third party

Results 176 - 200 of 295Sort Results By: Published Date | Title | Company Name

Gartner Magic Quadrant

Published By: Jive     Published Date: Feb 12, 2015
With its in-depth guidance and independent third-party vendor evaluations, Gartner’s Magic Quadrant market assessment can assist your organization in implementing an effective communication and collaboration solution. The full report covers 17 vendors, with specific information on their ability to execute and completeness of vision.
Tags : 
enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication, collaboration, market assessment
    
Jive

PaaS Built for Development: IBM Bluemix Solves a Range of Infrastructure and Middleware Challenges

Published By: IBM     Published Date: Jan 30, 2015
IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment. This session provides an overview of IBM Bluemix capabilities.
Tags : 
paas, ibm, infrastructure solutions, middleware challenges, knowledge management, enterprise applications, data management, data center
    
IBM

Exploit Kits: Cybercrime’s Growth Industry

Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, malware, viper
    
ThreatTrack Security

Four Key Trends Impacting Mobile Infrastructure Strategy

Published By: IBM     Published Date: Jan 09, 2015
As mobile technology evolves, it’s bringing rapid change to enterprises everywhere, so it’s essential to know the latest trends and how to build on them to create real business benefits. IDC believes third-party mobility service providers will play a key role in helping you do just that. Read the analyst report to get expert insight into how you can benefit from key mobile trends; building blocks and best practices for successful deployment and adoption of any mobility initiative; critical factors to consider when evaluating an IT services provider; and details on how IBM MobileFirst services can help you achieve a sustainable competitive advantage
Tags : 
ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges, iot, byod, infrastructure, trends, analytics, networking, security, it management, wireless
    
IBM

Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security

Published By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in today’s business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of today’s demanding IT environment.
Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment, it management, enterprise applications
    
Centrify Corporation

SANS Analytics and Intelligence Survey

Published By: McAfee     Published Date: Nov 20, 2014
This paper is the result of a recent SANS survey exploring the use of analytics and intelligence today and exposes the impediments to successful implementation. Organizations that are deploying analytics and intelligence properly are experiencing faster response and detection times, as well as greater visibility. However, many are confused about how to integrate and automate their intelligence collection processes.
Tags : 
siem, threat intelligence, platform integration, correlation and analysis, third-party intelligence tools, security
    
McAfee

PaaS Built for Development: IBM Bluemix Solves a Range of Infrastructure and Middleware Challenges

Published By: IBM     Published Date: Nov 19, 2014
IBM's new Platform-as-a-Service (PaaS) offering, IBM Bluemix, delivers the speed and flexibility of the cloud to allow developers to more quickly compose and build enterprise-grade applications for by providing access to IBM's vast software portfolio as composable services. This powerful PaaS/services combination, built on open standards and taking advantage of Cloud Foundry, enables developers to avoid vendor lock-in while leveraging their existing application development assets and skills, which is essential for building hybrid clouds. IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment.This session provides an overview of IBM Bluemix capabilities.
Tags : 
ibm, bluemix, cloud-computing, middleware, networking, security, software development, it management, business technology
    
IBM

Microsoft® Office 365® for the Enterprise: How to Strengthen Security, Compliance and Control

Published By: McAfee     Published Date: Nov 12, 2014
This paper discusses the Office 365 platform, its applicability for organizations of all sizes, and the need for third-party solutions which complement the platform to maintain a strong security posture.
Tags : 
office 365, osterman research, security for office 365, security, best practices
    
McAfee

The Case for Third Party Archiving in Microsoft Exchange Environments

Published By: Actiance, Inc.     Published Date: Nov 04, 2014
The native archiving capabilities in Microsoft Exchange 2013 are useful and represent a reasonable evolution of the archiving features and functions that were initially offered in Exchange 2010. However, for many regulated companies or those subject to a lot of litigation, the native archiving capabilities of Microsoft Exchange are not enough. They need to be supplemented with third-party archiving tools. Download now and learn more!
Tags : 
actiance, third party archiving, microsoft exchange environments, litigation, microsoft exchange 2013, it management, knowledge management
    
Actiance, Inc.

Microsoft Office 365 for the Enterprise: How to Strengthen Security, Compliance and Control

Published By: Actiance, Inc.     Published Date: Nov 04, 2014
Despite the range of functionality offered in Office 365, like any cloud-based offering, it cannot be all things to all customers. There are features missing in Office 365 that will prompt some customers to consider the use of third-party, cloud-based, or on-premise tools to enhance Office 365’s native capabilities. Specifically, these third-party enhancements are focused primarily on the security, archiving, and encryption capabilities built into Office 365. Read now!
Tags : 
actiance, microsoft office 365, security, compliance, control, it management, knowledge management
    
Actiance, Inc.

How to Use Push Notifications for Application Monetization

Published By: Phunware     Published Date: Oct 27, 2014
Learn how to use push notifications for application monetization and see the positive results of providing the right messages, at the right time, to the right users.
Tags : 
push notifications, geo fence, location marketing, location based alerts, imessage, cloud messaging, third party app notifications, local notifications
    
Phunware

Email Acquisition: The Amazing Opportunities of Email Acquisition Marketing

Published By: UnsubCentral     Published Date: Oct 17, 2014
Every smart marketer knows the value of affiliate marketing. But within the vertical, there are so many types of affiliates to choose from! Content, PPC, display, email – how do you choose who to work with?! In this e-book we will discuss the benefits of email marketing as an affiliate channel.
Tags : 
email acquisition marketing, affiliate email marketing, email publishers, email affiliate marketing, email marketing affiliate program, affiliate email list, third party email, affiliate marketing, performance marketing, affiliate marketing software, performance marketing software, create an affiliate program, affiliate email
    
UnsubCentral

Choosing the Right Security Solution

Published By: GeoTrust     Published Date: Oct 06, 2014
Choosing the right security solution is critical to the success of an online business. Look for trust-based security solutions that deliver protection and consumer peace-of-mind through cutting edge technology and integration with complementary third-party solutions.
Tags : 
security solution, online business, trust-based security solutions, protection, cutting edge technology, integration, third-party solutions, security
    
GeoTrust

Lab Validation Report NEC Express5800/R320 Server

Published By: Intel Corporation     Published Date: Sep 10, 2014
Sponsored by: NEC and Intel® Xeon® processor The goal of ESG Lab reports is to educate IT professionals about emerging technologies and products in the storage, data management and information security industries. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by NEC Corporation of America. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
lab, reports, improvement, storage, data, technologies, purchasing, valuable, customers, third-party, evaluation, security, information, data management
    
Intel Corporation

Beginners Guide to SSL

Published By: Symantec Corporation     Published Date: Jul 11, 2014
View the SSL 101 video and discover how Symantec SSL Certificates help you protect your business and your customer’s confidential information from attack.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development, ssl
    
Symantec Corporation

Always On SSL

Published By: Symantec Corporation     Published Date: Jul 11, 2014
Always On SSL is a fundamental, cost-effective security measure that provides end-to-end protection for website visitors by enforcing the use of encryption with SSL certificates from a trusted Certificate Authority on every single page.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development, ssl
    
Symantec Corporation

Why Symantec SSL?

Published By: Symantec Corporation     Published Date: Jul 11, 2014
Learn why the world’s largest financial institutions and most heavily trafficked websites trust Symantec Website Security Solutions for their SSL and more.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development, ssl
    
Symantec Corporation

Beyond SSL

Published By: Symantec Corporation     Published Date: Jul 11, 2014
Symantec extends SSL solutions with comprehensive website security solutions that enables companies to protect and grow their businesses by showing their customers that their trusted website is safe to search, surf and buy.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development, ssl
    
Symantec Corporation

Symantec Certificate Intelligence Center - Overview

Published By: Symantec Corporation     Published Date: Jul 11, 2014
Symantec Certificate Intelligence Center discovers and monitors SSL certificates from any Certificate Authority as well as automates SSL certificate lifecycle management for operational efficiency and business continuity.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development, ssl
    
Symantec Corporation

Benefits of Extended Validation, Symantec Website Security Solutions

Published By: Symantec Corporation     Published Date: Jul 11, 2014
Increase your website security with Extended Validation SSL certificates and find out how that translates to increased revenue for your business.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development, ssl
    
Symantec Corporation

Shop Safer in Three Simple Steps

Published By: Symantec Corporation     Published Date: Jul 11, 2014
Online shopping shouldn’t have to feel risky! There are inherent security threats when completing online transactions but if you follow these three simple tricks you’ll be on your way to browsing and buying in safety.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development, ssl
    
Symantec Corporation

Competitive Testing of Web Security Devices

Published By: Websense     Published Date: Jul 08, 2014
This paper reports on a independent third party test of Websense Triton Web Security Gateway Anywhere against four competing products.
Tags : 
websense, wsga, web security, testing of web security, web security products compared, phising, malicious redirects, access control, anti spam, anti spyware, anti virus, application security, hacker detection, internet security, intrusion detection, intrusion prevention, phishing, web service security
    
Websense

Choosing a Cloud Hosting Provider with Confidence

Published By: Symantec Corporation     Published Date: Jun 18, 2014
Cloud computing is rapidly transforming the IT landscape, and the conversation around adopting cloud technology has progressed from “if” to “when.” Enterprises are showing strong interest in outsourced (“public”) cloud offerings that can help them reduce costs and increase business agility. These cloud services offer enormous economic benefits but they also pose significant potential risks for enterprises that must safeguard corporate information assets while complying with a myriad of industry and government regulations. Read this white paper to find out what Symantec is doing help to bridge the gap to cloud computing!
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation

Getting Ahead of the Compliance Curve

Published By: Symantec Corporation     Published Date: Jun 18, 2014
Compliance is a fast-moving target, and it’s getting harder to keep up. In a survey by IT Policy Compliance Group, a consortium dedicated to helping IT security professionals meet policy and compliance goals, 70 percent of all respondents reported being subject to multiple regulatory compliance mandates, as well as contractual obligations and industry standards. Download to learn how Symantec Certificate Intelligence Center allows enterprises to automate discovery tasks and set up alerts to notify administrators when certificates expire or require maintenance.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, it management
    
Symantec Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.