it standard

Results 251 - 275 of 705Sort Results By: Published Date | Title | Company Name

Get Expert Answers on Optimizing Aging Switchgear

Published By: Schneider Electric     Published Date: Sep 19, 2017
When your power system has aging switchgear, you need to work harder to maintain safety and reliability. But easy-to-install options are available to upgrade aging switchgear to bring safety and reliability up to modern standards. Find out how switchgear modernization works in the comprehensive "Answer Guide: Make Aging Switchgear Last Longer and Perform Better." The guide includes information like the 4 Big Wins of Modernization, embedded demonstration videos, an FAQ on how to modernize and links to other modernization resources.
Tags : 
switchgear modernization, mv circuit breakers, lv circuit breakers, switchgear upgrades, electrical distribution equipment, schneider electric, circuit breaker upgrade, obsolete switchgear
    
Schneider Electric

Get PCI Compliant with Cenzic ClickToSecure® ARC

Published By: Cenzic     Published Date: Nov 11, 2008
Cenzic’s ClickToSecure ARC product is a certified PCI Scanner Vendor by the PCI Security Standards Council (certificate number 4192-01-01). This Software as a Service (SaaS) offering requires no software to install and provides your company with thorough reports via the Web that reveals security and compliance issues, remediation recommendations, and methods for process improvement. By using Cenzic, PCI compliance now just becomes one reporting feature among many in your arsenal of tools for managing application vulnerability.
Tags : 
cenzic, pci compliance, security, compliance
    
Cenzic

Get the facts about credit card security and PCI compliance.

Published By: IBM     Published Date: Jan 05, 2010
Find out where you stand on the path to PCI compliance with our checklist of the"digital dozen" requirements.
Tags : 
ibm mmdg, credit card security, pci compliance, secure network, cardholder data, network security appliance, security management, database security
    
IBM

Getting Ahead of the Compliance Curve

Published By: Symantec Corporation     Published Date: Jun 18, 2014
Compliance is a fast-moving target, and its getting harder to keep up. In a survey by IT Policy Compliance Group, a consortium dedicated to helping IT security professionals meet policy and compliance goals, 70 percent of all respondents reported being subject to multiple regulatory compliance mandates, as well as contractual obligations and industry standards. Download to learn how Symantec Certificate Intelligence Center allows enterprises to automate discovery tasks and set up alerts to notify administrators when certificates expire or require maintenance.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, it management
    
Symantec Corporation

Getting Ready for Microsoft Windows Server 2008

Published By: Dell Windows Server     Published Date: Jan 16, 2009
The Windows Server 2008 OS promises to supercharge enterprise computing by providing a solid foundation to support critical workloads and deliver rich Web-based experiences—all in an exceptionally secure, industry-standard operating environment. Dell smoothes the way by providing business-ready platforms optimized for Windows Server 2008 together with Structured Solution Designs to make the migration flexible, simple, and green.
Tags : 
dell, microsoft windows server 2008, structured solution designs, windows migration, platforms, windows, windows server
    
Dell Windows Server

Getting Started With Content Marketing: How to Build, Manage, and Optimize Your Content Strategy

Published By: Skyword     Published Date: Nov 14, 2014
Before you write a single word, you must build a home and create a vision for your content strategy. Skywords Getting Started With Content Marketing eBook leads by example, showing you exactly how to create identity in writing branded content, with real-life examples from our own launch of The Content Standard. Download it today to get started!
Tags : 
content strategy, content marketing, b2c content, b2b content, content marketing platform, content marketing agency, brand content, branded content, branded content marketing, content marketing strategy, content marketing guide, content marketing plan, contentn strategy guide, content marketing strategies, content marketing services, content marketing software, content marketing platform, content marketing solution, original content, web content marketing
    
Skyword

Gigaom report: Enterprise MBaaS platforms

Published By: JBoss Developer     Published Date: Feb 05, 2016
Perhaps the biggest transformation in enterprise IT since the public cloud emerged is the move toward mobile-first application development. As mobility continues to become the new enterprise standard, developers are looking for frameworks that provide the tools they need to create innovative mobile applications without sacrificing their existing investments. While there are proven, enterprise-ready frameworks and platforms for developing and deploying traditional desktop applications, the mobile application development landscape is still evolving. Mobile Backend as a Service (MBaaS) attempts to fill the gap between traditional application platforms and mobile applications. It is the new middleware, exposing APIs and functions that enable developers to rapidly build new mobile apps and mobile-enable legacy enterprise applications.
Tags : 
jboss, red hat, gigaom, enterprise, mbaas platforms, cloud, mobile applications, it management, enterprise applications, cloud computing, business technology
    
JBoss Developer

Git for the Enterprise: Secure, Scalable, Standards-Compliant

Published By: CollabNet     Published Date: Jan 11, 2013
For most enterprises, effective management of Git is a challenge. Discover technical innovations and emerging best practices now provide additional options to manage Git in the enterprise.
Tags : 
git, enterprise, productivity, security, scalable, compliance, application performance management, best practices, business activity monitoring, business management, enterprise software
    
CollabNet

Global Employment Screening is the Right Thing To Do

Published By: First Advantage     Published Date: Apr 30, 2018
If youre reading this ebook, you get it. Organizations like yours know that background screening is becoming a service without borders. You simply must screen the people who work for your organization, no matter where theyre from or where they work, or you risk the integrity and worldwide credibility of your company. Global screening can be very different from U.S. background screening. Availability of information, and the time and requirements to conduct the searches are different than what is standard in the U.S. That complexity is what drove the development of this eBook.
Tags : 
    
First Advantage

Going Mobile

Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organizations data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance, networking, security, it management, enterprise applications, data management
    
Commvault

Graph Functionality in SAP HANA: Real-Time Processing of Highly Connected Data

Published By: SAP     Published Date: Feb 03, 2017
The spatial analytics features of the SAP HANA platform can help you supercharge your business with location-specific data. By analyzing geospatial information, much of which is already present in your enterprise data, SAP HANA helps you pinpoint events, resolve boundaries locate customers and visualize routing. Spatial processing functionality is standard with your full-use SAP HANA licenses.
Tags : 
    
SAP

Grow Your Business in Qatar

Published By: Qatar Financial Centre     Published Date: Jun 20, 2019
In terms of growth and profitability, Qatar is set to go from strength to strength with the governments US$200 billion investment programme underlining their commitment to developing infrastructure, which is in line with the Qatar National Vision 2030 objectives for economic, human, social and environmental development. Part of Qatars 30-year vision is to attract foreign investment and an international talent pool, and businesses can take advantage of a compelling tax environment. Plus, they maintain 100% ownership of their business. Top all this off with a high standard of living in a multicultural environment with recognised academic opportunities, including full sponsorship for free study and an infrastructure that supports businesses to succeed. Its easy to see why Qatar businesses has firmly put itself on the map as a leading financial centre where business go to grow within a diverse nation that is home to over 85 different nationalities.
Tags : 
    
Qatar Financial Centre

Guard Your Organization's Data With Intelligent IBM Encryption

Published By: IBM     Published Date: Jul 26, 2017
Datadynamic, in demand and distributedis challenging to secure. But you need to protect sensitive data, whether its stored on premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive dataand compliance mandates still apply.
Tags : 
data, security, encryption, cloud environments, data regulation
    
IBM

Guard Your Organization's Data with Intelligent IBM Encryption

Published By: IBM     Published Date: Oct 16, 2017
Datadynamic, in demand and distributedis challenging to secure. But you need to protect sensitive data, whether its stored on-premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive dataand compliance mandates still apply.
Tags : 
ibm, encryption, hybrid-cloud, data protection
    
IBM

Guarding the Gates

Published By: Panasonic     Published Date: Oct 10, 2019
Thousands of federal employees are issued mobile devices every year to carry out their agencys mission. The government has strict security standards for such devices, but a new poll by Government Business Council (GBC) suggests that employee perceptions may be at odds with organizational priorities regarding security of these mobile devices.
Tags : 
    
Panasonic

Guarding the Gates: A Flash Poll on Mobile Device Security in the Federal Government

Published By: Panasonic     Published Date: Apr 23, 2019
Thousands of federal employees are issued mobile devices every year to carry out their agencys mission. The government has strict security standards for such devices, but a new poll by Government Business Council (GBC) suggests that employee perceptions may be at odds with organizational priorities regarding security of these mobile devices.
Tags : 
    
Panasonic

Hans Thalbauer TED Talk: Digitizing the Extended Supply Management

Published By: SAP     Published Date: Mar 17, 2016
- Supply Chains are already complex as they are why on earth would we want to extend them? Because its an end-consumer driven economy. We expect to purchase products and services through multiple channels and of course we want to have these products delivered the same day. Of course the product is individualized based on my specific requirements, and yes, it goes without saying, that the products need to be compliant to regulations and standards.
Tags : 
sap, ted talk, supply chain, digital, knowledge management, data management
    
SAP

Harness the full potential of virtualization: HP ConvergedSystem 700 for Virtualization Brief

Published By: HP     Published Date: Aug 25, 2014
You know virtualization drives big business valuebut how can you simplify this complex process? HP can set you on a fast path to virtualization, with breakthrough total cost of ownership, on a cloud-compatible platform. Ready this brief to learn more.
Tags : 
virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution, public, private, business, standardization, cost-efficient, cloud-compatible, platform, storage
    
HP

Hassle-free compliance

Published By: Tripwire     Published Date: Apr 21, 2010
Make compliance just another part of your processes by taking an operational approach to security.
Tags : 
tripwire, compliance, security, business continuity, security management, payment card industry, data security standard, pci dss, data protection, pci compliance
    
Tripwire

Healthcare Overcomes Difficulties With the Advantages of Hybrid Packet-Optical Networks.

    
Ciena

Help yourself: Boosting member satisfaction with intelligent selfservice capabilities

Published By: Group M_IBM Q2'19     Published Date: May 28, 2019
In our always-on, always-connected world, healthcare consumers expect instant access to customer service, not just from 9 AM to 5 PM. Its often no longer good enough for health plans to staff call centers during standard business hours. Members today typically want to be able to log in and help themselves to the answers they need from self-service channels whenever they want and they want the experience to be highly personal. One contact center benchmark study (see next page) revealed self-service channels can be a win-win for both businesses and consumers.1 When done well, self-service solutions can help businesses improve customer satisfaction while reducing costs. And consumers appreciate the convenience of getting answers quickly and efficiently.
Tags : 
    
Group M_IBM Q2'19

HFS Blueprint Report ServiceNow Services 2018

Published By: Infosys     Published Date: Jun 28, 2018
The 2018 HfS ServiceNow Services Blueprint continues our theme of looking at the services ecosystems of leading Software-as-a-Service platforms. Unlike other quadrants and matrices, the HfS Blueprint identifies relevant differentials between service providers across a number of facets under two main categories: innovation and execution.
Tags : 
provider, analysis, digital, automation, standardization
    
Infosys

High-Performance Embedded Applications: The SUMIT Standard

Published By: VersaLogic Corp.     Published Date: Nov 03, 2010
How the SUMIT interconnect standard is designed to meet the evolving needs of embedded systems.
Tags : 
embedded, single board computer, sumit, pci express, pcie, form factor, embedded design, boards & modules, embedded systems and networking
    
VersaLogic Corp.

Hospital Takes on Cybersecurity

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Phoenix Childrens CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security teams existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
BlackBerry Cylance

How are Open Source Development Communities Embracing Security Best Practices?

Published By: HP - Enterprise     Published Date: Oct 16, 2008
Is open source secure? How much business risk is introduced with it?  Fortify surveyed the open source community for an answer and revealed that open source projects lack the three essential elements of security:  people, process and technology.  Read this research to discover what actions can reduce these risks within your organization.
Tags : 
fortify, open source, business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, compliance, ebusiness
    
HP - Enterprise
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.