managed service

Results 301 - 325 of 343Sort Results By: Published Date | Title | Company Name

Implementing a cost-effective, high quality PKI - Why you should outsource your PKI

Published By: Entrust Datacard     Published Date: Nov 10, 2009
This white paper examines the elements that comprise a high quality PKI and the advantages of outsourcing to Entrust Managed Services PKI.
Tags : 
pki, digital certificates, hosted certificates, managed services pki, managed certificates, authentication, digital signature, entrust
    
Entrust Datacard

The evolving MPS landscape

Published By: Quocirca     Published Date: Oct 17, 2009
Managed print services (MPS) offer organisations the opportunity to control costs, reduce the complexity of managing a heterogeneous infrastructure and improve business processes. With many organisations striving to do more with less, MPS can cut both capital and operational expenses. Now is the time to tackle the huge cost and productivity drain represented by an unmanaged print environment. MPS passes control of this complex infrastructure to the experts leaving an organisation to focus on its core business competencies.
Tags : 
quocirca, data loss, encryption, data security, laptops, information protection, winmagic, information sharing
    
Quocirca

Keep unwelcome activity away from your data.

Published By: IBM     Published Date: Oct 13, 2009
Stopping inappropriate data access. This turnkey solution safeguards servers - where business data is stored and accessed - with a combination of software and managed security services that automate critical areas of security oversight. By monitoring and tracking system access, the solution is effective at enforcing security policies.
Tags : 
security threats, ibm, server, express mps, security policies, intrusion prevention, server sensor, internet security systems
    
IBM

Numara Track-It! Change Management for Flexible Seamless Upgrades of Services

Published By: Numara Software     Published Date: Jul 16, 2009
Discover how Numara® Track-It!® helps you avoid unplanned service interruptions, lost revenue and customer dissatisfaction due to unmanaged change. With change management capabilities, you will have the flexibility and management tools you need.• Implement change control • Reduce time and effort while improving productivity and compliance • Leverage your IT investment with a fully integrated change management solution • Improve customer satisfaction • Adhere to best practices in IT change management • Reduce the cost of IT services
Tags : 
help desk, track it, numara, customer management, best practices, customer satisfaction, self service, knowledge management
    
Numara Software

Server Virtualization & Cloud Computing: Four Hidden Impacts on Uptime & Availability

Published By: Stratus Technologies     Published Date: Jun 04, 2009
Cloud computing allows companies to use IT resources as a service, taking advantage of shared applications, processing and storage managed within the cloud - either inside a private cloud at an internal data center, or in an external cloud at a service provider. Greater robustness of the virtualized servers supporting this new IT model will ensure a resilient cloud infrastructure capable of delivering "on-demand" access to users.
Tags : 
demand, stratus, cloud computing, virtualized, on demand, storage management, shared applications, cloud
    
Stratus Technologies

Identity Enabled Web Services: Standards-based identity for Web 2.0

Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
Ping Identity

5 Steps to Secure Internet SSO

Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing
    
Ping Identity

Identity Enabled Web Services: Standards-based identity for Web 2.0

Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
Ping Identity

Secure Internet Single Sign-On 101

Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
Ping Identity

Managed Email Marketing: Using an Outside Agency for Successful Email Campaigns

Published By: DATAbuddy     Published Date: Apr 27, 2009
Thousands of companies already leveraged the power of email marketing to promote their business to a wide range of customers. For those businesses that haven't yet introduced email marketing into their advertising efforts - and even for some of those who have - the strategy does reveal some challenges. Companies struggling to get the most out of their email marketing efforts should consider using a managed email marketing service. Let's take a look at the challenges of email marketing and how an outside firm can tackle those issues.
Tags : 
databuddy, email marketing, e-mail, email, email campaign, outside agency, smb, small business
    
DATAbuddy

How to Effectively Manage SSL Certificates Across the Enterprise

Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Get your guide today and discover a smart, new strategy for managing SSL security across your network. With VeriSign's Managed PKI for SSL Web-based service, you can centrally manage all of your SSL Certificates with a simple, Web-based interface.
Tags : 
mpki for ssl, managed security solutions, ssl, verisign, http protocol, secure sockets layer, public key infrastructure, certification-authority (root ca)
    
VeriSign Incorp.

Virtual Support Networks: Ten Tips for Delivering Managed Services to On-Site Systems

Published By: WebEx     Published Date: Apr 02, 2009
The business of taking care of remote hardware and software has never been bigger:-Managed systems and services for retail, point of sale, hospitality, and other distributed operations are a hot growth area.- Enterprise help desks manage an increasingly dispersed array of hardware and software.- Enterprise software providers are moving to managed services and other value added support offerings to preserve margins in the face of increasing price pressure.
Tags : 
webex, virtual support networks, virtual support network, vsn technology, standard remote management, it server management, local area network, lan
    
WebEx

How Stratus guarantees 99.999% SLAs for Managed Services

Published By: Stratus Technologies     Published Date: Mar 10, 2009
Learn how Stratus Mission-Critical Managed services have delivered 100% business capability for a clients' global operation - so they can 'have their cake and eat it too!'
Tags : 
stratus, business capability, business process, it components, business centric managed service, slas, mission critical environments, disaster prevention
    
Stratus Technologies

Predictive service excellence for printers

Published By: Quocirca     Published Date: Feb 23, 2009
Networked printers and multifunction peripherals often require a high level of support and manual intervention. Secure remote monitoring platforms reduce device downtime through automating service alerts, providing proactive toner replenishment and automatic meter reading. End users benefit through improved device uptime, and manufacturers and their service partners can build proactive service relationships which can drive greater customer loyalty.
Tags : 
quocirca, printers, networked printers, multifunction peripherals, secure remote monitoring, document output devices, remote monitoring, managed print service (mps)
    
Quocirca

Anti-Spam Solutions - Jan 09: Comparative Testing: Appliances, Software and Hosted Service Solutions

Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
West Coast Labs performed a comparison test on a range of email solutions (appliances, software, and hosted service solutions) to measure their relative spam detection rates over a series of at least 100,000 genuine spam emails using West Coast Labs real-time spam feed.
Tags : 
saas, trend, trend micro, websense, barracuda, anti-spam, antispam, spam filter service
    
Trend Micro SaaS

Ten Tips for Increasing Operational Efficiency

Published By: Cisco     Published Date: Jan 29, 2009
The following are 10 tips for using network technology to help your business increase operational efficiency, reduce costs, improve customer satisfaction, and stay ahead of the competition.
Tags : 
cisco, increasing operational efficiency, boost operational efficiency, mobile employees, smb employees, secure wireless access, outsource it tasks, improve employee retention
    
Cisco

NetBenefit: Hosting Provider Uses Virtualization to Expand Services and Reduce Costs

Published By: Dell Windows Server     Published Date: Jan 16, 2009
NetBenefit is a leading provider of managed hosting services in the United Kingdom. Faced with ever more expensive London data center costs, the company decided to implement the Windows Server 2008 operating system featuring Hyper-V virtualization technology to give it the ability to create competitively priced entry-level virtual machines to complement its existing managed hosting services.
Tags : 
dell, netbenefit, managed hosting services, data center costs, windows server 2008, hyper-v, virtualization technology, virtual machines
    
Dell Windows Server

Enterprise Master Data Management: An MDM Institute MarketPulse In-Depth Report

Published By: IBM     Published Date: Dec 30, 2008
Corporate master data is a critical asset that must be increasingly managed within and beyond the enterprise, primarily to solve business problems in compliance, customer service, sales, and marketing. Such master data may be indentified, harmonized and integrated at multiple levels of the software stack to materialize a single customer view (or supplier, product, view etc.).
Tags : 
ibm, enterprise master data management, corporate master data, data integration, enterprise applications, data management, customer relationship management, enterprise resource planning
    
IBM

Improve Your Ability to Send, Receive, Track, and Collaborate on Large Files

Published By: YouSendIt     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality
    
YouSendIt

Improve Your Ability to Send, Receive, Track, and Collaborate on Large Files

Published By: YouSendIt, Inc.     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality
    
YouSendIt, Inc.

Sending, Receiving, and Tracking Large Files Securely

Published By: YouSendIt     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery
    
YouSendIt

Sending, Receiving, and Tracking Large Files Securely

Published By: YouSendIt, Inc.     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery
    
YouSendIt, Inc.

Email Retention and Archiving:Manage E-Records, Minimize Workplace Risks & Maximize Compliance

Published By: MessageLabs     Published Date: Oct 15, 2008
Failure to strategically manage email can be costly for any businesses. Learn about the risks of poor email management, and how to implement a comprehensive, best practices-based email retention policy.  Enforce your policy by implementing MessageLabs Managed Email Archiving Service to minimize email risks and maximize compliance with organizational, legal, and regulatory rules.  
Tags : 
messagelabs, email retention, archiving, risk, compliance, knowledge management, data management, data protection
    
MessageLabs

What to Look for in Mission-Critical Managed IT Services

Published By: Stratus Technologies     Published Date: Sep 30, 2008
The Choices from many reputable suppliers of IT managed services can appear very much alike. Yet when you have a mission-critical business process whose function must not be interrupted, you know your requirements call for something above and beyond. This paper serves as a field guide to help you identify key characteristics that set a critical managed IT service apart from even highly capable general-purpose offerings.
Tags : 
stratus technologies, it services, business impact analysis (bia), recovery point (rpo), recovery time objectives (rto), business continuity (bc), disaster recovery (dr) protection, service level agreement (sla)
    
Stratus Technologies

Get Protection on Demand with Managed Security Services

Published By: IBM     Published Date: Sep 18, 2008
Organizations of all sizes need security that can adapt to their ever-changing environments. IBM Managed Security Services can help you integrate security with business processes for increased flexibility, efficiency and productivity. Read this white paper to learn how IBM can put you in the driver’s seat with protection on demand.
Tags : 
ibm, ibm mmdg, managed security, productivity, security, it management, security management
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.