locker

Results 1 - 18 of 18Sort Results By: Published Date | Title | Company Name

Becoming a People Company: the Way to Unlock Fast-track Growth

Published By: Sage People     Published Date: Jan 22, 2019
In our latest survey report, we explore the growth challenges facing businesses and HR leaders in a rapidly changing landscape. We surveyed over 500 HR leaders in leading organisations to explore their views on these challenges, and to find out how they are supporting people and leveraging people data to help them achieve their growth goals. The survey revealed that: • It’s the war for talent, again. The greatest challenges for growing companies are winning the war for talent, growing productivity and improving workforce visibility. • Fast-growth companies share common traits in the way they manage and engage their people—we call this being a People Company. • There’s a disconnect between managers and employees in terms of what being a People Company means. • Becoming a People Company is a journey, with many organisations some way from embracing all aspects. • People Science is a thing: there’s an appetite to leverage people data and analytics, but there are blockers in the way. Re
Tags : 
    
Sage People

The Adoption of Cloud-Based Services

Published By: CA Technologies     Published Date: Jan 06, 2014
This report examines the issues around the adoption of cloud-based services and looks at the security technology that is being deployed by enthusiasts and why the avoiders are holding back.
Tags : 
mediacom, cloud-based services, adopt the cloud, security of data, effective security, security technology, sensitive data, cloud avoiders
    
CA Technologies

Winning Consensus Based Sales

Published By: CEB     Published Date: Dec 03, 2015
The key challenge of B2B selling today: customer purchase processes are overwhelmed by an increasingly large and diverse number of customer stakeholders who can’t reach consensus on a common course of action. Learn how to overcome buyer dysfunction and guide customer to consensus.
Tags : 
marketing, sales, b2b, challenger, consensus, mobilizer, implementation, product marketing
    
CEB

Management of Native Encryption for Apple FileVault and Microsoft BitLocker

Published By: Intel Security     Published Date: Oct 21, 2015
Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.
Tags : 
mcafee, intel, encryption, apple, filevault, microsoft, bitlocker, security
    
Intel Security

Managing BitLocker Encryption

Published By: CREDANT Technologies     Published Date: Apr 06, 2011
This whitepaper will examine some best practices for managing BitLocker®, as well as discuss how to more easily integrate BitLocker encryption into your security program and reduce the overhead of both key management and reporting.
Tags : 
credant technologies, bitlocker encryption, best practices, reporting, encryption
    
CREDANT Technologies

Data Center of the Future: BitLocker

Published By: Dell Windows Server     Published Date: Jan 16, 2009
Hear about BitLocker™, and important component in WS08 that adds whole disk encryption and secure startup.
Tags : 
dell, data center, bitlocker, windows server 2008, disk encryption, security, application security, encryption
    
Dell Windows Server

Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses

Published By: Cisco     Published Date: Feb 12, 2009
Spam email continues to be a big problem, especially for small businesses. Small companies rely on email just as much as large enterprises, and their mail servers get clogged with unsolicited mail just as often. But, with fewer resources to spare to address the spam problem, small businesses need smarter solutions. To find out how you can use the Cisco Spam & Virus Blocker to eliminate spam, improve productivity, and boost security and network performance in your business download today!
Tags : 
cisco, spam, anti-virus, servers, firewall, security, anti spam, anti spyware
    
Cisco

BitLocker Drive Encryption - How it Works and How it Compares

Published By: Lumension     Published Date: Jan 18, 2013
Watch this great technical webcast on-demand to help you jump start your effort to protect data on endpoints. Don't miss this real training for free™.
Tags : 
encryption, bitlocker, data protection, endpoint, security, best practices, application integration, business activity monitoring
    
Lumension

Windows 7 AppLocker | Understanding its Capabilities and Limitations

Published By: Lumension     Published Date: Sep 18, 2012
Windows 7 AppLocker | Understanding its Capabilities and Limitations
Tags : 
intelligent white listing, limitations, lumension, windows 7 applocker, business technology
    
Lumension

Solution Brief: Cisco UDC: The Optimal Infrastructure for Microsoft Environments and Applications

Published By: Cisco     Published Date: Jun 02, 2015
Today, many businesses fall short in realizing the full potential of their virtualization and private cloud strategies. Rigid infrastructure and architectural complexity are key blockers that must be overcome.
Tags : 
management, network, cloud, server, data center, infrastructure, application integration, analytical applications
    
Cisco

A Short Guide to Wikis

Published By: ProjectLocker     Published Date: Aug 21, 2009
This paper provides a brief overview of Wiki and its emerging importance in the business marketplace. It describes ways in which many major corporations are taking advantage of this new social software to transform their business practices, and lays out a short set of guidelines to consider before implementing your own Wiki solution.
Tags : 
collaboration, corporate portals, information management, intranets, messaging, wiki, wikipedia, social marketing
    
ProjectLocker

White Paper: 5 Tips to Turn Your Website into a Marketing Machine

Published By: ProjectLocker     Published Date: Nov 19, 2007
Learn how you can transform your website into a marketing machine that attracts qualified prospects and converts a higher percentage of them into paying customers.  This Internet marketing whitepaper discusses 5 tips you can implement today to leverage the Internet and reach your customers more effectively.
Tags : 
website marketing, search engine, sem, seo, online marketing, blogging, adwords, google adwords
    
ProjectLocker

CruSafe Project Personnel Tracking Case Study

Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Developed by Borer in conjunction with AND-Group, the CruSafe software and hardware system provides a state-of-the-art safety system specifically developed to address the key requirement for real-time tracking of personnel. AND CruSafe is a state-of-the-art safety system which has been specifically developed to address the key requirement for real-time tracking of personnel (often known as POB- Personnel On Board). CruSafe has already been proven to reduce muster times by 70%.
Tags : 
security, security management, access control, identity management, iam, authentication, crusafe, and-group
    
Borer Data Systems Ltd.

NISA Project: Employee Management Case Study

Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Clear Image was awarded a contract to supply and fit CCTV and Access control to NISA, one of the largest picking warehouses in Europe. The company runs 3 shifts per day and wanted to allocate lockers to employees. The simple solution would have been to give each employee a locker, but between Borer and Clear Image, a better solution was devised. Thanks to our technology, we can create one to many relationships between our devices. 
Tags : 
security, security management, access control, identity management, iam, authentication, nisa, physical security
    
Borer Data Systems Ltd.

Selecting PopUp Ad Filter Software

Published By: Microworld     Published Date: Dec 12, 2007
Unwanted PopUp Ads are intrusive Internet advertisements that are displayed when you access web pages. This white paper provides information about different type of PopUp Ads, losses they cause, how they work and suggests key features that a good PopUp Ad Filter software should have.
Tags : 
pop-up, popup, ads, pop-up ad, pop-up ads, internet security, online security, virus
    
Microworld

Windows Server R2 Management Best Practices

Published By: Dell     Published Date: Jul 30, 2012
Although you may be aware of the many new features Windows Server 2008 R2 offers, you may not know which ones are the most valuable for the data center.
Tags : 
hyper-v, server core, bitlocker, microsoft, data encryption, data center, data management, active directory
    
Dell

Management of Native Encryption for Apple FileVault and Microsoft BitLocker

Published By: Intel Security     Published Date: Oct 20, 2015
Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.
Tags : 
management of native encryption, mne, data protection, filevault, bitlocker, pat correia, encryption, network security appliance
    
Intel Security

Management of Native Encryption for Apple FileVault and Microsoft BitLocker

Published By: Intel Security     Published Date: Oct 21, 2015
Management of Native Encryption for Apple FileVault and Microsoft BitLocker
Tags : 
    
Intel Security
Search      

Add Research

Get your company's research in the hands of targeted business professionals.