dam

Results 526 - 550 of 854Sort Results By: Published Date | Title | Company Name
By: Intralinks     Published Date: Nov 26, 2013
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data.
Tags : intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, jurisdictional privacy heat map
     Intralinks
By: Palo Alto Networks     Published Date: Dec 11, 2013
Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: - The fundamentals of modern firewall technology - The ten critical business requirements your next firewall needs to address - Information on how to create a vendor request for proposal (RFP) - A functional test plan to assist in your firewall selection process
Tags : firewall, palo alto, security, network security, safe applications, cyber threats
     Palo Alto Networks
By: Windstream     Published Date: Aug 04, 2014
Cloud computing today is fundamentally altering business processes and changing the way organizations interact with customers, partners, and employees. This transformation brings incredible opportunities, including the ability to build a realtime enterprise where interaction and innovation flourish, and more agile, flexible, and cost-effective practices thrive. Yet cloud computing also presents significant challenges. The path to value is not clearly marked, and there are potential stumbling points along the way. Please download the whitepaper to learn more!
Tags : windstream, cloud computing, cloud hybrid options, oxford economics, cloud benefits, it management, data management
     Windstream
By: sevone     Published Date: Oct 23, 2014
Whether you’re looking to improve your application and service delivery, consolidate existing performance monitoring tools and responsibilities or justify the impact of a new technology deployment, the following six steps can help you create the fundamental building blocks of an effective performance monitoring strategy.
Tags : 
     sevone
By: Tyco Integrated Security     Published Date: Dec 08, 2014
When theft or violence is mixed with your bottom line, the damage can go way beyond physical and monetary consequences. We’ve outlined some ways you can begin eliminating both internal and external threats.
Tags : business protection, workplace violence, burglary, employee theft, business management, security
     Tyco Integrated Security
By: Netsuite DWASF Leads Display Q1 2015     Published Date: Nov 19, 2015
"In this white paper, The 8 Ways Outdated ERP Damages Your Business, learn how old ERP hold back business and how the cloud can help. Find out why economic, market, and technology changes have made it necessary for modern business systems to adapt more quickly, how outdated systems drain your IT budget, what a modern business must do to ensure their ERP systems keep pace with the demands of a global mobile business, and the four reasons companies are turning to the cloud to keep up with their ever-changing organizations."
Tags : erp system, upgraded erp, business innovation, productivity, enterprise applications
     Netsuite DWASF Leads Display Q1 2015
By: Niara     Published Date: Jan 27, 2016
Download this white paper to learn the must-have tactics organizations can use to quickly detect attacks on the inside and severely limit the damage they can do.
Tags : advanced attacks, attack detection, cybercriminals, perimiter defenses, security breach, learning-based security analytics, security monitoring, behavioral analytics, machine learning, user behavior analytics, user and entitiy behavior analytics, security, it management
     Niara
By: Delta Risk     Published Date: Jan 03, 2017
This white paper takes an extensive look at the regulatory and legal obligations providers must uphold to avoid costly fines, compromise of PHI, reputational damage, and potential litigation. Download now!
Tags : 
     Delta Risk
By: Microsoft     Published Date: Jul 20, 2018
SaaS represents an opportunity for ISVs to fundamentally transform their business to deliver greater value to customers, sell software to a broader range of customers, and streamline their internal operations. The market for software is quickly changing to demand this mode of delivery, as software buyers start considering total ownership costs, ease of use, and flexibility in their purchase decisions. ISVs need to prepare for such a transition. This paper will discuss the benefits that stem from changes to an ISV’s business model (how it competes in the marketplace) and operating model (how the ISV executes on its business model) as well as suggestions on how to prepare for a SaaS transition, based on the experience of 20 ISVs who successfully transitioned from a traditional software licensing and delivery model to SaaS.
Tags : 
     Microsoft
By: IBM     Published Date: Sep 10, 2009
"Get this white paper to learn 10 ways senior executives can more effectively manage their assets in an uncertain economy. David Berger, a Partner at Western Management Consultants, outlines strategies that help to avoid any damage, as well as improve in productivity and profitability.
Tags : ibm, david berger, strategic asset management, asset integration, total lifecycle asset management, risk management, supply chain optimization
     IBM
By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati
     IBM
By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa
     Aveksa
By: Skillsoft     Published Date: Apr 26, 2011
This paper seeks to uncover the fundamental requirements for a successful social learning program.
Tags : social learning, skillsoft, eigth truths, ingenius, learning re-imagined blog, business value, social platform, informal learning activity, social networking
     Skillsoft
By: Melissa Data     Published Date: Nov 18, 2008
Tom Brennan and John Nydam explain the Melissa Data and Stalworth partnership, discuss the business problems caused by bad data, and describe how DQ*Plus provides a complete data quality solution for enterprise applications and commercial databases.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software, data quality tools, data quality management, data quality objects, data quality api, address quality, data cleanse, data hygiene, data quality, data quality analysis, data quality api, data quality assurance, data quality control
     Melissa Data
By: Trend Micro SaaS     Published Date: Dec 05, 2007
eSecurityToGo hat sich auf Sicherheitslösungen für kleine und mittlere Unternehmen (SMB) von heute spezialisiert. Einen großen Teil des Kundenstamms bilden andere IT-Berater, die das umfassende Fachwissen und die besonderen Schwerpunkte von eSecurityToGo zu schätzen wissen. Das Unternehmen ist Reseller der kompletten Produktpalette von Trend Micro Lösungen. Es sichert sich damit zufriedene Kunden, die sich auch in Zukunft für Trend Micro entscheiden.
Tags : gegensatz, unternehmen, esecuritytogo, interscan messaging, trend micro, smb
     Trend Micro SaaS
By: Marchex     Published Date: Nov 11, 2010
This whitepaper is about taking the small business digital marketing products back to the drawing board to deliver a product set that help small businesses easily, cost-effectively, and efficiently address three fundamental needs: 1. lead generation; 2. online presence and reputation management, and; 3. relationship management.
Tags : marchex, digital marketing, smb, small business, relationship management, lead generation, reputation, lead gen, online presence
     Marchex
By: Marchex     Published Date: Oct 25, 2010
This whitepaper is about taking the small business digital marketing products back to the drawing board to deliver a product set that help small businesses easily, cost-effectively, and efficiently address three fundamental needs: 1. lead generation; 2. online presence and reputation management, and; 3. relationship management.
Tags : marchex, digital marketing, smb, small business, relationship management, lead generation, reputation, lead gen, online presence
     Marchex
By: Tripwire, Inc     Published Date: Mar 10, 2010
Unlike others, Tripwire solutions identify the events that matter most-those that pose the real security risks or take you out of compliance. And they help you discover those events immediately, while you can still contain the damage.
Tags : tripwire, pci compliance, business continuity, log, event management, it security, compliance automation, log center, pci dss
     Tripwire, Inc
By: SAS     Published Date: Apr 25, 2017
Physicians and their patients, medical policy makers and licensing boards, pharmaceutical companies and pharmacies all must work together to stem the opioid epidemic and achieve the fundamental objectives of reducing addiction and deaths. With so many players and data sources, today’s information is partial, fragmented, and often not actionable. We don’t have the data to understand what’s happening, to adjust policy, and to motivate physicians and patients to change their behaviors. Better data and analytics can help develop better treatment protocols, both for pain in the first place and for remediation when patients are becoming dependent on the drugs.
Tags : 
     SAS
By: SAS     Published Date: Oct 18, 2017
Procurement fraud affects nearly one-third of organizations, and it is often perpetrated by the most trusted, longtime employees, the ones you’d least suspect. Learn from three white-collar crime specialists about common flavors of procurement fraud, striking examples from recent headlines, four fundamental ways to get better at detecting and preventing fraud, and how to take procurement integrity to the next level.
Tags : 
     SAS
By: TeamQuest     Published Date: Sep 09, 2013
This paper describes the fundamental steps for performing capacity planning.
Tags : teamquest, capacity planning, cost effective, fundamental
     TeamQuest
By: TeamQuest     Published Date: Apr 09, 2014
The goal of capacity planning is to provide satisfactory service levels to users in a cost-effective manner. This paper describes the fundamental steps for performing capacity planning. Real life examples are provided using TeamQuest® Performance Software.
Tags : teamquest, virtualization, it professionals, optimize software, distributed environment, data center, performance, data management
     TeamQuest
By: Netezza IBM US     Published Date: Mar 27, 2012
This eBook will explain the fundamental differences between the IBM Netezza 1000 and Oracle Exadata solutions. You will learn which solutions best meet your business needs and how to achieve optimal results from your data.
Tags : ibm, netezza, exadata, technology, data center, data management, oracle exadata solutions
     Netezza IBM US
By: Dell     Published Date: Sep 24, 2012
The EqualLogic family of virtualized storage solutions from Dell is fundamentally changing the way enterprises think about purchasing and managing storage.
Tags : bulk data transfer, dell, microsoft, offloaded data, storage solutions, data storage
     Dell
By: Navisite- A Time Warner Cable Company     Published Date: Jul 01, 2013
In recent years, IT has seen a fundamental shift toward always-on capabilities for anywhere, anytime productivity. The Cloud has taken center stage as one of the largest influencers of IT decision making, modifying company operations, impacting enterprise finances, and incorporating into profit engines.
Tags : navisite, daas, it decision makers, impacting enterprise finances, profit engines
     Navisite- A Time Warner Cable Company
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com