document

Results 676 - 700 of 1000Sort Results By: Published Date | Title | Company Name

Predictive service excellence for printers

Published By: Quocirca     Published Date: Feb 23, 2009
Networked printers and multifunction peripherals often require a high level of support and manual intervention. Secure remote monitoring platforms reduce device downtime through automating service alerts, providing proactive toner replenishment and automatic meter reading. End users benefit through improved device uptime, and manufacturers and their service partners can build proactive service relationships which can drive greater customer loyalty.
Tags : 
quocirca, printers, networked printers, multifunction peripherals, secure remote monitoring, document output devices, remote monitoring, managed print service (mps)
    
Quocirca

Predictive vs. Anticipatory: Understanding the Best Analytic Approach

Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
What’s the best analytic approach for your business? As technology has evolved, so has our ability to process data at an incredible rate, making it possible to perform what has become known as Anticipatory Analytics. While still a relatively new concept, anticipatory analytics is gaining prevalence as a methodology. If you’re seeking to understand the future needs of your business before they show obvious signs, anticipatory analytics can’t be ignored. In this document, you’ll learn: • The advantages of anticipatory analytics • The key enablers of anticipatory analytics • How anticipatory can be leveraged for your business • Why anticipatory can give you first-mover advantage • When to use anticipatory or predictive analytics, based on your goals
Tags : 
    
Dun & Bradstreet

Préparation au grand rush de Noël: téléchargez le guide

Published By: Thawte     Published Date: Oct 05, 2015
A l’heure où les consommateurs sont de plus en plus nombreux à faire leurs achats de Noël sur Internet, leurs exigences de sécurité représentent un enjeu plus capital que jamais. C’est donc maintenant qu’il faut agir. Sur le Net, un client rassuré est un client à moitié converti. Notre nouvelle infographie et notre dernier document technique vous en livre toutes les clés avant le grand rush de Noël.
Tags : 
online shopping growth, christmas shopping season, online-savvy, customer demand, online security, security
    
Thawte

Priority Solutions International implements SpringCM

Published By: SpringCM     Published Date: Dec 07, 2006
Learn how web services integration enabled Priority Solutions’ clients and vendors to access documents in the SpringCM repository via the company’s self-service Web portal.
Tags : 
content management, document management, content management system, collaboration, web portal, portals, internet portal, springcm
    
SpringCM

Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security

Published By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in today’s business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of today’s demanding IT environment.
Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment, it management, enterprise applications
    
Centrify Corporation

Procurement Case Study Sampler

Published By: DocuSign     Published Date: Aug 17, 2016
This Sampler is a "show and tell" of how several companies are saving significant time and money with eSignatures as part of their Procurement processes. See how their teams are executing approval cycles faster by signing and sending documents digitally, from any device. 
Tags : 
docusign, digital, digital transaction management, papeless, paper cost, better service
    
DocuSign

Progress included in Gartner Magic Quadrant

Published By: Progress     Published Date: Jan 06, 2017
Digitalization brings both new opportunities and confusion to even the most carefully planned selection processes for WCM. CIOs and IT leaders aiming to boost the effectiveness of their digital business strategy should use this document to help them select the most appropriate vendor and solution. Gartner Magic Quadrant reports are the standard of excellence for vendor evaluation, research and reporting. While many vendors are evaluated, only a select few meet the stringent criteria for inclusion. Continuing its long-standing tradition, Gartner has released the 2016 Magic Quadrant for Web Content Management (WCM). Progress is recognized as a “Challenger” in this year's report, based on a combination of completeness of vision and ability to execute. This is the third consecutive inclusion for the company's award-winning web content management and digital experience solutions. Web content management is an integral piece to any successful digital transformation strategy. In our minds t
Tags : 
    
Progress

Project Insight Project Management Software vs. Microsoft Enterprise Project Management

Published By: Metafuse     Published Date: Sep 26, 2007
We are often asked how Project Insight differs from the Microsoft solution. There is no simple, 30 second answer to that question, as every software package is unique. Rather than attempt to detail a feature by feature comparison, here we offer the reader an overview of what we view as the main differences.
Tags : 
project management, document management, project planning, project, enterprise resource planning, erp, planning, metafuse
    
Metafuse

ProofMark System Concepts, Architecture, and Planning Guide

Published By: ProofSpace     Published Date: Mar 04, 2008
The ProofMark software solution is a broadly applicable system that operates on a computer, server, network, system, or infrastructure. This system utilizes public-key cryptography to create an irrefutable record of the time-existence and exact composition of any digital data. This document, the ProofMark System Concepts, Architecture, and Planning Guide, provides you with a broad technical overview of the ProofMark system.
Tags : 
public key, secure content, encryption, proofspace, proofmark, pki, document management, secure content management
    
ProofSpace

Protección contra Técnicas de Evasión Avanzadas

Published By: McAfee     Published Date: Jun 04, 2014
El paradigma de la seguridad de red actualmente está cambiando hacia una nueva realidad a medida que los métodos avanzados de hacking son más frecuentes y difíciles de detectar. Un ejemplo de este método son las técnicas de evasión avanzadas (AETs, Advanced Evasion Techniques). Aunque se han documentado ampliamente las evasiones en los últimos quince años, los proveedores de seguridad han ignorado sistemáticamente su importancia. Algunos proveedores incluso han minimizado la importancia de la amenaza presentada cómo evasiones como siendo puramente teórica. Sin embargo este debate no logra percibir el problema principal: el riesgo de los sistemas de seguridad de red comprometidos por AETs continúa creciendo a medida que más y más los ciberdelincuentes aprovechan activamente esta vulnerabilidad. La respuesta es combinar la inspección basada en flujos con la normalización de datos en múltiples capas de protocolo.
Tags : 
firewall de próxima generación, sistemas de prevención de intrusiones, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, aet, ngfw
    
McAfee

Protect Against Targeted Attacks With Security Intelligence

Published By: Symantec     Published Date: Mar 14, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
symantec, security intelligence, attacks, cyber attacks, hackers, web security, data protection, targeted attacks
    
Symantec

Protect Against Targeted Attacks with Security Intelligence

Published By: Symantec     Published Date: Nov 19, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, business continuity
    
Symantec

Protect Against Targeted Attacks with Security Intelligence

Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, hacker detection
    
Symantec

Protect Against Targeted Attacks with Security Intelligence

Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, firewalls
    
Symantec

Protect Against Targeted Attacks with Security Intelligence

Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, email security
    
Symantec

Protect your document & intellectual property with Locklizard

Published By: LockLizard     Published Date: Dec 08, 2008
In any enterprise there is information that has to be kept secret, but must be distributed, and therefore has to be identified with any recipient in the event that it is ‘leaked.’  This white paper addresses two examples of this requirement (boardroom secrets and mergers and acquisitions), and shows how to identify solutions that meet business needs for document protection and secure file sharing.
Tags : 
drm solutions, locklizard, document protection, secure file sharing, security, identity management, internet security, intrusion detection
    
LockLizard

Protect Yourself From Antivirus

Published By: Palo Alto Networks     Published Date: Apr 25, 2017
This document outlines three core reasons why traditional AV no longer offers organizations any meaningful security value. Looking beyond the tangible staffing, operational, and licensing and support costs, the document highlights some of the hidden costs associated with operating an antivirus system that may be intangible, difficult to quantify, or unquestioned due to precedence.
Tags : 
    
Palo Alto Networks

Protecting against the insider threat: Preventing the accidental send

Published By: Egress ABM Pilot     Published Date: Dec 07, 2017
This white paper is about the sinking feeling you get when you realise you’ve sent an email to the wrong person, attached the wrong file, or uploaded the wrong document to a file sharing site.
Tags : 
    
Egress ABM Pilot

Protecting data in the age of employee churn

Published By: Code42     Published Date: Apr 22, 2016
Today, in the age of information, people are paid for their ideas: to create original knowledge products or add value to existing products. Given their self-reliance, it is not surprising that workers take pride in their outputs—up to half of employees take a portfolio of files with them when they leave. When employees move on, many feel entitled to the work they’ve created.They presume it is acceptable to transfer work documents to personal computers, removable media, tablets, smartphones or online file sharing apps. Some pilfered data is innocuous and already in the public realm. But some of it is classified. Read this paper to find out how to collect and secure data to protect operations, reputation and continuity when employees leave.
Tags : 
data protection, code 42, data security, intellectual property, database security, information management, secure content management
    
Code42

Protecting server data with HP StoreOnce Catalyst and HP Data Protector

Published By: HP     Published Date: May 14, 2014
In today’s business environment, customers rely on the most efficient, high performing, and reliable backup systems to protect critical business information. Customers need to protect increasing levels of data while keeping costs under control. HP StoreOnce Backup systems provide a disk-based data protection platform while addressing data growth by applying HP StoreOnce deduplication software for efficient, longer term data retention.This document describes the benefits of using HP StoreOnce Backup systems combined with HP StoreOnce Catalyst software and HP Data Protector to back up important enterprise data. This document also recommends backup and recovery implementations.
Tags : 
hewlett packard, storeonce, data protector, catalyst software, it management, enterprise applications
    
HP

Protecting Unstructured Data on File Servers, NetApp, EMC and SharePoint

Published By: Quest Software     Published Date: Oct 25, 2012
Reduce the security risk and compliance concerns of unstructured data: emails, documents and spreadsheets. Unlike native tools, ChangeAuditor offers comprehensive, easy-to-use auditing, and more, to ensure security and regulatory compliance.
Tags : 
security, data security, file share security, sharepoint, file servers, netapp, data management, data center
    
Quest Software

Proteção contra técnicas de evasão avançadas

Published By: McAfee     Published Date: Aug 15, 2014
Atualmente, o paradigma de segurança de rede está mudando rumo a uma nova realidade, pois os métodos avançados dos hackers estão cada vez mais predominantes e difíceis de detectar. Um exemplo desses métodos são as técnicas de evasão avançadas (AET, Advanced Evasion Technique). Embora tenham sido documentadas inúmeras evasões nos últimos 15 anos, os fornecedores de segurança ignoraram sistematicamente sua importância.
Tags : 
    
McAfee

Proteção contra técnicas de evasão avançadas

Published By: McAfee     Published Date: Aug 15, 2014
Atualmente, o paradigma de segurança de rede está mudando rumo a uma nova realidade, pois os métodos avançados dos hackers estão cada vez mais predominantes e difíceis de detectar. Um exemplo desses métodos são as técnicas de evasão avançadas (AET, Advanced Evasion Technique). Embora tenham sido documentadas inúmeras evasões nos últimos 15 anos, os fornecedores de segurança ignoraram sistematicamente sua importância.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, aet, ngfw
    
McAfee

Providing a Frontline Defense Against Fileless Malware

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance

PUBLIC KEY INFRASTRUCTURE (PKI) BUYERS GUIDE

Published By: Entrust Datacard     Published Date: Jul 23, 2019
Advanced key and certificate management enables the use of digital credentials even in the most demanding of security environments. Such solutions enable users, regardless of whether they are internal or external to their network, to benefit from both basic and enhanced capabilities in a consistent and secure manner. This document was created to assist organizations in the selection of the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed. This is not intended to be an exhaustive list. It is meant as a starting place to assist you in your review process. Introduction
Tags : 
    
Entrust Datacard
Start   Previous    21 22 23 24 25 26 27 28 29 30 31 32 33 34 35    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.