December 2011 - (Free Research) This white paper explores how your organization can change the way it protects its critical data, combining preventive, detective and corrective controls to stop breaches from happening, detect threats as they arise, and correct settings that introduce security risk or non-compliance. Read now to learn more.
June 2009 - (Free Research) In today's tough economy, Polycom cut more than $7 million in operating expenses all while increasing collaboration, heightening productivity and streamlining business processes. See how we did it.
May 2008 - (Free Research) The purpose of this Executive White Paper is to help you avoid the pitfalls inherent in by any reduction in (work)force (RIF). It also details a solution that can assist companies in collecting employee data efficiently and keeping it secure.
December 2010 - (Free Research) ISACA recently unveiled the results of its 2010 survey "Shopping on the Job: Online Holiday Shopping and Workplace Internet Safety." This white paper discusses many of the risks associated with such actions and provides recommendations for enterprises dealing with such challenges.
December 2011 - (Free Research) This report from Ovum warns that enterprises need to recognise that they will need to move to IPv6, even if they have IPv4 addresses available. They should treat IPv6 like any other disaster recovery plan.
October 2010 - (Free Research) IT managers everywhere feel overwhelmed with the rising tide of security threats they have to deal with in the face of an increasing regulatory burden. It is not surprising then that they tend to overlook one particular area of IT security, which is the privileged access that they grant themselves and/or their colleagues in order to do their jobs.
March 2012 - (Free Research) This paper examines some of the types of insider threats organizations face today and the role monitoring and managing privilege user actions plays in security and compliance reporting efforts.
June 2012 - (Free Research) <p>Review this resource to learn a simple five-step action plan designed to enable IT execs to achieve effective SOA governance. Find out the right SOA governance plan can help you quickly and easily alleviate common SOA challenges.</p>
June 2013 - (Free Research) In this webcast, Dr. Barry Devlin, Founder, 9sight Consulting, will discuss the business value and technological foundations of operational analytics. He'll also explore how to bridge the business need for operational analytics with technology capabilities, as well as the business drivers for immediate decision making and action taking.
February 2011 - (Free Research) In this executive report from MIT Sloan Management Review and IBM Institute for Business Value learn how the smartest organizations are embedding analytics to transform insights into action and out-perform the competition, recommended actions organizations can take to bolster their analytics capabilities to achieve long-term advantage.
January 2013 - (Free Research) Analysts predict that 2013 will be a year of major changes for HR. In order to keep pace with business trends like mobility, savvy HR managers are looking to innovative technologies for support. Read this guide to learn 5 HR tech trends predicted to have a major impact and discover 3 action-items that will help jumpstart your HR overhaul.
February 2011 - (Free Research) In this webcast, discover key findings from The Economist Intelligence Unit's new research paper, “Mitigating the Impact of Project Failure in the Financial Services Industry.”
July 2009 - (Free Research) This paper reviews the challenges of measuring data center energy efficiency and proposes a solution: a new metric called CUPS, or Compute Units per Second, that allows data center managers to calculate data center efficiency.
December 2010 - (Free Research) This Technology Spotlight discusses the growth of Linux as a strategic platform for enterprises as well as the evolving uses of Linux and its benefits. The paper also looks at the role of Symantec in this important market.
August 2008 - (Free Research) It's estimated that up to 50 percent of visitors to landing pages will bail in the first eight seconds. This evaluation explains how putting more effort on nurturing recipients once they hit those landing pages would be time and money well spent.
September 2012 - (Free Research) Microsoft SharePoint is a widely deployed enterprise content management (ECM) and collaboration system because it delivers a functional user experience. However, it also presents some security concerns. Consult this informative white paper to learn more about some of the challenges and how to remedy these obstacles.
April 2013 - (Free Research) This expert handbook offers practical advice that will help you successfully plan and manage a predictive analytics program. Inside, discover how you can avoid common pitfalls and challenges and gain the knowledge you need to realize the promise of predictive analytics.
August 2009 - (Free Research) This paper examines the three most common causes of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders-- and then illustrates each cause to show that breaches can occur in.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.