bsp

Results 401 - 414 of 414Sort Results By: Published Date | Title | Company Name

Web Application Security: The Overlooked Vulnerabilities

Published By: Third Brigade     Published Date: Nov 27, 2006
This white paper identifies critical vulnerabilities that most organizations overlook when they secure their web applications. It also introduces host intrusion defense with deep packet inspection as a new, effective  approach for shielding these vulnerabilities.
Tags : 
web application security, application security, web security, web service security, security management, internet security, ips, intrusion prevention, intrusion detection, hacker detection, third brigade, security, it management, platforms, web services, data protection
    
Third Brigade

Fresh Approaches to Solving the Malware Problem

Published By: Secure Computing     Published Date: Nov 20, 2006
Organizations need to be protected from both known and unknown threats, and all the varieties and forms that sophisticated malware can take.  Learn about the changing nature of malware attacks and how the Webwasher Anti-Malware from Secure Computing can provide a highly effective defense against malicious content.
Tags : 
anti spam, anti spyware, anti virus, application security, security, network security, data protection, malware, secure computing, securecomputing
    
Secure Computing

Image Spam: The Latest Attack on the Enterprise Inbox

Published By: Secure Computing     Published Date: Nov 20, 2006
Spammers have now fired a new barrage of image spam using randomized images that appear identical to the human eye, yet appear to be entirely unique to most anti-spam software. Many of the changes to the images contained within spam messages are so subtle that they require a pixel-by-pixel examination of the image in order to detect the differences.  Read how Secure Computing effectively addresses this problem.
Tags : 
security, anti spam, email security, image spam, malware, spyware, crimeware, intrusion prevention, it management, phishing, secure computing, securecomputing, risk management, microsoft exchange, messaging
    
Secure Computing

Your IT Guy Has Enough on His Plate Without Being the HIPAA Police

Published By: KACE     Published Date: Nov 14, 2006
How is HIPAA Security Rule compliance impacting your IT department?  This paper explores some solutions.
Tags : 
hipaa, compliance, hipaa compliance, healthcare, privacy, confidentiality, kace, it management, enterprise applications, platforms, best practices, software compliance
    
KACE

Automate Now! Achieve Immediate Cost, Productivity and Security Benefits by Automating IT

Published By: KACE     Published Date: Nov 14, 2006
This Enterprise Management Associates (EMA) white paper takes a close look at automated IT management, especially for  medium-sized businesses.
Tags : 
it management, ema, enterprise management associates, automated it, it automation, smb, smbs, network management, manual it management, kace, security, remote network management, high availability, business process automation, service management
    
KACE

Solving the Data Quality Problem

Published By: TriTuns Innovation     Published Date: Nov 14, 2006
This paper examines the nature, cause and impact of data quality problems in typical IT system implementations.  It argues that the extent and impact of poor data quality is largely misunderstood and often ignored.
Tags : 
data quality, data protection, data improvement, improve data, trituns, trituns innovation, data management, data integration
    
TriTuns Innovation

Using Predictive Analytics to Uncover Root Causes and Solve Problems vs. Treat Symptoms

Published By: Customer Chemistry     Published Date: Nov 14, 2006
Predictive analytics can be utilized to uncover root causes so that problems can be eradicated.  Read this white paper to learn how companies can use predictive analytics treatment and prevention approaches to save time and resources, eliminate root causes of problems, and obtain the actionable insight required to improve marketing effectiveness.
Tags : 
analytics, predictive analytics, marketing strategy, customer research, market trends, marketing roi, customer chemistry, enterprise applications, business analytics, marketing automation, sales & marketing software, analytical applications
    
Customer Chemistry

Five Key Building Blocks Help You Realize the Bottom-line Benefits of Predictive Analytics

Published By: Customer Chemistry     Published Date: Nov 14, 2006
Building a top-tier analytics practice is an evolution.  The best approach is to start small, then scale with each success.  Learn how to incrementally build your analytics practice with five customizable building blocks that create a strong foundation for analytical success.
Tags : 
analytics, predictive analytics, business analytics, business process, business strategy, customer chemistry, enterprise applications, application performance management, business activity monitoring, business metrics, analytical applications
    
Customer Chemistry

Improving ROI with Predictive Analytics: Six Keys to Unlocking the Value of Customer Intelligence

Published By: Customer Chemistry     Published Date: Nov 14, 2006
Read this white paper to learn about the six keys to a structured approach to planning and implementation of a predictive analytics infrastructure.  Find out how you can turn customer intelligence data into actionable information for improving the accuracy, efficiency and success of your targeting efforts.
Tags : 
customer intelligence, business intelligence, marketing intelligence, customer research, predictive analytics, analytics, infrastructure, customer data, data mining, customer chemistry, enterprise applications, business analytics, business metrics, customer interaction service, analytical applications
    
Customer Chemistry

Helping Find the Way to Better Public Sector IT

Published By: Quocirca     Published Date: Nov 13, 2006
IT in the UK public sector is under intense scrutiny and needs to deliver better results:  much investment has been made which has too often failed to deliver. Projects have a history of being protracted and complex, offering significant challenges to all involved.
Tags : 
public sector, it management, government, project management, efficiency, productivity, quocirca
    
Quocirca

Integrated Business Communications: A Force For Business Transformation

Published By: IBM     Published Date: Nov 06, 2006
Many forward-thinking organizations are beginning to see the true potential of the convergence of voice, video and data.  It has the power to transform business relationships, business processes and collaboration between employees, suppliers and customers.
Tags : 
convergence, network convergence, ip telephony, voip, communications convergence, infrastructure, ip networks, ipsec, collaboration, ip faxing, voice over ip, ibm, it management, business process automation, business process management, enterprise software, customer experience management
    
IBM

Top 10 Data Protection Tips for SMBs

Published By: EMC     Published Date: Nov 06, 2006
The amount of data on business computers has grown astronomically over the past few decades.  If a company loses this data, business grinds to a halt. The following tips can help you select the hardware and software you need to safeguard the integrity of your data, guarantee accurate restores, and manage backups without placing an undue burden on IT personnel.
Tags : 
data protection, raid, disaster plan, smb, smbs, small business, top 10, backup and recovery, emc, emc insignia, storage, network architecture, network management, small business networks, iscsi, storage area networks, storage management, disaster recovery
    
EMC

Automated Penetration Testing: Completing the Vulnerability Management Framework

Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing, security audit, glba, hipaa compliance, aomega, security, network security, auditing, hacker detection, internet security, intrusion detection, intrusion prevention, security management
    
Aomega

Security Design Principles

Published By: Nixu     Published Date: Nov 06, 2006
This white paper is an overview of the Nixu Security System and the various security principles it encompasses.  Topics discussed include security design, application security, OS hardening, patch management, and more.
Tags : 
network security, patch management, firewall, intrusion prevention, application security, security management, nixu, security, firewalls, hacker detection, internet security
    
Nixu
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.