third party

Results 151 - 175 of 295Sort Results By: Published Date | Title | Company Name

The Heartbleed Bug: How To Protect Your Business with Symantec

Published By: Symantec Corporation     Published Date: Jun 18, 2014
Information security professionals who want to want to understand how to protect their systems from Heartbleed vulnerability should read this paper!
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, it management
    
Symantec Corporation

Gaining a foothold in the quest for more customers.

Published By: Adobe     Published Date: Jun 26, 2019
Get inside the minds of key decision-makers in mid-size companies who are tackling today’s biggest content management challenges. Learn how they’re thinking, what they see as opportunities, and how they’re planning to come out on top. With more than 7,000 CMS solutions available from more than 6,000 unique suppliers, you have a mind-boggling array of options — making it hard to know which path to take and how to decide. Here's your chance to get inside the minds of key decision-makers who are tackling today’s biggest content management challenges: - Personalization - Keeping up with current technology - Difficult-to-use content management systems - Over-reliance on IT teams for simple functions - Inadequate access to customer data and insights - Integrating third-party apps - Managing and optimizing content
Tags : 
    
Adobe

Evaluation of Polycom Pano: Hands - On Testing of a Feature - Rich Wireless Presentation Solution

Published By: Polycom     Published Date: Dec 18, 2017
Polycom Pano, a wireless and wired presentation solution, is designed to make it quick and easy for meeting participants to present and share various types of content. Polycom commissioned the Wainhouse Research test team to perform a third-party assessment of Pano. To facilitate this effort, Polycom provided a pre-release version of the Pano device, and a Sharp PN-L703B 1080p touch-capable 70” display. This report contains the results of our hands-on testing.
Tags : 
pano, wireless presentation solution, content sharing, blackboarding, annotation, polycom
    
Polycom

From Obligations to Opportunities: Building Your Next-Generation Auditing Solution

Published By: Rizepoint     Published Date: Feb 13, 2017
Every successful multi-unit food service or hospitality organization understands the importance of consistent audits and recognizes the essential function they provide. Today, thousands of businesses—from giant multi-national chains to small family-owned businesses—depend on regular internal and third-party audits to monitor, control, and manage everything from sanitation and food safety regulations to internal facility standards and brand consistency.
Tags : 
    
Rizepoint

Is the cybersecurity of the organizations you work with a risk to your business?

Published By: FICO     Published Date: Apr 07, 2018
Cybersecurity is on everyone’s mind – but why should you care about the cybersecurity of the businesses you work with? Download our infographic and discover: When you need to assess the cyber risk of another organization. The implications of not understanding the cybersecurity posture of the businesses you work with.. How measuring third-party cybersecurity risk will help you.
Tags : 
    
FICO

Third-Party Risk: Why Real-Time Intelligence Matters

Published By: Recorded Future     Published Date: Apr 18, 2019
Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. These business relationships can knowingly or unknowingly introduce different types of risks that need to be identified and managed as if these third parties were part of the enterprise itself. Recorded Future's latest risk intelligence offering enables threat intelligence teams to better understand, monitor, and measure their real-time exposure to these third-party risks. Armed with this information, organizations can better assess and prioritize risk mitigation actions.
Tags : 
    
Recorded Future

Know Your Weakest Links: 2 Steps to Managing Third-Party Risk

Published By: Recorded Future     Published Date: Apr 18, 2019
A very high level look into managing third-party risk in infographic format
Tags : 
    
Recorded Future

Don't Let Tags Freeze Your Site

Published By: Ensighten     Published Date: Jul 17, 2012
Learn how Tag Management Systems optimize deployment, performance and ROI of digital marketing, while accelerating page load. Add, remove and modify all third-party services like web analytics and conversion pixels via a single interface.
Tags : 
tag management, digital marketing, web marketing, web analytics, digital advertising, online advertising, javascript tags, web page optimization, web page performance, page load time, ad pixels, conversion pixels, digital marketing applications, conversion tracking, website tagging, tag management systems, tms
    
Ensighten

Javascript on Your Website is Killing You!

Published By: Ensighten     Published Date: Aug 02, 2012
Watch the playback on the hidden costs of website Javascript tagging in time, resources, page speed and stability. Hear the benefits of tag management systems and what to look for, plus hear how Sony increased web analytics ROI, while speeding page load.
Tags : 
tag management, digital marketing, web marketing, web analytics, digital advertising, online advertising, javascript tags, web page optimization, web page performance, page load times, ad pixels, conversion pixels, digital marketing applications, conversion tracking pixels, website tagging, google analytics, sitecatalyst, omniture, website visitor tracking, third-party cookies
    
Ensighten

Web Content Management + Marketing Automation = A Win for Top Performers

Published By: Gleanster Research     Published Date: Aug 30, 2013
Top Performers are early adopters of technologies that allow marketers to remove dependencies from third-party resources (such as IT) to impact the customer experience online – and it’s paying off. Today, technologies like web content management (WCM) and marketing automation are giving marketers control over the customer experience and real-time behavior-driven engagement.
Tags : 
    
Gleanster Research

Open Banking and the Future of Financial Services

Published By: MuleSoft     Published Date: Jan 16, 2018
The future of financial services is under pressure from profound digital disruption. Across the globe, there are forces, both regulatory and customer-led, that open up the market to new entrants and disrupt what customers are buying — and how. The advent of Open Banking is one major influence, with Open APIs paving the way for third-party developers to build applications and services independently. This whitepaper outlines the challenges facing financial services firms and how a new approach to enterprise integration — API-led connectivity — can help banks and financial services firms not only survive, but thrive in an increasingly competitive future. Download this whitepaper to learn: What financial services firms should do about Open Banking, based on the experiences of the impact of PSD2 in Europe How an API strategy could define the future of financial services How a global bank successfully completed a digital transformation initiative
Tags : 
    
MuleSoft

SAP integration best practices

Published By: MuleSoft     Published Date: Jun 27, 2019
A connected, agile IT landscape serves as the foundation for a successful business. SAP integration requires the right technology, a strategic approach to connect SAP and third-party systems, and a means of enabling your organization to achieve success. Learn how MuleSoft’s Anypoint Platform and MuleSoft Catalyst enable you to unlock SAP across the domains of people, process, and technology to drive innovation and change the clock speed of your business. Download this whitepaper to learn about: The top 3 challenges to SAP integration. How Anypoint Platform connects SAP to any app, data, or device. Abstracting configuration complexity with an API-led approach. How MuleSoft Catalyst empowers your teams to scale innovation.
Tags : 
    
MuleSoft

Document Management Case Study: Salter, Feiber, Murphy, Hutson & Menet, P.A.

Published By: Computhink     Published Date: Dec 10, 2007
Like most law firms, Salter Feiber deals with vast amounts of documents, a significant portion of which needs to be kept for long periods of time. "We tried to keep the files closed during the last 12 months onsite," says Kim Chewning, Firm Administrator. "Everything else was sent to a third party for storage in a secure facility." However, as the archive grew, so did the storage cost.
Tags : 
documents, document, document management, storage, law firm, lawyer, secure content management, customer service, spend management, minimal storage, minimize storage, cut storage costs, viewwise, viewise, computhink, best practices, information management, records management
    
Computhink

Shavlik Security Suite

Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Shavlik Security Suite can patch online and offline virtual machines; works both with an agent-based or agentless approach; supports legacy Windows platforms and a wide range of Microsoft and third-party applications; and furthermore provides strong control of scanning options, and a level of automated remediation that is impressive.
Tags : 
shavlik, security suite, virtual machine, legacy windows platform, third-party application, protection management, automated discovery, scanning, configuration management, infrastructure, network security, compliance, patch management, business process automation, data protection
    
Shavlik Technologies

HP StoreOnce vs. EMC Data Domain: The Emergence of a New Generation of Deduplication Solutions

Published By: HP and Intel® Xeon® processor     Published Date: Feb 11, 2012
In this competitive whitepaper, Edison Group provides an independent, third-party perspective and evaluation of HP's new B6200 StoreOnce Backup System versus EMC Data Domain.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation, security
    
HP and Intel® Xeon® processor

The Leaders Quadrant for Social Software

Published By: Jive Software     Published Date: Feb 24, 2014
With its in-depth guidance and independent third-party vendor evaluations, Gartner's Magic Quadrant market assessment can assist your organization in implementing an effective social business software solution.
Tags : 
jive, human resources, social software, social media, workforce, workforce magagement, social business, social business software, software solution, third party vendor, software development, it spending, workforce management, productivity, spend management, workforce management software
    
Jive Software

Exploit Kits: Cybercrime’s Growth Industry

Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, malware, viper
    
ThreatTrack Security

Financial Services PaaS & Private Clouds: Managing and Monitoring Disparate Environments

Published By: MuleSoft     Published Date: Oct 13, 2015
Learn the recommendations to meet the following challenges: Financial services firms are deploying private clouds and PaaS to improve IT manageability and to empower developers, but still need to manage and monitor legacy environments and third party applications Many firms are adopting PaaS to manage microservices and break down legacy applications into discrete components, resulting in many more endpoints to make discoverable, secure, connect, manage and monitor Applications and container technologies deployed on the PaaS may lack the ability to generate “machine data”--detailed information on memory utilization, system resources, endpoint analysis and other critical monitoring statistics
Tags : 
financial services paas, private clouds, disparate environments, memory utilization, it manageability, enterprise applications
    
MuleSoft

The Butterfly Effect

Published By: KPMG     Published Date: Nov 07, 2016
Seemingly unrelated events can conspire to harm your business when you rely on far-flung networks of suppliers, vendors, and service providers. Read “The Butterfly Effect” to learn how global organizations can address the threat of third party disruption in today’s economy.
Tags : 
supply chain, supply chain management, supply chain software, supply chain strategy, supply chain solutions, risk management, risk management software, risk management in supply chain, risk mitigation, business disruption, supply chain disruption, industrial manufacturing, manufacturing, automotive, auto, enterprise software, manufacturing trends, supply chain trends, enterprise applications
    
KPMG

HP StoreOnce Extends its Industry Leadership in Deduplication 2.0 - HP & EMC competitive analysis

Published By: HP and Intel® Xeon® processor     Published Date: Aug 10, 2012
In this competitive whitepaper, Edison Group provides an independent, third-party perspective and evaluation of HP's new B6200 StoreOnce Backup System versus EMC Data Domain. Criteria considered included scalability (including capacity and performance
Tags : 
intel, emc, edison group, whitepaper, storeonce
    
HP and Intel® Xeon® processor

Best Practices for Using Second- and Third-Party Data

Published By: Adobe     Published Date: Sep 23, 2019
Learn best practices for taking inventory of first-party data, and using second- and third-party data to fulfill programmatic campaigns and achieve digital marketing goals. • Define your team’s goals for customer data. • Take inventory of your first-party data. • Explore use cases for second- and third-party data. • Finding the best data providers. • Combine your first, second, and third-party data. • Case Study: MGM drives programmatic campaign results with third-party data. Business struggle to gain a holistic customer view — the skills to identify actionable insights from multichannel data are in short supply. If they could gain a holistic view of customer attributes and behaviors, they could make sure they get the right content at the right time.
Tags : 
    
Adobe

PDF security - a brief history of development

Published By: LockLizard     Published Date: Dec 08, 2008
This paper covers the development of PDF security from simple password protection mechanisms to access controls and DRM.  It discusses lifecycle management, PKI and digital certificates, PDF password security, PDF encryption, PDF DRM, Adobe livecycle / policy server, PDF control, and third party systems and standards for protecting PDF files. Normal 0 false false false EN-US X-NONE X-NONE
Tags : 
pdf security, pdf passwords, pdf drm, adobe pdf security, security, application security, encryption, password management, security management
    
LockLizard

3 Ways To Reduce Third-Party Application Risk and Strategies to Protect Endpoints

Published By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : 
lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware, configuration management, anti spam, anti spyware, application security, windows server, data protection
    
Lumension

A Strong Foundation for Patch Management

Published By: Shavlik Technologies     Published Date: Apr 14, 2011
This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.
Tags : 
shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security, anti virus, network security appliance, data protection, database security
    
Shavlik Technologies

Taneja Group: Optimization for Real Time Storage

Published By: IBM     Published Date: Jul 25, 2012
SVC and Real-time Compression reduces costs, improves IT Optimization and provides a outstanding savings for virtualized third party arrays through a software upgrade.
Tags : 
infrastructure, technology, cloud, storage, virtualization, data management, optimization, svc, backup and recovery, ip storage, storage management, storage virtualization, business technology, cloud computing
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.