IT-Analysis.com
IT-Analysis.com Logo
Business Issues Compliance
Business Issues Channels Enterprise Services SME Technology
Module Header
Louella FernandesLouella Fernandes
Louella Fernandes
22nd April - Internet of Things: A New Era for Smart Printing?
Simon HollowayThe Holloway Angle
Simon Holloway
18th April - Virgin Media expose private email addresses
Craig WentworthMWD Advisors
Craig Wentworth
17th April - Box's enterprise customers step forward to be counted
Craig WentworthMWD Advisors
Craig Wentworth
16th April - Egnyte the blue touchpaper...
Module Header
SITS14 - The Service Desk & IT Support Show
29th April - 30th April
London, United Kingdom
Ten Steps to Data Quality
8th May - 9th May
London, United Kingdom

View More Events

Introduction

These papers have been filed against the Business Issues -> Compliance domain. Would you like to view all papers we currently hold?


Papers in Business Issues -> Compliance

Published By: Bloor Research
Business Architecture is the glue that links the pieces together as a coherent whole. It is the approach by which you can step forward and deliver the navigation system for business, enabling your business to ask smart questions and get intelligent…
 
Published By: Bloor Research
Email is of vital importance as a communications and collaboration tool as it is one of the prime ways that business information is communicated and shared. This makes its storage and archiving a necessity for maintaining and improving productivity.
 
Published By: Quocirca
The need to ensure that employees remain within the bounds of policies dictating permitted expenses cannot be left to chance, or to expenses being dealt with after the point of transaction.
 
Published By: Bloor Research
For many companies, all their trading of goods or services is with other companies. This is referred to business to business, or B2B for short. This sort of transaction is typified by the transactions that take place between a manufacturer and...
 
Published By: Bloor Research
Enterprises seeking to simplify managing their IT infrastructure and make it as agile as possible have implemented server virtualisation, typically using VMware, and are increasingly adding storage virtualisation. Yet there are major technical...
 
Published By: Bloor Research
If you stop and take a look at all the objects that sit within an arms length of where you are sitting the chances are that a cell phone, in all its guises, is one of the first that you see. The reality is that the cell phone is the first piece...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
This paper represents a snapshot and brief summary of the log and (security) event management market. A more detailed discussion of this market, together with overviews of each product, a discussion of the issues involved and product...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...
 
Published By: Bloor Research
There are three major benefits to be derived from log and event management solutions (sometimes referred to as SIEM, security information and event management). In the first case, these solutions provide real-time identification and alerting...

Advertisement



Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761
Email: