Skip to main content
 

control

Results 276 - 300 of 2322Sort Results By: Published Date | Title | Company Name
Published By: Box     Published Date: May 31, 2012
This Gilbane Group Beacon examines how large-­scale trends are changing enterprise collaboration and content sharing expectations. It defines Cloud Content Management, an emerging set of content management practices.
Tags : 
cloud, content management, active control, collaboration, sharing, content sharing, free online storage, online storage
    
Box
Published By: Box     Published Date: Jun 04, 2012
Enter Box. Our partner integrations and robust security suite ensure employees get any-device, on-the-go content sharing and collaboration... while IT retains control and visibility of all user accounts. Get Your FREE Box IT Strategy Kit!
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools
    
Box
Published By: Box     Published Date: Jun 19, 2014
Mobile device management solutions are designed to set and enforce management at the device level, but have no inherent control of applications or content on those devices. As a result, IT leaders are looking to enterprise mobility management solutions to enable management, configuration and security across devices, applications and content – effectively addressing the problem of information sprawl. Learn how the partnership between Box and MobileIron can help you execute a “mobile first” strategy that manages and secures both mobile apps and content.
Tags : 
box, mobile first, securing information, mobile device management solutions, applications, enable management
    
Box
Published By: Box     Published Date: Jan 16, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now!
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware
    
Box
Published By: Box     Published Date: Nov 24, 2015
The adoption of enterprise content collaboration solutions has exploded as individuals sought ways to easily access, manage, and collaborate on content. Accordingly, businesses want to leverage those easy-to-use solutions but can’t compromise when it comes to enterprise-grade administrative control, security, and business insights.
Tags : 
box, dropbox, business, productivity, collaboration, content, enterprise
    
Box
Published By: Box     Published Date: Jun 22, 2018
• Content is among an organization's most critical assets. It flows through every aspect of a company, from people to systems to processes. But as teams grow and the breadth of their content expands, these valuable assets get fragmented across the different tools they use. • What if you had a secure, open platform that connects all your tools in the cloud, allowing you to pull together best-of-breed technologies that fit your unique business needs? These native integrations keep teams happy and give IT full visibility and control, while boosting productivity and collaboration across the entire organization. • Download our ebook to see how Cloud Content Management from Box provides you with a central and secure content layer that unites all of your apps with seamless, native integrations. In it, you'll learn about our most popular integrations — like Microsoft Office 365, Okta, Slack and Salesforce — and how Box helps you future-proof your tech stack while also providing a unified exp
Tags : 
    
Box
Published By: Box.net     Published Date: Jun 27, 2012
How macro trends are changing enterprise collaboration and content sharing requirements and expectations.
Tags : 
cloud content, active content, macro trends, enterprise collaboration, content sharing
    
Box.net
Published By: BP Logix     Published Date: Jan 17, 2011
This white paper covers how time is the critical element of the planning, oversight, and improvement of business processes. Learn how business users can gain ultimate control making processes more effective.
Tags : 
bpm, business process management, process management, worklfow
    
BP Logix
Published By: Brainshark     Published Date: May 07, 2013
Do your field reps use iPads or iPhones? If so, enable them to present with PowerPoint the way it was meant to be seen -- with fonts, colors and animations intact. Plus, empower you content team to instantly edit and update all versions of a particular presentation, all with the click of a mouse. Ideal for reducing risk and maintaining compliance! Users in more than 140 countries use SlideShark to deliver consistent, secure PowerPoint presentations on iPads and iPhones. Find out how SlideShark can empower you to distribute, control and track field PowerPoints. Click here to watch a quick 2-minute video and see SlideShark in action.
Tags : 
powerpoint, sales, mobile, ipad, iphone, slideshark, compliance, presentation
    
Brainshark
Published By: Brainshark     Published Date: Jun 03, 2013
View this 2 minute video to learn why millions use SlideShark to show flawless PowerPoints on the iPad...instantly track what reps presented which PowerPoints and to whom. Update every copy of a field sales presentation with a single of a mouse...Control, manage and track individual rep usage of master presentations.
Tags : 
powerpoint, sales, mobile, ipad, iphone, slideshark, compliance, presentation
    
Brainshark
Published By: Brocade     Published Date: Nov 25, 2015
The New IP is enabling open, agile networks that unlock new possibilities for your organization. And you can make it happen on your own terms. This white paper explains how the Brocade Virtualized Application Delivery Controller provides a strategic way to reduce TCO.
Tags : 
brocade, networking, network infrastructure, vacd, vrouter, virtual solutions
    
Brocade
Published By: Brocade     Published Date: Nov 25, 2015
Your business demands more than the basic load balancing solution offered by Amazon Web Services. Boost application performance by adding a sophisticated Brocade vADC to seamlessly integrate with any application deployed on AWS—improve user experience, scalability, and control.
Tags : 
amazon, brocade, aws, fucntionality, amazon elb, web services
    
Brocade
Published By: Bronto     Published Date: Jan 02, 2014
Attention digital marketers, we are no longer in control. Whether they realize the true strength of their powers or not, consumers now have the upper hand of the digital marketing experience. Download this e-book to explore each phase of the customer lifecycle and detail programs to reach your customers across channels, devices and levels of engagement.By downloading now, you'll gain instant access to Chapter 1, Acquiring and Welcoming New Subscribers. Then, keep an eye on your inbox for the remaining 5 chapters over the next few weeks.
Tags : 
lifecycle marketing, customer engagement, e-commerce marketing, acquiring subscribers
    
Bronto
Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother
Published By: Burton Group     Published Date: Jul 07, 2008
The identity federation market enjoys an exceptional supply of products. With well over a dozen products available to enterprise customers, most architects have more choices than time will allow for evaluation. This abundance of products is partly the result of the inherent difficulty of developing a truly multipurpose federation server. Although federation products are similar in name, each has its own personality and idiosyncrasies that make it suitable for certain environments but insufficient in others.
Tags : 
fim, federated identity management, identity federation, access control, identity management, passport, burton group
    
Burton Group
Published By: Business Assyst     Published Date: Mar 26, 2007
This paper considers whether smart cards really do have a role to play in loyalty systems or whether they are simply being promoted by the suppliers of smart card technology into what they see as a fast growing, profitable marketplace.
Tags : 
customer satisfaction, customer relationship management, customer interaction service, customer experience management, smart card, smart cards, access control, business assyst
    
Business Assyst
Published By: Business Controls, Inc.     Published Date: Sep 26, 2012
This paper covers the 7 essential hotline features to look for in a solution, the 4 best practices for creating and maintaining an effective hotline, and the HR potential of the traditional hotline to organizations that maintain locations, agents, or contractors outside the country.
Tags : 
    
Business Controls, Inc.
Published By: Business Software     Published Date: Apr 04, 2013
SCM is a combination of science and software that encompasses all operations within the supply chain, including the sourcing, acquisition, and storage of raw materials; the scheduling and management of work-in process; and the warehousing and distribution of finished products. With SCM solutions, businesses can streamline and automate the planning, execution, and control of these key activities.
Tags : 
supply chain management, software, business-software.com, vendors, revealed, scm solutions, control of key activities, management
    
Business Software
Published By: Business Software     Published Date: May 28, 2013
What is Financial Management Software? Financial management software solutions allow organizations to more effectively and accurately control and manage financial operations throughout the entire business – including across multiple companies, subsidiaries, divisions, countries, and sites. With powerful features and functionality, financial management systems dramatically streamline and enhance the way vital financial data is collected, processed, stored, accessed, and presented to users within, and beyond, the enterprise.
Tags : 
business software, divisions, financial management, finance
    
Business Software
Published By: C2C Systems     Published Date: Apr 24, 2013
Download this white paper to see how PST Enterprise enables corporate IT to regain control of distributed corporate email found in PST files to manage compliance, support discovery and minimize risk associated with this data. It enables full discovery of all PST files, regardless of their location or status, and it provides the information needed to take intelligent action on the data within. Such actions include owner determination, in-place retention, data migration, and file copy, move, disconnect and deletion.
Tags : 
pst enterprise, files, emails, data migration, file copy, distribution
    
C2C Systems
Published By: CA Mainframe     Published Date: Sep 12, 2008
Compliance requires strong security controls for mainframe environments also. This white paper discusses some major challenges that mainframes bring to compliance, and some key issues that need to be addressed. It also presents some key technologies and approaches that you can use to help you achieve easier compliance for your mainframe systems.
Tags : 
ca mainframe, mainframe, compliance
    
CA Mainframe
Published By: CA Service Assurance     Published Date: Sep 16, 2010
CA Technologies Newsletter featuring Gartner Research. This publication, enhanced by Gartner research, reveals how to take a proactive IT approach which ensures visibility and control during the adoption of virtualization and cloud environments.
Tags : 
apm, application performance, ca technologies, service delivery, application delivery, user experience, gartner, business services
    
CA Service Assurance
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 06, 2014
This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.
Tags : 
mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
CA Technologies
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.