ensure data

Results 201 - 225 of 228Sort Results By: Published Date | Title | Company Name

Choosing a Cloud Hosting Provider with Confidence: VeriSign SSL Certificates Provide a Secure Bridge

Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
In this must read white paper, you will learn about cloud computing, new opportunities, new security challenges and how to ensure your data is safe.
Tags : 
cloud, hosting company, security, ssl certificate, verisign inc., verisign ssl certificate, access control, application security
    
VeriSign Authentication Services, now a part of Symantec Corp.

Guide to B2B Leads: Ensure the Highest Quality Business Data

Published By: Jigsaw     Published Date: Nov 17, 2010
This white paper will discuss how business owners and salespeople can source the freshest business data and what to look for when choosing a business data provider.
Tags : 
jigsaw, gen, demand generation, awareness, leads, support, sales, targetingb2b
    
Jigsaw

Recent Advancements in SSL-based Security Solutions

Published By: VeriSign     Published Date: Feb 10, 2011
This paper reveals the latest advances in SSL technology and how these advances ensure your customers have confidence in the security of your site, as well as protecting them from threats such as phishing, data manipulation and other site scams.
Tags : 
verisign, ssl, security, phishing, data manipulation, threats, protection, secure sockets layer
    
VeriSign

The BlackBerry® PlayBook 2.0 and the Next Generation of Mobile Security

Published By: BlackBerry     Published Date: Oct 03, 2012
Though you can't stop the loss or theft of devices, there are powerful ways to ensure enterprise and data security in every scenario. This FAQ explains how the BlackBerry PlayBook tablets can be an integral part of an enterprise security strategy.
Tags : 
enterprise security, enterprise security strategy, mobile security, data security, blackberry, workplace mobility, mobile computing, wireless security
    
BlackBerry

The BlackBerry® PlayBook 2.0 and the Next Generation of Mobile Security

Published By: Blackberry     Published Date: Oct 03, 2012
Though you can't stop the loss or theft of devices, there are powerful ways to ensure enterprise and data security in every scenario. This FAQ explains how the BlackBerry PlayBook tablets can be an integral part of an enterprise security strategy.
Tags : 
enterprise security, enterprise security strategy, mobile security, data security, blackberry, workplace mobility
    
Blackberry

Project and Construction Execution Solution Brief

Published By: Oracle     Published Date: Oct 20, 2016
This wnhitepaper illustrates how Oracle’s Project and Construction Execution Solution for integrated cost and schedule delivery helps ensure project success by uniting business processes and data from the time a contract is created to when work is completed at the job site.
Tags : 
    
Oracle

Online merchants and E-tailers: Preparing for the 2014 Holiday Shopping Season

Published By: Symantec     Published Date: Dec 04, 2014
With 93% of people doing at least some of their holiday-season shopping with online merchants, e-tailers of every kind need to get their websites in gear and ensure their customers feel confident shopping on their site. Whether it’s shopping online, in store pick-up, or even browsing and wish lists, customers are offering you an unprecedented amount of data and sales this season. But fail to keep your customers safe with good website security, and all you’ll get is a lump of coal in your stocking.
Tags : 
online merchants, e-tailers, holiday, holiday season, website security, shopping, security
    
Symantec

File Security Evolution: From 5 Years Ago to Today (with a Hint at Tomorrow)

Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : 
byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection
    
Globalscape

Securing the Evolving Datacenter

Published By: Intel Security     Published Date: Oct 20, 2015
Companies are well aware of the benefits of virtualization and cloud computing, but many are reluctant to embrace the public clould because they don't have a way to assess and ensure security. This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : 
aberddeen, data center, datacenter, cloud, server security, networking, data management
    
Intel Security

Azure SQL Database E-book

Published By: Microsoft Azure     Published Date: Apr 25, 2018
As you develop any app, database performance optimization is a critical consideration. Azure SQL Database, the intelligent cloud database from Microsoft, is designed to simplify your work as a developer and adapt to your workload so you’re not left scrambling in pivotal moments. Read Intelligent Performance Optimization with Azure SQL Database for actionable ways to maximize the performance and optimization of your database at minimal cost. In this e-book, you’ll explore three perspectives on database performance: Dynamic resource scaling Database performance features Intelligent performance monitoring and tuning Get this free e-book today to ensure that your database has the resources it needs, makes the most of those resources, and constantly optimizes in the background for the best possible SQL performance.
Tags : 
    
Microsoft Azure

Conversational Office 365 Cyber Resilience – A Conversational Geek eBook

Published By: Mimecast     Published Date: Oct 02, 2019
If you are an moving to or already using Office 365 then it’s essential for you to formulate a plan toward a risk-free cyber resilience experience. Cyber resilience requires you to prepare for the before, during and after an attack/outage/incident. Doing so will protect your organization from security threats, compliance concerns, unplanned outages and more. To mitigate concerns and form a resilient strategy you have to first KNOW the risks. The right third-party solution can ensure email is protected against advanced cyberattacks and guarantee service availability SLA – all while leveraging your investment in Microsoft Office 365™. But, what are the key areas of concern around Office 365 email you should be aware of? Read what Microsoft Office Apps and Services MVP J. Peter Bruzzese has to say about the key features and functions you need to address security, data assurance and continuity for Office 365 email – and what to look for in a single solution that does it all.
Tags : 
    
Mimecast

Leveraging Office 365 with VMware AirWatch®

Published By: VMware AirWatch     Published Date: Dec 13, 2016
As enterprises embrace adoption of Microsoft Office 365 to drive productivity by using the latest mobile applications and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between security and user experience is often difficult. In this 60-minute webinar, discover how VMware AirWatch® Enterprise Mobility Management (EMM) easily integrates with both Office 365 and VMware Identity Manager to optimize user experience and ensure data is secure across all devices and platforms. An AirWatch expert will give an in-depth demonstration of the advantages of deploying Office 365 with AirWatch by VMware, as well as conduct a Q&A session.
Tags : 
    
VMware AirWatch

A Deeper Dive into Windows 10 Management with VMware AirWatch

Published By: VMware AirWatch     Published Date: Jul 20, 2017
Take a deeper look into how AirWatch enables Windows management to evolve from a rigid PC-centric approach to one offering a flexible and over-the-air configuration model. This session will delve into the specific configuration, security and OS patch management technologies that AirWatch introduces, as well as leveraging AirWatch alongside conventional Windows management tools that are in use today. • Leverage product provisioning and native configuration management features for policy management from the cloud • Integrate with the new Windows Update as a Service to flexibly manage OS updates and patches on or off the domain • Ensure endpoint security and data protection via advanced security features in the management platform and Windows 10
Tags : 
    
VMware AirWatch

What Data Discovery Means For You

Published By: Qlik     Published Date: Oct 13, 2015
Data discovery appeals strongly to business users, but some business intelligence leaders are reluctant to ensure adoption. Data discovery is filling the gap between traditional BI and advanced analytics, and this research explains why and how BI leaders should support its use.
Tags : 
qlik, data discovery, business intelligence, analytics, user produced content, data management, business technology
    
Qlik

Okta Security: Technical White Paper

Published By: Okta     Published Date: Jul 27, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control. This whitepaper details Okta’s focus on security and reliability, how Okta enhances security and how Okta itself stays secure.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta

Technologies Which Can Support And Greatly Facilitate Key Stages of Remediation

Published By: Thomson Reuters     Published Date: Mar 08, 2018
Although AI and big data have delivered advances in technology these past years which make remediation more manageable and more efficient, it’s important ensure that the solution you select, meets your particular requirements, addresses and meets your needs. Some jurisdictions require technology dealing with certain types of data to be hosted on-site; data hosting, exchange, protection and privacy can all affect the choice of solution or vendor. It’s common for companies to call out these specifics in their RFPs. Other considerations include the level of precision and recall (e.g., the accuracy) required to meet project needs, the setup time for a system, its implementation and the ability to support globally dispersed team members.
Tags : 
technology, financial, sector, database, thomson, reuters
    
Thomson Reuters

Repapering for Regulatory Change

Published By: Thomson Reuters     Published Date: Mar 08, 2018
Many seasoned attorneys will agree that remediating an enormous amount of documentation to ensure regulatory compliance is no easy feat. The volume of repapering necessary for compliance with the new rules governing margin requirements for non-centrally cleared derivatives (UMR) presented new challenges, exposed structural weaknesses, and provided many lessons learned which can be applied to any documentation remediation effort. Many UMR initiatives suffered significant hurdles that contributed to delays and missed deadlines. Common among the various challenges faced were the dearth of talent in the quantities needed, and the limited technology and data management solutions utilized.
Tags : 
legal. umr, project, management, alsp, thomson, reuters
    
Thomson Reuters

Best Practice: Identify High Potentials Before You Lose Them!

Published By: IBM     Published Date: Jul 20, 2016
Whether it's through using pre- or post-hire assessments, applying managerial feedback or learning results, identifying high potentials is a huge win for determining who will lead your company forward. With such information, businesses can ensure that their most valued employees are promoted, challenged, and encouraged to succeed - and that they stay with your business. Without this data, companies risk losing the talent that keeps them competitive and successful.
Tags : 
ibm, aberdeen group, talent acquisition, recruitment, human resource technology
    
IBM

Practical Human-in-the-Loop Machine Learning

Published By: AWS     Published Date: Jun 11, 2019
Join us to learn why Human-in-the-Loop training data should be powering your machine learning (ML) projects and how to make it happen. If you’re curious about what human-in-the-loop machine learning actually looks like, join Figure Eight CTO Robert Munro and AWS machine learning experts to learn how to effectively incorporate active learning and human-in-the-loop practices in your ML projects to achieve better results. You'll learn: When to use human-in-the-loop as an effective strategy for machine learning projects How to set up an effective interface to get the most out of human intelligence How to ensure high-quality, accurate data sets When: Available On Demand (please register to view) Who Should Attend: IT leaders and professionals, line-of-business managers, business decision makers, data scientists, developers, and other experts interested in implementing AI/ML on the cloud are encouraged to attend this webinar. AWS Speaker: Chris Burns, Solutions Architect Figure Eight Spea
Tags : 
    
AWS

ESG Assessing the Financial Impact of HPE InfoSight Predictive Analytics

Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Applications are the engines that drive today’s digital businesses. When the infrastructure that powers those applications is difficult to administer, or fails, businesses and their IT organizations are severely impacted. Traditionally, IT assumed much of the responsibility to ensure availability and performance. In the digital era, however, the industry needs to evolve and reset the requirements on vendors. HPE Nimble Storage has broken away from convention and transformed how storage is managed and supported with the HPE InfoSight predictive analytics platform. HPE engaged ESG to conduct a quantitative survey of the HPE Nimble Storage installed base, as well as non-HPE Nimble Storage customers, to better assess how HPE InfoSight positively impacts customer environments. Both HPE InfoSight telemetry data and ESG’s quantitative survey data show that the benefit delivered to HPE Nimble Storage customers is significant, driving: • 79% lower IT operational expenses. • 73% fewer trouble ti
Tags : 
    
Hewlett Packard Enterprise

ESG Assessing the Financial Impact of HPE InfoSight Predictive Analytics

Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Applications are the engines that drive today’s digital businesses. When the infrastructure that powers those applications is difficult to administer, or fails, businesses and their IT organizations are severely impacted. Traditionally, IT assumed much of the responsibility to ensure availability and performance. In the digital era, however, the industry needs to evolve and reset the requirements on vendors. HPE Nimble Storage has broken away from convention and transformed how storage is managed and supported with the HPE InfoSight predictive analytics platform. HPE engaged ESG to conduct a quantitative survey of the HPE Nimble Storage installed base, as well as non-HPE Nimble Storage customers, to better assess how HPE InfoSight positively impacts customer environments. Both HPE InfoSight telemetry data and ESG’s quantitative survey data show that the benefit delivered to HPE Nimble Storage customers is significant, driving: • 79% lower IT operational expenses. • 73% fewer trouble ti
Tags : 
    
Hewlett Packard Enterprise

Tech Target Editorial - Master Plan: Getting Your Money's Worth From MDM

Published By: IBM     Published Date: Apr 18, 2017
Master data management (MDM) programs provide ways to ensure that data is consistent in different systems throughout an organization, but poorly managed initiatives are large and complicated affairs. This handbook will provides practical advice on how to develop and implement successful MDM programs that can pay big business dividends. Discover expert advice on: - Strategies and tactics for effective MDM processes - The technology considerations that should be factored into project plans - The ramifications of incorporating pools of “big data” into MDM efforts - And more
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
IBM

Simple, Scalable and Accessible Archiving

Published By: Redstor UK     Published Date: Mar 12, 2018
Redstor Pro's Data Management Platform features an integrated archiving solution which delivers simple to manage, highly scalable long term archiving that ensures data remains extremely easy to access whilst freeing up expensive primary storage. Users of the service avoid the need to archive data to unreliable tape or add more expensive tier one storage due to data growth.
Tags : 
    
Redstor UK

HOW TO ENSURE EFFECTIVE DATA PROTECTION IN YOUR ORGANIZATION

Published By: Veeam '18     Published Date: Oct 28, 2019
The damage caused by ransomware is widely discussed in the media. But this is far from the only danger that threatens the availability of your data. In this webinar, you will learn about the basic concepts of IT system availability and how Veeam® can help you implement these concepts in your company. The following issues will be highlighted: backup rule "3-2-1"; why snapshots are not a backup; how to prevent implicit data corruption.
Tags : 
    
Veeam '18

How to prepare for your next security breach

Published By: Lenovo - APAC     Published Date: Jul 02, 2019
Your guide to security Don’t lose unnecessary time coping with attacks, threats and theft. Lenovo ThinkShield is a comprehensive security portfolio that brings you end-to-end protection. In your solutions guide, you’ll find out the benefits of ThinkShield, how to ensure your data stays secure, how to keep employees stay safe online and some important statistics on the rise of cyber attacks. It’s time to act before your next attack, read the guide to find out what to do next. Read the guide>
Tags : 
    
Lenovo - APAC
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.