Skip to main content
 

data

Results 11126 - 11150 of 12227Sort Results By: Published Date | Title | Company Name
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial services providers—from the solo accounting professional to the midsize accounting firm to world’s largest corporation, from CPAs to CFPs to credit counselors—have never been as challenging as they are in today’s turbulent times. And although the large data breaches at the most recognizable companies receive the most publicity, small companies and solo offices can also be victims, according to the Better Business Bureau.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
In this must read white paper, you will learn about cloud computing, new opportunities, new security challenges and how to ensure your data is safe.
Tags : 
cloud, hosting company, security, ssl certificate, verisign inc., verisign ssl certificate
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: SAP Inc.     Published Date: Jul 28, 2009
Companies can squeeze further business benefits from their existing SAP ERP and supply chain systems in order to save money at a time when it's desperately needed. This Report, which summarizes detailed data from a field study conducted exclusively for AMR Research SAP Peer Forum clients, was written to help business audiences looking for every opportunity to reduce the total business expenses of their huge, existing investments in SAP.
Tags : 
sap, fast payback, detailed data, business expense projects, sap erp, supply chain systems, amr, peer forum, business intelligence, field study, purchasing, order fulfillment, manufacturing, coe, cost of excellence
    
SAP Inc.
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how the WebSphere ILOG JRules Business Rules Management System (JRules BRMS) can automate decision making for data validation, eligibility and pricing in a real-world scenario. This demo shows how JRules BRMS allows organizations to gain a competitive advantage by adapting business systems to evolve with changing business policies and decisions. Click to view this demo!
Tags : 
ibm ilog, brm, business rule management system, jrules, websphere, author, deploy rules, business rules management
    
IBM ILOG.
Published By: BMC Control M     Published Date: Apr 01, 2009
Listen in as Sentrigo interviews Dr. Charles Popper, who discusses specific data integrity and security requirements for the pharma sector. Dr. Popper will address how to enforce the proper balance of information sharing and database protection, without compromising high-quality research.
Tags : 
    
BMC Control M
Published By: BMC ESM     Published Date: Mar 01, 2009
Free utility finds the fragmentation that's crippling your network! New Disk Performance Analyzer for Networks 2.0 takes the guesswork out of tracking networked system performance. This revolutionary utility scans networked systems' performance from one single access point. It equips administrators with an arsenal of performance data, so they can zero in on systems' fragmentation and slows. This second edition comes with a series of improvements which afford users more control and flexibility. Systems can be selected from the Active Directory or IP Address. And this cutting-edge tool supports custom grouping. So, repeated scans are easy to set up and run. Performance reports can also be scheduled for off-peak hours. Results will be automatically sent to your e-mail address. Performance reports are now exported to a MicrosoftT SQL database for easy sorting and querying. Don't let low-functioning systems go unnoticed. Get Disk Performance Analyzer for Networks 2.0 free now!
Tags : 
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 17, 2009
Join us as we talk with Atwell Williams, Solutions Architect for the Office of the CTO at BMC Software. Get insights into where to start when building and managing a CMDB and find out how to define what "done" looks like. Learn whether a bottom-up or a top-down approach will work best for you, hear important tips for training your team, and get some great practical advice from one of BMC's experts.
Tags : 
bmc, software, cto, solutions architect, cmdb, project, team, organization, implementation, successful team, project management, stage 4, configuration management database
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 17, 2009
IT Infrastructure Library® (ITIL®) best practices promote a well-functioning, collaborative IT environment that can enable the business and your IT organization to cope with the effects of economic stress.
Tags : 
itil, it infrastructure library, bmc, bmc software, it environment, integration, business objectives, configuration management database, cmdb, business service management, bsm, mean time to repair, mttr, roi and value on investment, voi
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 22, 2009
Join us as we talk with Atwell Williams, Solutions Architect for the Office of the CTO at BMC Software. Get insights into where to start when building and managing a CMDB and find out how to define what "done" looks like. Learn whether a bottom-up or a top-down approach will work best for you, hear important tips for training your team, and get some great practical advice from one of BMC's experts.
Tags : 
bmc, software, cto, solutions architect, cmdb, project, team, organization, implementation, successful team, project management, stage 4, configuration management database
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 22, 2009
IT Infrastructure Library® (ITIL®) best practices promote a well-functioning, collaborative IT environment that can enable the business and your IT organization to cope with the effects of economic stress.
Tags : 
itil, it infrastructure library, bmc, bmc software, it environment, integration, business objectives, configuration management database, cmdb, business service management, bsm, mean time to repair, mttr, roi and value on investment, voi
    
BMC ESM
Published By: Intermec     Published Date: Sep 07, 2011
Learn how to streamline pick-up and delivery operations in the Post & Parcel Industry.
Tags : 
intermec, streamlining, delivery companies, parcel industry, verdex, verification, data extraction
    
Intermec
Published By: Intermec     Published Date: Sep 07, 2011
Find out what impact this 2D revolution could have on your business.
Tags : 
intermec, 2-dimensional symbologies, operations, capture information, video, images
    
Intermec
Published By: Intermec     Published Date: Sep 08, 2011
This white paper identifies best practices for workforce optimization, resource management, revenue assurance and performance control, explains how technology supports these processes, provides leveraging current mobile and wireless technology to enhance processes to improve productivity and profitability.
Tags : 
intermec, mobile technology, workforce optimization, data management, revenue assurance, asset tracking
    
Intermec
Published By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
When a company creates a custom web application, it also creates a custom challenge. Traditional monitoring does not cover everything, but alerts if something goes wrong with the application are more important than ever. Learn the benefits of custom application monitoring and how NeoSpire can help. . Dramatically reduces the time to troubleshoot a failed web application . Provides complete overview of web transaction and web application performance, to proactively locate and fix bottlenecks in your web system . Improves customer experience and increase customer satisfaction with excellent performance of your web applications and e-business transactions . Eliminates the risk of loss of revenue and credibility . Increases the efficiency of mission-critical e-business operations and web applications
Tags : 
application monitoring, load balancing system, neospire, benefits of testing, hardware monitoring, disk utilization, memory utilization, cpu load, service monitoring, port check (standard and custom ports), number of processes running, specific process monitoring, database monitoring, mysql replication monitoring, oracle rman backup monitoring, vpn monitoring: farend ping test, load-balanced ip monitoring, external url monitoring, centralized ids, logging monitoring
    
NeoSpire Managed Hosting
Published By: NeoSpire Managed Hosting     Published Date: Oct 22, 2009
With the massive amount of information on an ever-evolving subject, understanding and becoming PCI compliant can be a daunting task. The process of becoming PCI compliant following the PCI SSC recommended process involves over 160 steps to a merchant's security system and can easily be misinterpreted. NeoSpire presents the Top 10 Misconceptions about PCI.
Tags : 
pci, neospire, security, compliance, paypal, data security standards
    
NeoSpire Managed Hosting
Published By: Webroot UK     Published Date: Aug 07, 2013
Mobility is one of the driving factors for all business and IT initiatives. IDC has characterized it as one of the four pillars of computing’s next dominant platform, along with social media, Big Data and cloud services. Mobility has the potential to dramatically enhance business agility, improve employee productivity and enable major shifts in the way individuals and businesses approach work.
Tags : 
mobile, security, small business, midsize business, improve employee productivity, business agility
    
Webroot UK
Published By: Discovery Corps, Inc.     Published Date: Nov 20, 2009
Seeing into the hearts and minds of our customers is impossible; but this article describes how Data Mining techniques can be used to create strategies and tactics to increase customer retention and value.
Tags : 
data mining, business intelligence, predictive modeling, customer retention, high-value customers, decision support, clustering, discovery corps
    
Discovery Corps, Inc.
Published By: GGR Communications     Published Date: Jan 14, 2010
The paper explores the topic of remote working, the key considerations for implementing the solution and the implications from both an IT and an HR perspective.
Tags : 
ggr communication, remote working, data security, remote desktop control, voip, voice over ip, remote phone system, telephony
    
GGR Communications
Published By: People for Business     Published Date: Jan 14, 2010
The paper explores the topic of remote working, the key considerations for implementing the solution and the implications from both an IT and an HR perspective.
Tags : 
people for business, remote working, data security, remote desktop control, voip, voice over ip, remote phone system, telephony
    
People for Business
Published By: Symantec.cloud     Published Date: Aug 10, 2010
This document is intended to give a broad overview of our security policies, processes and practices current at the date of writing.
Tags : 
messagelabs, symantec hosted services, security policies, best practices, cloud computing, software as a service, saas, data security
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will provide advice, best practices, and insight on how to create security and management policies for a wireless workforce.
Tags : 
messagelabs symantec hosted services, wireless workforce, mobile data security, data and services, business practices, security, management policy
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Nov 29, 2010
This three-part report describes how all businesses can benefit from SaaS services, in particular the variety of services that make up hosted services from Symantec.
Tags : 
messagelabs symantec hosted services, mobile workforce, saas services, security, management policies, distributed workforce
    
Symantec.cloud
Published By: Jigsaw     Published Date: Nov 17, 2010
This white paper will discuss how business owners and salespeople can source the freshest business data and what to look for when choosing a business data provider.
Tags : 
jigsaw, gen, demand generation, awareness, leads, support, sales, targetingb2b, b2b, leads, data leads
    
Jigsaw
Start   Previous    439 440 441 442 443 444 445 446 447 448 449 450 451 452 453    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.