integrity

Results 176 - 200 of 208Sort Results By: Published Date | Title | Company Name

The Principles of Electronic Agreement Legal Admissibility

Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace

NeoScale Helps Major Bank Meet Government Regulatory Requirements

Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
As more states pass regulations governing the security, confidentiality, and integrity of customer data, a leading national bank has recognized its need to ensure the safety and security of personal data for its thousands of customers. To ensure compliance and maintain the security of this information, the bank has deployed NeoScale’s CryptoStor Tape appliances to help accomplish its objectives.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.

Driving A Single View of The Customer

Published By: Informatica     Published Date: Sep 28, 2007
The purpose of this white paper is to outline the importance of data quality with reference to single view of customer. In any organization SVC is the foundation of successful customer relationship management (CRM).
Tags : 
crm, data quality, data integrity, customer relationship, informatica, svc, data management, customer relationship management
    
Informatica

Survival of the Fittest: Move Beyond FTP

Published By: Axway     Published Date: Jan 03, 2008
In a world where only the fittest survive, Axway can help. Our Managed File Transfer Survival Guide gives you a step-by-step plan for building a business case to ensure your success in managing the integrity of your data infrastructure. Download your complimentary survival guide today!
Tags : 
mft, ftp, managed file transfer, file transfer, data integrity, axway, knowledge management, data management
    
Axway

Spreadsheet Controls and the NAIC Model Audit Rule

Published By: Prodiance Corp.     Published Date: Dec 22, 2008
Since the National Association of Insurance Commissioners (NAIC) made revisions to the Financial Reporting Model Regulation (Model Audit Rule) in June 2006, the insurance industry’s attention to the risks associated with financial reporting has been on the rise. Structured similarly to Section 404 of the Sarbanes‐Oxley Act, the Model Audit rule places a significant burden on C‐level executives to ensure their oversight in the internal controls for financial reporting (ICFR) process. Executives within these insurance organizations, both public and private, will be required to evaluate their internal controls in preparation for the first reports due in 2010 for the 2009 reporting period.
Tags : 
prodiance, sarbanes‐oxley act, security and integrity of data, analytics, risk assessment, optimization, security, it management
    
Prodiance Corp.

Process Control Yields Cost Effective Weld Integrity - RPAS

Published By: Orbitform Group     Published Date: Jan 07, 2009
Today, resistance welding takes many forms across numerous applications in diverse market seg-ments. While each company must decide the most efficient welding technology for its various operations, the parameters that govern such decisions often change, sometimes rather quickly over short time intervals. This means decision makers must constantly monitor welding processes to ensure the right technology is applied to each application and done so in a cost effective manner.
Tags : 
orbitform, welding process control, resistance welding, welding technology, wlan, wan, networking, ethernet networking
    
Orbitform Group

Automated Document Marking & Printing for Paper-Based and PDF Workflows

Published By: Enhancement Software     Published Date: Jan 30, 2009
This white paper is intended to explore the process of secure and efficient paper‐based document marking and printing using Microsoft® Word. At the same time it will explore the savings that can be realized by implementing an automated practice that reduces risk of unintended use.
Tags : 
enhancement software, stampit, automated document marking, document integrity, corporate accountability, compliance, risk management, roi
    
Enhancement Software

Database Security and Regulatory Compliance within the Pharmaceutical Industry

Published By: BMC Control M     Published Date: Apr 01, 2009
Listen in as Sentrigo interviews Dr. Charles Popper, who discusses specific data integrity and security requirements for the pharma sector. Dr. Popper will address how to enforce the proper balance of information sharing and database protection, without compromising high-quality research.
Tags : 
platforms, data management, linux, sap, windows, service oriented architecture, sla, international computing
    
BMC Control M

Brunel helped build the Ark

Published By: Ark Continuity     Published Date: Oct 05, 2010
In the heart of Wiltshire a large data centre complex is being constructed by Ark Continuity.
Tags : 
low carbon, data centre, construction, dr ian bitterlin, high integrity
    
Ark Continuity

2013 Ultimate Buyers Guide to Endpoint Management Solutions

Published By: Lumension     Published Date: Jan 22, 2013
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti spam
    
Lumension

NetIQ Directory and Resource Administrator Powers NRG Energy with Automated Active Directory Mana

Published By: NetIQ     Published Date: Jul 21, 2011
Expansion into different markets can be difficult. Read this success story about how NetIQ Directory and Resource Administrator powered NRG Energy and find out what NetIQ can do for you and your business.
Tags : 
netiq, nrg, nrg energy, pci compliance, file integrity monitoring, fim, report on compliance, roc
    
NetIQ

Real Usage Scenarios on HP Integrity Servers

Published By: HP and Intel Xeon processors     Published Date: Nov 12, 2012
Use the Mission-Critical Converged Infrastructure as the foundation for the next decade of your computing. Combine years of trusted HP Integrity resiliency with HP BladeSystem efficiencies in the newest line of HP Integrity systems.
Tags : 
virtualization, hp integrity server, server, it infrastructure, data management., enterprise applications, data management, business technology
    
HP and Intel Xeon processors

Realize New Workload Migration and Consolidation Possibilities

Published By: HP and Intel Xeon processors     Published Date: Nov 12, 2012
The Mission-Critical Converged Infrastructure is the foundation for the next decade of computing. The newest line of HP Integrity systems combines years of trusted HP Integrity resiliency with HP BladeSystem efficiencies. Read on to learn more.
Tags : 
migration, workload migration, consolidation, it infrastructure, dynamic optimization, data management, business technology, data center
    
HP and Intel Xeon processors

Tips, Tools & Best Practices for Operational Data Quality

Published By: Trillium Software     Published Date: Jun 06, 2011
The fourth Web seminar in the series is titled "Tips, Tools & Best Practices" which shows how you can learn to deliver high performance data quality in real-time.
Tags : 
trillium software, operational data quality, odq, performance management, real-time transactions, high performance data quality, business processes optimization, information integrity
    
Trillium Software

The Seven Sins of Spreadsheets for Controlling Fixed Assets

Published By: Real Asset Management Inc.     Published Date: Jun 24, 2011
This white paper will identify the Top 7 issues which businesses using spreadsheets to manage their fixed asset data are failing to address.
Tags : 
real asset management, ram, spreadsheets, fixed assets control, fixed asset management system, corporate governance, data integrity, depreciation
    
Real Asset Management Inc.

HIPAA Compliant Data Centers

Published By: Dell Storage     Published Date: Aug 14, 2012
The importance of healthcare providers to assure their patients the utmost security, confidentiality and integrity of their sensitive information cannot be understated. This means being HIPAA compliant within every aspect of their practice, with a particular emphasis on the components of their healthcare IT infrastructure This white paper described elements and best practices of a HIPAA compliant data center. This comprehensive guide spans the administrative, physical, and technical safeguards of the HIPAA Security rule from the physical security and environmental controls necessary of the facility itself, to the requirements needed between a Covered Entity (CE) and the data center provider when outsourcing. Detailing both the benefits and risks of a third-party partnership, this white paper provides answers to key questions such as what exactly makes a data center HIPAA compliant, what to look for when choosing a service provider to work with, and why a Business Associate Agreement (BAA) is important for establishing accountability with these partners.
Tags : 
hipaa, compliant, data, center, centers, healthcare, providers, assure
    
Dell Storage

To Increase Downloads, Instill Trust First

Published By: Symantec     Published Date: Oct 02, 2012
Code Signing from Symantec certifies the Publisher and Integrity of the code.
Tags : 
trust first, symantec, integrity, digital channels, business technology
    
Symantec

Best Practices and Applications of TLS/SSL

Published By: Symantec     Published Date: Oct 02, 2012
The most well-known example of the use of public key infrastructure has proven flexible enough to assist in authentication, encryption and data integrity.
Tags : 
tls/ssl, public, key, infrastructure, transport, layer, security, business technology
    
Symantec

Joe Clabby: Ten Reasons Why HPs Itanium-based Servers Have Reached the Point-of-No-Return

Published By: IBM     Published Date: Mar 12, 2013
Follow-on white paper on the state of the Itanium market segment after the Oracle lawsuit and subsequent release of the new Integrity systems based on the Intel Itanium 9500 processor.
Tags : 
hp itanium, servers, point of no return, joe clabby, it management, data management, business technology, data center
    
IBM

Creating Business Value Through Location-Based Intelligence

Published By: SAP     Published Date: Jul 17, 2012
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
business, sap, white paper, technology, location, intelligence, business value, data services
    
SAP

Reduce Your Breach Risk: File Integrity Monitoring for PCI Compliance and Data Security

Published By: NETIQ     Published Date: Mar 12, 2013
File integrity monitoring facilitates the detection of attacks by cybercriminals and insider threats that may result in costly data breaches. It is a critical component of Payment Card Industry Data Security Standard (PCI DSS).
Tags : 
data security, compliance, pci dss, file integrity monitoring, fim, corporate compliance security, business technology
    
NETIQ

A comparison between HP Integrity Servers with HP-UX and IBM PowerSystems with AIX

Published By: HP and Intel      Published Date: May 06, 2013
The objective of this white paper is to provide IT executives and UNIX subject matter experts (SMEs) with a high level comparison of the UNIX virtualization offerings from HP for Integrity and HP-UX1 vs. IBM for Power and AIX. To assist in making a balanced comparison, this paper provides: - A high-level, feature-to-feature comparison of key areas of virtualization and virtualization management. - Modular table-based comparisons. - Information from publicly available resources.
Tags : 
    
HP and Intel

Reduce Costs and Run Your Microsoft Exchange Server on Amazon Web Services Cloud.

Published By: Amazon Web Services, Inc     Published Date: Sep 19, 2013
Amazon Web Services (AWS) provides a secure and dependable environment for deploying Microsoft Exchange Server 2010. Customers can use their existing Windows Server applications licenses, such as MS Exchange or SharePoint, on AWS without paying additional licensing fees. Take advantage of the pay-as-you-go-pricing, scalability, and data integrity of the AWS Cloud to run your Exchange Server workloads today. Download the Planning and Implementation Guide to learn more.
Tags : 
aws exchange, microsoft exchange, micrsoft exchange server, microsoft exchange download, microsoft exchange server download, ms exchange, ms exchange server, ms exchange download
    
Amazon Web Services, Inc

Wide Area File Services: Document Collaboration for the Distributed Business Environment

Published By: Globalscape     Published Date: Mar 21, 2014
This paper outlines the essential requirements for file sharing across a wide-area network (WAN), and briefly discusses the limitations of appliance-based WAN optimization when applied specifically to document collaboration. The paper uses a solution analysis to compare common business needs to required features, and explains how appliance-based optimization falls short of these needs. The paper then describes how Globalscape's software-only solution. (WAFS) provides file replication and collaboration across globally dispersed networks, securely and reliably, with the performance of local file sharing.
Tags : 
file sharing, wan optimization, high bandwidth, low overhead, file replication, autodesk, revit, wafs
    
Globalscape

Complex Chain, Smart Security: How to Protect the Global Pharmaceutical Supply Chain

Published By: Tyco Integrated Security     Published Date: May 05, 2015
Now is the time to craft a smart strategy you and your company can rely on. Download this white paper to find out how to assess vulnerabilities across the global supply chain so you can guard against major threats and ensure product integrity.
Tags : 
    
Tyco Integrated Security
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.