Enterprise Businesses Reports

Computer Weekly –11 April 2017: Virtual reality in healthcare
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how virtual reality technology is starting to be used to improve healthcare. We examine the new tax laws that are causing IT contractors to quit government digital projects. And we analyse the software licensing issues arising from SAP's recent court case over indirect access. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Apr 2017

TechTarget ComputerWeekly.com

How businesses can win talent war with mobile apps, HR data analytics, and cloud technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Becoming more digital has emerged as a ruling concept among forward-looking organisations in recent years. Now, while having multi-channel engagement with customers is a big aspect of digital, so too is attracting and retaining the employees who can make a reality of digital transformation.
Posted: 08 Feb 2021 | Published: 21 Apr 2016

TechTarget ComputerWeekly.com

MicroScope September: Video Conferencing
sponsored by MicroScope
EZINE: An issue looking at the way we all work looking at the way technology has changed the options for us all with an update on home working, holiday emailing and unified comms.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

MicroScope

Office 365 Cloud Services Encounter Turbulence
sponsored by TechTarget Content Management
EBOOK: Microsoft hopes to fly high with Office 365's cloud-based ECM and collaboration tools, but grounded on-premises customers and overlapping SharePoint product features are disrupting the flight plan. Access this 3-part expert e-book to explore how Microsoft walks the line between cloud and on-premises offerings.
Posted: 05 Apr 2016 | Published: 04 Apr 2016

TechTarget Content Management

Addressing Remote and Endpoint Backup Challenges with the Cloud
sponsored by TechTarget Data Backup
EBOOK: This handbook provides you with an overview of challenges associated with remote data protection and the products available today to address them. Read on now to address your endpoint data protection concerns, as well as how to choose the right cloud endpoint backup products for your organization.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

TechTarget Data Backup

SOC Analyst in a Box
sponsored by TechTarget Security
EZINE: Discover endpoint detection and response (EDR) tools and incident response procedures that will help shorten the time between threat detection and response.
Posted: 01 Mar 2016 | Published: 01 Mar 2016

TechTarget Security

Computer Weekly – 9 February 2016: How Software Protects People
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how software is helping to maintain safety in high-risk sectors such as oil and gas, aerospace and healthcare. We offer six tips from CIOs for innovation with data. And we examine the continuing threat to businesses from denial of service cyber attacks. Read the issue now.
Posted: 05 Feb 2016 | Published: 09 Feb 2016

TechTarget ComputerWeekly.com

Malware Hitching a Ride on Mobile Apps?
sponsored by TechTarget Security
EBOOK: The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
Posted: 27 Jun 2016 | Published: 20 Jun 2016

TechTarget Security

Enterprise File Sync-and-Share Needs a Shake-Up
sponsored by Nasuni
EGUIDE: In this expert-guide, explore how the EFS market has evolved, and why we need a new definition of the term. Then learn about how consumer-grade sync-and-share services puts your corporate data at risk, and 3 other options that could give your users the same experience in a much safer environment.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

Nasuni

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by TechTarget Security
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

TechTarget Security