third party

Results 176 - 200 of 286Sort Results By: Published Date | Title | Company Name

Case Study: Oslo University Hospital

Published By: Avaya     Published Date: Jun 15, 2016
Transforming the capabilities of Norway’s largest hospital with Avaya VENA Fabric Connect Oslo University Hospital needed a scalable, smart healthcare network to bring together three hospitals and absorb future growth, new acquisitions and third-party services. Read this case study for the details on how they accomplished their goals, and much more.
Tags : 
avaya, healthcare, case studies, best practices, business management
    
Avaya

ThousandEyes for Application Delivery

Published By: ThousandEyes     Published Date: Nov 17, 2016
The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services has increased the complexity application delivery. Online Operations and Site Reliability teams in firms of all types are now responsible for many parts of the application delivery chain. When things go wrong, no matter where, they’re expected to react quickly to minimize the impact on their customers. The challenge for application providers is that users may often experience service degradation when the application stack seems to be working perfectly fine, making troubleshooting extremely difficult. Download now to learn more!
Tags : 
    
ThousandEyes

HP StoreOnce Extends its Industry Leadership in Deduplication 2.0 - HP & EMC competitive analysis

Published By: Sponsored by HP and Intel®     Published Date: Nov 02, 2012
In this competitive whitepaper, Edison Group provides an independent, third-party perspective and evaluation of HP's new B6200 StoreOnce Backup System versus EMC Data Domain. Criteria considered included scalability, high availability and more.
Tags : 
data, data infrastructure, it infrastructure, data recovery, data protection, it management, data management, business technology, data center
    
Sponsored by HP and Intel®

Why You Should Consider Hosted Messaging Security

Published By: Trend Micro SaaS     Published Date: Feb 20, 2009
Hosted, or "in-the-cloud", messaging security capabilities are becoming increasingly popular with organizations of all sizes. Some have already adopted hosted services, while others are becoming more receptive to the notion of using third party services to manage their security infrastructure than they were just a year ago. Particularly driven by the current economic recession, decision makers are realizing that hosted email security can provide a cost-effective solution while actually improving security.
Tags : 
saas, trend, trend micro, software as a service, on-premise, cloud, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security
    
Trend Micro SaaS

HP StoreOnce Extends its Industry Leadership in Deduplication 2.0

Published By: Sponsored by HP and Intel®     Published Date: Feb 20, 2013
In this competitive whitepaper, Edison Group provides an independent, third-party perspective and evaluation of HP’s new B6200 StoreOnce Backup System versus EMC Data Domain.
Tags : 
hp storeonce, leadership, deduplication, industry leadership, emc, data domain, backup system, storeonce, it management, data management, business technology, data center
    
Sponsored by HP and Intel®

Microsoft® Office 365® for the Enterprise: How to Strengthen Security, Compliance and Control

Published By: McAfee     Published Date: Nov 12, 2014
This paper discusses the Office 365 platform, its applicability for organizations of all sizes, and the need for third-party solutions which complement the platform to maintain a strong security posture.
Tags : 
office 365, osterman research, security for office 365, security, best practices
    
McAfee

HP StoreOnce Extends its Industry Leadership in Deduplication 2.0

Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Apr 11, 2013
In this competitive whitepaper, Edison Group provides an independent, third-party perspective and evaluation of HP’s new B6200 StoreOnce Backup System versus EMC Data Domain.
Tags : 
hp storeonce, leadership, deduplication, industry leadership, emc, data domain, backup system, storeonce
    
Sponsored by HP and Intel® Xeon® processors

Taking the Sting Out of Java Vulnerabilities

Published By: Lumension     Published Date: Feb 07, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : 
lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content, security model, dll protection, it environments, security suite, endpoint protection, e-security, targeted phishing, organized attacks, vulnerability management, security, wireless security, best practices
    
Lumension

SCCM Practical Patch Compliance

Published By: Lumension     Published Date: Jun 03, 2015
Microsoft's System Center Configuration Manager doesn't handle every aspect of Linux/UNIX and third-party application security. Here's how to augment and leverage SCCM to close the gaps.
Tags : 
it security, data center, patch, software, application, analytical applications, database development, database security, employee performance, productivity, data warehousing
    
Lumension

The Case for Third Party Archiving in Microsoft Exchange Environments

Published By: Actiance, Inc.     Published Date: Nov 04, 2014
The native archiving capabilities in Microsoft Exchange 2013 are useful and represent a reasonable evolution of the archiving features and functions that were initially offered in Exchange 2010. However, for many regulated companies or those subject to a lot of litigation, the native archiving capabilities of Microsoft Exchange are not enough. They need to be supplemented with third-party archiving tools. Download now and learn more!
Tags : 
actiance, third party archiving, microsoft exchange environments, litigation, microsoft exchange 2013, it management, knowledge management
    
Actiance, Inc.

Microsoft Office 365 for the Enterprise: How to Strengthen Security, Compliance and Control

Published By: Actiance, Inc.     Published Date: Nov 04, 2014
Despite the range of functionality offered in Office 365, like any cloud-based offering, it cannot be all things to all customers. There are features missing in Office 365 that will prompt some customers to consider the use of third-party, cloud-based, or on-premise tools to enhance Office 365’s native capabilities. Specifically, these third-party enhancements are focused primarily on the security, archiving, and encryption capabilities built into Office 365. Read now!
Tags : 
actiance, microsoft office 365, security, compliance, control, it management, knowledge management
    
Actiance, Inc.

SCCM Practical Patch Compliance

Published By: Lumension     Published Date: Jun 05, 2015
Microsoft's System Center Configuration Manager doesn't handle every aspect of Linux/UNIX and third-party application security. Here's how to augment and leverage SCCM to close the gaps.
Tags : 
it security, data center, patch, software, application, analytical applications, database development, database security, employee performance, productivity, data warehousing
    
Lumension

Trend Watch: Small Businesses Benefitting from Outsourced Payroll with HR

Published By: BenefitMall     Published Date: Sep 23, 2015
Download this whitepaper to learn why many small and mid-sized firms are choosing a more robust outsourced solution that combines HR tasks, like time and attendance management and workforce administration, with traditional payroll processing to improve data accuracy, ensure regulatory compliance, and deliver greater economies of scale.
Tags : 
small business, small business owners, payroll, outsourcing payroll, third-party payroll service, attendance management, workforce administration, compliance
    
BenefitMall

Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security

Published By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in today’s business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of today’s demanding IT environment.
Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment, it management, enterprise applications
    
Centrify Corporation

Next-Generation Anti-Malware Testing

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
How did you choose your anti-malware solution? Did you put it through the same rigorous process as your other security solutions? Or, did you simply renew your current product licensing? Perhaps you went with something you had used at a previous job. Maybe you even went so far as to read a few product reviews and third-party test results or evaluations. But, did you test the anti-malware solution yourself? In this book, we explain how artificial intelligence (AI) can help your enterprise combat malware threats in a more preventative, proactive, and radically better way than legacy anti-malware products. We explain why you shouldn't just believe a vendor's marketing. Instead, you should test different solutions for yourself, just as you would with any other major security investment. Read more in this eBook.
Tags : 
anti, malware, testing, generation, data, security
    
BlackBerry Cylance

Patch Management: Picking the Low-Hanging Fruit

Published By: Lumension     Published Date: May 03, 2011
Why fixing third-party application vulnerabilities is at the core of sound government information security-and how to make sure patch management is optimizing your security posture.
Tags : 
patch management, security, lumension, government security, cyber attack, vulnerability management, application security, hacker detection
    
Lumension

3 Strategies to Protect Endpoints from Risky Applications

Published By: Lumension     Published Date: Aug 15, 2010
Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment.
Tags : 
cyber security, application security, risk management, third party applications, endpoint security, cyber crime, anti virus, hacker detection, internet security, network security appliance
    
Lumension

Active Directory Recovery: What it Is, What it Isn't

Published By: Dell Software     Published Date: Oct 01, 2012
Are you prepared for common Active Directory failure scenarios? Are you counting on the Recycle Bin, only to find what you need isn’t there? Learn what you can and can’t do with AD native tools, and how the right third-party tools can automate recovery and put you back in control.
Tags : 
native active directory, delegation, desktop management, ad native tools
    
Dell Software

Changed Your Service Account Password Lately?

Published By: Dell Software     Published Date: May 10, 2013
The fact is that managing Window service accounts is time-intensive and tedious, so managing them well is nearly impossible—without the right third-party tools. Read this white paper to discover how easy it can be to manage services in Windows.
Tags : 
dell software, service account, automated tools, secure passwords
    
Dell Software

PPC Bid Management Guide Top Bidding Tips from 10 PPC Experts

Published By: WordStream     Published Date: May 23, 2013
PPC bid management is one of the more complicated areas of PPC marketing, so many advertisers choose to automate using either the automated budding option in Google AdWords or a third-party bid management solution. Both approaches have their upsides and downsides - download this paper for the top bidding tips from 10 PPC experts.
Tags : 
wordstream, ppc, ppc bid management, bid management tools, ppc management, adwords bidding, ppc bidding tips, ppc bid management strategy, optimize keyword bid, bid management software, ppc advertising
    
WordStream

HP StoreOnce Extends its Industry Leadership in Deduplication 2.0 - HP & EMC competitive analysis

Published By: Intel Corp.     Published Date: Aug 08, 2012
In this competitive whitepaper, Edison Group provides an independent, third-party perspective and evaluation of HP's new B6200 StoreOnce Backup System versus EMC Data Domain. Criteria considered included scalability (including capacity and performance), high availability, architectural approach, pricing, and licensing.
Tags : 
storeonce, extends, edison, group, b6200, storeonce, backup, system, emc, data, domain, industry, leadership, deduplication, emc, competetive, analysis, scalability, capacity, performance
    
Intel Corp.

5 Ways Today's Backup and Restore Technologies Can Put Your Business on the Fast Track

Published By: Quest     Published Date: Jun 21, 2012
In this white paper, we'll explain the 5 key benefits that a third-party solution will bring to the business: savings, speed, security, stability, and simplicity.
Tags : 
backup, restore, security, database, quest, data management, business technology, data center
    
Quest

Lab Validation Report NEC Express5800/R320 Server

Published By: Intel Corporation     Published Date: Sep 10, 2014
Sponsored by: NEC and Intel® Xeon® processor The goal of ESG Lab reports is to educate IT professionals about emerging technologies and products in the storage, data management and information security industries. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by NEC Corporation of America. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
lab, reports, improvement, storage, data, technologies, purchasing, valuable, customers, third-party, evaluation, security, information, data management
    
Intel Corporation

ForgeRock Identity Platform Customer-driven, Internet-scale Identity Relationship Management

Published By: ForgeRock     Published Date: May 05, 2015
The goal of ESG Lab reports is to educate IT professionals about data center technology products for companies of all types and sizes. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by ForgeRock.
Tags : 
esg, forgerock, identity platform, self-service, third-party authentication, it management
    
ForgeRock

The Risk of "Free" Endpoint Security

Published By: Intel Security     Published Date: Jan 12, 2016
Research by third-party analyst Aberdeen Group reveals the true cost of "Free" endpoint security solutions.
Tags : 
aberdeen, free av, endpoint security, security, it management
    
Intel Security
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.