it outsourcing

Results 76 - 100 of 145Sort Results By: Published Date | Title | Company Name

Discovery Communications Case Study

Published By: Savvis     Published Date: Jul 07, 2010
Savvis delivers a complex, fully managed infrastructure for Discovery to support its real-time advertising deliverables, ad sales, scheduling, and programming for all its international operations.
Tags : 
savvis, saas, deliverability, managed infrastructure, outsourcing, infrastructure, software outsourcing, content delivery, colocation and web hosting
    
Savvis

The CISOs Guide to Measuring IT Security

Published By: Lumension     Published Date: Jan 11, 2012
Learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension

Reducing Local Admin Exposure Through Application Whitelisting

Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, access control, anti spam
    
Lumension

Virtualization Security Risks: How to Develop Your Strategic Approach Now

Published By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security, virtualization
    
Lumension

The Busy IT Pros Guide to Vulnerability Management: Top 5 Tips for Avoiding Preventable Attacks

Published By: Lumension     Published Date: Mar 31, 2012
Don't leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security, it management
    
Lumension

The Busy IT Professional's Guide to Governance, Risk and Compliance (GRC): Top 5 Tips For Simpler

Published By: Lumension     Published Date: Mar 31, 2012
Streamline your compliance efforts by implementing these five tips that will help you better tie together security deployments and processes, business goals and compliance activities.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security, it management
    
Lumension

Integrating cloud and on-premise applications with IBM WebSphere Cast Iron Cloud integration

Published By: IBM     Published Date: May 22, 2013
In today's business environment, organizations of all sizes are struggling to maintain the advanced IT capabilities they need to be competitive while reining in cost and complexity. Shifting to off-premise hosted models, such as software-as-a-service (SaaS) and business process outsourcing, is a common activity undertaken to manage costs. One of the main challenges businesses face in adopting cloud and SaaS delivery models is the task of synchronizing data and integrating the multitude of systems already in datacenters with new cloud-based applications, not to mention within the cloud itself. Traditionally, this required organizations to leverage existing tools as well as custom development. This white paper looks at how two enterprises encountered problems with cloud integration and adopted IBM WebSphere Cast Iron to solve their immediate problems and extend use more broadly across their organizations.
Tags : 
saas, ibm, ibm websphere, websphere, cloud computing, web sphere, service oriented architecture, software compliance
    
IBM

Navigating Your Journey Through Managed Services

Published By: Mindtree     Published Date: Nov 01, 2016
Learn how to cut costs so you can self-fund growth initiatives. An expert Managed Services guide can help you map a smart path to streamlining processes, outsourcing services and rearchitecting systems. With a customized plan in place, your Managed Services provider can begin to optimize IT and increase efficiencies through continuous improvements. Discover how Managed Services providers: Guarantee savings every year so you can invest in growth opportunities such as digital and analytics Optimize the run-the-business side of IT to accelerate innovation Deliver continuous improvements to productivity, quality and time to market
Tags : 
mindtree, growth initiatives, managed services guide, managed services, analytics, knowledge management, enterprise applications, business technology
    
Mindtree

The Total Economic Impact™ of Microsoft Azure IaaS

Published By: Microsoft Azure     Published Date: Apr 11, 2018
The 2017 study, The Total Economic Impact™ of Microsoft Azure IaaS, gives insight into both the costs and benefits of large-scale Azure infrastructure as a service (IaaS) implementation. This commissioned study conducted by Forrester Consulting analyzes the return on investment and business impact that several enterprises experienced when moving from a primarily on-premises environment to Azure. The companies interviewed come from a variety of industries and locations (global/multinational, North American, and European). In addition to a 435 percent overall return on an Azure IaaS investment*, the businesses also experienced: Reduced data center and outsourcing costs. Website scale and performance improvements. Ease of experimentation through virtualized environments. Developer and tester improvements. Download the study to learn about the potential ROI that could be realized by shifting some or all of your management and operations to Azure.
Tags : 
    
Microsoft Azure

5 Steps to Secure Internet SSO

Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing, bpo, ciso, attack, threats, personally-identifiable information, pii, trojan, virus, proprietary security mechanisms, crypto libraries, security assertion markup language, saml
    
Ping Identity

Identity Enabled Web Services: Standards-based identity for Web 2.0

Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity

Secure Internet Single Sign-On 101

Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity

Trend Watch: Small Business Owners Look to One-stop Shops For Benefit & Payroll Services

Published By: BenefitMall     Published Date: Sep 23, 2015
Download this whitepaper to learn more about HR outsourcing for benefit and payroll services for small businesses.
Tags : 
benefit outsourcing, payroll outsourcing, payroll, small business owners, saas, hr outsourcing
    
BenefitMall

Vital Payroll Services That Make Your Business More Efficient

Published By: InsideUpbg     Published Date: May 12, 2015
Globalization has afforded great opportunities for companies who take advantage of them. Outsourcing is one of these, and payroll outsourcing is gaining popularity throughout the business world. Processing payroll in a timely and accurate manner is critical for business success. Maintaining salary, benefit, and tax information can be complex, which is why increasing numbers of small to medium businesses are choosing to outsource their payroll.
Tags : 
    
InsideUpbg

Understanding and Selecting the Right Payroll Service Vendor

Published By: InsideUpbg     Published Date: May 12, 2015
Most business owners realize the obvious benefits of outsourcing payroll, such as saving money: outsourcing payroll can save your company up to 30% over the cost of in-house processing. The first important step, of course, is finding the right payroll provider to meet your needs. This guide is designed to help you through that process with questions you should ask and criteria to consider when comparing payroll vendors
Tags : 
    
InsideUpbg

The Small Business Guide to Big Business Email

Published By: 123Together     Published Date: Sep 19, 2008
Today's economy is especially hard on small businesses. How does your small business keep revenue coming in when your customers are spending less? How do you attract new customers in a cost efficient manner? How do you protect your businesses' valuable information assets without making a huge technology investment?
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services, small business networks, return on investment, collaborative commerce, content integration, information management, cloud computing, colocation and web hosting, content management
    
123Together

The IT Guidebook To Evaluating Hosted Exchange Providers

Published By: 123Together     Published Date: May 27, 2008
Email has become THE mission critical application for businesses large and small. As a growing business continually striving to increase productivity, collaboration and corporate success, you understand the important role that Microsoft Exchange Server plays in any profitable business. Small and mid-size businesses alike see the productivity benefits of utilizing an enterprise-class solution but since many do not have the financial or human resources to bring it in house, more and more of them are turning to a hosted solution.
Tags : 
123together, it strategies, economy, stability, migration, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services, contact management, human resources services, cloud computing, colocation and web hosting, content management
    
123Together

Microsoft Exchange Server: To Outsource Or Not To Outsource

Published By: 123Together     Published Date: Sep 10, 2008
You understand the value Microsoft Exchange Server can bring to your company but the internal deployment delays, administrative complexity and cost of Exchange just isn't practical. Business and technical executives strive to find time to focus on running their business and avoid the distractions of managing a 24X7 application such as Exchange. The time and expense of running a Microsoft Exchange Server in-house may simply be too much for a company your size.
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it, outsourcing, outsource, outsourcing, microsoft exchange, hosted exchange, mobile services, eprocurement, it spending, collaborative commerce, workforce management software, financial management, expense management
    
123Together

Considerations for Owning vs. Outsourcing Data Center Physical Infrastructure

Published By: Schneider Electric     Published Date: Jun 04, 2014
When faced with the decision of upgrading an existing data center, building new, or leasing space in a retail colocation data center, there are both quantitative and qualitative differences to consider. The 10-year TCO may favor upgrading or building over outsourcing, however, this paper demonstrates that the economics may be overwhelmed by a business’ sensitivity to cash flow, cash cross-over point, deployment timeframe, data center life expectancy, regulatory requirements, and other strategic factors. This paper discusses how to assess these key factors to help make a sound decision.
Tags : 
schneider, electric, data, infrastructure, upgrade, retail, outsource, own, data management, business technology, data center
    
Schneider Electric

Hosted Vs. In-House for Microsoft Exchange: Five Myths Debunked

Published By: Intermedia     Published Date: Nov 10, 2008
For companies with strapped and/or non-existent IT teams, outsourcing Microsoft Exchange can be an extremely smart, cost-effective option. While the hosted email market is indeed growing fast, a few stubborn myths continue to hold back many businesses from embracing it as a viable option to an in-house solution. In this article we will debunk those falsehoods one by one to show why a hosted Exchange model is the best choice for smaller organizations.
Tags : 
intermedia, exchange solution, exchange model, in-house exchange solution, hosted exchange solution, security, compliance, email security, microsoft exchange
    
Intermedia

Three Ways to Reduce Operating Costs by Outsourcing Data Center Infrastructure

Published By: BlueHill     Published Date: May 08, 2013
Read this white paper to learn the three ways to reduce operating costs by outsourcing data center infrastructure.
Tags : 
data center, data center outsourcing, outsourcing, reduce data center costs, infrastructure, network compliance, blue hill, bluehill, operating costs, network architecture, total cost of ownership, infrastructure management
    
BlueHill

Three Things to Look For In an Outsourcing Partner For Database Administration

Published By: DataVail     Published Date: Jan 08, 2013
In this whitepaper, you will learn about three essential things to consider when evaluating and selecting an outsourcing partner for database administration.
Tags : 
database, administration, outsourcing, dba, database administration, infrastructure, itil, virtualization, cloud computing, design and facilities, power and cooling, infrastructure management
    
DataVail
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.