document

Results 726 - 750 of 1000Sort Results By: Published Date | Title | Company Name

Requirements Gathering for Electronic Document Management

Published By: CloudDocs by eGistics, Inc.     Published Date: Sep 30, 2011
This paper identifies important criteria for gathering user requirements for an EDMS project.
Tags : 
    
CloudDocs by eGistics, Inc.

Requirements When Considering a Next- Generation Firewall

Published By: Cisco     Published Date: Oct 14, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a next-generation firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise.
Tags : 
cisco, nfgw, next generation firewall, enterprise management, network visibility, malware activity, malware protection, security solutions, networking, security, software development, it management, data management, business technology
    
Cisco

Requirements When Considering a Next-Generation Firewall (WP)

Published By: Cisco     Published Date: Apr 08, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise. An NGFW must be able to: • Integrate security functions tightly to provide highly effective threat and advanced malware protection • Provide actionable indications of compromise to identify malware activity • Offer comprehensive network visibility • Help reduce complexity and costs • Integrate and interface smoothly and transparently with third-party security solutions • Provide investment protection
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution, security, data management
    
Cisco

Research Report: Digitization Beyond the Point of Care

Published By: Bottomline Technologies     Published Date: Sep 16, 2016
Download this research report today to better understand how healthcare providers are reducing the use of paper beyond the point of care.
Tags : 
bottomline, bottomline technologies, digitalization, paperless office, document management, customer service, it spending, data protection, information management, records management
    
Bottomline Technologies

Retentionomics: The Path to Profitable Growth

Published By: Sailthru     Published Date: Aug 15, 2016
It has been well documented that it is much more cost-effective to focus on nurturing relationships with existing customers than it is to find and convert new ones. Forbes Insights and Sailthru recently completed a global study of 300 retail and media executives to find out if, and how, they take advantage of the benefits of retention strategies and how that impacts growth and performance.
Tags : 
sailthru, retention, forbes, growth, media, retail, marketing, nurturing, nurture, customer experience
    
Sailthru

Règlement général sur la protection des données (RGPD)

Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Ce document présente les résultats d’une enquête commandée par CA Technologies en vue de comprendre la situation des entreprises face aux exigences imposées par le RGPD. Ce dernier ayant de vastes implications concernant le type de données pouvant être utilisées dans les environnements autres que de production, CA Technologies souhaitait avant tout comprendre comment les entreprises envisageaient de se mettre en conformité avec le RGPD et quels sont les processus et technologies nécessaires pour y parvenir.
Tags : 
rgpd, gdpr, conformité, compliance, data testing, test data management, ca test data manager
    
CA Technologies EMEA

ROI: The Value of Deployment Automation

Published By: IBM     Published Date: Oct 17, 2013
ROI: The Value of Deployment Automation explains how a deployment automation framework can streamline release operations and increase business agility. The document describes the benefits of Deployment Automation. In addition, the whitepaper contains a formula for calculating the ROI of a Deployment Automation solution.
Tags : 
ibm, roi, deployment automation, deployment, automation, roi, automation framework, visibility, deployment frequency, application configuration, application release, application integration, application performance management, productivity, business technology
    
IBM

Safe Swimming in the Waters of ADA Accommodations Compliance

Published By: Optis     Published Date: Jun 08, 2015
This e-book offers seven steps to ensure that your organization avoids the dangers of hidden rocks and currents that swirl around ADA accommodations compliance: efficiently and accurately track, manage, and document your accommodation process to mitigate compliance risk and eliminate employee grievances.
Tags : 
ada, adaaa, ada compliance, employee ada accommodation
    
Optis

Sailing Through a Sea of Documents

Published By: PC Mall     Published Date: Mar 03, 2012
Canon's digital imaging products allowed Shoreline Records Management to chart a course to help increase productivity and reduce costs to promote business growth. Find out what Canon can do for your business in this case study!
Tags : 
canon, productivity, mobile, remote, shoreline, records, sanners, cnaon, documents, convert, wireless
    
PC Mall

San Diego County District Attorney Success Story: Beyond Pushing Paper

Published By: Adobe     Published Date: Feb 20, 2014
San Diego County District Attorney’s Office accelerates Juvenile Court proceedings using Adobe® Acrobat® Pro in Microsoft SharePoint environment.
Tags : 
adobe, adobe acrobat pro, file management, software, data management, electronic documentation, paperless processing, pdf documents, it management, content management system, document management, information management, records management, search and retrieval
    
Adobe

Sans Healthcare

Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management, security
    
Qualys

Scale-out All-flash Storage for Demanding Unstructured Data Workloads

Published By: Dell EMC     Published Date: Aug 22, 2017
This Lab Validation Report documents the results of recent hands-on testing of Dell EMC Isilon All-Flash storage. Testing focused on the platform’s performance and scalability and how it enables organizations to support more applications and workloads with flash based on their ever-increasing volumes of unstructured data.
Tags : 
    
Dell EMC

Scan to cloud or network

Published By: PC Mall     Published Date: Mar 03, 2012
This document provides step-by-step instructions on how to use your PC set up your HP Scanjet to scan to the cloud.
Tags : 
scan, scanners, productivity, cloud, network, wireless, convergence, infrastructure, interoperability, ip networks, ip telephony, migration, network architecture, network management, network performance, remote access, remote network management, storage area networks, storage management, storage virtualization
    
PC Mall

Scott Brownrigg Success Story: Designing the Future

Published By: Adobe     Published Date: Feb 20, 2014
Award-winning design practice advances architecture, interior design, and planning excellence by standardizing on Adobe Creative Cloud and Adobe Acrobat® Pro.
Tags : 
adobe, adobe creative cloud, software, software deployment, enterprise agreement, license management, document security, compliance, collaboration, productivity, file management, pdf files, it management, document management, standardization, software development, contact management, content integration, content management system, information management
    
Adobe

Scrum Reference Card

Published By: CollabNet     Published Date: Jan 11, 2013
This document, written by thought leader and certified CollabNet Scrum trainer and coach Michael James, condenses the essence of Scrum into 6 pages. It's a must read for agile enthusiasts and anyone who wants to learn more about Scrum.
Tags : 
scrum, agile, software development, framework, project management, application integration, application performance management, best practices, business process management, enterprise software, productivity
    
CollabNet

Secrets to BSM Success: End-to-End Visibility and Customer Focus

Published By: ASG Software Solutions     Published Date: Feb 23, 2010
There are success stories of businesses that have implemented Business Service Management (BSM) with well-documented, bottom-line results. What do these organizations know that their discouraged counterparts don't?
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions

Secure Document Sharing on Mobile Devices

Published By: IBM MaaS360     Published Date: Feb 05, 2015
Smart companies are realizing a vital part of any mobile device management strategy is to mitigate risk by sealing these security holes in document sharing and finding new ways to enhance information sharing across the enterprise in a secure and compliant manner.
Tags : 
mobile device management, mobile document sharing, risk mitigation, document security, byod, security, it management, document management, information management
    
IBM MaaS360

Securing Cloud Computing for Enterprise Collaboration

Published By: Intralinks     Published Date: Oct 03, 2013
As the business case for Software-as-a-Service (Saas) and other cloud computing models solidifies, more companies are incorporating cloud computing into their IT programs. However, the legal, regulatory, and ethical requirements of data security must be adhered to regardless of where the information is housed. The best SaaS providers offer strong authentication systems, user activity auditing tools, and real time usage reporting to maintain the highest level of control over sensitive and confidential data. In this 11-page white paper, Intralinks provides tips and questions to ask prospective providers about their security standards and practices, software reliability and uptime, and the availability of reporting and audit trails.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, knowledge management, enterprise applications, data management, business technology
    
Intralinks

Securing Data in the Cloud

Published By: Symantec.cloud     Published Date: Aug 10, 2010
This document is intended to give a broad overview of our security policies, processes and practices current at the date of writing.
Tags : 
messagelabs, symantec hosted services, security policies, best practices, cloud computing, software as a service, saas, data security, policy based management, data protection, data center design and management
    
Symantec.cloud

Securing end-user mobile devices in the enterprise

Published By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications, enterprise applications, business technology, telecom
    
IBM

Securing Web Applications: The Time Is Now

Published By: Cenzic     Published Date: Nov 21, 2006
Enterprises need to utilize software testing that can automatically review applications for security problems. This document examines the market drivers and technology associated with software security code review products and discusses how Cenzic is addressing this urgent need.
Tags : 
web applications, application security, web application security, security code, cenzic, security, auditing, compliance, encryption, firewalls, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, security management, security policies, single sign on, web service security, ebusiness
    
Cenzic
Start   Previous    23 24 25 26 27 28 29 30 31 32 33 34 35 36 37    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.