truste

Results 1 - 25 of 317Sort Results By: Published Date | Title | Company Name

eBook: Is 3D Scanning Right for Your Inspection Needs?

Published By: 3D Systems     Published Date: Feb 28, 2019
Combining the right people, hardware, and software to ensure quality everywhere Quality and reliability matter more than ever. In today’s hypercompetitive environment, companies can’t afford to lag behind when it comes to the quality of their products. And management can’t lag behind when it comes to adopting new tools and technologies to ensure quality everywhere. Over the past two decades, 3D scanning has become a crucial tool in many manufacturers’ measurement and inspection arsenals. It’s an effective metrology technique that is trusted for its accuracy, reliability, speed, and ease of use. Its noncontact nature and exceptional flexibility make it ideal for measuring a wide range of parts in a wide range of places. An effective approach to 3D scanning requires matching the right people with the right hardware and the right software to best meet your company’s measurement needs. This eBook will help you determine if 3D scanning is right for your inspection needs, and if it is, how b
Tags : 
    
3D Systems

Intelligent Client-Side Defense for Stolen Laptops

Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software

The Human Factor in Laptop Encryption

Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence
    
Absolute Software

So, You're Responsible for Managing Laptops

Published By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software
    
Absolute Software

Technology Brief: Absolute Software Expands Lifecycle Management

Published By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : 
absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen
    
Absolute Software

Demo: Absolute Manage

Published By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software

Grappling Growth: How IT Can Thrive in a Fast-Growing Organization

Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software

Webcast: iPads and iPhones Go to Work: The Essential Guide for IT Support

Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software

Webcast: The Growing Threat Landscape: Why your IT Security Strategy Needs to Evolve

Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software

Demo: Absolute Manage Mobile Device Management

Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software

The CFO as Analyst and Advisor

Published By: Adaptive Planning     Published Date: Oct 19, 2011
Surveys show that most CFOs want to upgrade their role from accounting specialists to strategic or business partners. But few CFOs have actually made the change, primarily because they have neither the time nor the necessary capabilities within the current finance team. But for those who do make the change, the rewards are tangible. This chapter lays out a number of important steps that the CFO and the finance team need to take to position themselves as trusted and valued business partners within the organization.
Tags : 
harvard, adaptive, marketry, cfo, analyst, financial managers, financial planning, budget
    
Adaptive Planning

E-signatures and procurement: How IT can help the business streamline vendor and supplier

Published By: Adobe     Published Date: Aug 04, 2015
This white paper shows how IT departments can help the business implement a solution that integrates with existing business applications and transforms procurement into a fast, agile process—all in a trusted environment.
Tags : 
e-signatures, digital signatures, electronic signatures, e-signatures solution, e-signatures and procurement, authentication, identity management, content management system
    
Adobe

Make Your App Experience Count

Published By: Akamai Technologies     Published Date: Aug 17, 2017
Make your app experiences count by focusing on your core competency — your awesome app and killer content — and enlist a trusted partner who can: Accelerate Content Optimize Images Gain insight into real-user activity Download now to learn more!
Tags : 
app, akamai, content, marketing
    
Akamai Technologies

Moving Beyond Perimeter Security: A Comprehensive and Achievable Guide to Less Risk

Published By: Akamai Technologies     Published Date: Jun 14, 2018
"A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8"
Tags : 
security, perimeter security, zero trust, cloud, enterprise security
    
Akamai Technologies

The 4 Benefits of VPN Elimination

Published By: Akamai Technologies     Published Date: Oct 23, 2018
VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution
Tags : 
    
Akamai Technologies

Moving Beyond Perimeter Security: A Comprehensive and Achievable Guide to Less Risk

Published By: Akamai Technologies     Published Date: Dec 11, 2018
A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper authored by Akamai’s CTO, Charlie Gero, to learn how to transition to a perimeter-less world in an incredibly easy way, with steps including: • The zero trust method of proof • The vision behind Google BeyondCorpTM • Analysis of application access vs. network access • How to deploy user grouping methodology • Guidance for application rollout stages 1-8
Tags : 
    
Akamai Technologies

The 4 Benefits of VPN Elimination

Published By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
    
Akamai Technologies

Zero Trust Delivers 6 Security and Business Benefits

Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies

Gigaom Analyst Report: The Power of Hadoop as a Service

Published By: Altiscale     Published Date: Mar 30, 2015
This industry analyst report describes important considerations when planning a Hadoop implementation. While some companies have the skill and the will to build, operate, and maintain large Hadoop clusters of their own, a growing number are choosing not to make investments in-house and are looking to the cloud. In this report Gigaom Research explores: • How large Hadoop clusters behave differently from the small groups of machines developers typically use to learn • What models are available for running a Hadoop cluster, and which is best for specific situations • What are the costs and benefits of using Hadoop-as-a-Service With Hadoop delivered as a Service from trusted providers such as Altiscale, companies are able to focus less on managing and optimizing Hadoop and more on the business insights Hadoop can deliver.
Tags : 
hadoop implementation, hadoop cluster, hadoop-as-a-service, managing and optimizing, it management
    
Altiscale

10 Problems Preventing Your IT Team From Doing Their Best Work and How to Solve Them

Published By: AtTask     Published Date: Jul 17, 2014
Rapid changes in both technology and business mean that IT departments are constantly barraged with new projects whether it's writing a web app or implementing new infrastructure for mobile application. It's a challenge just to stay ahead of the curve. This Whitepaper examines the top 10 every day pains that prevent IT managers from getting work done and offers some new and trusted solutions for improving your productivity.
Tags : 
at task, it organizations, work requests, technology changes, project updates, status reports, project management, knowledge management
    
AtTask

Top 10 Solutions to Productivity Problems for Marketing Managers

Published By: AtTask EMEA     Published Date: Mar 11, 2014
This paper examines the top 10 every day pains that prevent marketing managers from getting work done and offers some new and trusted solutions for improving your productivity.
Tags : 
    
AtTask EMEA

10 Ways to Have Your IT Team Doing Their Best Work

Published By: AtTask EMEA     Published Date: Mar 11, 2014
This piece examines the top 10 every day pains that prevent IT managers from getting work done and offers some new and trusted solutions for improving your productivity.
Tags : 
it managers, productivity, efficiency, employee performance, project management
    
AtTask EMEA

Cloud Native Monitoring at Entrust Datacard with Splunk

Published By: AWS     Published Date: Nov 15, 2018
"To provide trusted identities and secure transactions to your customers, you want a flexible, scalable monitoring solution that offers a unified view on the Amazon Web Services (AWS) cloud. Learn how Entrust Datacard can help your organization quickly identify, resolve, and prevent issues by using a cloud-native platform to deliver seamless customer experiences every time. Watch our on-demand webinar and gain valuable insights into: • How to use a DevOps approach to monitoring • The best practices to scale your monitoring solutions • How Entrust Datacard monitors trace, syslog and metric data from sources like Amazon CloudWatch, Application Load Balancer, and Amazon Aurora"
Tags : 
    
AWS

Informatica Eliminates SSH Key Management with Aporeto Cloud PAM on AWS

Published By: AWS     Published Date: Oct 01, 2019
Informatica is a leader in Enterprise Cloud Data Management, providing solutions that help organizations optimize, transform, and analyze their data. Informatica’s Intelligent Data Platform is built on a microservices architecture, helping organizations ensure their data is trusted, secure, governed, accessible, timely, relevant, and actionable on-premises or on the cloud.
Tags : 
    
AWS

Provide Trusted Data to the Business and Modernize Analytics

Published By: AWS     Published Date: Oct 07, 2019
Hear from speakers: Danielle Greshock, Sr. Manager, Amazon Web Services, Inc. (AWS) Vincent Lam, Head of Cloud Product Marketing, Talend Andy McPhee, Data & Analytics Engineering Director, AstraZeneca
Tags : 
    
AWS
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.