policies

Results 76 - 100 of 412Sort Results By: Published Date | Title | Company Name

Best Practices for Tape Encryption

Published By: CA Mainframe     Published Date: Sep 12, 2008
Increased regulatory scrutiny on the protection levels afforded sensitive information by those that transact and process it is causing enterprises to improve mainframe security strategies. This entails proactively investigating exposures and implementing appropriate policies, processes and technologies, including those for data z/OS tape encryption. Read this Technology Brief created by CA to learn how to identify exposure points and through the use of Tape Encryption.
Tags : 
tape library, tape backup, tape encryption, backup, encryption, best practices, ca mainframe, mainframe, storage, backup and recovery
    
CA Mainframe

Best practices to make BYOD simple and secure

Published By: Citrix Systems     Published Date: Oct 07, 2014
Bring-your-own-device (BYOD) programs and policies empower people to choose the best device to get their work done, including personally-owned consumer smartphones, tablets and laptops. This white paper provides guidance for introducing BYOD to help people become more mobile and productive while IT adapts to consumerization in a simple, secure and controlled manner.
Tags : 
best practices, secure, simple, consumerization, byod, program, device, smartphones, tablets, laptops, mobile, productive, it management, wireless
    
Citrix Systems

Best practices to make BYOD, CYOD and COPE simple and secure

Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Define the right bring-your-own-device (BYOD), choose-your-own-device (CYOD) and corporate-owned, personally-enabled (COPE) policies for your organization, backed by complete technologies for enterprise mobility management (EMM).
Tags : 
citrix, byodm cyod, cope, security, security management, security policies, best practices, data protection
    
Citrix Systems, Inc.

Best Practices: LAN Security and 802.1X

Published By: Nevis Networks     Published Date: Sep 04, 2007
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.
Tags : 
security policies, policy management, authentication, access control, lan, lan security, 802.1x, nevis, nevis networks, precision prospects, local area networking, network security, 802.11, wireless security
    
Nevis Networks

Bottom Line Reasons for a Total Workforce Management Strategy

Published By: Workforce Software     Published Date: Feb 02, 2015
The Aberdeen Group has taken a fresh look at two very important questions: How does automating a total workforce management strategy elevate business performance? What types of measurable gains can you expect to achieve? If you want a thorough and persuasive argument for automating workforce management processes across the enterprise, this is a must-read.
Tags : 
workforce software, software, automation, budgets, costs, compliance, visibility, labor, productivity, risk, attendance, work ours, pay rate, absence, alerts, support, policies, integration, human resource technology
    
Workforce Software

Briefing: The Future of IT – Preparing for modern delivery of IT

Published By: KPMG     Published Date: Jun 06, 2019
Organisations increasingly need a delivery model for technology that can keep pace with the market. This is about more than doing the basics faster. Find out what ‘modern delivery’ looks like. Read this briefing to discover: • why modern deliver is a key enabler for the customer-centric, connected enterprise • how organisations can make better decisions before development begins • how future development teams will be organised • how to adjust policies and controls to create space for innovation • critical steps for achieving frictionless agility at scale.
Tags : 
    
KPMG

Bring Your Own Device Policy Consideration

Published By: Good Technology Corporation     Published Date: Oct 23, 2012
As companies embrace the use of individual liable mobile devices to access corporate applications and data, Good provides guidance on creating individual liable usage policies.
Tags : 
byod, bring your own device, security, policy considerations, device, enterprise applications, business technology, virtualization, cloud computing
    
Good Technology Corporation

Building a Comprehensive Mobile Security Strategy

Published By: CDW     Published Date: Jul 08, 2015
A key to safeguarding data and apps is finding the right partner.
Tags : 
security, vulnerability management, analytics, threat prevention, mobility, data security, mobile, policies, access control, security management, security policies, mobile device management, data loss prevention
    
CDW

Business Driven Governance: Managing Policies for Data Retention

Published By: IBM     Published Date: May 28, 2014
Different types of data have different data retention requirements. In establishing information governance and database archiving policies, take a holistic approach by understanding where the data exists, classifying the data, and archiving the data. IBM InfoSphere Optim™ Archive solution can help enterprises manage and support data retention policies by archiving historical data and storing that data in its original business context, all while controlling growing data volumes and improving application performance. This approach helps support long-term data retention by archiving data in a way that allows it to be accessed independently of the original application.
Tags : 
ibm, data retention, information governance, archiving, historical data, integrating big data, governing big data, integration, best practices, big data, ibm infosphere, it agility, performance requirements, hadoop, scalability, data integration, big data projects, high-quality data, leverage data replication, data persistence
    
IBM

Change and Configuration Management for Today’s Dynamic A&D Organizations

Published By: IBM     Published Date: Mar 17, 2009
With A&D products containing tens of thousands of parts, and potentially millions of lines of software code–produced by hundreds of companies dispersed across the globe, Aerospace & Defense organizations understand the fundamental value and dire need for robust Change & Configuration Management (CM) processes. But it’s not just the number of parts, lines of code, or partners driving the need for better processes. The complexity of products and development processes, as well as the globalization of product development, are all contributing to an environment that is becoming more difficult to manage with each new program or project.
Tags : 
change and configuration management, ibm, telelogic, a&d, software coding, aerospace and defense, global supply chain, product data management, pdm, boms, cad, managing integrated product data, windchill pdmlink, cmmi, change management, product lifecycle management, project management, supply chain management
    
IBM

Choosing the Optimal Data Center Power Density

Published By: Schneider Electric     Published Date: Oct 17, 2016
This white paper analyzes these costs and presents a flexible architecture to accommodate a well-specified density, and discusses the importance of operational policies in enforcing the specification.
Tags : 
    
Schneider Electric

Cisco Validated Design Summary for BYOD

Published By: Cisco     Published Date: Jan 05, 2015
There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco

Cisco Validated Design Summary for BYOD

Published By: Cisco     Published Date: Apr 10, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases. There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : 
cisco, byod, wifi, wireless, wlan, productivity, productivity, mobile computing, mobile data systems, mobile workers, wireless communications, wireless hardware, wireless infrastructure, wireless phones, wireless service providers
    
Cisco

Climate Change: Challenges and Opportunities for Business

Published By: SAP     Published Date: Apr 13, 2011
Find out what your company needs to do to maximize opportunities and limit risks in response to current and future energy emissions policies. Learn about policies in force in regions and countries around the world, and discover strategies to manage emissions to help benefit your organization.
Tags : 
climate policy, energy policy, sap, global greenhouse gas emissions, christopher l. weber, h. scott matthews, andreas vogel, supply chain, ghg, ipcc, cloud computing, green computing
    
SAP

Cloud Communications and the Federal Government: Opportunities to Seize

Published By: Interactive Intelligence     Published Date: Apr 23, 2014
To put it carefully, certain technology decisions at the federal level since 2002 have been questionable. But citing new “Cloud First” policies for implementations in government contact centers, data centers, and federal agencies, cloud initiatives are now showing value by way of cost reductions and broader functionality. Abdo Rabadi of Blue Kite Consultants and Mechele Herres of Interactive Intelligence say even more benefits of the cloud await. Read how the federal government can best achieve them.
Tags : 
interactive intelligence, cloud communications, cloud, cloud solutions, government, cloud providers, business process automation, contact center, infrastructure, data center, cloud computing, telecom
    
Interactive Intelligence

Columbia College Saves $80,000 in T&E Expenditures with Help from Concur

Published By: Concur Technologies     Published Date: Oct 01, 2015
Read how Columbia College, with the help of Concur, put good internal controls over their travel and expenses, and implemented policies to help reduce spending.
Tags : 
t&e expenditures, internal controls, implement policies, reduce spending
    
Concur Technologies

Combatting Advanced Threats With Endpoint Security Intelligence

Published By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM

Combatting Advanced Threats With Endpoint Security Intelligence

Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM

Coming Soon: 50 States, 50 Sexual Harassment Training Laws

Published By: XpertHR     Published Date: Aug 02, 2018
When it comes to managing the risk of sexual harassment claims, today’s headlines and news stories make it abundantly clear that it’s not just what you’re doing today that may create risk—but what you’ve done, or haven’t done, in the past. XpertHR’s recent Sexual Harassment Survey revealed a wide range of responses from employers hoping to tackle the issue in 2018. New and vastly varying federal and state laws challenge HR professionals to remain on top of regulatory requirements related to policies, training and other compliance issues. XpertHR’s webinar, “Coming Soon: 50 States, 50 Sexual Harassment Training Laws,” will help you ensure you’re prepared, compliant and poised to act appropriately amid a growing number of regulations and continually emerging claims. Get tips from expert attorneys who will help you get up-to-date on: ? New training requirements for private sector employers in New York and varying requirements in other states ? Why high-quality harassment training i
Tags : 
sexual harassment, compliance training, #metoo, harassment training, harassment claim, compliance, harassment, employee management
    
XpertHR

Comparing Security Across The Three Main Cloud Providers

Published By: CloudHealth by VMware     Published Date: Aug 26, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware

Comparing Security Across The Three Main Cloud Providers

Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware

Compliance Multi-Tasking: Today's Security Priority

Published By: Secure Computing     Published Date: Feb 27, 2007
Driven by increasing regulatory scrutiny and the need to protect key corporate assets, concerns about compliance and data leakage have risen to the top of the priority list for today's corporate executives. This paper discusses multiple policies, procedures and processes corporations must consider to remain secure and compliant.
Tags : 
security, security management, compliance, security policies, hipaa compliance, data protection, database security, corporate governance, california sb-1386, california state bill 1386, authentication, secure computing, securecomputing
    
Secure Computing

Compliance Update 2015

Published By: Workforce Software     Published Date: May 26, 2015
New labor laws are a regular occurrence these days… and yet they’re just a small slice of your compliance demands. To help you stay informed and effective, our Director of Compliance takes an annual look at some of the biggest upcoming challenges and lets you know how to prepare.
Tags : 
workforce software, software, automation, budgets, costs, compliance, visibility, labor, productivity, risk, attendance, work ours, pay rate, absence, alerts, support, policies, integration, cloud, enterprise
    
Workforce Software

Consolidation: The Foundation for IT Business Transformation

Published By: ServiceNow     Published Date: Mar 24, 2015
Your enterprise needs the ability to identify all duplicative or outmoded IT and business applications, services and other resources, and then to consolidate those worth keeping, migrate those worth updating, and retiring the rest. And that consolidation delivers multiple business benefits. Key among these: a single interface to multiple tools and resources, and more agile global operations. With the right practices, policies and technology platform, your enterprise can accomplish these goals in ways that accelerate growth, cut costs and complexities, and enhance competitiveness.
Tags : 
consolidation, business transformation, single interface, business applications, business benefits, it management, enterprise applications
    
ServiceNow

Creating a Safety Culture

Published By: SambaSaftey     Published Date: Mar 15, 2019
Today, it’s commonplace for companies to check the motor vehicle records (MVRs) of their drivers once a year. That’s considered due diligence. But what if one driver gets a moving violation or a citation for driving under the influence three weeks after the report was pulled? It could take months for that potentially costly issue to come to light. Likewise, a driver safety policy issued annually is typically worth about as much as the paper it’s written on. There is great potential in setting high standards and creating positive driving behaviors, but this must be a continual process informed by concrete policies, shared motivation to improve, useful data, and quality leadership. Fortunately, several important practices can help companies create a better safety culture –saving money, reducing risk and legal vulnerability, and keeping employees and communities safe. Here’s how.
Tags : 
    
SambaSaftey
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.