Business Segmentation White Papers

(View All Report Types)
Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Account-Based Marketing Will Fail Without Organizational Alignment
sponsored by TechTarget
WHITE PAPER: What makes Account-Based Marketing (ABM) an effective, yet difficult, strategy is its dependence on strong alignment and collaboration between Sales and Marketing, as well as other stakeholders. Download this e-book to learn what steps your company can take to establish organizational alignment for ABM.
Posted: 08 Feb 2021 | Published: 20 Jan 2020

TechTarget

Part 4: Establish Organizational Alignment
sponsored by TechTarget
WHITE PAPER: When sales and marketing talk about lead generation, tensions often arise. While disagreements are normal, there are important steps you can take to prevent them from undermining what you’ll need to continuously improve. Find out what those steps are – and how to successfully take them – in this expert e-book.
Posted: 08 Feb 2021 | Published: 12 Dec 2019

TechTarget

Moving From Leads to Buying Groups in One Easy Step
sponsored by TechTarget
WHITE PAPER: In B2B organizations, shifting the focus from individual leads in the demand process to buying groups and demand units represents a major change. Download this white paper to learn how to leverage the teleservices team as the first step in an incremental evolution from individual leads to buying groups.
Posted: 08 Feb 2021 | Published: 06 May 2020

TechTarget

SIEM Analyst Research Bundle
sponsored by AT&T Cybersecurity
WHITE PAPER: No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

AT&T Cybersecurity

Taking Managed Security Services To The Next Level
sponsored by OpenText Security Solutions
WHITE PAPER: This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
Posted: 18 Apr 2014 | Published: 31 Oct 2013

OpenText Security Solutions

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Meaningful Use Requires Choosing the Ideal Devices for Your Clinicians
sponsored by Connection
WHITE PAPER: This white paper outlines a clinical device assessment service that uses 3-step process to help you choose the right mobile device plan to support your EMR transition model.
Posted: 02 May 2014 | Published: 31 Dec 2013

Connection

Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM