integrity

Results 101 - 125 of 208Sort Results By: Published Date | Title | Company Name

Get the Coverity Scan 2010 Open Source Integrity Report featuring the Android Integrity Report

Published By: Coverity, Inc.     Published Date: Nov 01, 2010
This report is the result of the largest public-private sector research project focused on open source software integrity, originally initiated between Coverity and the U.S. Department of Homeland Security in 2006. The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
Coverity, Inc.

voke Research Market Mover Array Report: Testing Platforms

Published By: Coverity, Inc.     Published Date: Aug 16, 2010
voke Names Coverity as a Transformational Company in the Testing Market Coverity has been rated as a Transformational company in the voke, inc. Market Mover Array Report for Testing Platforms. Coverity's rating is recognition of the impact that Coverity's software integrity strategy is making in shaping the future of the testing market.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
Coverity, Inc.

Automating the SANS 20 Critical Security Controls with QualysGuard

Published By: Qualys     Published Date: Nov 05, 2013
The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This paper describes how automating these controls using QualysGuard can protect your organization with continuous security while drastically lowering costs.
Tags : 
automation, cyber security, critical controls, malware defense, application software security, data recovery, compliance applications, qualysguard, internet security, intrusion detection, intrusion prevention, policy based management, security management, vulnerability management
    
Qualys

EMC Backup and Recovery Solutions for VMware: Customer Success Profiles

Published By: EMC Backup & Recovery Solutions     Published Date: Mar 29, 2010
VMware sites create more storage to manage and protect than their physical counterparts. This report showcases how EMC Backup and Recovery Solutions for VMware have helped customers redesign their backup operations.
Tags : 
emc, data domain, efficiency, vmware, server consolidation, servers, data integrity, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication, storage virtualization, server virtualization, data center design and management
    
EMC Backup & Recovery Solutions

Backup and Recovery for VMware Environments

Published By: EMC Backup & Recovery Solutions     Published Date: Apr 02, 2010
EMC backup and recovery solutions for VMware combine industry-leading deduplication storage and software to help you fully realize the benefits of virtualization. VMware servers consolidate production workloads well, but backups create bottlenecks that tax network and storage resources.
Tags : 
emc, data domain, efficiency, vmware, vcenter, server consolidation, servers, data integrity, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication, server hardware, server virtualization, data integration
    
EMC Backup & Recovery Solutions

IDC: VMWare Improves Network Utilization and Backup Performance Using EMC Avamar Deduplication

Published By: EMC Backup & Recovery Solutions     Published Date: Jul 29, 2009
This document examines VMware's implementation of the Avamar technology, including a discussion of its organizational challenges and evaluation requirements. VMware's results are highlighted and future implementation plans are summarized.
Tags : 
emc, data domain, efficiency, vmware, vcenter, avamar, server consolidation, servers, data integrity, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication, server hardware, backup and recovery
    
EMC Backup & Recovery Solutions

EMC Avamar Backup and Recovery for VMware Environments

Published By: EMC Backup & Recovery Solutions     Published Date: Apr 29, 2010
This white paper describes components of the VMware vSphere and VMware View solutions and discusses options for protecting these environments using EMC Avamar with global source-based data deduplication.
Tags : 
emc, data domain, efficiency, vmware, server consolidation, servers, data integrity, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication, server hardware, backup and recovery, storage virtualization
    
EMC Backup & Recovery Solutions

EMC Avamar and VMware: Fast, efficient backup and deduplication for VMware environments

Published By: EMC Backup & Recovery Solutions     Published Date: Oct 16, 2009
This data sheet describes how EMC Avamar backup and recovery software provides fast, efficient data protection for VMware environments. It explains Avamar support for deduplicated guest- and image-level daily full backups; and flexible Avamar server deployment options.
Tags : 
emc, data domain, efficiency, api, vmware, server consolidation, servers, data integrity, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication, backup and recovery, server virtualization
    
EMC Backup & Recovery Solutions

IDC Executive Guide: Assess the Value of Deduplication for your Storage Consolidation Initiatives

Published By: EMC Backup & Recovery Solutions     Published Date: Aug 06, 2008
This workbook helps you assess current needs and usage and determine where deduplication can positively affect your IT consolidation initiatives, help reduce costs, and create a more "green" environment.
Tags : 
emc, data domain, efficiency, vmware, server consolidation, servers, data integrity, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication, backup and recovery, it spending, data integration
    
EMC Backup & Recovery Solutions

Data Profiling Assessement Solution Sheet

Published By: EMC Backup & Recovery Solutions     Published Date: Aug 27, 2009
Data profile assessments will let us help you determine the best match for your situation, the data you are looking to protect, your service level agreements, and the specifics of your current challenges and environment.
Tags : 
emc, data domain, efficiency, api, disk backup, recovery, vmware, server consolidation, servers, data integrity, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication, backup and recovery, storage area networks
    
EMC Backup & Recovery Solutions

Backup and Recovery Product Portfolio

Published By: EMC Backup & Recovery Solutions     Published Date: Apr 28, 2010
This document showcases EMC's portfolio of backup and recovery products and describes how they provide the flexibility and scalability to meet the data protection needs of enterprises of all sizes.
Tags : 
emc, data domain, efficiency, api, disk backup, recovery, vmware, server consolidation, servers, data integrity, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication, backup and recovery, storage area networks
    
EMC Backup & Recovery Solutions

Proven Strategies for Archiving Complex Relational Data

Published By: IBM     Published Date: Feb 18, 2009
This white paper explains how the IBM® Optim™ Data Growth Solution provides proven technology and comprehensive capabilities that make archiving complex relational data both practical and desirable.
Tags : 
ibm integrated data management, database growth, optim data growth solution, database archiving, idm, disaster recovery, database referential integrity, data management, analytical applications, database development, data warehousing
    
IBM

Closing the Data Privacy Gap for SAP Applications

Published By: IBM     Published Date: Feb 18, 2009
This white paper provides insight into the requirements for protecting privacy in SAP non-production environments and describes some of the comprehensive data masking techniques available with the IBM® Optim™ Data Privacy Solution for SAP® Applications.
Tags : 
ibm integrated data management, data privacy, sap application, ibm optim data privacy solution, data masking, business context data elements, data integrity, data management, compliance, sap, data protection
    
IBM

Addressing Compliance Requirements for Privacy, Data Retention, and e-Discovery

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn, litigation, fines, personally identifiable information, pii, pci, payment card industry, phi, protected health information, pfi, personal financial information, pfi access control, audit
    
Trend Micro, Inc.

Overall Approach to Data Quality ROI

Published By: SAP     Published Date: Jun 23, 2009
Learn the importance of Data Quality and the six key steps that you can take and put into process to help you realize tangible ROI on your data quality initiative.
Tags : 
roi, data quality, sap, return-on-investment, crm, erp, enterprise resource management, customer relationship management, crm, business intelligence, referential integrity, sql, data quality scoring, target marketing, enterprise applications, data management, enterprise resource planning, return on investment
    
SAP

Creating Business Value Through Location-Based Intelligence

Published By: SAP     Published Date: Mar 24, 2011
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
location-based bi, business value, geographic enhancement, gps, mobile data systems, mobile workers, business intelligence
    
SAP

Data Migration Management: A Methodology - Sustaining Data Integrity for Going Live and Beyond

Published By: SAP     Published Date: Mar 24, 2011
As you prepare to embark on an ERP implementation or to upgrade an existing system, you have a lot to juggle and plan. You know the horror stories of "go-lives" going bad but you aren't sure how to avoid the pitfalls. This white paper discusses at length how Utopia's formal data migration methodology reduces the risks of large systems deployments by using a tried-and-tested framework for the entire migration process, from source data analysis through post-go-live support.
Tags : 
data migration management, source data analysis, data integrity, erp implementation, enterprise resource planning, business intelligence, configuration management, database development, data integration, data protection, data quality, data replication, web service management, data warehousing
    
SAP

Three Important Reasons for Privileged Access Management (and One Surprising Benefit)

Published By: Centrify Corporation     Published Date: Dec 02, 2014
Privileged access management can not only reduce your enterprise’s exposure to these risks but also improve IT reliability and reduce IT costs. Download the white paper: Three Important Reasons for Privileged Access Management (and One Surprising Benefit). You’ll discover how a privilege access management solution can ensure: • Comprehensive compliance such as the Sarbanes-Oxley Act for responsible governance. • Ensure business integrity and responsible business processes. • Tackle security risks, both inside and outside the organization. • Realize bottom-line IT cost benefits.
Tags : 
privileged access management, it cost benefits, comprehensive compliance, business processes, it reliability, it management
    
Centrify Corporation

The Impact of the Underground Economy, and How Analytics can Fight it ACFE Conclusion Paper

Published By: SAS     Published Date: Mar 06, 2018
“If we had done anything differently in Washington state, we would have done it faster,” said Hammersburg. “The key message is that fraud prevention – dealing with risk and program integrity – is not a cost issue, it’s a saving. When you can truly quantify the positive impact to the bottom line of a company or government agency, you shift the recognition that this is not an expense but that it’s a saving.” Some government organizations may be concerned that a rigorous program to shine a light on the underground economy will shine a brighter light on how much they didn’t know until now. Don’t let that stop you, said Hammersburg. “You have the opportunity to really get ahead of it now. Turn a risk into an opportunity going forward.”
Tags : 
    
SAS

Protect the Integrity of the Procurement Function White Paper

Published By: SAS     Published Date: Mar 06, 2018
Traditional procurement fraud detection methods – manual searches; spreadsheets; and simple slice, dice, filtering and reporting from silo systems – are not keeping pace. Whatever tools and processes are in place now, there’s always the opportunity to evolve to a higher level for more accurate detection – more high-value alerts and fewer false positives.
Tags : 
    
SAS

Achieving Program Integrity for Health Care Cost Containment Operations

Published By: SAS     Published Date: Mar 06, 2018
As explored in this paper, the SAS Fraud Framework supports a complete, modular, enterprise-level program integrity solution that helps payers prevent, detect and manage fraud, waste and abuse across all silos and lines of business. Its fully integrated components offer both top-down and bottom-up functionality for exposing hidden and risky networks. This approach gives payers enhanced detection capabilities, greater insight into case management and improved operational efficiency while decreasing overall cost of ownership. The result is highly effective, early, and even preventative detection of fraud, waste, abuse and corruption that improves operational efficiency and reduces health care costs.
Tags : 
    
SAS

IIA: Health Care Payment Integrity through Advanced Analytics

Published By: SAS     Published Date: Apr 04, 2018
“Fixing health care” is an urgent and pervasive priority for governments, businesses and citizens alike. Within many countries, costs are out of control, resulting in reduced access to quality care for those who need it, higher taxes and/or insurance costs for companies and citizens – and unfortunately, poorer health outcomes.
Tags : 
    
SAS

Best Practices and Applications of TLS/SSL

Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing.
Tags : 
verisign, larry seltzer, best practices, ssl, tls, transport layer security, secure lockets layer, authentication, encryption, data integrity, extended validation, security policies
    
VeriSign, Inc.

Get a Close look at Microsoft® Security Measures

Published By: Microsoft Corporation     Published Date: Oct 19, 2010
Get a close look at Microsoft security measures for ensuring data protection and integrity, and learn how you can rest assured about the security and reliability of Microsoft Online Services with 24x7 IT professional support and a financially backed service level agreement (SLA) for 99.9 percent uptime.
Tags : 
microsoft online services, security measure, data protection, business productivity, collaboration, it administration, collaborative commerce, productivity
    
Microsoft Corporation

Determining the Value of DKIM Whitepaper

Published By: Port25 Solutions     Published Date: Mar 09, 2012
What it does do, in its simplest form, is validate the integrity of the message, thereby assuring that it has not been tampered with during transit.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent, it management, data management, customer satisfaction, customer service, enterprise resource planning, infrastructure, design and facilities
    
Port25 Solutions
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.