document

Results 751 - 775 of 1000Sort Results By: Published Date | Title | Company Name

Security and Governance for Content Distributed on Mobile Devices

Published By: bigtincan     Published Date: Oct 10, 2014
These days, business productivity depends largely on the ability to securely access and interact with a wide range of information over mobile devices, such as tablets and smartphones. From sales executives to field technicians, the demand for accessing corporate content securely on mobile devices is growing exponentially. In the past, implementing security measures to protect corporate content has involved VPNs, intranets, firewalls and passwords. However the increasing uptake of mobile devices in corporate settings means security measures must be implemented over a plethora of networks and devices. bigtincan has created a powerful solution with BigTinCan hub. An application for mobile devices, it allows for the distribution, management and governance of a range of content, including documents and rich media content, with enterprise-grade security.
Tags : 
mobile apps, mobile content, mobile security, corporate content
    
bigtincan

Security Framework: A Guide for Business Leaders

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
While few corporate executives and boards of directors would dispute the importance of cybersecurity, some may feel ill-prepared to begin the process of managing these risks given the myriad technical and non-technical elements of the issue. The goal of this document is to address this gap by providing corporate leaders a practical framework for addressing the people, process, and technology elements of the cybersecurity challenge
Tags : 
palo alto, security framework, security, business leaders, digital
    
Palo Alto Networks

Security in Document Management: Enabling Secure Productivity

Published By: Adobe     Published Date: Aug 20, 2015
IT leaders need tools to protect a company's most important documents. That means sales agreements, offer letters, procurement contracts, legal documents - and everything between.
Tags : 
adobe, document, crm, mobile, sales, automation, cloud, it management
    
Adobe

Security in Document Management: Enabling Secure Productivity

Published By: Adobe     Published Date: Nov 10, 2015
Watch this seminar and hear experts from Penton Media and Adobe discuss methods to ensure that sensitive documents are handled by the right people - and no one else.
Tags : 
ibm, document management, data security, productivity, enterprise, mobile, security, saas
    
Adobe

Security in Fax: Minimizing Breaches and Compliance Risks

Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. Itís not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management
    
OpenText

Security in Fax: Minimizing Breaches and Compliance Risks

Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. Itís not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management
    
OpenText

Security Policy: Five Keys to User Compliance

Published By: Brainloop     Published Date: Nov 09, 2011
Business users are a key part of a company\'s security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company\'s confidential documents--provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training--yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, security, user compliance, indentity management, access control, identity management, internet security
    
Brainloop

Security Policy: Five Keys to User Compliance

Published By: Brainloop     Published Date: Jan 04, 2012
IT can do everything in its power to secure the company's confidential documents, yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, compliance, user compliance, security, access control, security management, security policies
    
Brainloop

Security Software Can't Protect Your Law Firm If Your Staff Can't Use It

Published By: Canon Solutions America     Published Date: Feb 28, 2019
Limiting access to confidential client files is vital. But choosing the wrong document security solution can overwhelm your staff (and your IT department) and leave your data vulnerable. Learn five important features a security solution should offer.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America

Security Solution Performance Benchmark

Published By: Intel     Published Date: May 15, 2017
The intent of this document is to help customers who are interested in implementing security protection mechanisms in Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) domains.
Tags : 
software-defined wan, security, network functions virtualization, nfv, wide area network, intel
    
Intel

See Why Small and Mid-Sized Companies Are Doing Things Quickr

Published By: IBM     Published Date: Sep 23, 2008
To stay ahead of the competition, companies depend on partnering and collaboration solutions that leverage the capabilities of suppliers, partners and customers. In this webcast you'll see how IBM Lotus Quickr 2.0 can transform the way everyday business content, like documents and rich media, can be shared to make a more effective collaboration team.
Tags : 
collaboration, ibm, ibm mmdg, mmdg, collaborative commerce, document management, productivity, quickr
    
IBM

Selecting the Right Cybercrime-Prevention Solution

Published By: IBM     Published Date: Aug 06, 2014
Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.
Tags : 
ibm, banking, cybercrime, prevention, solution, fraud, security
    
IBM

Selecting the right cybercrime-prevention solution

Published By: IBM     Published Date: Aug 08, 2014
Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.
Tags : 
fraud prevention, malware detection, threat intelligence, cybercrime, technology, internet security, intrusion detection, intrusion prevention
    
IBM

Selecting the right cybercrime-prevention solution

Published By: IBM     Published Date: Nov 04, 2014
Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.
Tags : 
threat prevention, cybercrime, it security, malware protection
    
IBM

Service Organizations and SoMoClo

Published By: Quest Software     Published Date: Feb 06, 2013
This document will highlight how these individual components are impacting service organizations and track the progress of convergence of these three components on the IT infrastructures of service organizations.
Tags : 
service, organizations, it infrastructure, service, mobility, field service, communication, collaboration
    
Quest Software

Service Organizations and SoMoClo

Published By: ClickSoftware     Published Date: Feb 07, 2013
This document will highlight how these individual components are impacting service organizations and track the progress of convergence of these three components on the IT infrastructures of service organizations.
Tags : 
service, organizations, it infrastructure, service, mobility, field service, communication, collaboration
    
ClickSoftware

Service-Based Masking: Critical to Data Loss Prevention and Threat Reduction

Published By: Delphix     Published Date: May 28, 2015
Over the past several years data loss and data leaks have been a regular part of headline news. From high-profile hacks of retailers such as Target and Home Depot to inadvertent email data leaks from large multi-national banks to targeted leaks of sensitive government documents, it is becoming clear throughout the private and public sector that data security or the lack thereof is an existential threat to business operations. While there are many vendors focused on data encryption, data masking is actually the single most effective mechanism for an IT organization to dramatically reduce or even eliminate the risk of data loss.
Tags : 
    
Delphix

Seven Key Considerations Before Your Upcoming F5 or Citrix Load Balancer Refresh

Published By: Avi Networks     Published Date: Aug 17, 2018
This whitepaper details how ADCs and virtual appliances are inflexible, expensive, and lacking in visibility in contrast to the central management, autoscaling features, intelligent analytics, and flexibility offered by the Avi Vantage Platform. This document also outlines 7 key considerations that you should evaluate before you refresh your current load balancers: 1. Automation and Self-Service 2. Elasticity 3. Applica tion Analytics and Troubleshooting 4. Performance 5. Hybrid Cloud 6. Ecosystem Integrations 7. Total Cost of Ownership
Tags : 
    
Avi Networks

Seven Reasons Why SIP Will Improve Your Customer Care Strategy

Published By: Genesys     Published Date: Jan 27, 2009
In this document, Opus Research offers seven ways SIP (Session Initiation Protocol) can revolutionize customer care in your enterprise. More specifically, we evaluate deployments that involve SIP and provide case studies that integrate Genesys SIP the Customer Interaction Manager (CIM), Genesys Voice Platform (GVP), and Business Process Routing from Genesys Telecommunications Laboratories.
Tags : 
genesys, sip, session initiation protocol, customer integration manager, genesys voice platform, voip, crm, enterprise applications
    
Genesys

Seven Smart Energy Saving Tips for Business

Published By: EDF Energy     Published Date: Aug 22, 2018
Download this document to discover EDF Energy's top tips to save energy for your business: - Get to know your usage - Savings by area - Rally your teams to help you save. To find out how these tips and more can help, download today!
Tags : 
    
EDF Energy

Sharing Sensitive Corporate Documents Without Compromising Security and Governance

Published By: Intralinks     Published Date: May 29, 2013
SaaS-based (Software as a Service) collaboration and information sharing repositories are paramount for secure file/document sharing Ė yet, not all GCs are truly aware of the benefits they can bring to an organization.
Tags : 
saas, software as a service, collaboration, information sharing, file, document sharing, secure, security
    
Intralinks

Sharing Sensitive Corporate Documents without Compromising Security and Governance

Published By: Intralinks     Published Date: Oct 03, 2013
For many companies, in particular in industries like pharmaceuticals, software development, or entertainment, their intellectual property is more valuable than any physical asset. And with the increasing need to collaborate with external business partners to accelerate product life cycles and enhance innovation, there is a greater risk for sensitive information to be compromised. In this 6-page white paper, discover the benefits of how the right inter-enterprise collaboration tool can ensure secure document sharing and team collaboration, and what to keep in mind as you look for a provider.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, knowledge management, enterprise applications
    
Intralinks

Sharing Sensitive Corporate Documents without Compromising Security and Governance

Published By: Intralinks     Published Date: Mar 12, 2014
In this 6-page white paper, discover the benefits of how the right inter-enterprise collaboration tool can ensure secure document sharing and team collaboration, and what to keep in mind as you look for a provider.
Tags : 
compromised information, sharing, corporate documents, security, governance, network security, it management, business technology
    
Intralinks

Sharing Simplified - Consolidating Multiple File Sharing Technologies

Published By: Box     Published Date: May 31, 2012
Read how one company's continuing consolidation of file sharing technologies reaped benefits that any organization may derive by undertaking that effort.
Tags : 
sharing, dow, free online storage, online storage, file sharing, online file storage, share files online, store documents online
    
Box

SHELL LUBRICANTS FOR DRIVELINE: FUELLING A SAFE AND RELIABLE FLEET

Published By: Shell U.K. Limited     Published Date: Sep 27, 2019
The success of your bus fleet business depends on your ability to keep vehicles on the road while finding innovative new ways to maximise cost efficiency. Yet 70% of fleet operators are concerned the costs of new technology may outweigh the benefits, which is why two-thirds (69%) donít want to upgrade while current machinery is still operational. 77% of fleet managers also say their maintenance staff would benefit from extra training. This is why weíve created Shell lubricants for Driveline: a suite of high-performing lubricants and expert advice that adds up to more than the sum of its parts Ė making your current bus fleet more efficient, profitable and competitive. Putting this into perspective, customers leveraging Shell Technical Services have seen a marked improvement in their operations. This has delivered over $68M in documented value savings to Shellís B2B customers.
Tags : 
    
Shell U.K. Limited
Start   Previous    24 25 26 27 28 29 30 31 32 33 34 35 36 37 38    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.