transact

Results 276 - 300 of 656Sort Results By: Published Date | Title | Company Name
By: Epicor     Published Date: Aug 03, 2012
The capabilities that enterprise resource planning (ERP) systems enable in wholesale and distribution have a wide umbrella of influence throughout an organization. Using ERP data to make better business decisions while cutting your costs is only one
Tags : wholesalers, distributors, erp capabilities, cross functional teams, full visibility, operations, transactions, technology aids, erp modules, erp extentions, measurement, optimization, measurable benefits, social media
     Epicor
By: HP     Published Date: Jul 29, 2008
This case study highlights how a leading transportation firm uses executive financial incentives to insure the highest system uptime for its customers. With the need to keep thousands of vehicles and employees on the move and process millions of daily transactions, keeping mission critical systems running is essential for financial performance.
Tags : mission critical, high availability, transportation, service management, itil
     HP
By: Entrust Datacard     Published Date: May 13, 2014
Digital certificates have emerged to serve as the trust foundation for identities, communication, transactions and information security due to their flexibility in terms of deployment and their high level of inherent security. Entrust IdentityGuard Cloud Services provide digital certificate and identity management solutions that bring together all certificate services, tools and security under a single cloud-based service. It’s a simple, strong and easy solution to issue and manage identities through their lifecycle via the cloud.
Tags : entrust, digital certificates, cloud services, identity management, security, it management
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
Digital certificates have emerged to serve as the trust foundation for identities, communication, transactions and information security due to their flexibility in terms of deployment and their high level of inherent security.
Tags : identity guard, cloud services, trust foundation, communication, transactions, information security, cloud-based service, solution, security
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes.
Tags : defending, enterprise, data security, protection, private identity, information transactions, trust, authentication, identity assurance, security
     Entrust Datacard
By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity
     Entrust Datacard
By: ArcSight     Published Date: Mar 04, 2009
This document will outline the requirements for an effective fraud mitigation solution. It will detail a solution that considers the entirety of an organization’s fraud mitigation strategy.
Tags : fraud, siem, arcsight, mitigating fraud, intrusion prevention systems, fraudsters, fraud policy, insider threats, mission critical assets, security
     ArcSight
By: BMC Control M     Published Date: Jul 22, 2009
Batch Application Integration allows you to process critical transactions, such as payment authorizations, in real-time, and cue fulfillment (such as packaging and shipping) or other lower priority actions for batch processing. Learn more about Batch Application Integration, and how BMC CONTROL-M makes it possible.
Tags : integrating, automation, composite applications, bmc, control-m, enterprise architects, batch application integration, batch processing, object oriented design, ood, service oriented architecture, soa, enterprise management associates, ema, enterprise, bai, enterprise resource planning, erp, business-to-consumer, b2c
     BMC Control M
By: PitneyBowes     Published Date: Sep 29, 2010
Breakthroughs in relationship marketing are transforming the role of transaction mail-and those who manage it.
Tags : pitney bowes, mail, transpromo, openability, postal, customer data integration, production intelligence, marketing, statement management
     PitneyBowes
By: PitneyBowes     Published Date: Sep 29, 2010
Our recent survey of business-to-business (B2B) companies across the UK, France, Germany and the USA reveals that TransPromo is moving from a much-talked-about projection to a widely implemented reality.
Tags : pitney bowes, b2b communications, transpromo, transactional mail, customer relationship
     PitneyBowes
By: EMC Corporation     Published Date: Jun 14, 2011
Qualitative and quantitative research among AP professionals to gain insights into trends in automated data capture in invoice processing.
Tags : emc, accounts payable, automation, paper process, transaction costs, error rates, invoice, centralized, outsourcing, cloud computing, capital budget, costs
     EMC Corporation
By: Aberdeen Group     Published Date: Apr 12, 2011
This research brief looks at the role of EV SSL Server Certificates in providing end-users with a higher level of assurance of a legitimate web site, and in increasing their confidence in the security of conducting online transactions.
Tags : aberdeen, ev ssl server certificate, extended validation, key management solution, encryption, security investment, scg, ssl, certificate, ecommerce
     Aberdeen Group
By: Citrix Systems     Published Date: Nov 10, 2014
Measurable performance is a key factor when selecting an Application Delivery Controller(ADC) solution for modern data centers. In this report, Tolly evaluates the performance of several Citrix NetScaler ADC models vs. that of comparable products. Learn how NetScaler fared and provided up to 480% the performance of F5.
Tags : dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security, data management
     Citrix Systems
By: Citrix Systems     Published Date: Nov 10, 2014
Today’s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce costs and datacenter sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security, data management
     Citrix Systems
By: Citrix Systems     Published Date: Nov 10, 2014
For the first time in several years, there has been a sharp increase in denial of service (DOS) attacks. In the past, these attacks have been directed at the networks of large companies. Now we are seeing the emergence of attacks targeting smaller companies and higher layers in the computing stack. Intruders are using low-bandwidth attacks disguised as legitimate transactions to bypass firewalls and basic intrusion prevention measures. Organizations need a better way to combat and prevent these attacks, and the right ADC can provide the solution. Learn how Citrix NetScaler can help protect against DOS attacks in the report, Citrix NetScaler: A Powerful Defense Against DOS Attacks (link).
Tags : dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security, data management
     Citrix Systems
By: Quest Software     Published Date: Jan 03, 2013
Discover Application Performance Management best Practices of 400 Leading Companies and See How to Implement These Best Practices in Your Organization.
Tags : application, performance management, best practices, enterprise applications
     Quest Software
By: McAfee     Published Date: Mar 08, 2013
Protect sensitive information in emerging computing models such as virtualized environments. Learn how to leverage the same security architecture to provide more effective and more efficient data security across dedicated database servers as well.
Tags : database security, virtual database environments, database virtualization, database activity monitoring, vm to vm transactions, virtual machines, virtual appliance, distributed database monitoring, memory based sensors
     McAfee
By: Viavi Solutions     Published Date: Apr 14, 2017
NPMD solutions are typically not directly involved in the actual card cardholder transaction. However, given that many can potentially capture and transmit cardholder data they must be viewed as an integral part of a business’ PCI DSS compliance strategy, especially when investigating data breaches for the purposes of reporting or remediation. Therefore, beyond satisfying your service delivery monitoring and troubleshooting requirements, be sure to verify your NPMD solution protects cardholder data and aids your efforts in PCI DSS compliance.
Tags : network security, account security, data management, network protection, secure systems, application security, network performance, network diagnostics
     Viavi Solutions
By: Aruba Networks     Published Date: May 21, 2013
Mobile technologies and cloud computing are changing what we connect, where corporate data lives, and how we transact business.
Tags : aruba, aruba networks, mobility management, emm solutions, contextual management, software development
     Aruba Networks
By: E-SignLive by Silanis     Published Date: Oct 02, 2013
An introduction to electronic signature technology for banks: What it is, why you need it, how it works and who in the banking industry is using e-signature solutions to automate customer-facing transactions. This guide answers common questions, shares ROI metrics and outlines best practices based on 20 years of transforming business processes and customer experience with electronic signatures.
Tags : banking, financial services, credit unions
     E-SignLive by Silanis
By: Symantec Corporation     Published Date: Mar 21, 2014
Best practices for maintaining the security of sensitive enterprise transactions.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
     Symantec Corporation
By: QTS Data Centers     Published Date: Mar 31, 2015
To keep pace with new business demands, rising customer expectations, and emerging technologies, IT leaders are realizing an important opportunity: infrastructure outsourcing. These services, including colocation, hosting, and cloud computing, give IT organizations the flexibility and agility to better serve the needs of the business.
Tags : qts, cloud, security, data transactions, cio report, cyber threats, security breaches, it leaders, it management
     QTS Data Centers
By: QTS Data Centers     Published Date: Mar 31, 2015
One of IT’s biggest balancing acts is to make data transactions easily available to authorized users while preventing all others from accessing its data assets. With high-profile data security breaches splashed across headlines nearly every day, CIOs are understandably worried about protecting their data. And for IT leaders who are considering moving their business to the cloud it is critical to ensure the provider they select has undertaken full and robust measures for physical and logical security.
Tags : qts, cloud, security, data transactions, cio report, cyber threats, security breaches, it leaders, it management
     QTS Data Centers
By: QTS Data Centers     Published Date: Mar 31, 2015
Information technology is undergoing rapid change as organizations of all types begin to embrace the idea of moving computing infrastructure from on-premises to the cloud. It is easy to understand why the cloud has taken off faster than any technology phenomenon in recent memory. The cloud has the potential to reduce total cost of ownership (TCO) while enabling quicker responses to fast-moving markets and ever-changing customer needs. “Being able to flex your compute resources based on changes in volume and customer demand increases agility, making going to the cloud a very attractive proposition for our customers,” says Brian Johnston, chief technology officer for QTS in Overland Park, Kansas, a provider of data center solutions and fully managed services.
Tags : qts, cloud, security, data transactions, cio report, cyber threats, security breaches, it leaders, it management
     QTS Data Centers
By: Teradata     Published Date: Mar 10, 2014
How the following topics help marketers in a data driven way: The Rise of Big Data, Big Data Myth, Global Perspective, Strategic Alignment, Where to Begin, The Right Technology, and Customer Success.
Tags : teradata, data-driven marketing, rise of big data, big data myth, global perspective, strategic alignment, right technology, customer success, marketing research, data center
     Teradata
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com