sign

Results 3951 - 3975 of 4045Sort Results By: Published Date | Title | Company Name

Heuristics Analysis: Detecting Unknown Viruses

Published By: ESET     Published Date: Jan 30, 2008
Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too. So, how do scanners really work? The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Tags : 
heuristics, threat analysis, how av works, av signatures, traditional antivirus, norton, symantec, trend micro
    
ESET

Steganography: Secret Files Lurking Inside Photos and Music

Published By: ESET     Published Date: Jan 30, 2008
Steganography is the science of hiding data inside of items, such as sound and picture files.  Listen to this podcast to learn more about steganography and the potential IT security concerns it poses.
Tags : 
embedded files, steganography, hiding data, secret files, coding, av signatures, traditional antivirus, norton
    
ESET

How General Cable Reduces Over 50% of Time and Costs Associated with Purchasing

Published By: Supply Chain Connect     Published Date: Jan 24, 2008
General Cable operates 28 manufacturing locations in 8 countries and is a leader in the development, design, manufacture, marketing and distribution of copper, aluminum and fiber optic wire and cable products. Their products are widely used in communications, energy, industrial and speciality markets. General Cable has nearly 300 suppliers of raw material for their US operations.
Tags : 
supply chain, scm, supply chain connect, business management, erp, manufacturing, manufacture, edi
    
Supply Chain Connect

Combating Malware: Leveraging the Power of a Planet

Published By: Panda Security     Published Date: Jan 16, 2008
A new white paper from Panda Security discusses the new breed of silent online threats that can bypass traditional antivirus programs and penetrate even the most highly 'protected' networks.  Additionally, the sheer volume of malware has overwhelmed the antivirus industry as a whole. Collective Intelligence is a new global security model specifically designed to combat the next evolution of malicious code.
Tags : 
malware, virus, anti-virus, spyware, anti-spyware, anti-malware, bot, botnet
    
Panda Security

The Latest Advancements in SSL Technology

Published By: VeriSign Incorp.     Published Date: Jan 15, 2008
Online visitors are becoming more and more wary about transacting online. One way to provide reassurance that your Web site is reputable and safe is to implement the latest SSL encryption technology on your site. Read this guide to learn about the latest in SSL.
Tags : 
security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority
    
VeriSign Incorp.

Maximizing Site Visitor Trust Using Extended Validation SSL

Published By: VeriSign Incorp.     Published Date: Jan 15, 2008
Provide your users with visual cues that indicate your site is secure. Extended Validation SSL can facilitate online commerce by increasing visitor confidence and reducing the effectiveness of phishing attacks.
Tags : 
shopping online, ssl certificate, extended validation, ca/browser forum, ssl certification authorities, certificate authority, ssl certificates, identity authentication
    
VeriSign Incorp.

Milhouse Engineering Manages the O’Hare Airport Project with GlobalSCAPE WAFS

Published By: GlobalSCAPE     Published Date: Jan 08, 2008
In 2005, O’Hare International Airport began a project to relocate and modernize a 2.1 million ft.2 runway. Five independent firms worked on the project design with the IT/data management led by Milhouse Engineering and Construction, Inc.  Milhouse implemented GlobalSCAPE WAFS which mirrors critical files to all sites. This provided fast local access to all project files automatically without any administrative burden and with no delays.
Tags : 
globalscape, data management, wide area networks, high availability, project management, information management
    
GlobalSCAPE

Putting the ROI into ITIL

Published By: Solidcore     Published Date: Jan 07, 2008
Demonstrating ROI for service management investments can be difficult, especially with multi-phase deployments like ITIL that can require significant up-front investment in exchange for returns produced in the future.  Learn how setting milestones and measuring the value of each phase of an ITIL implementation can help prove the project’s value and shape its focus.
Tags : 
itil, roi, service, service management, solidcore, return on investment, cmdb, change management
    
Solidcore

Midmarket ERP Solutions Checklist

Published By: InsideCRM.com     Published Date: Dec 28, 2007
So your midmarket company has done its research and has settled on what you feel is the perfect ERP (Enterprise Resource Planning) solution? Not so fast. Before you sign on the dotted line, consider these 12 key points to ensure you're making the best possible decision.
Tags : 
erp, enterprise resource planning, erp solution, erp software, erp vendor, erp provider, vendor selection, erp vendor selection
    
InsideCRM.com

Taking Remote Support to the Next Level

Published By: WebEx Communications     Published Date: Dec 14, 2007
Based on a survey conducted by ServiceXRG, this paper explores the use and effectiveness of remote support technology across all industry sectors and how companies can take remote support to the next level to significantly improve the support transaction process, reduce service delivery costs and increase solution effectiveness.
Tags : 
remote support, remote access, help desk, helpdesk, customer support, support, customer experience, customer satisfaction
    
WebEx Communications

Minimizing the Burden of PCI Compliance: A New Approach to Credit Card Encryption

Published By: Paymetric     Published Date: Dec 13, 2007
This paper describes a new approach to managing encrypted data that significantly strengthens an organization's security posture, while minimizing the cost and effort of PCI compliance. Read this white paper and find out more about how to comply with PCI compliance requirements.
Tags : 
erp, pci, pci compliance, erp, pci, ompliance, sap, sap
    
Paymetric

CMDB Adoption in the Real World: Just How Real Is It?

Published By: Tideway Systems     Published Date: Dec 11, 2007
This report provided by Enterprise Management Associates (EMA) is developed around research that's focused on showing the many faces of the CMDB – as a central point for governance, asset, inventory, change and configuration control, and as a core system, in many cases for more effective service assurance. Designated for IT adopters and planners – read by executives, as well as, architects, and technical influencers.
Tags : 
cmdb, configuration management, change management, itil, service management, itsm, tideway systems, tideway
    
Tideway Systems

Data Center Optimization

Published By: Tideway Systems     Published Date: Dec 11, 2007
Many firms are embarking on ambitious data center optimization projects to significantly reduce cost in hardware, maintenance, licensing, rack space, cooling and power – only to realize they are lacking fundamental data about their environment. Learn how you can accelerate and de-risk your data center optimization initiatives.
Tags : 
infrastructure, network management, configuration management, cms, cmml, cmdb, datacenter, data center
    
Tideway Systems

ITIL v3: Managing Application and Infrastructure Changes

Published By: Tideway Systems     Published Date: Dec 11, 2007
IT service providers need to offer services that deliver new business opportunities whilst increasing levels of availability, controlling risks and reducing costs. This paper provides you with practical guidance based on the practices in ITIL® V3 that will help you manage application and infrastructure changes and configurations.
Tags : 
service management, itil, change management, configuration management, knowledge management, service strategy, service design, tideway
    
Tideway Systems

Document Management Case Study: Salter, Feiber, Murphy, Hutson & Menet, P.A.

Published By: Computhink     Published Date: Dec 10, 2007
Like most law firms, Salter Feiber deals with vast amounts of documents, a significant portion of which needs to be kept for long periods of time. "We tried to keep the files closed during the last 12 months onsite," says Kim Chewning, Firm Administrator. "Everything else was sent to a third party for storage in a secure facility." However, as the archive grew, so did the storage cost.
Tags : 
documents, document, document management, storage, law firm, lawyer, secure content management, customer service
    
Computhink

An Effective Approach to Restoring System Access in Windows

Published By: ElcomSoft     Published Date: Dec 06, 2007
In order to protect important data, we use a large variety of methods and technologies, especially when the data in question is confidential and essential for day-to-day operations of a business and for making important management decisions. "If you have the information, you own the world" has become the basic tenet of our times, where control over data is of the utmost significance. The loss of access to important data can have a very negative impact on the company’s business.
Tags : 
password, password management, access control, server access, network management, windows, windows management, user access
    
ElcomSoft

Centrally Manage SAN Storage Configuration and Assignment for Microsoft Windows Servers

Published By: Sanbolic     Published Date: Dec 03, 2007
Clustered volume manager enables administrators to centrally configure and assign storage assets in a SAN storage environment in Microsoft System Management Server 2003 and Microsoft Operations Manager 2005 environments.
Tags : 
windows, storage, san, nas, sanbolic, network attached storage, storage area networks, windows server
    
Sanbolic

Efficient and Effective Integrated SSO Solution

Published By: Imprivata     Published Date: Nov 27, 2007
Increased pressure for cost-efficient administration, productive work environments and an array of strict government regulations are driving increased demand for integrated user Provisioning/SSO solutions that are affordable, easy to maintain and secure.
Tags : 
sso, single sign on, user management, authentication, identity management, imprivata, ppi, security
    
Imprivata

From Concept to Customer: Winning Web Strategies for Small Business

Published By: PTC     Published Date: Nov 27, 2007
Defining an effective Internet and domain name strategy is vital to any business — especially small- or medium-sized businesses which have limited development and promotional budgets. From defining this strategy, to understanding the keys to Web promotion, here is vital information that every entrepreneur should know.
Tags : 
web development, web site, web marketing, buy domains, buydomains, web site design, site promotion, seo
    
PTC

Moving to a Blade World: How Blade Computing Improves Your Business

Published By: Quocirca     Published Date: Nov 13, 2007
The evolution of Blade Computing has moved from mere server consolidation to a way of managing IT assets which brings significant business benefits. This paper aims to explain those benefits to the business and IT manager, and show how blade computing can be implemented to save money and improve the way IT serves the business needs.
Tags : 
infrastructure, infrastructure, soa, service oriented architecture, blade computing, blade, blade server, blade servers
    
Quocirca

Reducing the Burden of Administration for Email Content Control, Compliance & Policy Enforcement

Published By: Nemx Software Corporation     Published Date: Oct 23, 2007
Email compliance, security and content policy enforcement is a growing priority for all organizations.  Email content control solutions provide real-time scanning of email traffic and provide the foundation for proactive enforcement of regulatory and corporate policies.  However, the administrative burden associated with policy management imposed by most such products is significant.
Tags : 
email security, security management, policy administration, policy management, policy-based, policy based, email compliance, compliance
    
Nemx Software Corporation

Completing the 4G Vision: Gateways for Mobile WiMAX

Published By: WiChorus     Published Date: Oct 12, 2007
Wireless technologies are migrating from complex hierarchical voice-oriented architectures to flatter, low latency, all-IP based designs – reducing cost and complexity for service providers while efficiently supporting real time IP services. Coupled with this trend is the migration to higher performance OFDMA air links with MIMO and AAS, providing much greater bandwidth with improved interference characteristics.
Tags : 
wimax, access controller, asn-gw, gateway, base station, ofdma, edge router, farpoint group
    
WiChorus

eService: Winning in the Global Marketplace

Published By: eGain     Published Date: Oct 12, 2007
The Internet, years after its emergence, continues to be a challenge for most organizations. This paper examines the notion of eService and the need for it in large, global organizations in particular. It also provides guidelines for developing an effective eService plan, and concludes with a discussion of the most significant benefits of implementing such a plan.
Tags : 
eservice, customer service, online customer service, online help, helpdesk, help desk, e-service, online support
    
eGain

Employee Fraud within Financial Services

Published By: Actimize     Published Date: Oct 10, 2007
According to the results of Actimize's 2007 Employee Fraud survey, which was managed by Infosurv, an independent research company, financial services institutions know that they have a significant and growing problem with employee fraud and are not fully prepared to handle the threat as attacks from organized crime, dissatisfied staff and financially distressed employees become more sophisticated.
Tags : 
auditing, audit, finserve, finserv, financial services, data theft, identity theft, data protection
    
Actimize

The Business Case for Account Lockout Management

Published By: Netwrix     Published Date: Oct 10, 2007
This white paper covers account lockout management process and introduces new cost-effective workflows of account lockout resolution, describing significant ROI enterprises can achieve through the use of automated management solutions.
Tags : 
authentication, account lockout, access control, network security, lockout, user lockout, user authentication, user validation
    
Netwrix
Start   Previous    148 149 150 151 152 153 154 155 156 157 158 159 160 161 162    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.