validation

Results 76 - 100 of 213Sort Results By: Published Date | Title | Company Name
By: ScriptLogic     Published Date: Nov 14, 2011
Security Explorer provides IT administrators with one platform to completely manage access controls and security across a Windows network environment.
Tags : scriptlogic, desktop authority, computer-based management, desktop management tool, validation logic, software deployment, reporting, remote support
     ScriptLogic
By: Quinstreet - Netapp     Published Date: Jun 11, 2012
Find out why the the FAS2240 is an appealing product to small and midsize businesses. Receive your complimentary white paper now!
Tags : netapp, network storage, cloud computing, virtualization, storage efficiency, data storage, information management, nas
     Quinstreet - Netapp
By: NetApp     Published Date: Dec 12, 2013
IT managers have indicated their two most significant challenges associated with managing unstructured data at multiple locations were keeping pace with data growth and improving data protection. Learn how the NetApp Distributed Content Repository provides advanced data protection and system recovery capabilities that can enable multiple data centers and remote offices to maintain access to data through hardware and software faults.
Tags : netapp, lab validation, distibuted content repositor, big content scalability, enterprise reliability, intelligent object management, data management, data center
     NetApp
By: NetApp     Published Date: Dec 12, 2013
Learn why NetApp Open Solution for Hadoop is better than clusters built on commodity storage. This ESG lab report details the reasons why NetApp's use of direct attached storage for Hadoop improves performance, scalability and availability compared to typical internal hard drive Hadoop deployments.
Tags : netapp, lab validation, distibuted content repositor, big content scalability, enterprise reliability, intelligent object management
     NetApp
By: EMC Converged Platforms     Published Date: Aug 16, 2016
This white paper documents the results of recent hands on testing of EMC’s VxRail hyper-converged appliance.
Tags : 
     EMC Converged Platforms
By: CrowdStrike     Published Date: Nov 28, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries, investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence: Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security post
Tags : 
     CrowdStrike
By: Ephesoft     Published Date: Jan 18, 2018
Financial services companies can improve customer service and their bottom line by automating document intensive processes with banking, such as new account openings, mortgage, investing, credit cards, insurance, and personal, small business and commercial financial services. Learn how to make a substantial impact in terms of efficiency and cost savings for your organization with intelligent document capture technology.
Tags : extraction, validation, exporting, delivery, cloud, cost reduction, security
     Ephesoft
By: Sponsored by HP and Intel®     Published Date: Nov 05, 2012
Evaluator Group worked with HP to assess the features, performance and enterprise capabilities of the HP StoreOnce B6200 Backup system. HP labs and equipment were utilized with testing under the direction of on-site evaluator group personnel.
Tags : hp storeonce, application integration, testing, b6200, data management, data center
     Sponsored by HP and Intel®
By: VeriSign Incorp.     Published Date: Jul 13, 2009
Stay ahead of online security attacks, such as phishing, by understanding how they work. Read this white paper to learn how phishing attacks work, and how to avoid them.
Tags : verisign, phishing, extended validation, ev ssl, ssl, encryption, online safety, online security, security solutions, security
     VeriSign Incorp.
By: VeriSign Incorp.     Published Date: Jul 13, 2009
Provide site visitors visual cues that indicate your site is legitimate with Extended Validation (EV) SSL available from VeriSign.  Read this paper to learn how to increase site visitor confidence in your site. Learn more today!
Tags : verisign, phishing, extended validation, ev ssl, ssl, encryption, online safety, online security, security solutions, security
     VeriSign Incorp.
By: VeriSign Incorp.     Published Date: Jul 13, 2009
Enhance your online brand with trusted security from VeriSign.  In this paper you will gain insights on how to encrypt sensitive information and help improve customer confidence. Learn more today!
Tags : verisign, phishing, extended validation, ev ssl, ssl, encryption, online safety, online security, security solutions, trust, seucrity, security
     VeriSign Incorp.
By: VeriSign Incorp.     Published Date: Jul 13, 2009
Be sure your site is in compliance with government data regulations by reading about the different data regulatory standards in this white paper. Learn more today!
Tags : verisign, phishing, extended validation, ev ssl, ssl, encryption, online safety, online security, security solutions, trust, security, compliance, pci, hippaa, sarbanes-oxley, fisma, sox, security, data, data security
     VeriSign Incorp.
By: VeriSign Incorp.     Published Date: Jul 13, 2009
Online visitors are becoming ever so wary about transacting online.  One way to reassure them about transacting on your site is to make sure you have the latest in SSL on your site.  Read this guide to learn about the latest in SSL. Learn more today!
Tags : verisign, trust, seal, trust mark, ssl, extended validation (ev) ssl
     VeriSign Incorp.
By: VeriSign Incorp.     Published Date: Jul 13, 2009
Financial institutions understand the importance of keeping their site visitors safe while on their site, but they aren’t the only ones.  Read this guide to learn how to secure your site with SSL. Learn more today!
Tags : verisign, trust, seal, trust mark, ssl, extended validation (ev) ssl, banking, financial, security
     VeriSign Incorp.
By: VeriSign Incorp.     Published Date: Oct 01, 2009
This 45-page e-Book gives you the tools you need to detect security vulnerabilities, build an information security strategy, and plan your investment in security technology.
Tags : verisign, phishing, extended validation, ev ss, ssl, encryption, online safety, online security, security solutions, security vulnerabilities, information security
     VeriSign Incorp.
By: VeriSign Incorp.     Published Date: Oct 01, 2009
In order to ensure that your visitors can see that your Web site has passed Extended Validation (EV) authentication, VeriSign created VeriSign® EV UpgraderT-the first-ever solution to enable all visiting Windows® Internet Explorer® 7 (IE7) browsers to detect EV SSL Certificates and display them appropriately.
Tags : ssl, ssl technology, verisign, trust, seal, ev ssl, ssl certificate, trust mark, encryption, online safety, online security, security solutions, verisign
     VeriSign Incorp.
By: Sponsored by HP and Intel®     Published Date: Feb 20, 2013
This Evaluator Group report discusses the performance and high availability findings from the product testing done on the HP B6200 StoreOnce Backup System w/ Catalyst Software and compares it against industry competitors.
Tags : hp storeonce, b6200, backup lab validation report, catalyst software, industry competitors, it management, data management, data center
     Sponsored by HP and Intel®
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Gaining the trust of online customers is vital for the success of any company that transfers sensitive data over the Web. When shopping online, consumers are concerned about identity theft and are therefore wary of providing untrusted sources with their personal information, especially their credit card details. Other types of online businesses require different but equally sensitive information. People are reluctant to provide their national insurance numbers, passwords, or other confidential personal information, or sometimes even just name, address, and phone number. Perhaps the information will be intercepted in transit, they fear, or perhaps the destination itself is manned by imposters with ill intent.  The result is an abandoned transaction.
Tags : security, ssl, trust, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption, secured seal, extended validation, extended validation ssl, extended validation ssl certificates, extended validation ssl certificate, extended validation certificate
     VeriSign Authentication Services, now a part of Symantec Corp.
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing
     VeriSign Authentication Services, now a part of Symantec Corp.
By: IBM ILOG.     Published Date: Oct 26, 2009
This case study will showcase the challenges of clinical trial data management, but the highlighted techniques are applicable to any business needing smart, dynamic and adaptive Web-based user interfaces.
Tags : brms, business logic, business rules, claims management, data management, data validation, healthcare, productivity, web-based applications
     IBM ILOG.
By: Sponsored by HP and Intel® Xeon® processors     Published Date: Apr 11, 2013
This Evaluator Group report discusses the performance and high availability findings from the product testing done on the HP B6200 StoreOnce Backup System w/ Catalyst Software and compares it against industry competitors.
Tags : hp storeonce, b6200, backup lab validation report, catalyst software, industry competitors
     Sponsored by HP and Intel® Xeon® processors
By: Globalscape     Published Date: Jun 27, 2014
Globalscape’s Enhanced File Transfer™ (EFT™) High Security module (HSM), with the Auditing and Reporting module (ARM), helps achieve or exceed security practices mandated by the most rigorous standards, including PCI DSS, FIPS 140-2 Validation, HIPAA, and Sarbanes-Oxley. This whitepaper discusses how EFT, the HSM, and ARM can help you achieve compliance and stay compliant with the PCI DSS.
Tags : globalscape, enhanced file transfer, high security module, auditing, reporting, security practices, compliance, file transfer, records management
     Globalscape
By: SAP     Published Date: Jun 23, 2009
Learn why the requirement to close books quickly and with quality is emerging again as an important project for today's global finance function.
Tags : optimization, financial, performance, sap, global, globalization, businessobjects, sox, sarbanes-oxley, stakeholders, internal stakeholders, regulatory landscape, financial reporting standards, investor relations, audit trails, accounting, peer-to-peer, erp, enterprise resource planning, general ledger
     SAP
By: IBM     Published Date: Dec 03, 2015
This paper outlines how to enhance disaster recovery testing with a structured approach to validating full business recoverability in the event of an outage.
Tags : ibm, resiliency program, functional validation, disaster recovery, security, data management
     IBM
By: VeriSign, Inc.     Published Date: Aug 03, 2011
This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing.
Tags : verisign, larry seltzer, best practices, ssl, tls, transport layer security, secure lockets layer, authentication, encryption, data integrity, extended validation
     VeriSign, Inc.
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com