IT End Users White Papers

(View All Report Types)
11 Questions Every CIO Should Ask Their IT Manager
sponsored by Red Hat and JBoss
WHITE PAPER: What is your IT really costing you? Could you be doing more with the technology you have? Could you reduce costs and provide better service to your organization? Read Red Hat's suggestions on "11 Questions Every CIO Should Ask Their IT Manager", and how Red Hat open source solutions can help.
Posted: 19 Jun 2009 | Published: 10 Jun 2009

Red Hat and JBoss

Ten Critical Success Factors for CRM: Lessons Learned from Successful Implementations
sponsored by Oracle Corporation
WHITE PAPER: Customer relationship management (CRM) deployments can be complex and difficult. This white paper provides a checklist of the ten critical success factors for organizations to follow to avoid common pitfalls as they design and deploy their CRM system.
Posted: 16 Jan 2007 | Published: 01 Aug 2006

Oracle Corporation

Small Business VoIP: The Basics
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small business VoIP combines voice and data together on a single, secure network allowing your employees to stay connected with the people and data they need. The following is a guide to why you might want to consider a small business VoIP system.
Posted: 25 Sep 2008 | Published: 25 Sep 2008

Cisco Systems, Inc.

Increase Productivity and Reduce Security Risks for Teleworkers
sponsored by SonicWALL
WHITE PAPER: This paper provides an overview of how teleworking helps meet today's productivity demands. It discusses additional network security risks that anywhere access can create, and how SonicWALL addresses these concerns while offering additional benefits.
Posted: 23 Jan 2008 | Published: 22 Jan 2008

SonicWALL

The Distributed Enterprise
sponsored by Raritan Inc.
WHITE PAPER: This paper addresses the added value (in terms of uptime and security) of out-of-band access and control tools for branch offices, and why out-of-band should be considered as a component of branch office networks.
Posted: 18 Jan 2008 | Published: 01 Jan 2007

Raritan Inc.

Mobile Virtualization and Remote Access on Windows Mobile Smartphones
sponsored by Celio Corp / REDFLY Mobile Companion
WHITE PAPER: Remote access and virtualization on the smartphone is a secure and efficient way to provide the mobile workforce access to robust applications and desktop features.
Posted: 30 Oct 2008 | Published: 29 Aug 2008

Celio Corp / REDFLY Mobile Companion

Distributed Capture Platforms: Reducing Costs, Removing Bottlenecks and Mitigating Risks
sponsored by EMC Corporation
WHITE PAPER: Remote workforces are a growing trend that has documentation implications on your business processes. This paper explores that, placing special emphasis on a distributed capture strategy for resolving remote workforce-related issues.
Posted: 21 Aug 2008 | Published: 15 Aug 2008

EMC Corporation

Top 10 end-user computing stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: IT has been looking at how desktop computing can enable employees to become more productive by using new forms of collaboration and enterprise social media platforms. Here are Computer Weekly's top 10 end-user computing stories of 2019.
Posted: 08 Feb 2021 | Published: 24 Dec 2019

TechTarget ComputerWeekly.com

How virtual desktops simplify end user computing during lockdown
sponsored by TechTarget ComputerWeekly.com
EGUIDE: While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.
Posted: 15 Mar 2021 | Published: 19 Feb 2021

TechTarget ComputerWeekly.com

Cisco ThousandEyes End User Monitoring: Third-party analysis
sponsored by Cisco ThousandEyes
FORRESTER TOTAL ECONOMIC IMPACT REPORT: This white paper examines the total economic impact of Cisco ThousandEyes End User Monitoring. Learn how ThousandEyes can help you secure remote access, improve productivity, and enhance IT efficiency. Read the full Forrester Total Economic Index to discover the benefits.
Posted: 08 Aug 2024 | Published: 08 Aug 2024

Cisco ThousandEyes

Sustainable End User Computing: Lower costs, protect the environment, gain a competitive edge
sponsored by Unicon GmbH
WHITE PAPER: Sustainable end-user computing is crucial for reducing costs, protecting the environment, and gaining a competitive edge. Learn how VDI, energy-efficient devices, and extended device lifecycles can drive sustainability in this white paper.
Posted: 27 Aug 2024 | Published: 28 Aug 2024

All resources sponsored by Unicon GmbH

Dell Technologies and Intel Video
sponsored by Dell Technologies and Intel
WEBCAST: Watch this webinar to uncover how Dell AI PCs powered by Intel® Core™ Ultra offer a boost in productivity leveraging modern technology, ensuring the latest collaboration, security, and AI features to safeguard data and enhance user experience.
Posted: 15 Nov 2024 | Premiered: Nov 15, 2024

Dell Technologies and Intel

Global Leader in Fintech and Financial Operations Takes Advantage of a Secure Hybrid Cloud Solution
sponsored by Service Express
CASE STUDY: Discover in this case study how Service Express’s Secure Hybrid Cloud allows Fintech customers to expand financial and payment solutions to their end users, and take financial IT to the next level.
Posted: 28 Feb 2023 | Published: 28 Feb 2023

TOPICS:  .NET
Service Express

Stranger Danger – Going Beyond Secure Remote Access with Zero Trust Network Access
sponsored by JAMF
PRESENTATION TRANSCRIPT: As the network perimeter expands, organizations must modernize security with Zero Trust Network Access (ZTNA) beyond VPNs. Learn how ZTNA can improve end-user satisfaction and security in this webinar presentation transcript.
Posted: 04 Sep 2024 | Published: 04 Sep 2024

JAMF

Focus: Telecoms of the future
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The telecoms sector in 2017 finds itself increasingly challenged as operators and end-users respond to multiple challenges, such as the emergence of software-based networks, the steady erosion of voice revenues, and the growth of 'free' communications services.
Posted: 08 Feb 2021 | Published: 11 Aug 2017

TechTarget ComputerWeekly.com

From challenge to opportunity
sponsored by ServiceNow
EBOOK: This guide serves to dive into some of the HR and tech challenges today’s organizations have successfully overcome. Read on to learn how a unified digital platform can provide a simple, single brand experience for internal end-users, as well as how it can join up and simplify user experiences across technology silos and teams—and more.
Posted: 02 Apr 2024 | Published: 02 Apr 2024

TOPICS:  .NET
ServiceNow

Harness The Power Of AI A Guide To Modernizing Your Workplace
sponsored by Dell Technologies and Intel
EBOOK: As the very definition of the workplace evolves, the impact of the endpoint on end-user productivity, IT management, and security is under more scrutiny than ever before. Alongside this trend is the adoption of AI, which is rapidly climbing the list of priorities—and challenges—that organizations have. Access this e-book to learn more.
Posted: 18 Nov 2024 | Published: 18 Nov 2024

Dell Technologies and Intel

Harness The Power Of AI A Guide To Modernizing Your Workplace
sponsored by Dell Technologies and Intel
EBOOK: As the very definition of the workplace evolves, the impact of the endpoint on end-user productivity, IT management, and security is under more scrutiny than ever before. Alongside this trend is the adoption of AI, which is rapidly climbing the list of priorities—and challenges—that organizations have. Access this e-book to learn more.
Posted: 18 Nov 2024 | Published: 18 Nov 2024

Dell Technologies and Intel

Inbox Incursions Are More Than An Annoyance They Are A Security Risk
sponsored by Checkpoint Software Technologies
WHITE PAPER: An inbox incursion occurs when phishing emails are available to the end user for any length of time, forcing the vendor to remediate them post-delivery. Download this white paper for a deeper look at inbox incursion and the role it plays in the broader topic of email security.
Posted: 09 May 2024 | Published: 09 May 2024

TOPICS:  .NET
Checkpoint Software Technologies

Bitdefender Penetration Testing Services
sponsored by Bitdefender
WHITE PAPER: Many organizations that invested in web and mobile applications over the past few years were uneducated in the potential threats and failed to protect their end users from encountering availability and performance issues. Download this white paper to learn how it works and explore the different types of penetration testing.
Posted: 10 Feb 2024 | Published: 10 Feb 2024

TOPICS:  .NET
Bitdefender

Towards software-defined and cloud-native networking
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As networking equipment rapidly evolves to being software-defined and cloud-native, there is pronounced interest in products and services to accelerate service delivery, improve end-user experiences, and reduce infrastructure and operational costs in service delivery applications. Read more in this e-guide.
Posted: 08 Feb 2021 | Published: 17 Dec 2019

TechTarget ComputerWeekly.com

Voice of the Customer for Identity Governance and Administration
sponsored by Saviynt
GARTNER RESEARCH REPORT: Looking to make an informed decision on your next technology provider? Gartner Peer Insights Voice of the Customer delivers a comprehensive collection of reviews from end-users around the world. Based on feedback from first-hand experience, submitted scores sort providers among four Quadrants.
Posted: 19 Mar 2024 | Published: 19 Mar 2024

TOPICS:  .NET
Saviynt

Skills of a Modern IT Help Desk Technician
sponsored by Atlassian
EGUIDE: The modernization of end-user technology, combined with today’s more tech-savvy employee, means IT help desks are fielding more complex service requests than ever before. Download this custom TechTarget e-Guide to discover the requirements of the modern help desk and how you can equip your employees for success.
Posted: 25 Oct 2023 | Published: 23 Oct 2023

TOPICS:  .NET
Atlassian

How to get the best value from Office 365
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we outline the key differences between the three enterprise subscription packages offered by Office 365: E1, E3 and E5. By understanding the pros and cons of each tier as well as the needs of the end users, an IT department can ensure it purchases Office 365 in an effective manner.
Posted: 08 Feb 2021 | Published: 03 Dec 2018

TechTarget ComputerWeekly.com

Samsung SDS Zero Touch Mobility for ServiceNow
sponsored by ServiceNow and Samsung
PRODUCT OVERVIEW: Streamline your mobile device management with Zero Touch Mobility for ServiceNow. This solution provides hyperautomated workflows for end-to-end lifecycle management, from procurement to support and replacement. Reduce TCO, eliminate IT involvement, and enhance user productivity. Read the full brochure to learn more.
Posted: 16 Oct 2024 | Published: 16 Oct 2024

ServiceNow and Samsung

Top 10 datacentre stories of 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE: There is nothing like a datacentre outage to highlight just how reliant the digital economy is on these facilities, with the 2018 news cycle dominated by tales of server rooms going awry and causing mass disruption to end users across the globe. Here's a look back over Computer Weekly's top 10 datacentre stories of 2018.
Posted: 08 Feb 2021 | Published: 09 Jan 2019

TechTarget ComputerWeekly.com

Case Study Success Story: Wipro Limited
sponsored by GoTo
CASE STUDY: Wipro, a leading global information technology company, was trying to identify solutions that could help automate their global end user support service desk in order to improve their current employee experience. Explore how the integration of LogMeIn Rescue and Rescue Lens helped automate their service desk in this case study.
Posted: 21 Feb 2024 | Published: 21 Feb 2024

TOPICS:  .NET
GoTo

2024 Generative AI Survey EMEA
sponsored by TechTarget ComputerWeekly.com
LANDING PAGE: Business stakeholders, IT professionals, data scientists, and end users continue to weigh the benefits, use cases, and best practices of generative AI (GenAI) against concerns with AI ethics and hallucinations. TechTarget's Enterprise Strategy Group aims to cut through this distracting noise, in our just-launched 2024 Generative AI Pulse Study.
Posted: 16 May 2024 | Published: 17 May 2024

TechTarget ComputerWeekly.com

2024 Generative AI Survey APAC
sponsored by TechTarget ComputerWeekly.com
LANDING PAGE: Business stakeholders, IT professionals, data scientists, and end users continue to weigh the benefits, use cases, and best practices of generative AI (GenAI) against concerns with AI ethics and hallucinations. TechTarget's Enterprise Strategy Group aims to cut through this distracting noise, in our just-launched 2024 Generative AI Pulse Study.
Posted: 16 May 2024 | Published: 17 May 2024

TechTarget ComputerWeekly.com

VMworld Europe 2016: What to expect
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: VMworld Europe 2016 hits Barcelona in October, with VMware expected to announce new and refreshed products and services in support of its end-user computing and cloud strategy. In this e-guide, you'll find case studies featuring last year's winners, along with articles covering the technologies VMware looks set to champion at this year's event.
Posted: 08 Feb 2021 | Published: 08 Sep 2016

TechTarget ComputerWeekly.com

IT Organizations in a Quandary Over Visibility into Cloud Traffic
sponsored by Gigamon
RESEARCH CONTENT: Today, the push for the finalized IETF Transport Layer Security (TLS) 1.3 standard for network encryption continues to affect organization’s decisions. This white paper presents the key findings from a recent study conducted to investigate perceptions and beliefs of end users surrounding the adoption of the TLS 1.3 standard. Read on to learn more.
Posted: 29 Feb 2024 | Published: 29 Feb 2024

TOPICS:  .NET
Gigamon

Keeper Remote Browser Isolation Securely isolate web browsing activities from end-user devices, mitigating cybersecurity threats by hosting browsing sessions in a controlled remote environment
sponsored by Keeper Security Inc
PRODUCT OVERVIEW: Keeper's Remote Browser Isolation mitigates cybersecurity threats by hosting browsing sessions in a controlled remote environment, without a VPN. Secure access, zero-knowledge security, and comprehensive auditing make compliance a breeze. Read the full data sheet to learn more.
Posted: 06 Sep 2024 | Published: 06 Sep 2024

Keeper Security Inc