vendor

Results 1376 - 1400 of 1593Sort Results By: Published Date | Title | Company Name

Prefabricated Data Centers: Business Advantages for Colocation Providers

Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., T▄V) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plantĺs overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric

The SSL VPN Buyer's Guide

Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Buyer's Guide describes the 20 most important purchase requirements and 37 crucial questions you should ask before choosing an SSL VPN vendor.
Tags : 
buying guide, buyers guide, vpn purchase, ssl, vpn, ssl vpn, secure remote access, policy management, aventail, network security, remote access, remote network management, tunneling, ipsec
    
Aventail

SSL VPN Checklist

Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Checklist details important capabilities to consider when evaluating and comparing SSL VPN vendors and their technology solutions. Enterprise requirements are organized into six broad categories: application-level experience and support, security enforcement, flexible policy management and administration, ease of use, leadership and vision, and financial strength and reputation.
Tags : 
virtual private network, ssl vpn, ssl, vpn, ssl vpn requirements, vpn requirements, system requirements, policy management, security management, secure remote access, aventail, security, access control, internet security, network security appliance
    
Aventail

Infonetics Report: Enforcing Network Access Control Market Outlook and Worldwide Forecast

Published By: Aventail     Published Date: Aug 21, 2009
Network Access Control (NAC) solutions has arrived, with the support of some of the largest vendors in the IT/networking world, its own consortium, the excitement of users at organizations of all types and sizes, real available solutions, and significant revenue generated. Learn more in this white paper.
Tags : 
vpn, ssl, nac, network access control, access control, remote access, remote access security, aventail, ssl vpn, network security, authentication
    
Aventail

The SSL VPN Toolkit

Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Toolkit provides vital information to help you at every stage of your decision process. In this one download you'll get Aventail's SSL VPN Technical Primer (a technology overview and an objective comparison of IPSec VPNs and SSL VPNs); SSL VPN Buyer's Guide (assessment criteria and questions to ask VPN vendors); and SSL VPN Purchase Checklist (SSL VPN requirements in six feature/function categories).
Tags : 
ssl, vpn, ssl vpn, ssl vpn purchase, vpn purchase, buyers guide, buying guide, ipsec, ipsec vpn, comparison, system requirements, aventail, network management, access control, security management
    
Aventail

Gartner Report: Magic Quadrant for SSL VPN

Published By: Aventail     Published Date: Aug 21, 2009
Are you evaluating remote access solutions? Look at vendors with mature technology, a vision for the future of remote access, and a proven track record. Hear what Gartner, considered the leading analyst firm covering the SSL VPN industry, has to say about it.
Tags : 
ssl, vpn, analyst report, gartner group, gartner, virtual private network, remote access, ssl vpn, aventail, network security
    
Aventail

Storage Management Simplified with Virtualization

Published By: Creekpath     Published Date: Aug 21, 2009
Imagine a world where storage management is simplified; everything works together; there are no configuration issues when upgrading, and vendors all cooperate to allow information to be easily stored and retrieved seamlessly. This was a reality in the mainframe world, but the deployment of open systems shattered these concepts.
Tags : 
virtualization, storage virtualization, storage management, storage array, storage arrays, creekpath, storage, data management, backup and recovery, storage area networks
    
Creekpath

The Definition of a Business Service for Customer Data Integration

Published By: IBM     Published Date: Dec 12, 2006
This white paper will define different vendor approaches to developing business services and the relative cost implications of each approach for the customer. 
Tags : 
service oriented architecture, soa, customer data integration, cdi, best practices, data integration, service-oriented architecture, customer interaction service, ibm, enterprise applications, data management, business intelligence, analytical applications, information management
    
IBM

Understanding the Real Risk for Asset-Intensive Companies

Published By: IBM     Published Date: Aug 21, 2008
The goal of having one enterprise resource planning (ERP) solution for all business processes remains popular. However, there are still many misconceptions associated with using enterprise resource planning solutions in asset-intensive industries. This white paper discusses and demystifies the myths for decision makers in asset-intensive industries. You’ll also see how IBM Maximo Asset Management can enhance the quality of asset data, contribute to the safety of the workforce, and help facilitate best practices that significantly impact the long-term success of your business.
Tags : 
erp, asset management, best practices, bpm, business process, ibm mi, ibm, ibm grm, enterprise resource planning, erp solutions, erp vendors, erp modules, asset-intensive, business process management
    
IBM

Bringing Together Manufacturing: Enterprise Resource Planning

Published By: IBM     Published Date: Sep 18, 2008
When bound to regulation and compliance, process manufacturers find opportunities to grow through enterprise resource planning (ERP). However, 50% of process manufacturers execute non-integrated ERP strategies. This Aberdeen Group research study reveals best practices to help you adapt or select an ERP vendor that improves your business performance.
Tags : 
erp, enterprise resource planning, cindy jutras, process, process industry, chemical, food and beverage, food, beverage, pharmaceutical, pharma, best-in-class, material requirements planning, mrp, global competition, manufacturing process, microsoft dynamics, acsis, fullscope, traceability
    
IBM

ESSO SOS: The Critical Questions Every Company Needs to Ask

Published By: Imprivata     Published Date: Aug 21, 2009
This white paper is intended to make the ESSO evaluation process simpler and faster by identifying the critical questions you need to ask ESSO vendors as you evaluate their solutions.
Tags : 
enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, authentication, imprivata
    
Imprivata

Selecting an Intranet Search Engine

Published By: ISYS     Published Date: Aug 21, 2009
Learn about Intranet Search Engines and how to choose the one to suit your needs. Includes a template for specifying your requirements and evaluating vendors.
Tags : 
search engine, search, desktop search, enterprise software, davies, isys, isys search, intranet search, search engines, content integration, search and retrieval
    
ISYS

Unified CPM and the Application of Predictive Analytics

Published By: OutlookSoft     Published Date: Aug 21, 2009
As vendors rush to embrace and exploit predictive analytics, only those with a truly unified solutions will succeed in capitalizing on this powerful and promising technology. Read this insightful white paper to learn more.
Tags : 
analytics, business analytics, performance managment, business process management, bpm, business activity monitoring, metrics, business metrics, activity monitoring, corporate performance management, outlooksoft, outlook soft, it management, best practices, business intelligence, business management, enterprise software, productivity
    
OutlookSoft

Top Ten Network Management Lies and Deceptions

Published By: PerformanceIT     Published Date: Aug 21, 2009
It's confusing and sometimes overwhelming. Learn about common misconceptions about network and system management software and the distortions that software vendors promote when it comes to marketing their product's features.
Tags : 
network management, compliance, networking, systems management, sms, management software, performanceit, performance it, network performance management, remote network management
    
PerformanceIT

How to Find the Right Hosted CRM Vendor at the Right Price

Published By: Salesboom     Published Date: Aug 21, 2009
Choosing an on-demand Customer Relationship Management (CRM) vendor can be a daunting task, especially for the price conscious consumer who lacks the budget for intensive research. This white paper will arm SMBs with the right questions to ask when evaluating on-demand or hosted CRM vendors.
Tags : 
crm, customer relationship management, crm software, sales software, on demand, on-demand, on-demand crm, sales software, marketing software, software selection, vendor selection, hosted crm, salesboom, small business networks, sales & marketing software
    
Salesboom

Selecting the Right Host Intrusion Prevention System: 12 Key Questions to Ask

Published By: Third Brigade     Published Date: May 25, 2007
This white paper identifies twelve critical questions that organizations need to consider when selecting a Host Intrusion Prevention System product. These questions relate to protection, manageability, integration and speed.
Tags : 
host ips, ips, hips, intrusion prevention, vendor selection, software selection, security, hacker prevention, hackers, anti virus, anti spyware, network security, cybercrime, third brigade, access control, firewalls, internet security, intrusion detection
    
Third Brigade

Top 10 Points to Consider in a Business Integration Vendor

Published By: webMethods     Published Date: Aug 21, 2009
Selecting the right business integration vendor is a challenge. While it is essential to focus on what is critical for your company, it is also important to evaluate vendors using a common set of metrics. This document uses customer feedback taken from a broad portfolio of evaluations to offer key factors and considerations to use when selecting an integration software vendor.
Tags : 
business integration, integration, return on investment, roi, business process management, bpm, vendor selection, business integration software, choosing a vendor, vendor, web methods, webmethods, it management, data management, application integration, analytical applications, data integration, service oriented architecture, web service management
    
webMethods

Advancing Productivity Where Complexity and Urgency Collide

Published By: XOsoft     Published Date: Aug 21, 2009
Creating business value is the ultimate goal of investing in new IT technologies. This paper offers recommendations for both IT users and vendors that are vital to ensure that this goal is met.
Tags : 
storage management, productivity, business management, added value, it spending, tco, total cost of ownership, it management, xosoft, storage
    
XOsoft

Multi-Tier Storage Strategies

Published By: SBE     Published Date: Nov 17, 2006
This white paper covers the use of new growth-oriented file systems with snapshot capabilities, iSCSI for network layer independence, and a collection of other technologies provided by various vendors and open source projects to create a multi-tiered storage solution with self-service data restoration, long term growth, and disaster recovery.
Tags : 
iscsi, storage management, storage scalability, scalable storage, scalability, multi tiered, multitiered, sbe, storage, clustering, ip storage, storage area networks, data protection
    
SBE

Evaluate NAC for your Enterprise

Published By: Symantec     Published Date: Jun 12, 2008
Looking for a network security solution? Whether you've already adopted NAC for your enterprise or are researching options, download this helpful survey presented by IDC about NAC benefits and vendor overviews.
Tags : 
network access control, network security, security, nac, symantec, access control
    
Symantec

Why You Need Email Active Archiving Now

Published By: Symantec     Published Date: Jun 12, 2008
An effective email management solution is essential for organizations in today's litigious environment. Learn more from Gartner research about the market and top vendors providing active archive solutions today. Download this research study to learn more.
Tags : 
symantec, email management, email archiving, archive, archiving, storage, storage management
    
Symantec

On-premise to On-demand: Software as a Service Opportunity

Published By: Quocirca     Published Date: Apr 23, 2007
Many independent software vendors (ISVs) are recognising the benefits of offering software as a service (SaaS) as an alternative for their customers and once the teething problems have been overcome there are a number of long term benefits for both parties.
Tags : 
isv, isvs, saas, software as a service, business model, software service, aspiren, independent software vendor, business management, quocirca
    
Quocirca

On-Premise and On-Demand: SaaS Is Now Mainstream But Will Never Be Ubiquitous

Published By: Quocirca     Published Date: May 14, 2008
The software as a service (SaaS) delivery model has matured to such an extent that there is now an on-demand component to most software applications, whether it is online help, automated updates or the main application engine. At the same time, many vendors are realizing that to provide a satisfactory end user experience, total reliance on a web browser is not always enough and a desktop component is often needed.
Tags : 
saas, quocirca, software development
    
Quocirca

Fact or Fiction: Debunking the Top 5 Misconceptions about Vulnerability Management

Published By: Lumension     Published Date: Oct 17, 2008
Vulnerability management can be a powerful means toward reducing the threat surface within an enterprise IT environment. But because vulnerability management technology has been around in some form or another for so long there has been plenty of time for the din of marketing-speak from various vendors to confuse users about the true nature of vulnerability management tools and practices.
Tags : 
lumension, it environment
    
Lumension

Get PCI Compliant with Cenzic ClickToSecure® ARC

Published By: Cenzic     Published Date: Nov 11, 2008
Cenzic’s ClickToSecure ARC product is a certified PCI Scanner Vendor by the PCI Security Standards Council (certificate number 4192-01-01). This Software as a Service (SaaS) offering requires no software to install and provides your company with thorough reports via the Web that reveals security and compliance issues, remediation recommendations, and methods for process improvement. By using Cenzic, PCI compliance now just becomes one reporting feature among many in your arsenal of tools for managing application vulnerability.
Tags : 
cenzic, pci compliance, security, compliance
    
Cenzic
Start   Previous    46 47 48 49 50 51 52 53 54 55 56 57 58 59 60    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.