key management

Results 176 - 200 of 391Sort Results By: Published Date | Title | Company Name
By: Forcepoint     Published Date: Jul 30, 2019
How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
     Forcepoint
By: Tenable     Published Date: Nov 06, 2018
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
     Tenable
By: Tenable     Published Date: Jan 25, 2019
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
     Tenable
By: Sprinklr     Published Date: Mar 13, 2018
"“Analyze This” highlights key points from recent Forrester Wave Reports to help you work smarter. Read on for an overview of what Forrester – and Sprinklr – say about: - Social Advertising Technology - Content Marketing Platform - Social Media Management Solutions"
Tags : 
     Sprinklr
By: Vehicle Tracking Solutions     Published Date: May 31, 2018
Safety is a top priority for companies with a fleet of drivers and vehicles. It starts with hiring and screening new employees with safe driving records and qualifications. You may even have written safety policies. However, having visibility into your driver’s whereabouts and their behaviors behind the wheel is key in identifying and preventing risks before it costs your business. Do you wish that you could sit in the passenger seat of every vehicle in your fleet to watch driver behavior? With data-driven fleet safety management software from Silent Passenger you can. According to NHTSA, the cause of 94% of collisions is driver error. By monitoring unsafe driver behaviors such as speeding, hard braking, and fast acceleration is key to preserving fleet safety. A reliable fleet safety management software delivers key business intelligence that helps maintain fleet efficiency and productivity on the road. Improve Safety and Reduce Operational Costs Running a safer fleet can have a signif
Tags : 
     Vehicle Tracking Solutions
By: TIBCO Software     Published Date: Nov 07, 2019
Is your risk infrastructure showing signs of strain in the face of FRTB, Basel III, and BCBS 239? Imagine a risk function where discrepancies among business, risk, and finance views are eliminated, setting the stage for advanced technologies, robotic process automation, and machine learning. Take a step beyond first generation data governance towards unified data and analytics across the enterprise. In this whitepaper, we explore how technology can help financial institutions not just automate compliance, but demonstrate organizational commitment to the change management process and adherence to the principles of regulations and law. Get insights into: How you can master regulatory change as part of transforming the risk function, elevating knowledge and data resources through governance, MDM, data science, and analytics An overview of the key market challenges for delivering a unified data management and governance model Real-world case studies from G-SIBs focused on data governanc
Tags : 
     TIBCO Software
By: Riverbed     Published Date: Feb 26, 2015
In the world of network management, knowledge is power. But many organizations know a lot less about their network than they think. With proper network auditing and configuration, businesses can fill this knowledge gap.
Tags : network management, network auditing, automation, key network management processes, audit, network infrastructure
     Riverbed
By: Workday     Published Date: Sep 08, 2015
Download this white paper to understand the six key capabilities that separate Workday Financial Management from old-world business apps.
Tags : financial systems, finance technology, workday, security, payroll software, financial management, cloud computing, modern financial mangement system
     Workday
By: Dell Software     Published Date: Feb 19, 2014
When application performance issues occur, it seems DBAs get blamed – even if databases aren’t the cause. In this new white paper, see how to maintain peak database performance at all times – and how to prove, beyond a doubt, your databases aren’t causing the headaches! Read this paper today.
Tags : database infrastructure, key business metrics, dba challenges, database management, database monitoring, best practices
     Dell Software
By: Dell Software     Published Date: Feb 19, 2014
Go beyond one-dimensional virtual machine performance. Foglight for Virtualization helps you visualize, analyze and optimize your entire virtual infrastructure health. In this technical brief, learn how Foglight simplifies cross-platform database performance monitoring and management. Read it today.
Tags : database infrastructure, key business metrics, dba challenges, database management, database monitoring, best practices
     Dell Software
By: Dell Software     Published Date: Feb 19, 2014
In "Proactive Performance Management for Enterprise Databases," read about the inherent challenges of proactive database management, and what to look for when choosing the right management tool for your company. Get this white paper today.
Tags : database infrastructure, key business metrics, dba challenges, database management, database monitoring, best practices
     Dell Software
By: HP     Published Date: Jul 29, 2008
Connect to this special web event to hear from Forrester Research and HP on how to address key vulnerabilities in the storage network, receive tips and recommendations on selecting and implementing data storage encryption solutions and details on how to achieve centralized key management and data encryption where it matters most.
Tags : mission critical, security, datacenter, data center, storage security, storage
     HP
By: Raritan Inc.     Published Date: Jun 23, 2010
Virtualization presents a tremendous opportunity for IT organizations. Yet deployment involves major process and management complexities. This white paper outlines best-practice methodologies that help you tackle challenges brought on by virtualization. We also suggest key questions to ask when evaluating a consolidated management solution.
Tags : power distribution unit, raritan, pdu, power monitoring, environmental monitoring, data center power, data center monitoring, monitor power, power metering, data center temperature, electrical power meter
     Raritan Inc.
By: Entrust Datacard     Published Date: Jan 16, 2015
Upon issuance, all SSL digital certificates have a finite lifespan and are no longer recognized as valid upon expiration. Certificates may have varying periods of validity and are often set to expire anywhere between one and five years based on company policy and/or cost considerations. This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : entrust, ssl, certificates, security, professionals, management, lifecycle, certificate, issues, holes, verification, applications, domains, audit, scan, systems, policies, monitor, inventory
     Entrust Datacard
By: VMware     Published Date: Feb 26, 2009
CA ARCserve® Backup, CA XOsoft™ Replication, and CA XOsoft™ High Availability provide several key features that enable you to both protect virtualized servers and benefit from server virtualization in your overall recovery management strategy
Tags : ca arcserve backup, ca xosoft replication, ca xosoft high availability, virtualization support, recovery management strategy, virtual machines, vms, vmware consolidated backup (vcb), protecting virtual machines, backup agent, esx server, physical-to-virtual, p2v, disaster recovery hosts, stand-by servers, vss snapshots, security, storage
     VMware
By: CREDANT Technologies     Published Date: Apr 06, 2011
This whitepaper will examine some best practices for managing BitLocker®, as well as discuss how to more easily integrate BitLocker encryption into your security program and reduce the overhead of both key management and reporting.
Tags : credant technologies, bitlocker encryption, best practices, reporting
     CREDANT Technologies
By: Aberdeen Group     Published Date: Apr 12, 2011
This research brief looks at the role of EV SSL Server Certificates in providing end-users with a higher level of assurance of a legitimate web site, and in increasing their confidence in the security of conducting online transactions.
Tags : aberdeen, ev ssl server certificate, extended validation, key management solution, encryption, security investment, scg, ssl, certificate, ecommerce
     Aberdeen Group
By: Aquire     Published Date: Oct 07, 2011
Gain a clear understanding of what workforce analytics are and how they are integral for strategic planning to support your company's overall strategies from the creators of Human Resource Executive's 2010 Top Product, Aquire InSight.
Tags : workforce analytics, aquire, aquire insight, workforce analytics software, hr reports, hr metrics, hr trends, hr dashboard, hr benchmarking, hr measurement, hr benchmark, hr reporting, measuring hr, roi of hr, hr metrics dashboard, human resource reports, hr kpi, hr indicators, key hr metrics, workforce analysis tool
     Aquire
By: IBM Smarter Analytics     Published Date: Jun 20, 2013
For many companies, 2012 was a year of positive momentum and better results. Consequently, strong optimism influenced planning for 2013, leading to one resounding, emphatic focus: GROWTH. As such, companies geared their compensation plans to focus the sales force on growth. Has it worked? This, at first glance, should be a simple question for sales compensation professionals to answer, but it is often illusive. This practical, high impact discussion will provide attendees with key practices for how to understand the effectiveness of their sales compensation plans and where to look as they seek to make improvements. Attendee benefits/Takeaways: •Key Do's and Don’ts for Assessing Plan Effectiveness •Core Plan Effectiveness Metrics to Leverage •Next Steps for Making Improvements •Learn how technology can be used to sharpen management’s visibility •Understand the operational efficiencies that can be achieved with Sales Performance Management technology.
Tags : sales, optimization
     IBM Smarter Analytics
By: Riverbed     Published Date: Nov 12, 2012
This Forrester white paper examines the trends driving the new wave of dynamic web content in enterprises to understand its sources, its shape, and its impact on current web architectures and networks. Learn more about the keys to content management
Tags : dynamic web, web content management, wcm, web architecture, enterprise applications
     Riverbed
By: Siemens     Published Date: Jun 06, 2014
This white paper examines some of the critical success factors for a sustainable population health management program and how the CareXcell™ solution can provide the IT infrastructure needed to address new value-based care requirements.
Tags : siemens, hie, clinical workflows, care coordination, reduce costs, streamline communication, healthcare
     Siemens
By: Dell Software     Published Date: Feb 20, 2014
Short: Discover how new cloud-based integration platforms dramatically speed results and lower costs in this informative white paper.
Tags : database infrastructure, key business metrics, dba challenges, database management, database monitoring, best practices, data management
     Dell Software
By: Adobe     Published Date: Sep 16, 2016
There’s no doubt that your digital asset management system (DAM) can change everything when it comes to delivering the right customer experience at the right time. According to 78% of marketers, DAM is key to speed up time to market. It fast-tracks everything — from asset creation and management to campaign delivery. A next-generation DAM can turn your content marketing into compelling customer experiences. To learn more content marketing tips, read Breaking the DAM. ?
Tags : adobe, digital, digital asset management, dam, digital asset management system, customer experience, enterprise applications
     Adobe
By: Adobe     Published Date: Jun 26, 2019
Get inside the minds of key decision-makers in mid-size companies who are tackling today’s biggest content management challenges. Learn how they’re thinking, what they see as opportunities, and how they’re planning to come out on top. With more than 7,000 CMS solutions available from more than 6,000 unique suppliers, you have a mind-boggling array of options — making it hard to know which path to take and how to decide. Here's your chance to get inside the minds of key decision-makers who are tackling today’s biggest content management challenges: - Personalization - Keeping up with current technology - Difficult-to-use content management systems - Over-reliance on IT teams for simple functions - Inadequate access to customer data and insights - Integrating third-party apps - Managing and optimizing content
Tags : 
     Adobe
By: Adobe     Published Date: Jun 26, 2019
While having the right tech is key to delivering great experiences, an equally important part of the equation is having the right people, processes and org structures. Three best practices to design your org for successful experience delivery: 1. Cultivate the right skills and find the right talent for customer obsession 2. Set up org structures that encourage cross channel collaboration 3. Embrace the possibility of using external support to address the challenges of change management
Tags : 
     Adobe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com