Skip to main content
 

control

Results 226 - 250 of 2321Sort Results By: Published Date | Title | Company Name
Published By: Sigaba     Published Date: Aug 21, 2009
This white paper describes how Sigaba's secure email solutions minimize the burden on IT organizations through a combination of easy integration with existing enterprise systems and simple maintenance.
Tags : 
access control, email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba
    
Sigaba
Published By: IBM     Published Date: Oct 20, 2015
This analyst piece shows that to be able to take control and do effective planning, marketers need insights that can only be supplied by marketing analytics.
Tags : 
ibm, marketing, analytics, planning, marketing research
    
IBM
Published By: IBM     Published Date: Mar 04, 2016
This analyst piece shows that to be able to take control and do effective planning, marketers need insights that can only be supplied by marketing analytics
Tags : 
marketing analytics, data, ibm, best practices, effective planning
    
IBM
Published By: Anaplan     Published Date: Mar 29, 2018
To support these principles, Anaplan was deliberately crafted as a highly distributed global company that allows for significant resiliency against threats and disasters. All functions within Anaplan are geographically distributed across the globe, reducing risks associated with regional events. The U.S. offices host most of the sales, marketing, and support activities. Staff in the U.K. and Singapore offices provide regional coverage, in addition to backup support.
Tags : 
anaplan, architecture, security, controls, geographically, regional, global
    
Anaplan
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : 
ibm integrated data management, jd edwards, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth, data classification
    
IBM
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : 
ibm integrated data management, siebel crm, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth, data classification
    
IBM
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : 
ibm integrated data management, oracle e-business suite, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth, data classification
    
IBM
Published By: NAVEX Global     Published Date: Dec 07, 2017
With the introduction of the Foreign Corrupt Practices Act (FCPA) and UK Bribery Act, organisations must take corruption in business seriously. Given the complexity of the activities addressed in an anti-bribery and corruption programme, however, the task can seem overwhelming. Our Anti-Bribery and Corruption Risk Assessment Checklist outlines how to implement an effective anti-bribery compliance programme using a protect, detect and correct methodology to manage core programme components such as: • Policies • Risk Assessment • Corrective Action • Training / Communication • Culture • Controls / Oversight • Business Partners Our checklist will enable you to design and implement an effective, global and consistent anti-bribery compliance programme.
Tags : 
foreign corrupt practices act (fcpa), uk bribery act, risk management, third – party risk
    
NAVEX Global
Published By: NAVEX Global     Published Date: Jul 17, 2017
Screening your third party vendors and business partners for risk can be a challenging process. With so many different factors to consider, where do you even begin? We've developed our Anti-Bribery and Corruption Risk Assessment Checklist so you can streamline your compliance risk assessment processes and ensure each potential risk is addressed. Keep up with changing European laws and regulations with this checklist.
Tags : 
training, communication, culture, controls, oversight, policies, risk assessment
    
NAVEX Global
Published By: McAfee     Published Date: Sep 04, 2014
El tipo más amenazante de ataque cibernético es invisible. El riesgo para las empresas es real según lo evidenciado por los recientes ataques de alto nivel. Las organizaciones necesitan controles de seguridad por capas que funcionen en conjunto para detectar la presencia y las acciones de hackers y malwares furtivos.
Tags : 
ataques furtivos, malware, sistema de prevención de intrusiones, siem, controle de seguridad en capas
    
McAfee
Published By: IBM     Published Date: Oct 10, 2014
Today’s competitive marketplace requires the organization to frequently release and deploy applications at the pace of user demands, with reduced cost, risk, and increased quality.
Tags : 
application release, application control, application deployment
    
IBM
Published By: Appcito     Published Date: Apr 09, 2015
Social media marketing ?rm ViralMint rolled out a new feature that proved so popular that the increased customer tra?c swamped the capabilities of the existing load balancer solution and greatly increased application response times. Lacking visibility into the volume or nature of its tra?c, ViralMint had no clues for how to address its issues. A fortuitous conversation led to discovery of the Appcito Cloud Application Front End (CAFE) service, which allowed ViralMint to gain control of its cloud application tra?c, retain its customers’ trust and build on its unexpected success.
Tags : 
customer traffic, load balancer solution, application response times, visibility, cloud application service, cloud application delivery, aws, amazon web services
    
Appcito
Published By: Coyote Point Systems     Published Date: Aug 25, 2010
Application Delivery Controllers understand applications and optimize server performance - offloading compute-intensive tasks that prevent servers from quickly delivering applications. Learn how ADCs have taken over where load balancers left off.
Tags : 
coyote point, systems, slbs, server load balancers, adc, adcs, ssl, load balancing, load balancer, application delivery, application delivery controller, application delivery network, ssl acceleration, ssl offloading, server offload, server offloading, server acceleration, content switch, content switching.
    
Coyote Point Systems
Published By: Avi Networks     Published Date: Mar 07, 2018
"Maximizing Operational Efficiency and Application Performance in VMware-Based Data Center Some of the most common challenges in VMware-based virtual data center environments include: - Lack of visibility into applications and end-user experience - Complex and error-prone operations - High capital and operational costs Review our solution brief to learn how the Avi Controller, the industry’s first solution that integrates application delivery with real-time analytics, is able to solve these challenges."
Tags : 
    
Avi Networks
Published By: HPE     Published Date: Feb 11, 2015
Firms That Plan For Mobile, Cloud, Big Data, And The Impact Of Social Media Without First Taking Control Of Their Existing Application Portfolio Are Headed For Disaster.
Tags : 
    
HPE
Published By: IBM     Published Date: Jun 28, 2016
Software applications are the mainstay of modern business. Applications deliver business-critical services to customers and enable companies to function efficiently. To ensure performance and availability of their applications, companies must have full visibility and control of the applications and enabling infrastructure. If an outage or slowdown occurs, the company needs to know precisely where the problem originated, what caused it, and how to prevent it from occurring again.
Tags : 
software, data, best practices, productivity, applications
    
IBM
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
Whether critical applications live in the cloud, in the data center, or both, organizations need a point of control for application security. Learn how you can achieve the security, intelligence, and performance that today's infrastructure demands.
Tags : 
cloud security, securing applications in the cloud, securing data in the cloud, secure web applications, web application firewall
    
F5 Networks Inc
Published By: F5     Published Date: Jan 31, 2013
Whether critical applications live in the cloud, in the data center, or both, organizations need a strategic point of control for application security. Learn how you can achieve the security, intelligence, and performance for today's standards.
Tags : 
application, security, cloud, cloud security, f5 networks, performance, prevent attacks
    
F5
Published By: Citrix Systems     Published Date: Sep 17, 2015
Citrix XenApp delivers Windows apps as secure mobile services. With XenApp, IT can mobilize the business - increasing user productivity, while reducing costs by centralizing control and security of intellectual property.
Tags : 
citrix, xenapp, security, windows, app virtualization
    
Citrix Systems
Published By: UPS     Published Date: Sep 05, 2017
Our active and actively aging population is the dichotomy fueling significant growth for implantable medical devices. Innovations focused on mobility, engagement and quality of life are directly targeting this growing population. The implantable medical device industry is poised to capitalize on these unique needs, while simultaneously meeting unprecedented cost pressures. It is time for manufacturers to seek expertise in inventory management and logistics for greater visibility, control and profitability. For implantable medical device manufacturers to be as active and healthy as the patients they serve, their future depends on the ability to differentiate products — not only by price, but through cost, service and documented outcomes. New trends in personal health tracking keep patients moving, and data collection will similarly improve the health of your business.
Tags : 
medical devices, inventory management, logistics, clinical outcomes data, ups
    
UPS
Published By: Intel Security     Published Date: Apr 06, 2016
Threat intellegence can even up the battle between attackers and defenders. This 31 page report from Securosis defines Threat Intellegence and discusses how you can leverage threat intelligence to shorten the window between compromise and detection.
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection
    
Intel Security
Published By: VMTurbo     Published Date: Mar 25, 2015
Virtualization 1.0 vs. Virtualization 2.0: Where Are You? Virtualization 1.0 is marked by the ability to virtualize, monitor, and react to problems across the environment as they occur. Ever cognizant of the performance limitations that typify higher workload densities, Virtualization 1.0 hesitates to virtualize the critical applications that would be most beneficial. Virtualization 1.0 is limited by the inherent complexities of virtualization. Virtualization 2.0 is marked by complete, proactive control over the virtual environment. Virtualization 2.0 virtualizes up to 100% of its applications, guided by an intelligent abstraction that continually drives the environment to its desired state. Virtualization 2.0 is the promise of virtualization brought to fruition.
Tags : 
vmturbo, virtualization, it economic model, virtual environment, it management solutions
    
VMTurbo
Published By: BMC Control M     Published Date: Jul 16, 2009
Le traitement par lots est une activité critique dans la plupart des entreprises. C’est le fondement technique sur lequel reposent bon nombre d’applications : commerce électronique, comptabilité, contrôle des stocks et de l’inventaire, planification des ressources d’entreprise, service à la clientèle, pour n’en citer que quelques-unes. L’interruption d’un traitement par lots crucial peut avoir des répercussions majeures sur l’activité : arrêt, perte de revenu, pénalités contractuelles, et autres.
Tags : 
itil, cmdb, bmc, software, bmc control-m, smart
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 22, 2009
Le traitement par lots est une activité critique dans la plupart des entreprises. C’est le fondement technique sur lequel reposent bon nombre d’applications : commerce électronique, comptabilité, contrôle des stocks et de l’inventaire, planification des ressources d’entreprise, service à la clientèle, pour n’en citer que quelques-unes. L’interruption d’un traitement par lots crucial peut avoir des répercussions majeures sur l’activité : arrêt, perte de revenu, pénalités contractuelles, et autres.
Tags : 
itil, cmdb, bmc, software, bmc control-m, smart
    
BMC Control M
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.