|
| |
|
|
| Meetings Around the World : The Impact of Collaboration on Business Performance | | Based on research conducted by Frost & Sullivan, the white paper discusses impacts of collaboration on business performance. These impacts are based on a Collaboration Index, which measures how collaborative businesses are, and illuminates the relationship between collaboration and business performance. Is also explores the enterprise needs for joint work and how study respondents see collaboration meeting them. Finally, the paper outlines conclusions and implications about collaboration and how it can improve business performance. Free with registration, compliments of Microsoft. |
|
| Linking Best Practices to Success : Business Value of Integrated Communications Solutions | | This IDC white paper reveals research that supports a model designed to assist organizations in assessing how well they are maximizing the potential business value of integrated communications solutions. IDC Canada set out to measure the relationship between best practices and the business value derived from communications solutions implemented by Canadian organizations. Free with registration, compliments of Telus. |
|
| Risky Business: How to plan for the unexpected | | An interruption to the continuous operations of business can come at any time, take a range of forms, and have varying degrees of impact. This IDC white paper is the second of a three-part series which together explore good planning, future direction and options available to businesses in preparing their business resilience, IT security and disaster recovery plans. |
|
| Outsourcing Risk: The Managed Services Option | | The third of a three-part series of IDC whitepapers that examine the risk management challenges facing organizations today, the threats posed by inadequate IT security (people, process and technology), inadequate adherence to the various and growing list of regulations. It describes how organizations can mitigate the potential damage caused by these factors through outsourcing all or part of their IT security requirements to a Managed Security Service Provider. |
|
| |
| |
| "Dear Privacy Officer" - the Nightmare Letter | |
Organizations need to be prepared for the receipt of the 'nightmare access
letter' from an irate consumer who knows a little too much about privacy and information
technology. This white paper provides an overview of the principles relating to safeguarding and access and includes an example of an access letter, offered as a tool for C-level
executives on the forefront of dealing with privacy breach fallout.
|
|
| IT Risk Management Report (Trends through December 2006) | |
IT Risk is a growing component of total Operational Risk. IT Risk Management, which includes security, availability, performance and compliance elements, each with its own drivers and capacity for harm, is emerging as a separate practice.
This study examined IT Risk, along with the technology and process controls used to mitigate it, in a year-long study based on in-depth structured interviews with more than 500 IT professionals around the world.
Download this comprehensive report now.
|
|