Skip to main content
 

data

Results 9876 - 9900 of 12787Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry     Published Date: Mar 11, 2013
See how BlackBerry® 10 guards against data leakage, prevents unauthorized access, secures corporate apps on personal devices and more – with advanced policies tough enough for the world’s most security-conscious organizations.
Tags : 
capabilities of blackberry 10, apps, secure corporate apps, corporate, devices, personal devices, organizations
    
BlackBerry
Published By: HP-Intel®     Published Date: Jul 22, 2013
When it comes to IT risk, most people think in terms of disaster recovery and protecting critical patient data in the event of a natural disaster like a hurricane or an earthquake.
Tags : 
strategy guide, disaster recovery, healthcare, hp healthcare, off-site disaster recovery
    
HP-Intel®
Published By: Dell     Published Date: Nov 04, 2013
Learn to quickly, easily and seamlessly manage your complex databases environments. Read this white paper today.
Tags : 
dell, database, methodology, infrastructure, dba
    
Dell
Published By: Dell     Published Date: Nov 17, 2013
This paper explains the challenges involved in proactive database management and identifies the key features to look for in database management solutions.
Tags : 
database management, dba, dbas, dell, enterprise database, raw data, data overload, application performance management, apm, data storage
    
Dell
Published By: F5     Published Date: Jan 31, 2013
Cloud computing is becoming a key IT resource, but securing applications and data in the cloud remains a concern. Secure remote access tech, web application firewalls, network-side scripting and other strategies can make cloud deployments secure.
Tags : 
securing cloud, cloud computing, security, cloud security, authenticaion, authorization
    
F5
Published By: F5     Published Date: Jan 31, 2013
Whether critical applications live in the cloud, in the data center, or both, organizations need a strategic point of control for application security. Learn how you can achieve the security, intelligence, and performance for today's standards.
Tags : 
application, security, cloud, cloud security, f5 networks, performance, prevent attacks
    
F5
Published By: F5     Published Date: Jan 31, 2013
Organizations are increasingly adopting a hybrid cloud computing strategy to realize the benefits without compromising on security and control. Learn of the 3 categories of solutions focused on integrating data centers with cloud.
Tags : 
cloud, integration, bridges, brokers, gateways, hybrid cloud, cloud security
    
F5
Published By: F5     Published Date: May 15, 2013
Elasticity is considered superior to traditional scalability because it attempts to exactly match resources to demand. Take a closer look at a ScaleN technology that offers a more efficient, elastic, and multi-tenant approach to meeting the challenges and demands of modern data center architectures. You’ll learn how elasticity can be achieved and how it offers multiple scalability models to better meet the sub-second failover and on-demand scalability required by modern business and IT organizations.
Tags : 
scalen, elastic infrastructure, technology, multi-tenant approach, over provisioning
    
F5
Published By: Fonality     Published Date: Feb 25, 2013
A Fonality study found that for companies with knowledge workers who average an eight-hour workday, nearly 50 percent of that time-almost four hours a day.
Tags : 
fonality, unified communications, integrated platform, voice, data, video communications, uc systems, it infrastructure
    
Fonality
Published By: SilverSky     Published Date: Mar 26, 2014
The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.
Tags : 
silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security, cloud solutions, compliance, deployment, encryption
    
SilverSky
Published By: SilverSky     Published Date: Mar 26, 2014
The Radicati Group, a technology market research firm, highlights its choices for Hosted Microsoft Exchange providers based on market share and functionality. They detail the criteria for a Top Performer in this market and include SilverSky in that category.
Tags : 
silversky, ibm, radicati group, technology market reserach, hosted microsoft exchange providers, hosted microsoft exchange, cloud mailbox, data center, cloud business email providers
    
SilverSky
Published By: SilverSky     Published Date: Mar 26, 2014
In this white paper, authored by technology market research firm The Radicati Group, the paper covers the ten reasons you should outsource your archiving solution, the seven unique benefits of archiving in the cloud and the how the SilverSky solution, powered by IBM compares.
Tags : 
silversky, ibm, radicati group, technology market research, cloud mailbox, email archiving, cloud based email archiving, archiving solution, outsource, data center, cloud business email providers, email solutions, storage, deployment
    
SilverSky
Published By: SilverSky     Published Date: Mar 26, 2014
This white paper includes a comprehensive list of things to consider in evaluating cloud-based email solutions, from the hidden costs of hosting your own, to additional services you might need, as well as what questions to ask your provider.
Tags : 
silversky, cloud based email, cloud, email solutions, security, archiving, data protection, collaboration, security solutions, cloud based email provider
    
SilverSky
Published By: SilverSky     Published Date: May 09, 2014
Download this report for access to all the data from the most recent report, as well as expert analysis from respected industry leaders.
Tags : 
silversky, financial institution, threat report, security report, cloud strategy, security products, security vendor, silversky methods, compromised institutions, the cloud, security incidents
    
SilverSky
Published By: SilverSky     Published Date: May 09, 2014
This white paper explores the problems with traditional network setups and ways to address these issues in a budget friendly manner.
Tags : 
silversky, fortune 500, business security, network security, it management, security products, security systems, log data, detects threats, protects network, it budgets, software-as-a-service, saas, log management
    
SilverSky
Published By: SilverSky     Published Date: May 22, 2014
Are you looking to enhance security and regulatory compliance around email, without having to add staff? SilverSky offers a game-changing Email Data Loss Prevention (DLP) solution, run on IBM SoftLayer, which can help. Read this paper to learn more and for helpful tips on preventing data loss.
Tags : 
silversky, ibm, email, email services, email service providers, email protection, email security, email data loss prevention, data loss prevention, dlp, encryption
    
SilverSky
Published By: SilverSky     Published Date: May 22, 2014
Companies today are able to focus more time on their core competencies by trusting email and other resource-intensive activities to experts in the cloud. Thinking of moving services to the cloud? Read SilverSky’s comprehensive list of things to consider when evaluating cloud-based email solutions.
Tags : 
silversky, ibm, cloud, cloud-based email, cloud business email, email service, email solutions, cloud based email solutions, email storage, email monitoring, data protection, email service provider
    
SilverSky
Published By: Paychex     Published Date: Apr 01, 2013
In order to control employee costs, you must first track and understand them. That's where a time and labor management system can help. Not only will you have the data you need to make cost-effective decisions, but you'll be able to determine the best way to optimize your workforce. This white paper outlines the critical features and criteria recommended in selecting an effective time and labor management system.
Tags : 
    
Paychex
Published By: Paychex     Published Date: Apr 01, 2013
Most business owners are familiar with the tasks involved in tracking employee time and attendance. Typically, this involves the collection of time sheets or cards, adding and approving time totals, and the calculation of data -- all of which are subject to error. What is not commonly understood is the extent to which automation can simplify and improve this essential business process. This white paper outlines the strategic advantages of an automated time and labor management system for businesses and employees.
Tags : 
    
Paychex
Published By: Yext     Published Date: Apr 15, 2013
The paper will show every small business owner the most common data location problems. It will explain why these problems need to be fixed and then show you the best strategies to fix them.
Tags : 
advertising, marketing, location, listings, maps, directories, yext, business, local, smb, seo, google, yahoo, mapquest, bing, yelp, facebook, foursquare
    
Yext
Published By: Yext     Published Date: May 21, 2013
The paper will show every dealership the most common data location problems. It will explain why these problems need to be fixed and then show you the best strategies to fix them.
Tags : 
advertising, marketing, location, listings, maps, directories, yext, business, local, smb, seo, google, yahoo, mapquest, bing, yelp, facebook, foursquare, search marketing, emerging marketing
    
Yext
Published By: Yext     Published Date: May 21, 2013
The paper will show every law firm the most common data location problems. It will explain why these problems need to be fixed and then show you the best strategies to fix them.
Tags : 
advertising, marketing, location, listings, maps, directories, yext, business, local, smb, seo, google, yahoo, mapquest, bing, yelp, facebook, foursquare, search marketing, emerging marketing
    
Yext
Published By: Yext     Published Date: May 21, 2013
The paper will show every doctors office the most common data location problems. It will explain why these problems need to be fixed and then show you the best strategies to fix them.
Tags : 
advertising, marketing, location, listings, maps, directories, yext, business, local, smb, seo, google, yahoo, mapquest, bing, yelp, facebook, foursquare, search marketing, emerging marketing
    
Yext
Published By: Dell Software     Published Date: Aug 15, 2013
Virtualization has changed data centers from static to flowing, and this fluidity has brought challenges to resource allocation. Find out how your organization can stay ahead of the curve. Read the White Paper >>
Tags : 
dell, cpu, memory, storage, vsphere, data center, technology, dynamic
    
Dell Software
Published By: Dell Software     Published Date: Aug 15, 2013
Virtualization means applications now compete for resources such as storage, CPU cycles and memory, often leading to bottlenecks and unhappy customers. Find out how you can improve your VM performance. Read the White Paper >>
Tags : 
dell, virtualization, applications, storage, cpu, memory, data center, metrics
    
Dell Software
Start   Previous    389 390 391 392 393 394 395 396 397 398 399 400 401 402 403    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.