document

Results 326 - 350 of 1000Sort Results By: Published Date | Title | Company Name

Architecture and Application Control

Published By: LogMeIn     Published Date: Feb 27, 2018
LogMeIn offers consistently reliable service to its Bold360 customers and is vigilant in efforts to provide services that are not only robust and scalable, but also secure. This document describes how we achieve reliable scalability and the measures taken by LogMeIn to protect Bold360 customer data.
Tags : 
industry, network, service, operations, scalability, data, encryption
    
LogMeIn

Cloud Storage Might Be Your Biggest Security Blind Spot

Published By: SailPoint Technologies     Published Date: Sep 05, 2019
If you’re not controlling access to documents, spreadsheets, presentations and reports stored in the cloud, your organization is significantly more vulnerable to security breaches and data privacy compliance penalties. Download this white paper to find out why. .
Tags : 
    
SailPoint Technologies

B2B Enterprise Content Marketing 2019

Published By: Seismic     Published Date: May 14, 2019
New research from Content Marketing Institute shows that enterprise content marketers are seeing more success with content marketing. Download the report to learn: ? The benefits of a documented content marketing strategy ? How enterprise marketers rate alignment of content marketing and sales in their organization ? Content marketing methods enterprise marketers use to nurture their audience Discover the benchmarks, budgets, and trends impacting content marketers in the B2B enterprise space in the year ahead.
Tags : 
    
Seismic

Take Your Firm from Transactional to Transformational

Published By: Right Networks     Published Date: Aug 13, 2019
Transforming your firm doesn’t happen overnight. It takes time, patience and planning. However, the value of moving away from the old, transaction-based way of doing business and into a more modern model is immense. Consider getting to a place where you’ve built a cloud technology infrastructure that allows staff and clients to collaborate via access to real-time data and documents. Where you are running at peak efficiency. Build a business that’s modern. One that allows you to be a leader, not mired down in transactional work. It can be a reality. Our 3-step guide, courtesy of our friends at Rootworks, can help you transform your firm into one that will last well into the future and secure your legacy.
Tags : 
    
Right Networks

Enhanced Data Center Security with SPARC and Oracle Solaris

Published By: Oracle     Published Date: Oct 20, 2017
This paper provides guidance to organizations interested in researching Oracle’s SPARC M7 and Oracle Solaris 11 security features and capabilities. It will also provide a high level overview of some of the noteworthy features that these two product offerings bring to the market. We will review industry best practices in information security as it relates to these Oracle products in the context of a secure implementation. This paper is not meant to be an in depth technical paper, position paper, or security implementation guide. It will instead endeavor to deliver a foundational level of knowledge of the SPARC M7 processor and server technology and the function set within Oracle Solaris 11 that are primarily relevant to information security as it is currently understood. The information used to compose this paper was collected from a variety of open sources, interviews with Oracle subject matter experts, and reviews of OEM (Original Equipment Manufacturer) documentation and specificatio
Tags : 
    
Oracle

The Fully Encrypted Data Center

Published By: Oracle     Published Date: Oct 20, 2017
This document discusses how to secure applications using Oracle Solaris 11 security and the hardware-assisted cryptography capabilities of Oracle’s SPARC servers. This document explores the end-to-end application security scenarios, technical prerequisites, configuration, deployment, and verification guidelines for multitier application deployments running on Oracle Solaris 11–based SPARC servers. In addition, this document covers the Oracle hardware-assisted cryptographic acceleration of the SPARC processor, a key feature when performance and data protection are deemed critical. The derived security benefits can be leveraged into a variety of solutions including application software, middleware, and infrastructure software.
Tags : 
    
Oracle

Close The Gap in your Data Protection Strategy (Italy)

Published By: Zscaler     Published Date: Jun 19, 2019
Le regole del gioco sono cambiate: le applicazioni stanno ormai migrando verso il cloud e gli utenti possono avere accesso da qualsiasi location senza mai il bisogno di collegarsi al corporate network. E’ quindi indispensabile ripensare l’architettura della sicurezza. Scoprite con questo documento come proteggere i vostri attivi strategici con le nostre funzionalita’ di Data Protection e Cloud DLP.
Tags : 
    
Zscaler

Predictive Coding: The Next Frontier in Legal eDiscovery

Published By: Rand Secure Archive     Published Date: Jun 06, 2013
Without a doubt, technology has revolutionized the way business is done. The vast majority of internal and external communication is now done through email, instant messaging, VOIP and other types of electronic communication. In addition, most business documents exist in digital form. The digitization of business has had significant implications for litigation. Legal eDiscovery is now an essential part of settling cases between organizations. Previously, many companies believed that eDiscovery was only for organizations that were public or highly regulated, but now most companies recognize that electronically stored information (ESI) regulations are applicable to all organizations and there is an ever-increasing need for cost-effective eDiscovery.
Tags : 
coding, ediscovery, legal, effective, organization, networking, security, it management, storage, data management
    
Rand Secure Archive

New demands for security and compliance in online collaboration

Published By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection, it risk management, mergers acquisition due diligence, mobile collaboration, online collaboration, online document storage, password protect documents, saas collaboration, saas security, secure collaboration, secure document, secure file sending, application security
    
Brainloop

Managing Information Risk: Why Compliance and Security Must Join Forces

Published By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection, document security, document sharing, electronic document management, file protection, governance, grc, information risk, it risk management, mergers acquisitions due diligence, mobile collaboration, online collaboration, online document sharing
    
Brainloop

Security Policy: Five Keys to User Compliance

Published By: Brainloop     Published Date: Nov 09, 2011
Business users are a key part of a company\'s security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company\'s confidential documents--provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training--yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, security, user compliance, indentity management, access control, identity management, internet security, intrusion prevention, security management, security policies
    
Brainloop

Enterprise Information Management Security Options

Published By: Brainloop     Published Date: Nov 09, 2011
This paper advocates that for any document sharing application to genuinely add value, it must augment or complement the organization's existing document security infrastructure.
Tags : 
brainloop, enterprise, information management, security options, technology, business, access control, authentication, internet security, security management, security policies
    
Brainloop

Six Secrets That Banks Can Use to Reduce Costs and Drive Process Improvements

Published By: Lexmark     Published Date: May 28, 2014
A UBM tech report on the 6 secrets that banks can use to reduce cost and drive process improvements
Tags : 
lexmark, reducing costs, driving process improvements, modern document management, best practices, business process management, document management, records management
    
Lexmark

Definitive Guide to Policy and Procedure Management

Published By: NAVEX Global     Published Date: Apr 20, 2018
Learn how to effectively and efficiently manage your organisation's employee handbook, code of conduct and other important documents. This guide gives organisations of all sizes insight on how to optimize policy and procedure management with real-world examples, helpful tips, and research. What you’ll learn: - Best Practices on How to Plan, Implement, and Measure your programme - Eleven Commandments of Policy Formatting and Writing - 20 Questions for Prioritising Policy Development Efforts - Pros & Cons of Various Distribution Methods - Assessment Questions to Evaluate Your Current Document Management Strategy - Build versus Buy Considerations
Tags : 
    
NAVEX Global

How to Respond to Bribery and Corruption Red Flags

Published By: NAVEX Global     Published Date: Jul 31, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Use this document to identify when bribery and corruption activities are most likely to be occurring within your business. Next to each bribery and corruption ‘red flag’ we have provided some suggested responses and best practices an organisation can use to address these issues and minimize the risks for your business. You’ll learn: What procedures should I have in place for third party engagements? Are there particular red flags that indicate increased corruption risk? How should I respond to high-risk third-party red flags?
Tags : 
    
NAVEX Global

Deliver Engaging Communications with PDF Portfolios

Published By: Adobe Systems     Published Date: Mar 04, 2011
Learn how easy it is to create and send a single PDF Portfolio using Adobe Acrobat X Pro. See how to create a rich, branded PDF Portfolio containing many types of documents, each with a rich preview experience. Discover how to embed web pages and streaming media and even output the entire portfolio experience as a web page.
Tags : 
adobe, pdf, portfolio, acrobat, pro, rich media, business intelligence, business process management, enterprise software, sales & marketing software
    
Adobe Systems

Accelerate Document Review Workflows with Acrobat X

Published By: Adobe Systems     Published Date: Mar 04, 2011
Join Adobe experts to learn how to enable your PDF documents so that multiple people, in real time, can add notes and comments, promoting a true "conversation" about your critical documents. See how to use familiar commenting tools and even enable users of the free Adobe Reader to take part in your review.
Tags : 
adobe, pdf, portfolio, acrobat, pro, rich media, acrobat x, business intelligence, enterprise software, sales & marketing software
    
Adobe Systems

Make PDF Workflows More Efficient and Ensure Document Compliance using Actions

Published By: Adobe Systems     Published Date: Mar 04, 2011
In this session presented by Adobe experts, you'll learn how to use Adobe Acrobat X Pro to save time and standardize processes by automating routine, multistep tasks in a guided Action. Find out how to create, manage, execute, and share a sequence of automatic or user-guided steps that can be applied to single PDF files or batches of files.
Tags : 
adobe, pdf, portfolio, acrobat, pro, rich media, acrobat x, business intelligence, enterprise software, sales & marketing software
    
Adobe Systems

IT's next challenge: Three Key Trends in Document Collaboration and Exchange

Published By: Adobe     Published Date: Jun 02, 2011
This whitepaper highlights next steps for IT to collaborate beyond office walls and enable IT's infrastructure to better support the increase of rich-media documents.
Tags : 
adobe acrobat x, document collaboration, exchange, infrastructure, enterprise communication, cost reduction, global collaborators, total cost of ownership, collaboration, document management
    
Adobe

Acrobat X: A Strategic Choice for Enterprise-Wide Productivity

Published By: Adobe     Published Date: Jun 02, 2011
A study of knowledge worker collaboration workflows.
Tags : 
adobe acrobat x, crimson consulting group, productivity, collaboration workflow, document security, collaboration, document management
    
Adobe

Deliver Engaging Communications with PDF Portfolios

Published By: Adobe Systems Inc.     Published Date: Mar 04, 2011
Learn how easy it is to create and send a single PDF Portfolio using Adobe Acrobat X Pro. See how to create a rich, branded PDF Portfolio containing many types of documents, each with a rich preview experience. Discover how to embed web pages and streaming media and even output the entire portfolio experience as a web page.
Tags : 
adobe, pdf, portfolio, acrobat, pro, rich media
    
Adobe Systems Inc.

Building a Business Case for Learning Management Systems

Published By: Saba Software     Published Date: Jan 03, 2013
Download the whitepaper "Building a Business Case for Learning Management Systems” now and learn how to sell an LMS within your organization with political astuteness and business savvy.
Tags : 
lms, learning management systems, business case, business case document, lms acquisition initiative
    
Saba Software

Strategy Guide: Security Information Management In Government

Published By: HP - Intel®     Published Date: Oct 05, 2012
This whitepaper is a rich media document, and includes industry viewpoints, multimedia content, and up to three detailed customer case studies embedded within this single dossier.
Tags : 
security, security practices, enterprise security, security information management, government, application security, security services, server virtualization, business technology
    
HP - Intel®

Strategy Guide: Cloud In Government and Educational Institutions

Published By: HP - Intel®     Published Date: Oct 05, 2012
This whitepaper is a rich media document, and includes industry viewpoints, multimedia content, and up to three detailed customer case studies embedded within this single dossier.
Tags : 
cloud, cloud computing, virtualization, application modernization, blade servers, business technology, infrastructure
    
HP - Intel®

Strategy Guide: Application Modernization In Government

Published By: HP - Intel®     Published Date: Oct 05, 2012
This whitepaper is a rich media document, and includes industry viewpoints, multimedia content, and up to three detailed customer case studies embedded within this single dossier.
Tags : 
virtualization, virtualized servers, it infrastructure, government, application modernization, servers, blade servers, business technology
    
HP - Intel®
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.