information work

Results 351 - 375 of 482Sort Results By: Published Date | Title | Company Name

No More Chewy Centers: The Zero Trust Model Of Information Security

Published By: IBM     Published Date: Apr 20, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM

IBM Security: Integrated Threat Protection System for Dummies 2017

Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM

Microsoft Dynamics RoleTailored Business Productivity

Published By: Microsoft Dynamics     Published Date: Jul 23, 2007
Businesses don’t garner insights or make decisions. Businesses don’t close deals, invent new products, or find new efficiencies. People do. Companies excel when they empower their people to drive the business forward. But to see results, you also have to give your people the right tools, information, and opportunities—because success ultimately comes down to your people.
Tags : 
microsoft, microsoft dynamics, productivity, people ready, people-ready, employee performance, business process automation, bpm, information management, information work, collaboration, corporate portal, dynamics ax, business integration, business process management, workforce management, corporate portals, project management
    
Microsoft Dynamics

Essential Data Protection, Recovery and Resiliency for Banks

Published By: Vision Solutions     Published Date: Jan 22, 2009
This white paper explores how the power of an information availability solution can unlock the latent potential of your IT environment and deliver new value for your organization. It includes an Action Worksheet to use in discussions with your IT executives.
Tags : 
vision solutions, data protection, information availability, banking industry, crm, enterprise applications, data management, customer relationship management, as/400
    
Vision Solutions

Beyond Bullet Points: Unlock the Story Hidden in Your Data

Published By: GoToWebinar     Published Date: Oct 05, 2011
"So you drank the Kool-Aid and subscribed to the idea that your presentations need to ""tell a story"" and ""be more visual."" But how do you translate dry information into something that's compelling to your audience? When you get back to the basics and focus on the structure of the information you present, you'll find a new way to lay the groundwork for a clean and clear storyboard that will deliver the story and visuals you want. Watch this on-demand webinar to hear Cliff Atkinson, author of Beyond Bullet Points, talk about how you can turn dry content into a compelling presentation. "
Tags : 
citrix, webinar, presentations, visuals, technology, marketing, structure, on-demand
    
GoToWebinar

Emergency Telecommuting

Published By: GoToMyPC     Published Date: Apr 06, 2011
This comprehensive emergency telecommuting guide provides critical information and just-in-time solutions for those who find themselves unexpectedly working from a distance.
Tags : 
telecommuting, teleworker, emergency, virtualworks, citrix, telework program, telecommuter, productivity, mobile workers, project management, video conferencing, collaboration, employee performance
    
GoToMyPC

Your Network is the New Battlefield

Published By: IBM     Published Date: May 09, 2013
Federal agencies must take a proactive approach to information and network security due to increasing cybersecurity threats. IBM Tivoli Endpoint Manager, built on BigFix technology, is the leading enterprise cybersecurity solution to help combat cyber threats and eliminate vulnerabilities.
Tags : 
network, security, cybersecurity, endpoint manager, solution, eliminate vulnerabilities, technology
    
IBM

Transforming your voice, video and collaboration infrastructure

Published By: IBM     Published Date: Oct 10, 2013
e IBM journey toward unified communications for mobile and social collaboration. Many of today's innovations are driven by the consumer marketplace, and the workplace is no exception. As consumers, we are very familiar with new ways for people to find each other, keepin touch, share ideas and be mobile, getting information from many place. As employees, we would like to apply these consumer capabilities to our work - seamlessly and on a global basis - to make us more productive and effective with business colleagues, clients and business partners. This white paper discusses IBMs infrastructure transformation over the first 12 years, summary value proposition, and volution in supporting mobile devices and BYOD.
Tags : 
collaboration, infrastructure, mobile, social, communication system, unification, mobile collaboration, social collaboration, byod, ibm, bring your own device, infrastructure, infrastructure transformation, summary value proposition, mobile devices, business technology, telecom
    
IBM

Executive Brief: Leveraging Mobility to Improve Sales

Published By: Oracle     Published Date: Nov 05, 2013
Sales people spend more time out of the office than in. When they are out of the office, they need information at their fingertips. And in today’s more mobile, more collaborative, and more data-rich business world, the needs of corporate sales forces are radically changing. In particular, sales people have always needed access to information about their customer before a meeting and an easy way to update customer information after a meeting. Now, to work more efficiently from the road, they could benefit from and in many cases need additional help in the form of relationship management assistance, collaboration tools, and contextual and relevant business analytics.
Tags : 
mobility, mobile, collaboration, crm, customer service, sales, enterprise communication, mobile crm
    
Oracle

Executive Brief - Leveraging Mobility to Improve Sales

Published By: Oracle     Published Date: Nov 05, 2013
Sales people spend more time out of the office than in. When they are out of the office, they need information at their fingertips. And in today’s more mobile, more collaborative, and more data-rich business world, the needs of corporate sales forces are radically changing. In particular, sales people have always needed access to information about their customer before a meeting and an easy way to update customer information after a meeting. Now, to work more efficiently from the road, they could benefit from and in many cases need additional help in the form of relationship management assistance, collaboration tools, and contextual and relevant business analytics.
Tags : 
mobility, mobile, collaboration, crm, customer service, sales, enterprise communication, mobile crm, mobile computing, mobile data systems, customer relationship management
    
Oracle

Campus LAN and Wireless LAN Design Summary

Published By: Cisco     Published Date: Dec 21, 2016
There is a tendency to discount the network as just simple plumbing, to think that all you have to consider is the size and the length of the pipes or the speeds and feeds of the links, and to dismiss the rest as unimportant. Just as the plumbing in a large stadium or high rise has to be designed for scale, purpose, redundancy, protection from tampering or denial of operation, and the capacity to handle peak loads, the network requires similar consideration. As users depend on the network to access the majority of the information they need to do their jobs and to transport their voice or video with reliability, the network must be able to provide resilient, intelligent transport.
Tags : 
    
Cisco

Powering The Hybrid Enterprise

Published By: Riverbed     Published Date: Jun 02, 2015
To better serve business demands for information everywhere, enterprises must develop new strategies for optimizing multiple kinds of networks.
Tags : 
hybrid enterprise, hybrid network, cloud infrastructure, increase reliability, reduce costs, hybrid networking, network performance management, application performance management, cloud computing, infrastructure
    
Riverbed

Collaborate or be left behind: leading the digital frontier

Published By: IBM     Published Date: Nov 11, 2014
Social and cloud technologies are connecting us to more people and information than we ever could have imagined. The challenge is to get the right information from the right sources in the right context at the right time. IBM has the leading cloud collaboration platform that helps you collaborate with extended networks, focus on the relevant and filter out the rest. Join IBM clients as they share how they drove real outcomes with collaborative processes. See how IBM partners are innovating the leading enterprise software platform. Hear IBM's perspective on these technological shifts and see the latest advancements in action.
Tags : 
digital frontier, social technology, cloud technology, cloud collaboration, it management, knowledge management, enterprise applications, data management
    
IBM

B2B SB2B Services Analytics and Reporting

Published By: IBM     Published Date: Mar 18, 2015
More and more companies are moving to the cloud for B2B services, and for good reason. There’s a huge potential for increased visibility and analytics-driven insights to be gained from B2B transactions that can give businesses unprecedented levels of information. But many organizations continue to struggle when it comes to going beyond basic transactional data and historical performance metrics. What does it take to not only report on past activity, but to get real-time alerts, predict future events, manage exceptions, and proactively leverage this wealth of data in order to put it to work? Read this IBM white paper to find out how B2B Services Reporting and Analytics provide new insights into your trading partner relationships and to drive better, more profitable business decisions.
Tags : 
b2b services, ibm, b2b analytics, b2b reporting, transactional data, trading partner relationships, it management, enterprise applications, data management, business technology
    
IBM

Addressing User Data Risks In A Distributed Data World

Published By: Druva     Published Date: Mar 30, 2016
As information security continues to rise to the top of the enterprise priority list, what used to be an easy-to-control environment, with all data stored behind the corporate firewall, is no longer. Shadow IT, mobile computing, consumer IT, and cloud computing are all transforming enterprise IT. Workers using unsecured networks and devices without encryption are also a concern, as data breaches cost organizations millions of dollars in fines, data loss, investigations, and customer backlash.
Tags : 
druva, data risks, consumer it, corporate firewall, shadow it, mobile computing, data breaches, security
    
Druva

Forbes Insights: 8 Advantages of Video Conferencing

Published By: Cisco     Published Date: Nov 17, 2015
In today’s global economy, innovation matters. For teams to innovate rapidly and with great frequency, they must be able to clearly communicate and closely collaborate. Miscommunication, misunderstanding and misinterpretation only leads to costly errors, bottlenecked business processes and market misfires. Most of these issues are avoidable. A convergence of low-cost but high-quality technology and a highly competitive business environment is making video collaboration a channel of choice for today’s information workers and decision makers. The availability of relatively low-cost technology—including high-quality video conferencing equipment, high-bandwidth networks and easy-to-use applications and tools—is bringing video collaboration within reach of today’s workforce. The impact on innovation and productivity—as well as critical business processes, from customer service to problem-solving—is only just starting to be felt.
Tags : 
cisco, forbes insights, video conferencing, productivity, collaboration, it management, wireless, knowledge management, business technology
    
Cisco

CloudFlare advanced DDoS protection

Published By: CloudFlare     Published Date: Jul 25, 2016
CloudFlare’s advanced DDoS protection, provisioned as a service at the network edge, matches the sophistication and scale of such threats, and can be used to mitigate DDoS attacks of all forms and sizes including those that target the UDP and ICMP protocols, as well as SYN/ACK, DNS amplification and Layer 7 attacks. This document explains the anatomy of each attack method and how the CloudFlare network is designed to protect your web presence from such threats.Below you will find detailed information on these attacks and how the CloudFlare network protects against them.
Tags : 
cloudflare, best practices, technology, security, access control, business intelligence, business technology, cloud computing
    
CloudFlare

Detecting the Enemy Inside the Network

Published By: Trend Micro     Published Date: Oct 12, 2012
This free white paper provides a comprehensive overview of the threat as well as the advanced protection that enterprises can now use to protect their networks and information.
Tags : 
information technology, network, trend micro, security, network security, hacker detection, intrusion detection, intrusion prevention, network security appliance, business technology
    
Trend Micro

Business Transformation: A Roadmap for Maximizing Organizational Insights

Published By: SAS     Published Date: Sep 30, 2014
When Information Revolution1 was published in 2006, no Chinese based companies were among the top 10 largest companies by market capitalization. Apple didn’t sell phones. Facebook was something college kids used to connect with their friends. Back then, we talked a lot about the amount of data coming in and faster processing speed. What we believed then remains true today: Data, and the decision-making process, can be moved throughout the organization to equip every decision maker (automated, line worker, analyst, executive) to make the best choices. By operationalizing analytics, organizations can identify and quantify both opportunity and risk. Information Revolution highlighted SAS’ Information Evolution Model, which helps organizations understand how they interact with their information and how to extract more value from it through analytics.
Tags : 
sas, organizational insights, operationalizing analytics, sas’ information evolution model
    
SAS

Security Management 2.0: Time to Replace Your SIEM?

Published By: Q1 Labs     Published Date: Feb 01, 2012
Is it time? Are you waving the white flag? Has your first gen SIEM failed to meet expectations despite your investment? If you are questioning whether your existing product or service can get the job done, you are not alone. Read this Securosis white paper to learn how easy it can be to replace your SIEM with a next generation solution.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring
    
Q1 Labs

Using Security Intelligence to Gain Operational Efficiencies in Federal Government

Published By: Q1 Labs     Published Date: Feb 02, 2012
In this study, IANS interviewed two Q1 Labs customers using QRadar to assess their Return On Security (ROS). The two customers were providers of service to the U.S. Government and had highly secure environments dealing with extremely sensitive data. The data yielded from the interviews showed substantial benefit to the organizations for the cost, both in money and staff time.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, continuous monitoring, access control, network security appliance, data protection, vulnerability management
    
Q1 Labs

Transitioning from SIEM to Total Security Intelligence

Published By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, access control, authentication, identity management, internet security, intrusion prevention, data protection
    
Q1 Labs

Worldwide Retailer Boosts Privacy with Security Intelligence

Published By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : 
siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, pci compliance, log management, log data, log management solution, access control, identity management, internet security, intrusion detection
    
Q1 Labs

Learn How Security Intelligence Can Help Combat WikiLeaks Stuxnet and Advanced Threats

Published By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, log management solution, threat detection, fraud prevention, risk management
    
Q1 Labs

Ten Tips for Preparing an Effective Acceptable Use Policy

Published By: SpectorSoft     Published Date: Apr 01, 2015
Corporate computers and information and communications systems (collectively, “electronic resources”) remain the workhorse for most businesses, even as alternatives, such as third-party text messaging services, external social media, and cloud computing, flourish. Employees rely on corporate electronic resources for e-mail, calendaring, business contacts, Internet access, document creation and storage, and a multitude of other business applications. Consequently, for employers, it is critical to establish and maintain their right to inspect all information stored on, and to monitor all communications transmitted by, corporate electronic resources. The corporate acceptable use policy is the linchpin of that effort. The ten tips below are intended to aid employers who either want to implement an acceptable use policy for the first time, or who need to update their policy.
Tags : 
acceptable use, communications systems, text messaging, acceptable use policy, confidentiality, security, it management, knowledge management, data management
    
SpectorSoft
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.