer experience, and empower financial advisors.
Tags : 
    
Samsung
Published By: Samsung     Published Date: Dec 18, 2015
Download this whitepaper to see how mobile technology can help improve patient care, communication, and security
Tags : 
    
Samsung
Published By: Cisco     Published Date: Jan 05, 2016
This buyer’s guide provides an in-depth explanation of the factors that impel organizations to look at next generation security solutions
Tags : 
cisco, next gen buyer, guide, network security, solutions
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases.
Tags : 
business models, development, business solutions
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Modern organizations are expanding mobility initiatives across virtually every business function. According to Cisco’s 2015 Mobility Landscape Survey, 72 percent of business leaders believe mobility is a strategic imperative for their organization’s success. In fact, in many businesses today, line-of-business (LoB) leaders are increasingly funding and making decisions about mobile applications and solutions.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
This IDC study represents the vendor assessment model called the IDC MarketScape. This research is a quantitative and qualitative assessment of the characteristics that explain a vendor's success in the marketplace and help anticipate the vendor's ascendancy. The study assesses the capability and business strategy of 12 of the top enterprise wireless LAN (WLAN) vendors. This evaluation is based on a comprehensive framework and a set of parameters expected to be most conducive to success in providing enterprise WLAN solutions, during both the short term and the long term. As the enterprise WLAN market is highly competitive and relatively mature, all vendors performed relatively well in the study.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
When evaluating a next-generation firewall (NGFW) to determine whether the solution can give you comprehensive protection for your entire enterprise, you need to look for seven must-have capabilities. The NGFW should: 1. Integrate security functions tightly to provide effective threat and advanced malware protection 2. Provide complete and unified management 3. Provide actionable indications of compromise to identify malicious activity across networks and endpoints 4. Offer comprehensive network visibility 5. Help reduce complexity and costs 6. Integrate and interface with third-party security solutions 7. Provide investment protection This white paper explains this checklist in depth and provides examples of the benefits a truly effective NGFW solution can deliver.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats. This paper explores: • Where sandboxing technology stands today • Why it fails to meet the needs of organizations • What’s needed for effective malware analysis
Tags : 
    
Cisco
Published By: Equinix     Published Date: May 18, 2015
This paper illustrates how organisations are becoming digital enterprises due to the technology implications of scale and volume.
Tags : 
technology, digital economy, network, become a digital enterprise, mobile, social, cloud, big data
    
Equinix
Published By: Equinix     Published Date: May 28, 2015
This paper illustrates different perspectives on building a secure and flexible data center platform that sustains growth and innovation and delivers a serious competitive advantage.
Tags : 
data center, strategic business advantage, hybrid, technology, it demands, data center platform, equinix, equinix solutions
    
Equinix
Published By: Equinix     Published Date: May 28, 2015
Changes in where traffic originates and how much data is generated will soon have profound effects on Internet latency and end-user quality of experience.
Tags : 
data, generate data, host applications, ensure optimal performance, devices, mobile data, mobility, data traffic
    
Equinix
Published By: Equinix     Published Date: May 28, 2015
This infographic provides information on how Performance Hub is designed to improve the performance of your entire network while simplifying your infrastructure and lowering your Total Cost of Ownership.
Tags : 
equinix performance hub, networks, data growth, network architecture, connectivity, network services, cloud, devices
    
Equinix
Published By: Financial Force     Published Date: Dec 01, 2017
Making the decision to move to cloud accounting is one step in the right direction; understanding the best approach and how you'll get there is half the battle. But guess what? It doesn't have to be difficult. The purpose of this ebook is to provide you with details on how to best plan your cloud accounting implementation, the benefits of a single cloud approach, and offer some key insights and recommendations when evaluating solutions that will make the implementation process so much easier.
Tags : 
    
Financial Force
Published By: Financial Force     Published Date: Dec 01, 2017
This IDC Vendor Profile describes FinancialForce.com, a cloud applications company with financial management, ordering and billing, human capital management (HCM), professional services automation (PSA), and supply chain management (SCM) solutions built on the Salesforce1 platform and a 36-year heritage of building financial management solutions at UNIT4 (the former Agresso and CODA products). FinancialForce.com's accounting solution, launched in 2008 as CODA 2go, was the first on - demand financial system built entirely on the Salesforce1 Platform. Backed by Technology Crossover Ventures, Advent International, Salesforce Ventures, and UNIT4, FinancialForce.com's applications continue to be the leading finance and professional services solutions available as native Salesforce1 applications on the AppExchange.
Tags : 
    
Financial Force
Published By: Financial Force     Published Date: Dec 01, 2017
Download this guide to review three major pain points that companies are facing as they prepare for the new revenue recognition standards-ASC 606 and IFRS 15- as they are fast approaching.
Tags : 
    
Financial Force
Published By: Adobe     Published Date: Mar 21, 2017
Le cloud est devenu un incontournable des technologies de l'information depuis près de dix ans. SaaS (Software-as-a-Service), IaaS (Infrastructure-as-a-Service), PaaS (Platform-as-a-Service) et désormais XaaS (Anything-as-a-Service) : autant de solutions technologiques proposées sous forme de services qui stimulent l'adoption de ce que nous appelons collectivement les services cloud.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 21, 2017
Soucieuses de transformer au plus vite leur activité, les entreprises du monde entier font appel aux technologies numériques pour gagner en agilité et en efficacité, réaliser des économies et offrir à leurs clients une expérience hors normes. Les processus de signature documentaire représentent l’un des plus grands atouts pour accélérer cette transformation.
Tags : 
    
Adobe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.