level business

Results 276 - 300 of 322Sort Results By: Published Date | Title | Company Name

Step Up Encryption with Thawte SGC SuperCerts

Published By: Thawte     Published Date: Oct 06, 2014
Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
Tags : 
network security, encryption, internet security, ssl
    
Thawte

Website Security Threat Report 2013

Published By: Symantec Corporation     Published Date: Oct 03, 2013
Online where the reputation and success of your business is often measured by the trust that your customers have in the security of your website, it is important to understand how you can maintain and build on that trust. To that end, SSL/TLS has been the key to trust on the Internet for more than a decade and will continue to be so when it comes to providing the highest levels of protection against evolving cyber security threats. And while, yes, the technology is sophisticated and leading edge, the goal is simple: to make the Internet safer to transact business—for you, your customers and everyone else with whom you interact online. Please use this document as a reference to understand the threat landscape and understand how you can protect your company and your infrastructure.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation

Server-Gated Cryptography: providing better security for more users

Published By: Thawte     Published Date: Aug 08, 2013
Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
Tags : 
thawte, ssl certificate, application, web server, data collection, technology, encryption, networking, security, data management, business technology
    
Thawte

Why Cloud Computing is Requiring us to Rethink Resiliency at the Edge

Published By: Schneider Electric     Published Date: Feb 12, 2018
Use of cloud computing by enterprise companiesis growing rapidly. A greater dependence on cloud-based applications means businesses must rethink the level of redundancy of the physical infrastructure equipment (power, cooling, networking) remaining on-premise, at the “Edge”. In this paper, we describe and critique the common physical infrastructure practices seen today, propose a method of analyzing the resiliency needed, and discuss best practices that will ensure employees remain connected to their business critical applications.
Tags : 
    
Schneider Electric

Leveraging Your SAP Investment with Applix Business Analytics

Published By: Applix     Published Date: Mar 13, 2007
Financial and business managers today are seeking a higher level of analytical ability to manage business performance than ever before. But these kinds of analyses often lie beyond the reach of most of today's ERP systems.
Tags : 
enterprise resource planning, erp, business analytics, analytical applications, sap, business management, applix
    
Applix

IT Service Level Agreements: Proving the Business Value of Data Protection

Published By: Bocada     Published Date: Aug 21, 2009
The paper then reveals a methodical, step by step process for implementing an SLA, from drawing up the initial requirements, to using the SLA to drive continuous improvements that are squarely focused on strategic business value.
Tags : 
service level, sla, service level agreement, service-level agreement, business management, business value, service management, itsm, bocada, bocata
    
Bocada

Establish ITIL Infrastructure Library (ITIL) Processes to Align Your IT With Business Objectives

Published By: IBM     Published Date: Aug 21, 2008
Today, an IT-driven, customer-centric business approach isn’t a luxury — it’s imperative. More and more businesses are moving out of a cost-centric view of their IT potential and into a realization that IT can transform business processes. This white paper shows how you can maximize your IT function by leveraging ITIL best practice processes. These guidelines can help you effectively manage IT changes, assets, personnel and service levels all while reducing costs—going beyond simple IT asset management to deliver proactive IT business improvements.
Tags : 
itil, best practices, service management, asset management, ibm, ibm mi, ibm grm
    
IBM

IBM Maximo Asset and Service Management Solution

Published By: IBM     Published Date: Apr 17, 2009
Optimize IT process, maximize ROI and improve service levels. The challenge facing businesses today is the need to achieve ever-higher levels of service and maximize return on investment, while simultaneously minimizing costs. This white paper reveals how IBM Maximo® asset and service management solutions help your organization run more efficiently.
Tags : 
ibm maximo, asset and service management solution, optimize it, maximize roi, service lebels, service management solutions, tivoli, it business processes, service levels, ibm, service level agreements slas, key perfor¬mance indicators, kpis, it asset management, itam, it infrastructure library, itil, it asset management, itam, work management
    
IBM

Executive Guide to Web Services Security

Published By: Reactivity     Published Date: Aug 21, 2009
Businesses are rapidly adopting Web services to provide new levels of integration between applications. By comparison with earlier data communications techniques, Web services are faster and cheaper to develop, quicker to deploy, and easier to adapt to emerging business needs. This paper discusses the special security challenges posed by the use of Web services, and how to secure networks against them.
Tags : 
web services, web service management, web service deployment, web service, web service security, network security, secure networks, reactivity, xml, analytical applications, service oriented architecture
    
Reactivity

A Guide for SMBs That Need to Deploy a Hosted PBX Phone Solution

Published By: Vocalocity     Published Date: Apr 18, 2007
Hosted PBX phone solutions are revolutionizing how small and medium-sized businesses (SMBs) serve their customers, grow their business, and support their employees. Delivering the same enterprise level, professional phone system capabilities large businesses use at a much lower cost, hosted PBX is helping SMBs save money while putting their customer services on par with much larger organizations.
Tags : 
pbx, phone, phone system, ip telephony, telecom, telecommunications, voip, voice over ip, networking, network management, vocalocity
    
Vocalocity

SOA Test Methodology

Published By: Torry Harris Business Solutions     Published Date: Jul 18, 2007
Service-Oriented Architecture (SOA) promises significant benefits to today's organizations. Successfully delivering SOA benefits, especially Business Agility and Component Reuse, will be dependant on the Test Approach that your organization adopts to implement your SOA.
Tags : 
soa, service oriented architecture, middleware, service level, performance testing, business agility, quality of service, qos, quality assurance, governance testing, testing, soa governance, torry harris, thbs, open source, software outsourcing, software testing, sla
    
Torry Harris Business Solutions

Adaptive SOA: Enable Composite Applications with Real-Time Agility

Published By: Ultimus     Published Date: Aug 16, 2007
By enabling Adaptive SOA, Ultimus Adaptive Discovery takes SOA to the highest level of rapid deployment and agility. It accomplishes this by enabling business processes to be developed rapidly, and to embrace change in real-time. More importantly, it empowers business professionals and analysts who own processes to discover and change processes with IT playing the supporting role to manage the infrastructure.
Tags : 
ultimus, bpm, business process management, automation, process discovery, discovery, adaptive discovery, bpa, productivity, adaptive soa, soa, service oriented architecture, service-oriented, enterprise applications, business process automation
    
Ultimus

Architecting the Virtual Data Center for Availability, Data Protection, and Disaster Recovery

Published By: VMware Dell     Published Date: Sep 29, 2008
Virtualization offers the promise of simplifying your IT infrastructure from the desktop to the data center. But can your virtual environment maintain the level of availability you need to keep your business running or to recover from a disaster?
Tags : 
vmware, dell, virtual data center, data protection, disaster recovery, network architecture, high availability, server virtualization
    
VMware Dell

Entrepreneurs & Managed IT: Putting Big Company Strategies to Work for Small & Mid-Sized Businesses

Published By: Managed Systems, Inc.     Published Date: Aug 14, 2008
No matter the size of the business, technology plays a critical role in its financial success. At the most basic level, companies have to deal with desktop and laptop computers for all their employees, e-mail, access to the Internet, Blackberries, and other kinds of on-site and remote devices. Add networking issues like viruses, spam and bandwidth utilization, and suddenly, this effort becomes a major challenge to anyone operating a small or mid-sized business (SMBs) with limited resources and a limited budget.
Tags : 
network management, smb, small business, medium business, mid-sized business, smb networks, managed systems, it services, outsourcing, outsourced it, managed services, managed systems, tech support, it solutions, security, compliance, disaster recovery, it management, infrastructure, small business networks
    
Managed Systems, Inc.

Manage IT Services Efficiently. Serve Business Effectively.

Published By: HP - Enterprise     Published Date: Jun 04, 2013
Many organizations are now moving parts of their IT infrastructure to the Cloud. However, managing these resources within a comprehensive management framework is still essential. And the management approach for these hybrid environments needs to take a step forward and start to focus on service level management, not the care and feeding of discrete components. This whitepaper provides the information needed on implementing Business Service Management (BSM) in hybrid environments.
Tags : 
it infrastructure, cloud, business service management, hybrid environments, project management, service management
    
HP - Enterprise

Bolster Network Security with VPN Load Balancing and Redundancy

Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Today’s Wide Area Networks (WANs) are experiencing increased saturation with the deployment of bandwidth-intensive applications, increased numbers of users, and the need for reliable security transmissions. IT personnel responsible for these issues acknowledge the increased congestion and have strived to maintain high levels of network performance. At the same time, IT departments are tasked with the job of lowering the cost of network infrastructure and ongoing operations. Network administrators continually face the challenge of balancing the increased use of critical applications on the Internet, while eliminating downtime and congestion from affecting user quality and day-to-day business operations.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation

What is the Emphasis on Choosing an IM Software For Business?

Published By: B Labs     Published Date: Sep 19, 2010
This white paper briefly overviews a functionality of enterprise-level IM systems and describes new features and tasks that can be important to corporate and business users.
Tags : 
chat, instant messaging, communication, server, messenger, messaging, collaboration, ethernet networking, small business networks, wide area networks, encryption, internet security, secure instant messaging, wireless communications, wireless messaging, call center software, enterprise software, extranets, intranets, productivity
    
B Labs

The CFO as the Architect

Published By: Adaptive Planning     Published Date: Oct 19, 2011
Despite a number of compelling reasons to move away from annual plans and budgets, many CFOs are reluctant to make the change. They fail to recognize that there are alternative (and less dysfunctional) ways of driving performance improvement and making managers accountable for performance. CFOs need to implement systems that provide managers at every level with the capability to make fast, well-informed decisions. They need to replace annual planning cycles with more regular business reviews that enable managers to see trends, patterns, and "breaks in the curve" long before the competition.
Tags : 
adaptive, marketry, cfo, business, finance, decision making
    
Adaptive Planning

SSL Validation

Published By: Thawte     Published Date: Oct 05, 2015
Domain Validation (DV), Organisation Validation (OV) and Extended Validation (EV) SSL certificates offer completely different levels of authentication - but what does that mean? The right certificate for you depends on your business type and what you are using the certificate for. To discover which level of validation wins for your needs, download our quick reference guide now.
Tags : 
    
Thawte

Step Up Encryption with Thawte SGC SuperCerts

Published By: Thawte     Published Date: Dec 29, 2015
Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
Tags : 
encryption, sgc certificates, browser, security management, web service security, business intelligence
    
Thawte

The Cisco Connected Factory: Powering a Renaissance in Manufacturing

Published By: Cisco     Published Date: Feb 23, 2016
Industrial enterprises around the world are retooling their factories with advanced technologies to boost manufacturing flexibility and speed, achieving new levels of overall equipment effectiveness (OEE), supply chain responsiveness, and customer satisfaction in the process. This renaissance reflects very real pressures industry players face today. For years, traditional factories have been operating at a disadvantage, impeded by production environments that are “disconnected”—at the very least strictly gated—to corporate business systems, to supply chains, and to customers and partners.
Tags : 
technology, manufacturing, management infrastructure, infrastructure
    
Cisco

2014 Survey Report: Remote Collaboration Challenges and Strategies to Overcome

Published By: Polycom     Published Date: Jul 24, 2014
Download this survey to learn what 5,000 business professionals around the world say are their biggest collaboration challenges—and discover the strategies they deploy to overcome them. In late 2013, Polycom invited customers and partners around the world to participate in a survey that focused on collaboration challenges. More than 5,000 business professionals from all job levels, functions and vertical sectors responded, candidly sharing insights about their obstacles and the strategies they deploy to overcome them. The survey reveals that 85% of the respondents believe video conferencing helps them achieve their business goals. See how they successfully use video in their profession and how you can leverage technology to defy distance and improve remote collaboration within your organization as well.
Tags : 
polycom, collaboration video conferencing, defy distance, networking, it management
    
Polycom

5 Ways to Personalize Beyond the Subject Line

Published By: Monetate     Published Date: Aug 19, 2014
82 percent of shoppers say they would buy more items from a brand if the emails they sent were more personalized. But how do you deliver that level of revenue-driving personalization? This white paper offer five tactics that will personalize your email beyond the subject line and drive real business growth.
Tags : 
subject line, geo-targeting, personalized emails, email strategies
    
Monetate

The New Business Imperative for DDoS Protection

Published By: ArborNetworks     Published Date: Feb 12, 2016
The modern enterprise is dependent upon connectivity at every level. Every business initiative, whether driven by sales, marketing, manufacturing, finance, R&D or HR, is dependent upon reliable network availability and continuity. Disrupting that continuity is what Distributed Denial of Service (DDoS) attacks are all about.
Tags : 
arbor network, ddos, enterprise, attack, network, business technology
    
ArborNetworks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.