ComputerWeekly.com Research Library

Powered by Bitpipe.com

Vendor Selection Research

  • Building a Vendor (IT) Risk Management Program

    Sponsored by: BitSight

    Understand a vendor's security posture without requiring expensive site visits and penetration tests. Assess your vendors more frequently and focus efforts on those who have serious security issues.

  • How to Decide on Next-Gen Firewalls

    Sponsored by: Fortinet, Inc.

    Firewalls are must-have network security tools and a new generation of firewalls is emerging. This comprehensive guide examines next-generation firewalls, how to evaluate vendors and what to consider before making a purchase.

  • MobileIron Named a Leader in Enterprise Mobile Management Report

    Sponsored by: MobileIron

    Find out how the top 11 enterprise mobile management (EMM) vendors stack up against each other when compared against an expert 25-criteria evalutaion.

  • Will Your Company Make it Through the Big Data Gauntlet?

    Sponsored by: ComputerWeekly.com

    Lower cost and greater accessibility mean more companies can capitalize on the huge benefits of big data analytics software. Find out how you can join them by taking our quick survey, and downloading this free e-guide.

  • The Definitive VNA Checklist

    Sponsored by: Lexmark Healthcare

    Access this checklist to discover which essential attributes, qualifications, and functionality to take into consideration when selecting a VNA, including architecture elements, vendor characteristics, information lifecycle management, and more.

  • What You Need to Know About Vendor Risk Management in Financial Institutions

    Sponsored by: BitSight

    This white paper discusses several proactive tips for better vendor risk management (VRM) practices that you can quickly put into place. Learn to overcome challenges faced within the financial industry for taking on VRM and how you can adopt these security secrets and keep pace with today's growing threat landscape as advanced threats persist.

  • 40 Questions You Should Have in Your Vendor Security Assessment

    Sponsored by: BitSight

    In this white paper, you will learn how to get started with your VRM security program and by accessing the most important questions to ask third-party businesses.

  • Critical Capabilities for Security Information and Event Management (SIEM)

    Sponsored by: LogRhythm, Inc.

    Access this report for insight on aligning IT's needs with three key use cases to choose the best SIEM solution for the organization.

  • New Considerations for Application Integration

    Sponsored by: ComputerWeekly.com

    If you're currently undertaking an application integration project, it's important to know the current events surrounding it. Discover valuable information that may assist with a project in the works, or help you stay ahead of the curve with one that's just around the corner.

  • Buyer's Guide to HR Management Tools

    Sponsored by: ComputerWeekly.com

    When searching for HR management tools that fit your company's needs, several dynamics come into play that can test your knowledge of the software, vendors and your company. And it's not just about employee recruitment and retention. Access our complimentary, expert guide to help you prepare for the buying process.

  • Microsoft Skype for Business: A Look at the New Platform

    Sponsored by: ComputerWeekly.com

    Our new e-guide is an essential for networking pros who need to understand what Skype for Business offers and how best to anticipate areas of confusion, likely operational costs, and more.

  • Exclusive Guide: Hot Data Storage Technologies for 2016!

    Sponsored by: ComputerWeekly.com

    Participate in our research program around Primary Storage Optimization and get immediate access to our December 2015 issue of Storage Magazine. Discover a full range of storage topics, including a list of the hot storage technologies for 2016, expert advice on architecting storage for VDI, top tips for disaster preparedness, and more.

  • Earn your CISSP certification

    Sponsored by: ComputerWeekly.com

    Prepare to reap the benefits of CISSP certification with the help of our step-by-step guide to passing the exam. Just take a few minutes to complete this survey and receive direct access to our comprehensive e-guide.

  • Integrated Talent Management

    Sponsored by: ComputerWeekly.com

    This Independent analyst perspective into the integrated talent management systems market from Elearnity assesses the leading talent management suppliers.

  • Improve the success of HR systems implementation

    Sponsored by: ComputerWeekly.com

    Mark Martin, former HR executive at Direct Line Group and T-Mobile, lists the key questions you need to ask suppliers when selecting a HR Technology system.

  • SD-WAN Bill of Frights

    Sponsored by: Fatpipe, Inc.

    With SD-WAN being the hottest buzzword in networking right now and the many components of the technology, it can be easy to be lead into making the wrong decision. Have confidence that you are deciding on the best SD-WAN provider for your business by following theses 5 golden rules.

  • Third-Party Risk Management: Evaluating and Contracting with Vendors

    Sponsored by: BitSight

    This expert e-guide describes how to use standardized documentation for third-party risk assessment in order to minimize risk before deciding on a vendor. Access this resource now for advice on the security-related clauses that financial institutions need to include in their vendor contracts in order to comply with regulatory requirements.

  • What to Look for from an SDS Provider

    Sponsored by: IBM

    Take a look at this infographic for insight into what capabilities you should look for in an SDS vendor.

  • Magic Quadrant for Master Data Management of Product Data Solutions

    Sponsored by: TIBCO Software Inc.

    The master data management (MDM) of product data solutions market continues to grow and evolve. Increasingly, end-user organizations are using MDM to transform into a digital business.This Magic Quadrant evaluates 15 providers. Read on to find the right vendor for your needs.

  • Magic Quadrant for Master Data Management of Customer Data Solutions

    Sponsored by: TIBCO Software Inc.

    This Magic Quadrant helps information management leaders find the right integration vendor for their needs.

  • Magic Quadrant for Enterprise Mobility Management Suites

    Sponsored by: Maas360 by IBM

    The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices. This magic quadrant for enterprise mobility management suites can help you decide. Read on to learn more.

  • Accessing A Multi-Cloud Environment

    Sponsored by: CoreSite

    This expert e-guide will show you how to deal with migrating applications in the new cloud world. Also learn the four strengths to look for in a cloud management vendor and how to achieve open management in a multivendor environment.

  • IBM PureFlex/SmartCloud vs. the VCE Vblock Cloud

    Sponsored by: IBM

    Access this analyst report to learn why IBM's PureFlex represent a more compelling mainstream cloud alternative when compared with VCE's Vblock cloud offerings.

  • Understanding the Vendor Neutral Archive: How to Approach a VNA for Immediate and Longer-Term Benefit

    Sponsored by: BridgeHead Software

    This white paper explains the basics behind vendor neutral archives (VNAs). Click through to uncover the short- and long-term benefits, as well as get information of what to consider before making the investment.

  • Experts Reveal Best Practices for ERP Requirements Planning and More

    Sponsored by: Epicor Software Corporation

    This SearchManufacturingERP.com e-guide provides expert best practices to help you successfully approach ERP requirements planning, select the right ERP vendor, and get senior management on board with your project.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.