Skip to main content
 

perspective

Results 326 - 350 of 384Sort Results By: Published Date | Title | Company Name
Published By: Lumension     Published Date: Oct 17, 2008
The realities of security and compliance have changed considerably since patch management faced its first big paradigm shift some years ago. At that time many organizations wrestled with the transition from manual patching and remediation to an automated process. Of course, nothing in security is ever static, so it is no surprise that patch management has continued to evolve since then. Though still automated, today’s best patch management tools and techniques are significantly different from their predecessors. In this whitepaper, Lumension Security’s Matt Mosher, Senior Vice President of the Americas, gives an historical perspective on how this evolution unfolded and why it is important for organizations to evolve their patch management technology in order to remain on top of increasing security attacks.
Tags : 
lumension, unix, linux, web 2.0, windows, cve
    
Lumension
Published By: Cenzic     Published Date: Nov 11, 2008
This paper explores the role of white box vs. black box testing. White box testing technologies have a definite but limited use and value. From a Web application security perspective it must be understood that significant blind spots come with white box testing. Ultimately white box testing is not sufficient to secure your applications: simply put organizations that rely solely on white box technologies will be exposed to vulnerabilities in their applications, thus making it an ineffectual method of testing real-world risks. This paper will demonstrate black box or dynamic testing is ultimately the appropriate solution for “truly” securing Web applications.
Tags : 
cenzic, web application security, white box texting, black box testing, secure web applications, cenzic
    
Cenzic
Published By: Infor     Published Date: Feb 27, 2007
In recent years, industry leading companies have identified business process innovation as the only real competitive advantage. But what sets the most admired process companies apart from the rest is their continued business process innovation and scale? Download this white paper to find out.
Tags : 
productivity, best practices, business process automation, business process management, enterprise resource planning, erp, business management, infor, business process
    
Infor
Published By: Ecora Software     Published Date: Aug 15, 2007
21 CFR Part 11 continues to cause confusion. Recent FDA guidance documents help, but many IT departments still struggle to establish appropriate validation processes with limited time and resources. Ecora's FREE in-depth guide, "Achieving Sustainable IT Compliance to 21 CFR Part 11," gives you an overview of the regulation from an IT perspective. It also outlines how you can accurately and cost-effectively implement a systems-based best practices approach that will help you meet FDA requirements.
Tags : 
21 cfr part 11, compliance, electronic records, electronic data, electronic signatures, information management, pharm, pharmaceuticals, drug, fda, electronic signature, digital signature, audit, auditing, fda, compliant, ecora
    
Ecora Software
Published By: Interactive Intelligence     Published Date: Feb 28, 2013
Driving to one percent - In this series, we view this phenomenon from a business perspective and how seemingly minor additions, deletions, or shifts can reap substantive results.
Tags : 
driving to one percent, call analysis, answering machine detection, interactive intelligence, fdcpa compliance
    
Interactive Intelligence
Published By: Interactive Intelligence     Published Date: Feb 28, 2013
In this white paper series, on TCPA, from ARM.com, Latitude Software, and Interactive Intelligence, we asked collection industry attorneys David Kaminski and Anita Tolani to weight in on different aspects of technology for TCPA compliance.
Tags : 
tcpa compliance, telephone consumer protection act, compliance, interactive intelligence
    
Interactive Intelligence
Published By: Microworld     Published Date: Dec 12, 2007
MicroWorld Winsock Layer (MWL) is a radical technology that fights viruses and other threats from a new perspective. Developed by MicroWorld Technologies Inc., MWL blocks threats at the Internet gateway itself and does not allow them to enter your system. This article discusses features of MWL and explains how it does its anti virus and content security tasks, efficiently and quietly.
Tags : 
winsock, ethreats, e-threats, malware, email security, internet security, spam, anti-spam, anti spam, anti virus, anti-virus, mwl, escan, microworld
    
Microworld
Published By: Verint     Published Date: Jul 10, 2013
In this research perspective sponsored by Verint, Ventana research delves into customer experience management. You'll learn about the importance of the customer experience when dealing with a company and how it can strongly impact their propensity to remain loyal - to continue to purchase products and services from the company, to recommend it to other people and refrain from posting negative comments about it on social media
Tags : 
verint, customer experience management, customer experience challenges, customer analytics
    
Verint
Published By: Catalyst SF     Published Date: Apr 30, 2008
This white paper is intended to provide an overview of the mobile marketing options available to marketers today. It is designed for the person who wants an entry level perspective on the platform. Ultimately, this document is meant as a starting point in your pursuit for greater understanding of emerging media options, in this case mobile. After reading, you should have some idea of how to proceed to explore digital marketing for your brand.
Tags : 
catalyst, mobile marketing, mobile, cell, cell phone, smart phone
    
Catalyst SF
Published By: Diligent Technologies     Published Date: Apr 11, 2008
New technologies exist that can radically slim down the physical storage requirements for secondary disk storage. Taneja Group refers to these technologies as Capacity Optimization (CO) technologies. In this technology brief, we will examine what IT teams should be looking for in a capacity optimization solution, and then share our perspective on the Diligent HyperFactor technology.
Tags : 
deduplication, minimizing storage, minimize storage, diligent technologies, diligent, storage
    
Diligent Technologies
Published By: Rockwell Automation     Published Date: Jun 23, 2008
In today's global markets, companies are required to navigate a plethora of standards and regulatory requirements, making global business complex. Rockwell Automation's perspective is that the harmonization of standards and regulatory requirements is the best approach to facilitate global market access, competition and growth.
Tags : 
erp, automation, manufacturing, rockwell, rockwell automation, compliance
    
Rockwell Automation
Published By: HP - Enterprise     Published Date: Nov 19, 2008
This webinar explores 12 of the most common security traps in Java by examining the causes of security failures in modern Java–based applications. Approaching security with an “outside in” style, we look at vulnerabilities from a developer’s perspective, focusing on the source code.
Tags : 
security, application security, java, vulnerabilities, developer, source code, analysis, fortify software, fortify
    
HP - Enterprise
Published By: Oracle Corp.     Published Date: Sep 05, 2012
Oracle White Paper- Evolution from the Traditional Data Center to Exalogic: An Operational Perspective
Tags : 
data center, virtualization, storage, data management, exalogic, oracle
    
Oracle Corp.
Published By: GGR Communications     Published Date: Jan 14, 2010
The paper explores the topic of remote working, the key considerations for implementing the solution and the implications from both an IT and an HR perspective.
Tags : 
ggr communication, remote working, data security, remote desktop control, voip, voice over ip, remote phone system, telephony
    
GGR Communications
Published By: People for Business     Published Date: Jan 14, 2010
The paper explores the topic of remote working, the key considerations for implementing the solution and the implications from both an IT and an HR perspective.
Tags : 
people for business, remote working, data security, remote desktop control, voip, voice over ip, remote phone system, telephony
    
People for Business
Published By: Project Perfect     Published Date: Jan 28, 2010
This paper highlights and consolidates interesting risk management topics for enterprise information systems from enterprise architect and system integration perspectives.
Tags : 
dynamics, role dyanmics, project dymanics, eric tse, project management
    
Project Perfect
Published By: SAS     Published Date: Aug 03, 2016
Imagine that you are in a meeting with several department heads discussing issues around enrollment. As people begin to share their thoughts, you quickly realize that each person in the room is working from conflicting information – and everyone thinks their information is correct. The group spends most of the meeting arguing over whose data and reports are correct rather than understanding the problem and making decisions. Sound familiar? When organizations have their data fragmented across many systems and departments, these situations are all too common. Without a single, trusted source of truth and easyto- use tools to interpret and understand the data, conversations are limited by everyone’s departmental perspectives and resources.
Tags : 
best practices, enterprise, competitive advantage, technology, data
    
SAS
Published By: SAS     Published Date: Aug 04, 2016
Banks have been using credit scoring models for over five decades, so managing the life cycle of models is nothing new. Most have had some kind of process in place to ensure the models they develop are robust, validated and monitored from a performance perspective and that decision makers have confidence in them. In recent times, however - partly in response to the credit crisis in 2008 - the discipline of model risk management (MRM) has become more formalized and rigorous, driving the need for enterprise-level model information management systems. The regulatory scrutiny being applied to them is intensifying and spreading globally, with US and European regulators leading the charge. For example, whereas regulators were previously more interested in the numbers they were provided, now more regulators want to have a core understanding of the models banks used to generate these numbers.
Tags : 
best practices, risk management, finance, security, info systems
    
SAS
Published By: European Medical Staffing     Published Date: Oct 27, 2010
A perspective on current visa options for international nurses
Tags : 
visa options for international nurses
    
European Medical Staffing
Published By: Mobixell Networks     Published Date: Nov 23, 2010
Network Aware Optimisation - a unique perspective on mobile data network congestion
Tags : 
mobile network operators, mobile data network optimisation, traffic management, wireless operators
    
Mobixell Networks
Published By: EMC Corporation     Published Date: Apr 03, 2013
Instead of just thinking about backup in terms of familiar IT “speeds and feeds,” organizations are looking at it from a broader business perspective.
Tags : 
emc, ebook, backup environments, backup transformation, speeds and feeds
    
EMC Corporation
Published By: SkillSoft MKG     Published Date: Oct 09, 2010
Equipping the workforce with the critical perspectives and peripheral vision it needs to be business effective has become one of the single most vexing challenges facing organizations today. SkillSoft's 10x10x10 framework can help.
Tags : 
skillsoft, 10x10x10 framework, global workforce, framework
    
SkillSoft MKG
Published By: Achievers     Published Date: Jan 28, 2013
Comparing the CEO perspective on employee engagement with actual employee experience gives surprising insight into improving corporate programs. Read this white paper to see where the viewpoints differ most and how to bridge the gap.
Tags : 
employee recognition, employee rewards, online recognition program, trends
    
Achievers
Published By: Sysomos     Published Date: May 26, 2011
A strategy for monetizing social media marketing and measuring ROI.
Tags : 
marketwire sysomos, marketingsherpa, cmo perspectives, social media monetization, social marketing roi, sergio balegno
    
Sysomos
Published By: KeyedIn Solutions     Published Date: Apr 25, 2012
In this white paper, we will examine how to define and articulate a strategy from a number of key perspectives. This white paper is essential reading for anyone interested in helping their organization achieve maximum performance.
Tags : 
    
KeyedIn Solutions
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.