Collaboration

Using the latest vendor white papers, learn how to use unified comms, social business and project management to get more accomplished.

  • White Papers // Mar 2015

    The Art and Science of Delighting Customers - A Google for Work Collection

    Cloud-based tools are helping organizations with both strategic business challenges and daily operations. They spur growth, innovate culture, engage the workforce and help put customers at the forefront of all business decisions. In this Google for Work Collection, we’ll share how technology is driving leadership, and how innovative companies are...

    Provided By Google, Inc.

  • White Papers // Mar 2015

    IBM QRadar Perception Capture Study

    Ponemon Institute conducted 1:1 confidential interviews with 25 IT security practitioners from U.S. companies for this independent study of QRadar SIEM users. Figures presented include total costs to acquire, deploy and run QRadar. Read More..

    Provided By IBM

  • White Papers // Mar 2015

    IBM X-Force Threat Intelligence Quarterly - Q4 2014

    Who can you trust? Learn from the IBM X-Force team in this new quarterly report how the Internet of Things and IP reputation tracking are transforming the security landscape. Read More..

    Provided By IBM

  • White Papers // Mar 2015

    Protect people, processes and technology from web application threats.

    Incidents of web application security breaches that result in data theft are growing in frequency and severity, making it critical for organizations to take immediate steps to examine the security measures they have in place, assess vulnerabilities and act to protect the business. Read More..

    Provided By IBM

  • White Papers // Mar 2015

    IDC MarketScape Expert Worldwide Federated Identity Management and Single Sign On 2014 Vendor Assessment

    In any organization, it’s more important than ever to verify people are connected to IT resources with the appropriate credentials and level of assurance. Read More..

    Provided By IBM

  • White Papers // Mar 2015

    IBM Cyber Security Intelligence Index Report

    This report is based on cyber security event data that IBM Managed Security Services collected between April 2012 and March 2013 in the course of monitoring client security devices and data derived from responding to and performing forensics on cyber security incidents. Read More..

    Provided By IBM

  • White Papers // Feb 2015

    Splunk Boosts Day-to-Day Operational Intelligence, Secures its IP with Box

    Known for extracting meaning and 'operational intelligence' out of mountains of customer machine data, San Francisco-based Splunk knew it had a challenge. The big data software company needed a better and more secure way to track its intellectual property (IP). Previously, Splunk's documents were stored in several consumer cloud services....

    Provided By Box

  • White Papers // Feb 2015

    Data Protection : Quality Plus Fast ROI

    Too many organizations today struggle with backup and recovery solutions that not only fail in their primary mission of reducing the risk of data loss but also cost far too much. Find out how Dell Data Protection from Dell Software can help deliver a sound return on investment, while dramatically...

    Provided By Dell Software

  • White Papers // Feb 2015

    Revolutionizing the Future Workplace

    A variety of technological, demographic and cultural forces are converging at this unique moment in history and stand poised to revolutionize the workplace of the future. Customers are demanding the ability to access the marketplace from anywhere, anytime and on any device; newer employees now expect the flexibility to collaborate...

    Provided By Polycom, Inc.

  • White Papers // Feb 2015

    6 Ways IT Will Move From the Back Office to the Boardroom

    In today’s world, IT is no longer confined to just tech support. IT is becoming business critical across all departments. From HR to marketing, finance to sales, IT solutions and infrastructure allow all employees to be successful in their role, as well as improving business processes and efficiency. Download...

    Provided By Polycom, Inc.

  • White Papers // Feb 2015

    Six Steps to Creating a Highly Collaborative Video Culture

    Polycom and Quocirca surveyed over 800 business video conferencing users around the world on the state of video adoption. The global findings have identified the top six key things to consider when creating a highly collaborative video culture. And it is not just about reducing travel!Download this infographic to discover...

    Provided By Polycom, Inc.

  • Webcasts // Feb 2015

    On-demand Webcast: How to Succeed Under Pressure for High-Performance - Sales Succeeding Under Pressure

    Selling is not easy, especially under pressure. Pressure changes how the brain functions; it diminishes our ability to think, make decisions and connect with others. That’s why the ability to manage pressure is one of the things that sets high-performing sales people and sales leaders apart. And it’s one of...

    Provided By Citrix Online

  • White Papers // Feb 2015

    A*STAR - The Agency for Science, Technology and Research

    A*Star had high levels of user discontent and not enough computational resources for the population of users or the number of research projects. Platform LSF acted as the single unifying workload scheduler and helped rapidly increase resource utilization.

    Provided By IBM

  • White Papers // Feb 2015

    When Millions Need Access: Identity MGMT in an Interconnected World

    For organizations opening their systems to large numbers of internal and external users, IBM solutions meet the scalable identity management, security and compliance needs of both the business and its end users with control over permissions and other user access functions.

    Provided By IBM

  • White Papers // Feb 2015

    Financial Malware Explained

    Cybercriminals rely upon increasingly sophisticated techniques to steal the credentials of online banking customers, and then reuse them to take over the victim’s account and perform fraudulent transactions such as transferring money to new destinations. IBM Security Trusteer solutions offer multiple layers of protection across devices and the fraud lifecycle....

    Provided By IBM

  • White Papers // Feb 2015

    2013 IBM Chief Information Security Officer Assessment

    Building on the 2012 Finding a Strategic Voice IBM study, CAI interviewed 41 executives with information security responsibilities to identify behavior and practices that could strengthen the role and influence of security leaders.

    Provided By IBM

  • White Papers // Feb 2015

    IBM Security Services Cyber Security Intelligence Index Report

    This report is based on cyber security event data that IBM Managed Security Services collected between April 2012 and March 2013 in the course of monitoring client security devices and data derived from responding to and performing forensics on cyber security incidents.

    Provided By IBM

  • Videos // Feb 2015

    Prevent Insider Threats with IBM Security Privileged Identity Manager (PIM)

    See how IBM Security Privileged Identity Manager's Privileged Session Recorder option helps detect and block insider threats by recording and storing every action made in a privileged user's session.

    Provided By IBM

  • White Papers // Feb 2015

    IBM Security Identity Governance

    IBM Security Identity Governance is designed to help organizations effectively manage identities and application access by bridging the gaps across compliance, business and IT infrastructure operations. As a result, organizations can help reduce the risk of fraud, conflicts of duties and human error in business processes.

    Provided By IBM

  • White Papers // Feb 2015

    Technical Overview: Cloudant Spatial

    Cloudant Geospatial is a fully managed cloud service that helps deliver advanced geospatial with built-in high availability, global data distribution, and horizontal scaling capabilities. Read More..

    Provided By IBM

  • White Papers // Feb 2015

    Technical Overview: Anatomy of the Cloudant DBaaS

    Deciding which data management platform will provide the best performance takes a lot of research and planning. A Database as a Service (DBaaS) solution like Cloudant helps accelerate the process. Read More..

    Provided By IBM

  • White Papers // Feb 2015

    Choose the Most Secure Object Storage for Your Hybrid Cloud

    Data mobility is changing the way that businesses work. Organizations, lines of business, and even individual users can run applications, store data cheaply, and access content from anywhere. This puts IT in a tough position. What they need is a new approach for storing and accessing data: one where the...

    Provided By Hitachi Data Systems

  • White Papers // Feb 2015

    Data Mobility and Control Can a CIO have Both?

    Whether they are travelling across town or across the globe, today’s tech-savvy employees increase their productivity and connectedness with numerous personal devices. The potential for collaboration through these devices is so great that employees often solve their file sharing needs through publicly available cloud storage services. This is a practice...

    Provided By Hitachi Data Systems

  • White Papers // Feb 2015

    Information Governance Confidence Calculator: English

    Confidence in information is vital for business users who make impactful decisions based on analytical insights. While easy to define, confidence has proven difficult to measure and visualize. To address this need, Aberdeen Group has developed the Information Confidence Calculator (ICC).

    Provided By IBM

  • White Papers // Feb 2015

    Information Governance Confidence Calculator: Measuring Trust in Big Data

    This Aberdeen research report details the research and methodology of the Information Confidence Calculator (ICC). The ICC is a tool to score and visualize trust in customer data used for various types of decisions. This report introduces the ICC and offers guidance on how to use the tool and your...

    Provided By IBM

  • White Papers // Feb 2015

    Information Governance Best Practices: Adopt a Use Case Approach

    When should you implement integration governance? According to this Gartner research note, you should start now if you are an IT professional considering an initiative like master data management (MDM), e-discovery, information archiving or cloud migration should start implementing information governance now.

    Provided By IBM

  • White Papers // Jan 2015

    Enabling the Modern Business through IT

    CIOs today are asked to drive transformational change, get the most out of your current IT investments with even higher performance, and be the strategic advisor to your business partners. What if you could transform your company’s future by increasing the flexibility and agility of your IT infrastructure to support...

    Provided By NetSuite

  • Webcasts // Jan 2015

    On-Demand Webcast: Leading Innovation: How to Jumpstart Your Organization's Growth Engine

    Productivity is no longer enough. Today, growth means pushing strategic innovation initiatives across the enterprise – to everyone, everywhere, every day. Join Jeff DeGraff, professor of management and organizations at the University of Michigan’s Ross School of Business, as he presents a simple approach for leaders to recognize, develop...

    Provided By Citrix Online

  • White Papers // Jan 2015

    Four Key Trends Impacting Mobile Infrastructure - Review

    As mobile technology evolves, it’s bringing rapid change to enterprises everywhere, so it’s essential to know the latest trends and how to build on them to create real business benefits. IDC believes third-party mobility service providers will play a key role in helping you do just that. Read the analyst...

    Provided By IBM

  • White Papers // Jan 2015

    Gartner Report: Magic Quadrant for Managed Mobility Services

    Of the 14 top managed mobility services providers Gartner examined and reviewed by both completeness of vision and ability to execute, only IBM was positioned in the Leaders Quadrant in their latest Magic Quadrant report. Read the analyst report to learn more. We continue to address the growing needs of...

    Provided By IBM

  • White Papers // Jan 2015

    Gartner Magic Quadrant for Managed Mobility Services 2014

    Of the 14 top managed mobility services providers Gartner examined and reviewed by both completeness of vision and ability to execute, only IBM was positioned in the Leaders Quadrant in their latest Magic Quadrant report. Read the analyst report to learn more. We continue to address the growing needs of...

    Provided By IBM

  • White Papers // Jan 2015

    Four Key Trends Impacting Mobile Infrastructure Strategy

    As mobile technology evolves, it’s bringing rapid change to enterprises everywhere, so it’s essential to know the latest trends and how to build on them to create real business benefits. IDC believes third-party mobility service providers will play a key role in helping you do just that. Read the analyst...

    Provided By IBM

  • Podcasts // Dec 2014

    Webinar: How Zerox Leverages User Activity Monitoring

    Learn how Xerox has taken a new approach to improve information security by leveraging user activity monitoring. Join Arvo Bowen for a live webcast on January 21 at 11am EST. See how Xerox identifies user-based risks before they become a security incident.

    Provided By ObserveIT

  • Webcasts // Dec 2014

    On-Demand Webcast: Social Media Customer Service: How to Deal with It. How to Take Advantage of It.

    Once upon a time, a happy customer would tell six of his friends about your company. And an unhappy customer would tell eight, maybe 12 of his friends about your company. Then, along came social media. With the click of a button, complimentary shout-outs and scathing complaints alike could reach...

    Provided By Citrix Online

  • Research // Dec 2014

    Conferencing Loud & Clear

    We spend hours in phone conferences with colleagues, clients, and customers every day, but poor sound quality can turn a productive collaboration into a time-wasting drag. Next-generation conference phones deliver whole-room coverage and crystal-clear audio that keeps participants engaged. Have you ever dialed into a conference call, only to...

    Provided By VTech

  • White Papers // Dec 2014

    IBM System Z in a mobile World

    Becoming a mobile enterprise is about re-imagining your business around constantly connected customers and employees. The speed of mobile adoption dictates transformational innovation rather than incremental innovation. Mobile really is a disruptive innovation. Read More..

    Provided By IBM

  • eBooks // Dec 2014

    eBook: Connected Employees. Unstoppable Productivity

    Your customers are embracing mobility like never before. More than ever, they need tools to help users collaborate effectively anytime, anywhere—in a way that doesn’t burden IT. Introducing HP Flex-Bundles for Unified Communication and Collaboration with Microsoft® Lync®, the all-in-one package that helps your customers enable better teamwork, boosting productivity...

    Provided By Hewlett-Packard & Intel®

  • White Papers // Dec 2014

    University Cuts $1 Million in Annual Travel Costs

    At the University of Notre Dame, faculty and staff use Cisco WebEx™ products to collaborate with colleagues, to communicate with overseas students, and to reduce travel costs. Notre Dame administrators cite WebEx’s cross-platform support and ease of use as the primary reasons it’s become so popular among instructors and students....

    Provided By Cisco Systems

  • eBooks // Dec 2014

    Connected Employees. Unstoppable Productivity.

    Your customers are embracing mobility like never before. More than ever, they need tools to help users collaborate effectively anytime, anywhere—in a way that doesn’t burden IT. Introducing HP Flex-Bundles for Unified Communication and Collaboration with Microsoft® Lync®, the all-in-one package that helps your customers enable better teamwork, boosting productivity...

    Provided By Hewlett-Packard & Intel®

  • White Papers // Dec 2014

    IDC Report: The Business Value of IBM zEnterprise System Deployments

    On a Smarter Planet, information-centric processes are exploding in growth. In order to excel in today’s competitive environment, businesses need to support these processes, and efficiently manage the massive volumes of data they drive, with minimal risk. The mainframe has always been the IT industry's leading platform for transaction processing,...

    Provided By IBM