it standard

Results 676 - 700 of 713Sort Results By: Published Date | Title | Company Name

Hassle-free compliance

Published By: Tripwire     Published Date: Apr 21, 2010
Make compliance just another part of your processes by taking an operational approach to security.
Tags : 
tripwire, compliance, security, business continuity, security management, payment card industry, data security standard, pci dss, data protection, pci compliance
    
Tripwire

Five Challenges to Continuous PCI DSS Compliance

Published By: Tripwire     Published Date: Apr 21, 2010
Learn more about these challenges, how to address them, and how Tripwire IT security and compliance automation solutions can help.
Tags : 
tripwire, pci dss compliance, it security, automation solution, payment card industry, data security standard, audit, auditing, compliance, business process automation, data protection, pci compliance
    
Tripwire

PCI Compliance: Are UK Businesses Ready?

Published By: Tripwire     Published Date: Apr 28, 2010
Learn more about the survey results and how the right attitudes and technical controls can change that outlook.
Tags : 
tripwire, pci compliance, pci dss, it security, auditing, compliance, internet security, data protection
    
Tripwire

For PCI, the Future is Now

Published By: Tripwire, Inc     Published Date: Mar 10, 2010
How to comply with the global standard without breaking the bank
Tags : 
tripwire, pci dss, payment card industry, data security standard, risk management, automation, audit, auditing, business process automation, data protection, database security, pci compliance
    
Tripwire, Inc

Achieving NERC Compliance Through Tripwire IT Security and Compliance Automation Solutions

Published By: Tripwire, Inc     Published Date: Mar 10, 2010
NERC enforces comprehensive reliability standards for planning and operating the collective bulk power system, including the Critical Infrastructure Protection (CIP) Cyber Security Standards.
Tags : 
tripwire, nerc compliance, it security, automation, cip, cyber security, reliability standard, log, event management, compliance, internet security, business process automation
    
Tripwire, Inc

Why Do Leading Organizations Implement Integrated Workplace Management Systems?

Published By: TRIRIGA     Published Date: Jul 27, 2007
In this white paper, we discuss industry standards, the range of disciplines IWMS spans, external systems (e.g., CAD, ERP, human resources) that interact with a solid IWMS, and the costs avoided when innovators enforce data templates and processes throughout the enterprise.
Tags : 
facilities management, iwms, real estate management, facilities, iwms, integrated workplace management, maintenance and operations, project management, workplace management, tririga, triraga, lease administration, retail, capital assets, corporate real estate, store openings, user moves, on-boarding, off-boarding, human resource technology
    
TRIRIGA

IT Solutions Guide: Secure Your Social Organization with HootSuite Enterprise

Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Without a standard and secure environment for social media, your organization remains vulnerable to malware, unauthorized or fraudulent accounts, and data leakage. IT departments are usually the ones who get called in to clean up the mess. Why not take control of the situation now? Download this guide to HootSuite Enterprise for IT departments today.
Tags : 
social media, social media management, enterprise, hootsuite, solutions guide, security, permissions
    
uberVU via HootSuite

Web Application Threats are Evolving. Are Your Security Efforts Keeping Pace? Today, Web

Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale, pos, application-layer vulnerabilities, web 2.0, virtual servers, service oriented architecture (soa), lightweight technologies, insider threat, holistic control model, software development lifecycle, sdlc, wafs, international computing
    
VeriSign Incorp.

Stay in compliance with government security standards

Published By: VeriSign Incorp.     Published Date: Jul 13, 2009
Be sure your site is in compliance with government data regulations by reading about the different data regulatory standards in this white paper. Learn more today!
Tags : 
verisign, phishing, extended validation, ev ssl, ssl, encryption, online safety, online security, security solutions, trust, security, compliance, pci, hippaa, sarbanes-oxley, fisma, sox, security, data, data security
    
VeriSign Incorp.

Data Genomics Index

Published By: Veritas     Published Date: May 12, 2016
The Data Genomics Index is a first-of-its-kind benchmark analysis of data stored within a typical enterprise environment. This report reveals insights into data growth, data age, and data type thereby providing organizations with the comparison standard for beginning to take action on their data. In addition to the Index, Veritas has founded the Data Genomics Project. This community of likeminded data scientists, industry experts and thought leaders will come together to surface the true nature of enterprise environments, build the data-genome that matters for information management, and share the discussion with a world struggling to solve tremendous data growth challenges.
Tags : 
    
Veritas

High-Performance Embedded Applications: The SUMIT Standard

Published By: VersaLogic Corp.     Published Date: Nov 03, 2010
How the SUMIT interconnect standard is designed to meet the evolving needs of embedded systems.
Tags : 
embedded, single board computer, sumit, pci express, pcie, form factor, embedded design, boards & modules, embedded systems and networking
    
VersaLogic Corp.

Is your credit card data safe from hacks?

Published By: Viavi Solutions     Published Date: Jun 30, 2014
News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What can you do to make sure your customers and clients are protected? The 12 Payment Card Industry (PCI) Data Security Standard (DSS) requirements along with the right Application Performance Monitoring (APM) solution can help keep you one step ahead of the hackers.
Tags : 
network instruments, hacks, apm, security, pci, dss, hackers, database security
    
Viavi Solutions

The Top 20 Tools Needed for Hybrid IT

Published By: Viavi Solutions     Published Date: Sep 30, 2016
IT today is more complex than ever. Public cloud, networks, storage systems, servers, and applications all combine to deliver today’s IT services. But how do you manage such a diverse and complex infrastructure? Can legacy tools help after this seismic shift? This document answers these questions and provides 20 tools you need to deliver services in this new hybrid IT world. Today’s IT environment provides greater promise than ever before. New technologies are driving new capabilities and even more opportunities to differentiate. The opportunity for innovation has never been greater: faster compute, more storage, and new applications all working together to drive greater efficiency and greater power. But this wave of innovations has also added greater complexity since one failure in this increasingly complex IT stack means a failure of the entire service. New consumer-focused cloud based applications are setting a high standard—nearly 100% up time with peak performance all while IT.
Tags : 
    
Viavi Solutions

5S As An Integral Part of Six Sigma

Published By: Villanova     Published Date: Aug 21, 2009
Based on the Japanese words Seiri, Seiton, Seiso, Seiketsu and Shitsuke, the 5S philosophy focuses on effective workplace organization and standardized work procedures. 5S simplifies your work environment, reduces waste and non-value activity while improving quality efficiency and safety. Once fully implemented, the 5S process can increase morale, create positive impressions on customers, and increase efficiency and organization.
Tags : 
lean methods, productivity, efficiency, workforce management, customer service, six sigma, 6 sigma, project management, business management, business process management, bpm, people management, villanova, it management, supply chain management
    
Villanova

Uncovering Critical Revenue Drivers for Online Service Providers

Published By: Vindicia     Published Date: Oct 04, 2017
If your company provides subscription based online services or softwareas-a-service (SaaS), your business success depends upon improving two key metrics: customer acquisition and customer retention. At Vindicia, our in-depth experience in handling more than 240 million accounts that have transacted over $21 billion for our clients enables us to provide unique insights into how well companies performs relative to industry standards. Such business insights can help your company improve your online services business, potentially leading to millions in incremental revenue through increased acquisition and retention numbers.
Tags : 
    
Vindicia

VMware View Optimization Guide for Windows 7

Published By: VMware     Published Date: Sep 12, 2011
This document provides guidelines for configuring a standard Windows 7 image to be used within a VMware View environment, providing administrators with the information necessary to create a standard image of Windows 7 leveraging the Microsoft Deployment Toolkit or by utilizing a script-based approach to optimize a traditionally installed Windows 7 virtual machine.
Tags : 
vmware, windows 7, microsoft, deployment toolkit, desktop infrastructure, scalability, optimization guide, target virtual machine, installation method, operating systems customization, network attached storage, storage area networks, storage management, windows, data quality, project management, desktop management
    
VMware

Journey to the Hybrid Cloud

Published By: VMware     Published Date: Jul 01, 2016
Cloud computing adoption continues to expand as the overall benefits of cloud (cost efficiency, self-service, and IT standardization) are becoming more broadly recognized. While private cloud is the primary type of cloud infrastructure that is in use today, organizations are finding that cloud can no longer be a standalone IT sourcing and consumption model. Enterprises demand greater flexibility and scalability, leading them to invest in hybrid cloud models, which supply them with a seamless application, data, and management environment across all of their IT resources. IDC expects that the percentage of users who adopt private or public cloud models will diminish over the next several years, as enterprises increasingly choose to implement a hybrid cloud model.
Tags : 
vmware data center, vcloud air, vsphere, hybrid cloud, public cloud, private cloud, disaster recovery, data center extension, data center replacement, date center modernization, virtual private cloud
    
VMware

Top 5 Reasons Why Hyperconverged Infrastructure is The Right Way Forward

Published By: VMware     Published Date: Dec 14, 2018
Hyperconverged infrastructure (HCI) is the best strategic option for meeting your organization’s demands for increased efficiency and agility while leveraging existing apps and data. HCI is a scale-out software-defined infrastructure that converges core data services on flash-accelerated, industry standard servers, delivering flexible and powerful building blocks under unified management. Put simply, HCI has the potential to revolutionise your security environment and increase efficiencies relating to application performance. In this whitepaper, we break down the top 5 reasons why hyperconverged infrastructure is the right way forward for your organisation. Please enter your details to access the whitepaper.
Tags : 
    
VMware

Customer Success: First American

Published By: VMware Dell     Published Date: Jun 05, 2008
The First American Corporation is America’s largest provider of business information. Their numerous acquisitions and diverse lines of business meant that First American had multiple datacenters dispersed throughout the country. They turned to VMware virtualization technology to consolidate facilities. They standardized on VMware technology and avoided purchasing 700 physical machines.
Tags : 
server consolidation, server containment, desktop manageability, vmware infrastructure, vmware, green it, green, servers, server virtualization, green computing
    
VMware Dell

Smart Devices, Smart Security

Published By: Voltage Security     Published Date: Sep 13, 2012
If there are any lingering doubts that mobile de-vices-such as smartphones and tablets-have profoundly transformed today's business, one study finds that using smart devices for produc-tivity is "now the standard.
Tags : 
data security, smart devices, smart security, data security strtegy, mobile security, security risks, security, smart phones, wireless security, data protection, database security, business technology
    
Voltage Security

The Business Case for SOA: Rationalizing the Benefits of Service-Oriented Architecture

Published By: webMethods     Published Date: Aug 21, 2009
One of the most significant IT initiatives underway is the adoption of service-oriented architecture (SOA), where IT assets are aligned to business services in a standard, flexible and architected fashion. The concept is often discussed in conjunction with Web services, though the two are not synonymous.
Tags : 
soa, service-oriented architecture, service oriented architecture, service management, alignment, web service, web methods, webmethods, software development, it management, web service security, database development, web services
    
webMethods

Phishing 2.0

Published By: Webroot Inc     Published Date: Mar 05, 2014
In this white paper we will summarize the decline of Phishing 1.0, discuss how phishing has turned toward business and become more costly, outline the structure of new Phishing 2.0 attacks, delineate how the new campaigns evade standard antiphishing countermeasures, and describe how web security services with real-time antiphishing capabilities can protect against Phishing 2.0 attacks.
Tags : 
phishing, campaigns, antiphishing, security, social media, malware, block, network, technology, protection, web security, networking, data protection
    
Webroot Inc

Revenue Recognition: Transitioning to the New Standard

Published By: Workday     Published Date: Nov 27, 2017
Revenue recognition is no walk in the park. We know—we’ve been there. Workday was one of the first companies to adopt the new standard, ASC 606. Read this whitepaper to help you prepare for the transition to ASC 606 and IFRS 15. Discover the challenges other companies are facing, what they’re doing to make the change, and the key things you need to consider as you prepare.
Tags : 
asc 606, ifrs 15, prepare, transition
    
Workday

Revenue Recognition: Transitioning to the New Standard

Published By: Workday     Published Date: Mar 01, 2018
: Read this whitepaper to understand ASC 606 and IFRS 15, identify how to prepare for the transition, and find out how other companies are handling the change
Tags : 
asc 606, ifrs 15, transition
    
Workday
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.