business

Results 13701 - 13725 of 15605Sort Results By: Published Date | Title | Company Name
Published By: PKWARE     Published Date: Aug 21, 2009
Regulatory and business requirements are driving the need for protecting information stored and transferred electronically. PKWARE provides an introduction to protecting your most valuable asset - your data.
Tags : 
regulatory compliance, compliance, information management, data security, data protection, secure content management, pki, pkware
    
PKWARE
Published By: Pointsec     Published Date: Aug 21, 2009
Critical data is best protected against misuse on business trips complete encryption of notebook hard disks. If 4,500 notebooks are involved, as is the case for the Zurich firm Swiss Re, precise selection criteria and exact planning for the international rollout are important.
Tags : 
data protection, laptop, lost laptop, lost notebook, encryption, data encryption, laptop encryption, vulnerability, pointsec, wireless
    
Pointsec
Published By: Preventsys     Published Date: Aug 21, 2009
This paper is a synopsis of the presentations given at the Preventsys "CISO Breakfast Series," a succession of seminars given across North America in January and February 2005. The speakers for each breakfast consisted of security professionals and executives who provided their views on how to more effectively align information security with business initiatives.
Tags : 
network security, intrusion prevention, security management, business management, information management, data security, preventsys, security
    
Preventsys
Published By: Preventsys     Published Date: Aug 21, 2009
Security professionals are constantly being asked to justify every security project. Security risks can often be difficult to measure and even more difficult to understand by people outside the department. The key to demonstrating improvement is to translate security information into business terms.
Tags : 
security, metrics, business metrics, security management, information management, aligning, alignment, business integration, preventsys
    
Preventsys
Published By: ProjectLocker     Published Date: Aug 21, 2009
This paper provides a brief overview of Wiki and its emerging importance in the business marketplace. It describes ways in which many major corporations are taking advantage of this new social software to transform their business practices, and lays out a short set of guidelines to consider before implementing your own Wiki solution.
Tags : 
collaboration, corporate portals, information management, intranets, messaging, wiki, wikipedia, social marketing, project locker, projectlocker, knowledge management
    
ProjectLocker
Published By: PTC     Published Date: Aug 21, 2009
Download this white paper to see the results of a study conducted by IDC, the premier global provider of market intelligence, in which 600 companies were surveyed to identify common information tasks and their costs.
Tags : 
business intelligence, information management, cost control, total cost of ownership, tco, productivity, efficiency, ptc, intelligence
    
PTC
Published By: PTC     Published Date: Nov 27, 2007
Defining an effective Internet and domain name strategy is vital to any business — especially small- or medium-sized businesses which have limited development and promotional budgets. From defining this strategy, to understanding the keys to Web promotion, here is vital information that every entrepreneur should know.
Tags : 
web development, web site, web marketing, buy domains, buydomains, web site design, site promotion, seo, domain name, hosting, web site design, website design
    
PTC
Published By: Reactivity     Published Date: Aug 21, 2009
The vast majority of IT professionals and business people agree that security is the leading concern for SOA and XML messages and most quickly realize that SSL is limited by not providing content security, auditability or reliability. This paper will discuss how to extend SOA beyond the perimeter through high performance.
Tags : 
soa, web services, xml, service oriented architecture, service-oriented architecture, soa security, xml security, security performance, reactivity, data management
    
Reactivity
Published By: Reactivity     Published Date: Aug 21, 2009
Businesses are rapidly adopting Web services to provide new levels of integration between applications. By comparison with earlier data communications techniques, Web services are faster and cheaper to develop, quicker to deploy, and easier to adapt to emerging business needs. This paper discusses the special security challenges posed by the use of Web services, and how to secure networks against them.
Tags : 
web services, web service management, web service deployment, web service, web service security, network security, secure networks, reactivity
    
Reactivity
Published By: RuleStream     Published Date: Aug 21, 2009
The ability to harness intellectual property and product know-how is a key to competitive advantage. RuleStream appears to have broken through past technological barriers in rules-driven knowledge capture and reuse.
Tags : 
product development, market intelligence, business intelligence, competitive, business process automation, business process management, bpm, bpa, rulestream, knowledge management, enterprise applications
    
RuleStream
Published By: RuleStream     Published Date: Aug 21, 2009
Manufacturers of products with highly configurable and ever-changing customer requirements must confront specific challenges and operate far differently than traditional product development environments.
Tags : 
business process automation, business process management, bpm, bpa, scm, enterprise software, productivity, supply chain management, product development, make to order, made-to-order, made to order, rulestream, enterprise applications
    
RuleStream
Published By: Salesboom     Published Date: Aug 21, 2009
The high price and complexity of traditional, installed-on-premise enterprise software has left SMBs unable to obtain true integrated Customer Relationship Management (CRM) and Enterprise Resource Planning (ERP) software. On-demand software-as-a-service is changing all that. This white paper discusses the benefits of the on-demand, or hosted CRM and ERP vs on premise CRM and ERP solution and the benefits to the SMB.
Tags : 
crm, customer relationship management, smb, smbs, small business, enterprise resource planning, erp, resource management, saas, software as a service, application integration, sales software, salesboom, enterprise applications
    
Salesboom
Published By: Secure Computing     Published Date: Nov 30, 1999
Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. Find out in this paper how you can achieve automated configuration compliance with the SafeWord SecureWire IAM appliance from Secure Computing.
Tags : 
network architecture, network management, sarbanes oxley compliance, compliance, sox compliance, hipaa compliance, configuration management, government agency, secure computing, securecomputing
    
Secure Computing
Published By: SeeControl     Published Date: Aug 21, 2009
Facing increasing customer demands for equipment uptime and rapid service response, many companies servicing critical equipment and machinery are turning to on-customer-site spare parts inventory strategies. To maximize the benefits of this approach, leading companies are 'reverse engineering' their service chains to build restocking plans and manage performance based on parts consumption, not distribution, patterns.
Tags : 
service chain, supply chain management, scm, efficiency, consumption-based, supply and demand, service business, customer service, seecontrol, see control
    
SeeControl
Published By: Sigaba     Published Date: Aug 21, 2009
This paper presents the business case for secure messaging, which extends far beyond compliance issues. In fact, choices about when to implement secure messaging affect every aspect of banking.
Tags : 
financial, bank, access control, email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba
    
Sigaba
Published By: Sigaba     Published Date: Aug 21, 2009
This document details the mandated and proposed rules generally referred to as the "HIPAA requirements" and how they affect healthcare organizations and their business partners transmit medical information electronically.
Tags : 
compliance, policy based management, business management, hipaa compliance, health, hipaa, privacy, sigaba, security
    
Sigaba
Published By: Signiant     Published Date: Aug 14, 2008
Never before has the Media and Entertainment (M&E) industry seen such rapid change in business models, adoption of digital technologies, and global, distributed, collaborative workflows. New business ventures, consolidation of terrestrial-based television stations, broadband penetration, time-to-market pressures, and shifting audience viewership are some of the ingredients that are contributing to the re-definitions that are taking place in the M&E industry.
Tags : 
signiant, digital media, supply chain, information management
    
Signiant
Published By: SilverStorm Technologies     Published Date: Aug 21, 2009
The world of super computing has changed in recent years, moving from a scale-up, monolithic, expensive architecture to the scale-out clustering of low cost microprocessors, also referred to as High Performance Business Computing (HPBC) clusters.
Tags : 
clustering, cluster, network architecture, grid, utility computing, efficiency, integration, silverstorm, silverstorm technologies
    
SilverStorm Technologies
Published By: Soffront     Published Date: Aug 21, 2009
In the decade since customer relationship management (CRM) software first appeared on the market, implementation of the enterprise application suite that helps businesses find new customers, retain existing customers and otherwise increase revenues have gained a reputation as being risky ventures, subject to user rejection, cost overruns, and missed deadlines.
Tags : 
crm, customer relationship mangement, crm software, crm application, crm app, customer retention, customer satisfaction, lead generation, cost control, crm implementation, crm deployment, soffront, enterprise applications
    
Soffront
Published By: Soffront     Published Date: Aug 21, 2009
How marketing automation and CRM can help a mid-sized business consolidate data, improve customer information, streamline marketing efforts, and take full advantage of marketing campaigns.
Tags : 
crm, smb, smbs, data consolidation, data quality, application integration, marketing, marketing roi, marketing efficiency, customer relationship management, marketing automation, soffront
    
Soffront
Published By: Soffront     Published Date: Aug 21, 2009
Companies are discovering that a Knowledge Management System (KMS) has grown from a nice to have concept, to a must-have asset in customer facing departments. Providing immediate answers to customers requires easy access to the important product and business knowledge of an organization. KMS makes that possible.
Tags : 
knowledge management, information management, knowledge base, product information management, pim, product knowledge, customer service, customer support, call center management, soffront
    
Soffront
Published By: Solidcore     Published Date: Jan 28, 2008
Are you about to implement change management using BMC Remedy Service Management or BMC IT Service Management for Mid-sized Businesses (a.k.a. Magic or Service Desk Express)? Have you already implemented one of these systems and want to maximize the return on your investment? Get this white paper to see how others have optimized their change management implementation approach to derive the most value from their investment by adding closed-loop control.
Tags : 
cmdb, change management, service management, bmc, remedy, bmc remedy, it management, roi, return on investment, solidcore
    
Solidcore
Published By: Spectra Logic     Published Date: Aug 21, 2009
Read how Spectra Logic Corporation's BlueScale Encryption integrates hardware encryption directly into the electronics of a tape library, offering a practical, affordable, & scalable option.
Tags : 
backup, database security, data security, encryption, tape-based backup, tape backup, data encryption, spectralogic, spectra logic, storage
    
Spectra Logic
Published By: St Bernard Software     Published Date: Aug 21, 2009
Download this information-packed white paper by Nancy Flynn, Executive Director of the ePolicy Institute, for a no-nonsense look at the business risks and legal liabilities associated with employee misuse of the Internet, email, instant messaging (IM), and peer-to-peer (P2P) file-sharing technology.
Tags : 
spyware, security policy, security policies, policy based management, email security, secure im, st. bernard, st bernard, epolicy
    
St Bernard Software
Published By: St Bernard Software     Published Date: Aug 21, 2009
Download this white paper from St. Bernard Software to read about a variety of contemporary, Internet-borne threats that are making it foolhardy for any business to provide unfettered Internet access for its users.
Tags : 
filtering, email security, firewall, access control, employee internet access, internet security, web security, restrictions, st bernard, st. bernard
    
St Bernard Software
Start   Previous    542 543 544 545 546 547 548 549 550 551 552 553 554 555 556    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.