- Agility25
- AI10
- Analytics13
- API11
- APM1
- Applications362
- AppSec1
- Artificial intelligence38
- Auto financing3
- Auto lending challenges1
- Automation38
- BIg Data6
- Blockchain2
- Business276
- BYOD7
- Cloud492
- Compliance1
- Covid-194
- Customer Experience22
- Data141
- Data Protection50
- Datacenters198
- Datacentre13
- Development1
- Digital42
- Digital Transformation251
- GDPR8
- Healthcare1
- Hybrid Application3
- Hybrid Cloud2
- Hybrid IT16
- Hyperconvergence18
- Innovation3
- Investment2
- IOT31
- IT Infrastructure60
- IT Services23
- IT Transformation53
- Job10
- Management387
- Marketing220
- Mobility166
- Networking3
- Networks332
- Online conference13
- Productivity40
- Ransomware12
- Risk Managment9
- SAP4
- SAP1
- Security463
- Servers2
- Software105
- Solutions22
- Storage34
- Strategy38
- Sustainability1
- Tech91
- Unified Communications3
- Virtualisation22
- Workspace117
- Zero Trust2
- 4ALLPORTAL2
- Absolute Software5
- Access It Automation5
- Adobe6
- ADP28
- Aerohive6
- Akamai6
- Alcatel-Lucent Enterprise13
- Alert Logic3
- Alteryx16
- Amazon Business5
- AMD4
- Amplience6
- APC16
- APC by Schneider Electric Papers2
- Appsense9
- Arbor Networks4
- Arctic Wolf5
- Arkadin3
- Arkeia1
- Arkoon4
- Arrow ECS2
- Aruba Cloud1
- Aruba HPE11
- Aruba Networks14
- Aspera8
- AtTask4
- AuthO2
- Avaya5
- Avenga1
- AvePoint3
- Avocent13
- AWS24
- Axis1
- baramundi17
- BEA Systems, Inc.10
- Binary Tree9
- Black Duck Software6
- Bluekiwi1
- BMC6
- British Gas UK3
- BT3
- CA45
- CapeFoxx1
- Capgemini10
- Centrica Business Solution7
- channeladvisor3
- checkout.com1
- Cisco26
- Cisco Intel9
- Citrix50
- Citrix-Microsoft2
- ClickSoftware1
- CloudBlue2
- Cloudera6
- Cognizant3
- Commvault15
- Computer Associates9
- Condusiv Technologies4
- Conga3
- Contentserv1
- Courion3
- CybelAngel4
- Damovo3
- Dataiku1
- Dell - AMD1
- Dell - Intel vPro4
- Dell - Intel Xeon4
- Dell /vmware18
- Dell and Intel Enterprise Resource Centre8
- DELL EMC - MICROSOFT2
- Dell EMC Microsoft 101
- Dell Kace1
- Dell RadeonPro1
- Dell Technologies3
- Dell Technologies - Intel3
- Dell_Intel_built-in3
- Dell_intel-corei71
- Dell-Intel20
- Dell-tech_intel-vPro2
- dell/nutanix8
- DellEmc - Intel22
- DellEMC-XEON-Microsoft4
- Denodo3
- Diligent4
- Diskeeper Corporation Europe1
- Double-take software / Vision Solutions4
- Dropbox8
- Druva5
- Easyvista1
- Eaton Electric1
- Elastic2
- Elastic & Microsoft1
- Electric Cloud1
- EMC14
- Ephesoft1
- Epson1
- Equinix13
- Esker7
- eVault5
- eWEEK Europe4
- Experian3
- F51
- F5 Networks43
- FICO3
- Flexera4
- Forcepoint20
- Forgerock10
- Fortinet22
- Fortinet & Capgemini2
- Frontrange5
- Gemalto1
- Genesys26
- Genesys - Business Systems6
- Genesys and Connect3
- Genesys and Foehn4
- Genesys and TTEC4
- Gigamon12
- Google1
- GoToMeeting1
- Heat Software1
- Hootsuite3
- Hornetsecurity5
- HP32
- HP / Intel11
- HPE Intel19
- Huawei4
- Ibexa1
- IBM223
- IFS7
- iGrafx1
- Ilex International4
- Imation4
- Imperva6
- Improbable3
- Intel14
- INTEL1
- Intel MRS11
- Intel Security3
- Intel Xeon14
- Intermedia5
- Interxion1
- iPass3
- Ipswitch2
- Ipswitch Whatsup4
- Iron Mountain4
- Jama4
- Juniper6
- Kaminario4
- Keboola1
- KnowBe44
- Knowmad Mood3
- Komprise7
- Kyocera1
- LANdesk Software2
- LastPass2
- Lenovo1
- Lifesize2
- Limelight8
- Link111
- Logmein5
- Lombardi3
- Lookout15
- Loopup2
- Lumen2
- Lumension Security6
- Magento5
- Malwarebytes5
- MatsSoft3
- McAfee9
- MicroFocus3
- Microsoft19
- Microsoft US3
- Milkman3
- Mimecast8
- Mitek1
- Mobica4
- MobileIron12
- MSG1
- NaviSite19
- NEC2
- Neo Technology9
- Netapp6
- NetIQ3
- NetMediaEurope10
- Network Instruments1
- Nortel Networks France1
- NPAW4
- Okta51
- OneTrust5
- Opayo5
- Opentext10
- Oracle27
- Orbit Defence1
- Outsystems4
- PagerDuty9
- Palo Alto Networks41
- Panda Security2
- Parallel2
- Percipient1
- Ping Identity1
- plan1
- Plantronics11
- Polycom26
- PTC2
- Pulsant45
- Pure Storage25
- Quadient3
- Quest38
- Quest Software8
- Qumu1
- Rackspace6
- Rakuten1
- Rally Software2
- Recorded Future1
- Red Hat41
- RES Software8
- Response Communications - Aerohive1
- Response Communications - Blue Cat1
- Response Communications - Gigaom1
- Response Communications - Nimble Storage1
- Response Communications - Palo Alto1
- Response Communications - SilverPeak2
- RingCentral1
- Riverbed31
- Rohde & Schwarz2
- Rubrik3
- Safenet4
- Sage Pay11
- Salesforce17
- Samba Nova9
- SAP28
- Savvis2
- Schneider Electric9
- Script Logic3
- SDL8
- Secunia4
- Sempre Analytics1
- Sennheiser1
- SentinelOne1
- ShoreTel2
- Siemens5
- Sierra Wireless2
- SilverPeak7
- Sinequa2
- Sitecore3
- Slack5
- Solarwinds1
- SolidWorks3
- Sonicwall1
- Sprinklr4
- Stripe2
- SuccessFactors5
- SugarCRM3
- SUSE6
- Sybase14
- Symantec22
- Syniverse9
- Systancia1
- T-Systems1
- Tableau1
- Talkdesk12
- TCS5
- TCS & Microsoft1
- Telecity1
- Tenable4
- Thawte4
- Toshiba Intel1
- Trend Micro10
- Trifacta1
- Veeam20
- Veracode28
- Veridas2
- VeriSign10
- Veritas11
- Vidyo5
- Virtana6
- VMware116
- VMware AirWatch12
- Vodafone4
- WALLIX2
- Weber1
- Webroot25
- Websense7
- WhatsApp1
- Wind River21
- Wind-River10
- Zeenea2
- Ziff Davis Enterprise1
- Zscaler9
Podcast: The real reason finance struggles to deliver insight
Finance is being asked to do more than ever before: Deliver faster insight. Shape strategic decisions. Lead the organisation’s approach to AI. But inside many finance teams, the reality is very different. Analysts are still spending the majority of their time gathering, cleaning, and reconciling data across disconnected systems. By the time the numbers are ready, the moment to influence the
Data Product Reusability: Why building data products for reuse isn’t just good practice – it’s the fastest path to value.
Discover why data product reusability is becoming a critical lever for accelerating value creation. This infographic explores how organizations can move beyond simple data access to build reusable, business-ready data products that significantly reduce time to value and lower costs. It highlights the hidden inefficiencies in traditional data workflows, where up to 80% of effort
Build Once, Scale Everywhere: The Economics of Reusable Data Products
As organizations scale their use of data and AI, the challenge is no longer only making data available—it is ensuring that available data can be used repeatedly, reliably, and at scale. Data availability remains a foundational requirement for any data-driven organization. Without timely, trusted access to data, no downstream value is possible. However, availability alone
3 Strategies for Making Better Credit & Collections Management Decisions
Managing credit risk and collections efficiently is critical to maintaining healthy cash flow. Yet many organizations still rely on manual processes that slow down operations and increase risk. In this ebook, Esker shares three powerful strategies to modernize credit and collections, improve customer relationships, and accelerate payments. What you’ll learn: How to reduce credit risk
10 Accounts Payable KPIs You Should Be Measuring
Are you measuring what really matters in your Accounts Payable process? Without the right KPIs, it’s impossible to identify inefficiencies, control costs, or improve performance. This ebook from Esker highlights the 10 essential KPIs that every AP team should monitor to drive efficiency, accuracy, and strategic value. What you’ll learn: The most important KPIs for
Navigating the Changing Waters of E-invoicing Regulations
E-invoicing is rapidly becoming mandatory across the globe, and businesses must adapt quickly to stay compliant and avoid penalties. In this ebook, Esker breaks down the evolving landscape of e-invoicing regulations and shows how automation can help your organization stay ahead. Learn how to simplify compliance while improving efficiency and reducing risk in your Accounts
The Case for Accounts Receivable Automation
Are you getting the most out of your ERP system when it comes to Accounts Receivable? Many organizations rely on ERP platforms, yet still struggle with inefficiencies, delayed payments, and limited visibility into cash flow. This whitepaper from Esker reveals how to enhance your ERP with automation to streamline AR processes, improve accuracy, and accelerate
Identity security: 5 critical challenges
In an era where identities have become the primary attack vector for cybercriminals, organizations face constant threats targeting user credentials and identity infrastructure. Systems such as Active Directory and cloud identity platforms like Microsoft Entra ID are frequent targets, and a single compromised identity can lead to widespread breaches, privilege escalation, and costly downtime. This
A “Boom” Model for Cyber Resilience
In today’s digital landscape, every organization faces the risk of a “boom,” a disruptive IT incident caused by cyberattacks, human error, system failures, or misconfigurations. These events can compromise critical systems and bring business operations to a halt. This eBook introduces the BOOM Model, a practical framework for building true cyber resilience by combining two
Disrupting cyberattacks in flight
Cyberattacks are becoming more frequent, more sophisticated, and more damaging. Identity systems such as Active Directory have become prime targets for attackers seeking persistent access and control. Simply detecting and responding after an attack is no longer enough. Organizations need the ability to stop attacks as they happen to prevent disruption and damage. This white