pto

Results 326 - 350 of 440Sort Results By: Published Date | Title | Company Name

Risk-Free Travel: A Look At Swiss Re

Published By: Pointsec     Published Date: Aug 21, 2009
Critical data is best protected against misuse on business trips complete encryption of notebook hard disks. If 4,500 notebooks are involved, as is the case for the Zurich firm Swiss Re, precise selection criteria and exact planning for the international rollout are important.
Tags : 
data protection, laptop, lost laptop, lost notebook, encryption, data encryption, laptop encryption, vulnerability
    
Pointsec

The Mobile Workforce: The Weakest Link

Published By: Pointsec     Published Date: Aug 21, 2009
The use of handheld computers is estimated to grow by more than 50 percent in the next few years. This surge in use of mobile devices means that companies need to make sure their growing mobile workforce use devices that are secure so that handhelds do not become the weakest link in their security system.
Tags : 
secure mobile, secure laptop, laptop security, secure handheld, wireless security, network security, pointsec, wireless
    
Pointsec

Enterprise Security for Mobile Computing Devices

Published By: Pointsec     Published Date: Aug 21, 2009
This paper will help security officers and staff of large organizations seeking to protect sensitive data on mobile computing devices.
Tags : 
wireless security, network security, laptop security, mobile computing, secure mobile, data protection, access control, vulnerability management
    
Pointsec

Ensure the Integrity of your Content: ProofMark System Technical Overview

Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data
    
ProofSpace

Electronic Signature Assurance & the Digital Chain-of-Evidence

Published By: ProofSpace     Published Date: Aug 17, 2007
This white paper defines the life cycle of an electronically signed record and describes  the requirements for handwritten signature-equivalence throughout its retention period.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace

The Principles of Electronic Agreement Legal Admissibility

Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace

ProofMark System Concepts, Architecture, and Planning Guide

Published By: ProofSpace     Published Date: Mar 04, 2008
The ProofMark software solution is a broadly applicable system that operates on a computer, server, network, system, or infrastructure. This system utilizes public-key cryptography to create an irrefutable record of the time-existence and exact composition of any digital data. This document, the ProofMark System Concepts, Architecture, and Planning Guide, provides you with a broad technical overview of the ProofMark system.
Tags : 
public key, secure content, encryption, proofspace, proofmark, pki, document management, secure content management
    
ProofSpace

The Data Economy Report

Published By: Pure Storage     Published Date: Oct 09, 2017
Digital technology has arguably been the biggest disruptor for individuals and organisations in the last twenty years. It has changed how we communicate, how we shop, how we spend our time and how we develop and grow our businesses. For businesses, digital has not just created new products and services, but fundamentally shifted business models and the dynamic between business and customer, business and supplier, business and employee. It has become a significant force for value and revenue creation, but one that brings with it many challenges.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Pure Storage

Modernize Your Sap Implementation — Make Real-Time Business a Reality

Published By: Pure Storage     Published Date: Sep 27, 2019
For most enterprises, 60 to 73 percent of enterprise data goes unused for business-intelligence (BI) and analytics efforts, according to Forrester.1 Data that is out of sight or out of date creates a competitive blind spot for businesses today. With customer demands, economic changes, and new trends and technologies evolving at a dizzying pace, staying relevant — not to mention competitive — requires that businesses access all available BI to be ?exible and agile. Businesses must have quick access to data that is comprehensive, accurate, current, and consumable in real time. A traditional infrastructure, where the online analytical processing (OLAP) platform and the online transaction processing (OLTP) platform are separate, makes ?exibility and agility difficult to achieve. When a business has accurate, current data in hand, it can make real-time data-driven business decisions so that it can stay relevant and competitive, or even be a disruptor in its industry. One way that a busines
Tags : 
    
Pure Storage

Loud and Clear: SMBs Get the Message About Unified Mobile Communications

Published By: Quocirca     Published Date: Jul 03, 2008
Businesses of all sizes adopt technology to make them more productive, cost effective or flexible and help them compete. Over the years the adoption of tools such as mobile phones, wireless laptops, the internet and email have all been driven by such expectations. Small and mid-sized businesses (SMBs) are often at the forefront as these technologies can give them a lead on their larger competitors. What starts as a useful extra tool or 'competitive edge' soon becomes the accepted norm and a search for improved quality and utility then ensues.
Tags : 
convergence, mobile, wireless, communications, unified communications, quocirca, small business networks, wireless communications
    
Quocirca

Removing the complexity from information protection

Published By: Quocirca     Published Date: Jul 27, 2009
With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. To protect themselves from financial and reputational damage, encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move. They can also add value by allowing the secure sharing of information among authorised users and by enabling more secure remote working.
Tags : 
quocirca, encryption, security, information protection, compliance, data management, internet security
    
Quocirca

The evolving MPS landscape

Published By: Quocirca     Published Date: Oct 17, 2009
Managed print services (MPS) offer organisations the opportunity to control costs, reduce the complexity of managing a heterogeneous infrastructure and improve business processes. With many organisations striving to do more with less, MPS can cut both capital and operational expenses. Now is the time to tackle the huge cost and productivity drain represented by an unmanaged print environment. MPS passes control of this complex infrastructure to the experts leaving an organisation to focus on its core business competencies.
Tags : 
quocirca, data loss, encryption, data security, laptops, information protection, winmagic, information sharing
    
Quocirca

How To Find, Prioritize and Mitigate Vulnerabilities in Your Organization

Published By: Rapid7     Published Date: Jul 12, 2012
In this webcast, Bernd Leger, VP of Marketing, Products & Solutions at Rapid7 and Nate Crampton, Product Manager at Rapid7 discuss the current state of how organizations are prioritizing vulnerabilities in their environments and what security professionals can do to lower their security thresholds.
Tags : 
rapid7, technology, security, it management, business technology, security management, security policies, data protection
    
Rapid7

Executive checklist: Open banking

Published By: Red Hat     Published Date: Mar 26, 2019
Modern banking has become synonymous with the modernization of legacy systems. To continuously improve customer experiences, banks must break down monolithic, institutionalized processes and create a culture that spawns innovation from anywhere. But while 90% of banks are already on their path of transforming to be more digital, only 8% are considered disruptors due to their high levels of digital adoption.
Tags : 
    
Red Hat

Limited Access to Patient Records Risking Medical Errors?

Published By: RES Software     Published Date: Jul 03, 2012
Give your clinicians access to a single, secure and HIPAA compliant workspace. Using their laptop, tablet or smartphone, they can quickly access patient data on the go, while you retain control of your devices.
Tags : 
res software, healthcare, technology, healthcare it, workspace manager, scripts, clinician productivity, desktop migration
    
RES Software

Consumerisation of IT vraagt andere manier van ICT-beheer

Published By: RES Software     Published Date: Apr 08, 2013
De ontwikkeling in IT heeft de afgelopen jaren niet stil gestaan. Alleen al het concept ‘Bring Your Own Device’ (BYOD), een gevolg van Het Nieuwe Werken, veroorzaakt een verandering in de manier waarop ICT-beheer vandaag de dag wordt uitgevoerd. De grens tussen werk en privé en de technologie die thuis of op het werk gebruikt wordt, vervaagt steeds meer nu werknemers persoonlijke apparaten als een tablet of mobiele telefoon, ook op de werkvloer gebruiken. Of andersom, wanneer de arbeidskracht de werklaptop thuis op de bank nog even voor een persoonlijk rondje surfen openklapt.
Tags : 
    
RES Software

TCO verlagen met IT automatisering en verbetering van desktop beheer

Published By: RES Software     Published Date: Apr 08, 2013
De Total Cost of Ownership (TCO) voor pc's is op jaarbasis zo?n €4200 per onbeheerde desktop1 en €6600 per onbeheerde laptop1. Het is dus geen verrassing dat het terugdringen van de TCO door een verbeterd beheer en automatisering de hoogste prioriteit heeft, voor zowel grote als kleine bedrijven. Vooral omdat een gemiddelde van 35% van het IT-budget van organisaties wordt besteed aan Windows-desktops en -laptops. In deze whitepaper wordt bekeken hoe geautomatiseerde producten voor zogenoemd workspace beheer kunnen helpen om de TCO van pc's met ten minste €140 per pc per jaar te verlagen met behoud van de productiviteit van de eindgebruiker.
Tags : 
    
RES Software

Practical Tips to Find and Fix Common App Performance Problems

Published By: Riverbed     Published Date: Nov 02, 2016
"Performance issues today are compounded by increasingly complex infrastructures that IT teams must contend with when delivering applications. As a result detecting and fixing performance problems is hard. Sluggish end-user transactions may present themselves as being slow due to the code. However, that slowness is often not the root cause, but rather a symptom of an underlying infrastructural issue hidden from view. Examine common, yet elusive application performance problems that reveal themselves only when you look at them from the right vantage point. Get the field guide today!"
Tags : 
    
Riverbed

Global Language Learning: Employee Engagement and Business Performance Game Changer

Published By: Rosetta Stone     Published Date: Jan 23, 2018
When augmenting the benefits package for your organization, it’s natural to focus on traditional perks that employees have come to expect: PTO, health insurance, and maybe a tuition assistance credit here or there. But if you’re looking for creative and effective ways to stimulate employee engagement while also driving business results, you’ll want to consider the powerful impact of offering language-learning opportunities. Where’s the connection? And how can you reproduce these benefits within your organization? This playbook offers a deeper look at why language learning has such a positive influence on employee engagement and business performance, as well as step-by-step instructions for implementing a language-learning program in your organization.
Tags : 
    
Rosetta Stone

Global Language Learning: Employee Engagement and Business Performance Game Changer

Published By: Rosetta Stone     Published Date: Apr 03, 2018
When augmenting the benefits package for your organization, it’s natural to focus on traditional perks that employees have come to expect: PTO, health insurance, and maybe a tuition assistance credit here or there. But if you’re looking for creative and effective ways to stimulate employee engagement while also driving business results, you’ll want to consider the powerful impact of offering language-learning opportunities. Why language learning? It offers immediate and long-term benefits to both employees and employers. Research shows that organizations that offer access to language learning see an increase in employee engagement factors like loyalty, morale, and productivity, which in turn boosts business performance factors such as customer satisfaction and internal communications. Where’s the connection? And how can you reproduce these benefits within your organization? This playbook offers a deeper look at why language learning has such a positive influence on employee engagement
Tags : 
    
Rosetta Stone

TOSS OUT THE RULERS, BRING IN THE (CLOUD) WI-FI

Published By: Ruckus Wireless     Published Date: Jul 16, 2018
Students and teachers at Belleville Township High School District now rely on Ruckus Networks to stay connected to laptops, tablets, and smartphones. With Ruckus Cloud Wi-Fi, the IT team at Belleville Township High School District is able to access and manage WLANs with a click of a button. Read this case study to learn why they chose Ruckus Cloud Wi-Fi, allowing Belleville to take classroom learning to the next level.
Tags : 
    
Ruckus Wireless

An Enterprise Guide to Understanding Key Management

Published By: SafeNet     Published Date: Jul 13, 2010
The information presented in this white paper discusses various approaches to cryptography and key management, and can be used as a starting point for developing an effective policy-based key management solution.
Tags : 
safenet, key management, cryptography, integrated security platform, policy compliance, data protection, enterprise security policy, lifecycle
    
SafeNet

Applying Enterprise Security Policy and Key Management

Published By: SafeNet     Published Date: Jul 13, 2010
This white paper is the second in a series following An Enterprise Guide to Understanding Key Management which introduces different types of cryptography and keys used in modern data protection applications.
Tags : 
safenet, enterprise security policy, key management, cryptography, data protection application, integrated security platform, encryption, application security
    
SafeNet

Encryption with WAN Optimization

Published By: SafeNet     Published Date: Jan 14, 2014
WAN optimization is a widely used technology that improves the efficiency of network data transmission. SafeNet Ethernet encryptors are Layer 2 (data link) appliances that secure traffic at wire speeds across wide area Ethernet services to provide protected information transmission. This paper discusses the scenario where both encryption and optimization are used across a WAN and the design considerations required.
Tags : 
wan optimization, wan, encryption, network data security, wan acceleration, safenet, security, wireless
    
SafeNet

Successfully extend CRM to your mobile workforce

Published By: Sage SalesLogix     Published Date: Apr 03, 2009
Workforce mobilization has become a key competitive requirement for most organizations. However, enabling mobility is more than just providing laptops and mobile phones to users and sending them out into the field. It's about selecting the appropriate technologies and developing the right user experience.
Tags : 
crm, customer relationship management, customer centric, saleslogix, user center design, mobile crm, customer-centric, customer service
    
Sage SalesLogix
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.