White Papers by Topic: Business intelligence

Resources available: 202

Social Media in Technology: A Unified Strategy for Success

Find out how social media is sparking a new era of customer and industry-understanding in technology enterprises and how industry leaders are overcoming the challenges of integrating social media across their organization.

Evaluating Enterprise Social Relationship Platforms

The business impact of social media is undeniable. With organization-wide participation increasingly the norm, choosing social tools that meet the security, compliance and governance requirements of your organization is essential.

Drive Business Growth with the Right Social Media Tools

With social media taking an increasingly important role in business, CIOs have an opportunity before them: Demonstrate their ability to evolve by facilitating the adoption of social media in a secure, compliant manner.

Protecting Digitalized Assets in Healthcare

Healthcare providers face an urgent, internal battle every day: security and compliance versus productivity and service. For most healthcare organizations, the fight is an easy one: Providing quick, high-quality care wins every single time.

Is a SaaS Deployment Right for You?

Find out the answer and as well as the other deployment options.

Discover How Mail Express Solves 2 of Your Biggest IT Headaches

Email. It can be the source of some of IT's biggest headaches. As it eats up storage and bandwidth, it also opens up holes in your IT security plan. But there is good news. Mail Express can easily solve your most troublesome headaches.

File Security Evolution: From 5 Years Ago to Today (with a Hint at Tomorrow)

This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security.

Data on the Move = Business on the Move; How Strategic Secure Managed File Transfer Adds Value and Drives Business

This whitepaper describes the formal and informal file-sharing methods business employees use to perform their daily functions and explains that, from sending small text documents to multi-gigabyte video files.

Maximizing Uptime for Mission-Critical File Transfers: Availability and Scalability for Managed File Transfer

This whitepaper provides guidance on common high-availability and scale-out deployment architectures, and discusses the factors to consider for your specific business environment.

EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture

This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.

©1994-2014 Infoworld, Inc.