corporate data

Results 226 - 243 of 243Sort Results By: Published Date | Title | Company Name

Demand for High Application Availability Soars

Published By: Stratus Technologies     Published Date: Jun 16, 2009
"Time is money. You can't do business if you can't access your applications. I won't settle for anything less than 99.99% application availability." Steven Sommer, veteran CIO/CTO There is no aspect more critical to a business than the ability of its end users, customers, business partners and suppliers to have high availability access the corporate applications. If applications are unavailable, business ceases. And corporations know it.
Tags : 
c-level, stratus, itic, end users, customers, partners, high availability, corporate applications, service oriented architecture, soa, web based applications, afcom, uptime, continuous availability, servers, downtime, big iron, return on investment, roi, slas
    
Stratus Technologies

Timely Answers Define Intelligence: Analyzing the Full Sweep of Your Data Assets

Published By: SRC,LLC     Published Date: Jun 01, 2009
We work in an ever-changing landscape of competitors, market forces, customer relationships, partner alliances, political and regulatory pressures, and global climate effects. The common mechanism for coping effectively with change is to refer to canned reports and dashboards, dump reporting data into a spreadsheet and look for answers to today's questions. All too often, we have to rely on estimates rather than models, and gut feel rather than data, because we can't get answers in a timely fashion. Yet we know that the answers lie hidden in the morass of corporate data.
Tags : 
business intelligence, src, capabilities, unified enterprise, spatial intelligence, alteryx, oracle, netezza, teradata, gui, ford, experian, sql, enterprise applications, business management, analytical applications
    
SRC,LLC

Trend Micro LeakProof: Leveraging Data Leak Prevention Technology to Secure Corporate Assets

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.

When Encryption Is Not Enough

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.

Concentric Hosted Exchange Whitepaper

Published By: Concentric     Published Date: Mar 27, 2009
Email, calendaring, collaboration, and mobility solutions are moving from corporate data centers to service provider networks. Service providers can realize far greater economies of scale than most businesses and deliver higher levels of service to more users at a lower cost; in fact, the fewer the users, the higher cost for each. Concentric Hosted Exchange is a fast, reliable and affordable solution for email, calendaring, collaboration, and mobility based on Microsoft® Exchange Server 2007 Service Pack 1 (SP1) and Microsoft Outlook® 2007. Concentric Hosted Exchange provides all of the benefits of Microsoft Exchange and Outlook 2007 without the up-front infrastructure costs or ongoing overhead.
Tags : 
concentric, hosted exchanged, email, calendaring, collaboration, mobility, corporate data centers, service provider networks, service providers, microsoft® exchange server 2007, sp1, microsoft outlook® 2007, total cost of ownership, tco, concentric hosted exchange, cli, command line interface, lower bandwidth cost, hmc, global address list
    
Concentric

The .NET Connectivity Guide: Tips & Techniques for Better Performance

Published By: DataDirect Technologies     Published Date: Mar 17, 2009
Connecting to a database requires a number of independent layers. The application needs to incorporate software that establishes the connection and calls to the database. A database connectivity layer needs to be in place to help manage security, communications, and data flow with the database. The database has a set of interfaces that help translate the client requests into actions within the database engine. And with the advent of .NET, the costs of managed versus non-managed code must also be considered.
Tags : 
.net, data direct, microsoft .net architecture, scaling, effective architectural design, virtual machine, intermediate language, component object model, com, windows operating system, com-based code, cpu utilization, optimize database connectivity, software development, c++, java, web development
    
DataDirect Technologies

Data Privacy - The Untold Story

Published By: IBM     Published Date: Feb 23, 2009
This webcast features addresses the challenges of protecting corporate and confidential data. It focuses on the untold story of data privacy and many of the compliance challenges that companies now face. The webcast features Dennis Gaughan and Cynthia Babb and is 55 minutes and 33 seconds.
Tags : 
ibm idm, data privacy, data security, database security, confidential data, security, compliance, intrusion prevention, security policies
    
IBM

The Move to Push Button Business Recovery, The New Corporate Requirement for Enterprise Business

Published By: InMage     Published Date: Feb 18, 2009
Companies of all sizes realize that near real-time business recovery is no longer a nice-to-have – it is becoming a new corporate must have. Competition, regulations and the 24x7 nature of businesses all push for continual application and data availability under almost any circumstances.
Tags : 
inmage, service level agreements, slas, enterprise business continuity, dcig, continuous data protection, cdp, host-based, san-based, corporate recovery point objectives, rpos, enterprise applications, data management, security management, data protection, data replication, database security
    
InMage

Enterprise Master Data Management: An MDM Institute MarketPulse In-Depth Report

Published By: IBM     Published Date: Dec 30, 2008
Corporate master data is a critical asset that must be increasingly managed within and beyond the enterprise, primarily to solve business problems in compliance, customer service, sales, and marketing. Such master data may be indentified, harmonized and integrated at multiple levels of the software stack to materialize a single customer view (or supplier, product, view etc.).
Tags : 
ibm, enterprise master data management, corporate master data, data integration, enterprise applications, data management, customer relationship management, enterprise resource planning
    
IBM

Fraud Prevention & Detection for Mission Critical Spreadsheets

Published By: Prodiance Corp.     Published Date: Dec 22, 2008
According to Baseline Consulting, approximately 32% of corporate data is contained in enduser computing (EUC) applications and approximately 68% is stored in IT controlled applications. These EUCs – primarily spreadsheets, PC databases (e.g. Access databases), BI reports, and word documents – are often stored on employee desktops and corporate file shares, and for the most part, are uncontrolled. They lack the proper safeguards and controls one would expect with IT controlled applications, including documentation, version control, back-up and archival, change control, testing, security and access control, and more.
Tags : 
prodiance, end-user computing (euc), risk assessment, automation, monitoring, spreadsheet, link migration, networking, security, migration
    
Prodiance Corp.

Expanding Roles of Data Management Professionals: A Survey From Industry Peers

Published By: CA Mainframe     Published Date: Sep 12, 2008
Data Professionals are now being asked to perform higher-level tasks and interact with businesses as “data stewards”.  In this survey, you will learn the challenges as outlined by over 850 data professionals. Get this CA-sponsored survey of the International DB2 Users Group (IDUG) conducted by Unisphere Research. The closer link between corporate performance and database performance is increasing pressure on data professionals to provide higher-level services to enterprise business customers.
Tags : 
database administrator, dba, database, data management, ca mainframe, mainframe, database security
    
CA Mainframe

Reducing IT Energy Drain for Business Gain

Published By: BlueArc Corporation     Published Date: Apr 24, 2008
The crisis of mass power consumption in the corporate data center has come to a head. Power required to run data centers in the U.S. is estimated to be as much as that produced by five power plants in a year. Energy expenditures and requirements have doubled in the last five years, and computer disposal is the fastest growing type of waste in the world, according to top Stanford researchers and Greenpeace.
Tags : 
bluearc, green, green computing, energy, energy efficient, business management, spend management
    
BlueArc Corporation

Good Mobile Messaging

Published By: Motorola     Published Date: Feb 06, 2008
Mobile Messaging—a standards-based, wireless messaging application and management system that connects mobile workers to enterprise e-mail, contacts, calendar, notes and more. All with a messaging architecture that incorporates end-to-end encryption of all data.
Tags : 
mobile, wireless, mobile messaging, wireless messaging, motorola, motorola good, wireless communications
    
Motorola

GlobalSCAPE Provides a Competitive Edge for Williams Lea

Published By: GlobalSCAPE     Published Date: Jan 08, 2008
Williams Lea is a leading global provider of customized corporate information solutions. The company needed to reliably, easily and securely transfer sensitive files and implement a system to share files and ensure a business continuity/disaster recovery plan.  Today, Williams Lea uses the GlobalSCAPE’s Enhanced File Transfer (EFT) solution to provide secure protocol support and encryption to protect data in transit and at rest.
Tags : 
eft, enhanced file transfer, managed file transfer, mft, disaster recovery, business continuity, data protection, globalscape, security, information management
    
GlobalSCAPE

Practical Guide to Implementing HIPAA IT Security Standards

Published By: Ecora Software     Published Date: Aug 15, 2007
Do you need to implement corporate policies regarding security and confidential health information? Learn: How to use IT documentation to prepare for and pass Security audits; What IT data is critical for Security Standards; What is the difference between Security and IT Audits. You can implement a sustainable HIPAA Security Standard – Read this paper to learn more.
Tags : 
hipaa, hippa, health care, healthcare, compliance, privacy, consumer data, data privacy, information management, customer data, consumer privacy, privacy, database security, ecora, hipaa compliance
    
Ecora Software

Managing PST Files from Discovery to the Archive

Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
As the need to retain corporate data has increased to meet regulatory requirements-- and best practice may dictate email meeting certain internal policies-- the very existence of PSTs is putting email more and more "at risk. So what can you do about PSTs?
Tags : 
im and email archiving, im archive, email archive, email security, data management, enterprise email, personal email, email archiving, c2c, pst, outlook, mailbox, storage, messaging
    
C2C Systems, Inc.

Compliance Multi-Tasking: Today's Security Priority

Published By: Secure Computing     Published Date: Feb 27, 2007
Driven by increasing regulatory scrutiny and the need to protect key corporate assets, concerns about compliance and data leakage have risen to the top of the priority list for today's corporate executives. This paper discusses multiple policies, procedures and processes corporations must consider to remain secure and compliant.
Tags : 
security, security management, compliance, security policies, hipaa compliance, data protection, database security, corporate governance, california sb-1386, california state bill 1386, authentication, secure computing, securecomputing
    
Secure Computing

Best Practices for Securing Your Enterprise LAN

Published By: AirTight Networks     Published Date: Nov 30, 1999
Making corporate data accessible through Wi-Fi networks means intruders and other unwanted visitors can easily access such networks if proper precautions and tools aren't used to protect them. This paper will discuss best practices in all five areas to secure the enterprise network, whether wired or wireless.
Tags : 
wireless, best practices, enterprise security, wi-fi, wireless security, network security, intrusion prevention, lan, local area network, local area networking, hacker detection, airtight, airtight networks, wlan, vulnerability management
    
AirTight Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.