> White Papers > Technology > Enterprise Applications
 

Enterprise Applications

Enterprise Application software performs business functions such as accounting, production scheduling, customer information tracking, bank account maintenance, and the like. It is almost always hosted on servers, and is used by multiple employees of the same organization. Major subcategories include ERP, CRM, and SCM.
Results 1 - 25 of 5533Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Nov 04, 2014
n this Gigaom Research Webinar, we will examine the schism between the automated enterprise and the manual operations that support it, assess the tools and processes available to bring the back office up to speed, and present a roadmap to bring business agility and consistency to your operations.
Tags : adobe, communications, business automation, business communications, operations
     Adobe
By: Polycom     Published Date: Oct 31, 2014
Description: Learn how the Polycom® CX8000 and Polycom® CX5100, the 360-degree panoramic room view camera with HD active speaker tracking for Lync 2013, are designed to extend the familiar desktop Lync collaboration experience into the conference room making meetings more effective and engaging. Topics covered were: How to tell if your company is ready for a Microsoft Lync Room System, what Polycom’s new Microsoft Lync Room System solution adds to a Lync deployment and how Polycom’s CX8000 and CX5100 are different than other Microsoft Lync Room Systems.
Tags : best practices, network, services, topics, architects
     Polycom
By: Polycom     Published Date: Oct 31, 2014
Description: Lync expert and blogger Jeff Schertz presented about deploying video for Microsoft Lync and preparing for a Lync Room System. You have questions and Jeff Schertz has the answers when it comes to anything Lync, including video implementation. Jeff led a technical discussion on how to deploy video for Lync and what you need for the Microsoft Lync Room System.
Tags : best practices, network, services, topics, architects
     Polycom
By: Polycom     Published Date: Oct 31, 2014
Description: Microsoft Solution Architects discuss the top considerations when adding Microsoft Lync video to your network. You have Microsoft Lync for IM and Presence. Maybe you also use Lync for Enterprise Voice. Video is a logical next step. This webinar will cover how to prepare your network and your organization for Lync video. Topics covered were: What to consider when deploying video, learn about real customer successes and missteps with Lync video deployment and services available to assist with the readiness of your network.
Tags : best practices, network, services, topics, architects
     Polycom
By: Kaspersky Lab     Published Date: Oct 30, 2014
The importance of IT security to a business has never been greater. But often, investments are shelved or cutbacks are made. This can result in businesses unknowingly making compromises regarding their IT security. In this latest whitepaper from Kaspersky Lab, you’ll find useful facts, examples and business case arguments to help you get buy-in and commitment from your business.
Tags : it security, it security investments, cyber threats, malware detection, security
     Kaspersky Lab
By: IBM     Published Date: Oct 30, 2014
Filled with exotic terms like “Hadoop” and “Data Scientist”, Big Data, business intelligence and analytics have always been the domain of the biggest enterprises with huge teams to devote to analyzing data. But thanks to the latest technology advances businesses of almost any size can utilize tools to help inform every part of business decision-making. This SlashGuide looks at a recent Slashdot Pulse research study on BI/BA and discusses what’s really important when it comes to Big Data – and what businesses can do now to capitalize on the trend.
Tags : business analytics, big data, bi/ba, it management, knowledge management
     IBM
By: Kaspersky Lab     Published Date: Oct 30, 2014
With corporate IT becoming increasingly complex, how can IT management boost efficiency… while improving corporate security?
Tags : corporate it, corporate security, simplifying secuirty, systems management solutions, it management
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Oct 30, 2014
Kaspersky Lab experts are releasing new research designed to assist you in your cyber security business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security.
Tags : it risk, risk report, it security, cyber attacks, security
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Oct 30, 2014
Humorist Franklin P. Jones may have said it best: “When you get something for nothing, you just haven't been billed for it yet.” These are wise words of warning for businesses counting on so-called “free” IT security software.
Tags : it security software, business infrastructure protection, security, it management, knowledge management
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Oct 30, 2014
Hardly a day goes by without the discovery of a new cyber threat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?
Tags : cyber threat, cyber defenses, security intelligence, malware discovery, security
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Oct 30, 2014
You’re aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations.
Tags : malware threats, cyberespionage, security technologies, security, it management
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Oct 30, 2014
Virtualization promises to boost efficiency and cut costs, making it an important element in your IT department’s efforts to do more with less. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk.
Tags : virtualization, cyberthreats, security software, security solutions, security
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Oct 30, 2014
You want to maximize the potential offered by new technologies and establish an advantage over your competitors. But you know the latest IT developments can also bring new security challenges.
Tags : it security, security technologies, it developments, security, it management
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Oct 30, 2014
In recent years, threat actors have become increasingly focused on targeting corporations to obtain sensitive information for financial profit or economic espionage. Regardless of the adversaries’ motives, corporations understand the need to implement defensive measures to secure their infrastructure and sensitive data while mitigating the risk of future attacks.
Tags : financial profit, economic espionage, it security, risk mitigation, security
     Kaspersky Lab
By: Kaspersky Lab     Published Date: Oct 30, 2014
Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted to IT security, established businesses like yours are vulnerable to a wider array of attacks. To keep your organization safe, it's imperative to stay at least a few steps ahead of the bad guys. Do you know where the threats are coming from?
Tags : it security, cyber threats, threat detection, security, it management
     Kaspersky Lab
By: MaaS360 by Fiberlink     Published Date: Oct 27, 2014
Find the best EMM solution for your needs. Evaluate vendors based on customer satisfaction, ease of use and more. Learn about the BYOD and EMM landscape from top industry analysts in this in-depth research report.
Tags : maas360, fiberlink, ibm, emm solution, emm
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Oct 27, 2014
Mobile productivity is a must. Be sure you’ve addressed key mobile security considerations--read The Forrester Wave: Enterprise Mobile Management, Q3 2014.
Tags : maas360, fiberlink, ibm, enterprise mobile management, enterprise mobile
     MaaS360 by Fiberlink
By: Aruba Networks     Published Date: Oct 27, 2014
A quick look at why authentication, authorization and accounting – or AAA and RA DIUS – were developed can easily take you back more than a decade.
Tags : policy management, authorization, aaa, ra dius, it management
     Aruba Networks
By: Aruba Networks     Published Date: Oct 27, 2014
Secure enterprise mobility for #GenMobile isn’t difficult, but it does require some critical thinking about policies and enforcement. A flexible and comprehensive access management platform ensures that security and compliance requirements are met without sacrificing the user experience or over-burdening IT.
Tags : enterprise mobility, critical thinking, policies and enforcement, access management platform, compliance requirements
     Aruba Networks
By: ForgeRock     Published Date: Oct 24, 2014
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and repeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : revenue generator, digital growth, identity management, customer-focused, it management
     ForgeRock
By: Red Hat     Published Date: Oct 23, 2014
The business case for standardizing on Red Hat infrastructure solutions Read this IDC whitepaper to discover the quantifiable business benefits that standardizing on Red Hat® infrastructure has delivered organizations like yours. You'll learn how customers using Red Hat Enterprise Linux® and Red Hat's system management product, Red Hat Satellite: • Quickly recover up-front subscription costs. • Experience higher ratios of servers and users per administrator. • Significantly reduce annual downtime.
Tags : quantifiable benefits, infrastructure, management product, higher ratios, reduce annual downtime
     Red Hat
By: BMC Software     Published Date: Oct 23, 2014
In a first-of-its-kind study, IDC has docu­mented the costs of business risks cre­ated when business and IT teams fail to communicate effectively. Hear how enterprises are addressing the friction associated with IT needs and the gaps and opportunities that exist between business needs and IT service delivery models.
Tags : costs and risks, communication, enterprises, it service delivery models, it management
     BMC Software
By: BMC Software     Published Date: Oct 23, 2014
Gartner clients often ask for a comparison of BMC and ServiceNow as viable strategic partners in the ITSSM tool space. Both vendors provide strong ITSSM offerings and benefit from excellent global brand recognition, but the similarities end there. Outside of ITSSM, BMC and ServiceNow are two different companies with two different strategic road maps. Choosing between BMC and ServiceNow requires IT organizations to determine how value will be gained beyond the use of their ITSSM offerings.
Tags : itssm, strategic partners, it organizations, itsm integration, saas
     BMC Software
By: IBM     Published Date: Oct 22, 2014
Download this white paper from MWD Advisors and get an inside look at what you’ll need to (1) Empower your most valuable knowledge workers; (2) Provide exceptional customer experiences; and (3) Thrive in an increasingly competitive environment
Tags : customer service, case management, advanced analytics, it management, knowledge management
     IBM
By: IBM     Published Date: Oct 22, 2014
A case study on how a major oil and gas producer saves 35 percent on data storage costs and 30 percent in litigation-related costs by adopting a smarter data discovery and defensible disposal strategy, using IBM Enterprise Content Management solutions.
Tags : legacy data, data storage costs, data storage, content management, it management
     IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Application Integration, Application Performance Management, Best Practices, Business Activity Monitoring, Business Analytics, Business Integration, Business Intelligence, Business Management, Business Metrics, Business Process Automation, Business Process Management, Call Center Management, Call Center Software, Change Management, Corporate Governance, Customer Interaction Service, Customer Relationship Management, Customer Satisfaction, Customer Service, eBusiness, Enterprise Resource Planning, Enterprise Software, eProcurement, Extranets, Groupware Workflow, HIPAA Compliance, Incentive Compensation, International Computing, IP Faxing, IT Spending, Manufacturing Execution Systems, Marketing Automation, Performance Testing, Product Lifecycle Management, Project Management, Return On Investment, Risk Management, Sales & Marketing Software, Sales Automation, Server Virtualization, Simulation Software, Spend Management, Supply Chain Management, System Management Software, Total Cost of Ownership, Video Conferencing, Voice Over IP, Voice Recognition, Workforce Management

Search White Papers      

Related Topics

Application Integration
712 Documents
Application Performance Management
700 Documents
Best Practices
946 Documents
Business Activity Monitoring
459 Documents
Business Analytics
571 Documents
Business Integration
405 Documents
Business Intelligence
833 Documents
Business Management
814 Documents
Business Metrics
250 Documents
Business Process Automation
427 Documents
Business Process Management
528 Documents
Call Center Management
164 Documents
Call Center Software
133 Documents
Change Management
204 Documents
Corporate Governance
110 Documents
Customer Interaction Service
407 Documents
Customer Relationship Management
603 Documents
Customer Satisfaction
488 Documents
Customer Service
499 Documents
Data Management
1599 Documents
eBusiness
213 Documents
Enterprise Resource Planning
450 Documents
Enterprise Software
507 Documents
eProcurement
61 Documents
Extranets
26 Documents
Groupware Workflow
55 Documents
HIPAA Compliance
110 Documents
Incentive Compensation
35 Documents
International Computing
109 Documents
IP Faxing
47 Documents
IT Management
1818 Documents
IT Spending
255 Documents
Manufacturing Execution Systems
68 Documents
Marketing Automation
148 Documents
Networking
819 Documents
Performance Testing
100 Documents
Platforms
177 Documents
Product Lifecycle Management
189 Documents
Project Management
248 Documents
Return On Investment
442 Documents
Risk Management
300 Documents
Sales & Marketing Software
183 Documents
Sales Automation
122 Documents
Server Virtualization
472 Documents
Simulation Software
46 Documents
Spend Management
162 Documents
Supply Chain Management
147 Documents
System Management Software
155 Documents
Total Cost of Ownership
249 Documents
Video Conferencing
206 Documents
Voice Over IP
236 Documents
Voice Recognition
74 Documents
Workforce Management
174 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.