dam

Results 576 - 600 of 914Sort Results By: Published Date | Title | Company Name
By: EMC Corporation     Published Date: Mar 20, 2014
This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident. It provides a framework to help organizations determine where they are in the security journey and where they want to be.
Tags : emc, incident response, malware detection, security journey, reduce risk, improve security, security
     EMC Corporation
By: Achievers     Published Date: Jan 17, 2014
Today’s workforce is fundamentally changing. Organizations are flatter, more agile, and require even better retention strategies. HR professionals and business leaders agree on the importance of attracting, retaining, and cultivating top talent. An employee rewards and recognition program that has the buy-in and support of business leaders can transform your corporate culture, making your organization a great place to work, building your brand as a top employer, delighting your customers with your service, and reaping the financial benefits that come from Employee Success. Download this white paper, Obtaining executive buy-in for recognition programs, and obtain best practices to sell the vision of a rewards and recognition program to your CFO.
Tags : employee success, employee recognition, employee engagement
     Achievers
By: Dell     Published Date: Mar 02, 2012
By now the fundamentals of computer and network security are familiar to almost everyone who interacts with a PC on a regular basis: install antivirus software, choose good passwords and protect them and download and install software updates. Despite these measures, businesses of all sizes continue to suffer security breaches.
Tags : dell, mobile data, mobile devices, smartphones, it planning, technology, it management, small business, technology trenfs
     Dell
By: Egencia     Published Date: Aug 04, 2014
Over the past decade, procurement fundamentals have redefined travel management. As the industry refreshes its position on traveler satisfaction, however, travel management and procurement concepts find a new balance in best-in-class programs.
Tags : egencia, modern travel management, business travel, managing expenses, travel dollars, travel policy, enterprise applications
     Egencia
By: Kaseya     Published Date: Mar 12, 2015
The risks of irregular maintenance and non-compliance of IT and security policies can cost the organization much in terms of fines, lost opportunities and a damaged reputation. With such a serious and complex challenge, employing an efficient and comprehensive solution is paramount to minimize risk and instill confidence in the organization’s ability to fulfill on its compliance requirements.
Tags : it systems, systems management, financial institutions, banking sector, compliance hurdles
     Kaseya
By: Comcast Business     Published Date: Mar 24, 2015
Today’s K-12 schools are hungry for bandwidth. The reason is clear: highperforming, reliable and easily expanded network services support the latest classroom innovations, including videoconferencing, 1:1 computing, distance learning and modern learning management systems. It’s no surprise then that progressive educators now see a direct link between the overall success of their school districts and access to high-capacity networks. This emerged as a clear trend in new research by the Center for Digital Education (CDE) — a commanding 98 percent of administrators and IT representatives said the future of K-12 education hinges on ubiquitous connectivity. This white paper lays a framework for planning and implementing high-performance networks. In addition to explaining why now’s the time to plan network upgrades, this paper answers one of the fundamental questions asked by IT managers at schools everywhere: “How much network capacity will we actually need?”
Tags : education, network modernization, high-performance networks, bandwith, classroom innovations, networking, it management
     Comcast Business
By: Comcast Business     Published Date: Mar 24, 2015
The introduction of bandwidth-intensive learning applications, including video and peer-to-peer applications in teaching has fundamentally transformed the way teachers teach and students learn. The federal E-rate program has forever changed the technology landscape of school districts and libraries in the United States. Receiving funding is not guaranteed, and following the E-rate process and procedures is critical – especially when thousands, even millions, of dollars are at stake for your district. The rewards that new, education-specific cutting edge education applications deliver to the classroom far outweigh the effort required to participate in the program. This paper briefly examines the promise of new, education-specific applications, the advanced network services that enable them, and the role of the E-rate program.
Tags : application-enabled learning, education, funding, bandwith, education applications, e-rate program, networking, it management
     Comcast Business
By: Intralinks     Published Date: Nov 26, 2013
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data.
Tags : intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, jurisdictional privacy heat map
     Intralinks
By: Palo Alto Networks     Published Date: Dec 11, 2013
Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: - The fundamentals of modern firewall technology - The ten critical business requirements your next firewall needs to address - Information on how to create a vendor request for proposal (RFP) - A functional test plan to assist in your firewall selection process
Tags : firewall, palo alto, security, network security, safe applications, cyber threats
     Palo Alto Networks
By: Windstream     Published Date: Aug 04, 2014
Cloud computing today is fundamentally altering business processes and changing the way organizations interact with customers, partners, and employees. This transformation brings incredible opportunities, including the ability to build a realtime enterprise where interaction and innovation flourish, and more agile, flexible, and cost-effective practices thrive. Yet cloud computing also presents significant challenges. The path to value is not clearly marked, and there are potential stumbling points along the way. Please download the whitepaper to learn more!
Tags : windstream, cloud computing, cloud hybrid options, oxford economics, cloud benefits, it management, data management
     Windstream
By: sevone     Published Date: Oct 23, 2014
Whether you’re looking to improve your application and service delivery, consolidate existing performance monitoring tools and responsibilities or justify the impact of a new technology deployment, the following six steps can help you create the fundamental building blocks of an effective performance monitoring strategy.
Tags : 
     sevone
By: Tyco Integrated Security     Published Date: Dec 08, 2014
When theft or violence is mixed with your bottom line, the damage can go way beyond physical and monetary consequences. We’ve outlined some ways you can begin eliminating both internal and external threats.
Tags : business protection, workplace violence, burglary, employee theft, business management, security
     Tyco Integrated Security
By: Netsuite DWASF Leads Display Q1 2015     Published Date: Nov 19, 2015
"In this white paper, The 8 Ways Outdated ERP Damages Your Business, learn how old ERP hold back business and how the cloud can help. Find out why economic, market, and technology changes have made it necessary for modern business systems to adapt more quickly, how outdated systems drain your IT budget, what a modern business must do to ensure their ERP systems keep pace with the demands of a global mobile business, and the four reasons companies are turning to the cloud to keep up with their ever-changing organizations."
Tags : erp system, upgraded erp, business innovation, productivity, enterprise applications
     Netsuite DWASF Leads Display Q1 2015
By: Niara     Published Date: Jan 27, 2016
Download this white paper to learn the must-have tactics organizations can use to quickly detect attacks on the inside and severely limit the damage they can do.
Tags : advanced attacks, attack detection, cybercriminals, perimiter defenses, security breach, learning-based security analytics, security monitoring, behavioral analytics, machine learning, user behavior analytics, user and entitiy behavior analytics, security, it management
     Niara
By: Delta Risk     Published Date: Jan 03, 2017
This white paper takes an extensive look at the regulatory and legal obligations providers must uphold to avoid costly fines, compromise of PHI, reputational damage, and potential litigation. Download now!
Tags : 
     Delta Risk
By: Microsoft     Published Date: Jul 20, 2018
SaaS represents an opportunity for ISVs to fundamentally transform their business to deliver greater value to customers, sell software to a broader range of customers, and streamline their internal operations. The market for software is quickly changing to demand this mode of delivery, as software buyers start considering total ownership costs, ease of use, and flexibility in their purchase decisions. ISVs need to prepare for such a transition. This paper will discuss the benefits that stem from changes to an ISV’s business model (how it competes in the marketplace) and operating model (how the ISV executes on its business model) as well as suggestions on how to prepare for a SaaS transition, based on the experience of 20 ISVs who successfully transitioned from a traditional software licensing and delivery model to SaaS.
Tags : 
     Microsoft
By: IBM     Published Date: Sep 10, 2009
"Get this white paper to learn 10 ways senior executives can more effectively manage their assets in an uncertain economy. David Berger, a Partner at Western Management Consultants, outlines strategies that help to avoid any damage, as well as improve in productivity and profitability.
Tags : ibm, david berger, strategic asset management, asset integration, total lifecycle asset management, risk management, supply chain optimization
     IBM
By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati
     IBM
By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa
     Aveksa
By: Skillsoft     Published Date: Apr 26, 2011
This paper seeks to uncover the fundamental requirements for a successful social learning program.
Tags : social learning, skillsoft, eigth truths, ingenius, learning re-imagined blog, business value, social platform, informal learning activity, social networking
     Skillsoft
By: Melissa Data     Published Date: Nov 18, 2008
Tom Brennan and John Nydam explain the Melissa Data and Stalworth partnership, discuss the business problems caused by bad data, and describe how DQ*Plus provides a complete data quality solution for enterprise applications and commercial databases.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software, data quality tools, data quality management, data quality objects, data quality api, address quality, data cleanse, data hygiene, data quality, data quality analysis, data quality api, data quality assurance, data quality control
     Melissa Data
By: Trend Micro SaaS     Published Date: Dec 05, 2007
eSecurityToGo hat sich auf Sicherheitslösungen für kleine und mittlere Unternehmen (SMB) von heute spezialisiert. Einen großen Teil des Kundenstamms bilden andere IT-Berater, die das umfassende Fachwissen und die besonderen Schwerpunkte von eSecurityToGo zu schätzen wissen. Das Unternehmen ist Reseller der kompletten Produktpalette von Trend Micro Lösungen. Es sichert sich damit zufriedene Kunden, die sich auch in Zukunft für Trend Micro entscheiden.
Tags : gegensatz, unternehmen, esecuritytogo, interscan messaging, trend micro, smb
     Trend Micro SaaS
By: Marchex     Published Date: Nov 11, 2010
This whitepaper is about taking the small business digital marketing products back to the drawing board to deliver a product set that help small businesses easily, cost-effectively, and efficiently address three fundamental needs: 1. lead generation; 2. online presence and reputation management, and; 3. relationship management.
Tags : marchex, digital marketing, smb, small business, relationship management, lead generation, reputation, lead gen, online presence
     Marchex
By: Marchex     Published Date: Oct 25, 2010
This whitepaper is about taking the small business digital marketing products back to the drawing board to deliver a product set that help small businesses easily, cost-effectively, and efficiently address three fundamental needs: 1. lead generation; 2. online presence and reputation management, and; 3. relationship management.
Tags : marchex, digital marketing, smb, small business, relationship management, lead generation, reputation, lead gen, online presence
     Marchex
By: Tripwire, Inc     Published Date: Mar 10, 2010
Unlike others, Tripwire solutions identify the events that matter most-those that pose the real security risks or take you out of compliance. And they help you discover those events immediately, while you can still contain the damage.
Tags : tripwire, pci compliance, business continuity, log, event management, it security, compliance automation, log center, pci dss
     Tripwire, Inc
Start   Previous    17 18 19 20 21 22 23 24 25 26 27 28 29 30 31    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com