Skip to main content
 

proactive

Results 351 - 375 of 416Sort Results By: Published Date | Title | Company Name
Published By: Avetta     Published Date: Nov 08, 2016
Huntsman Corporation Reduces U.S. Contractor TRIR by 74% with Avetta Discover how a manufacturing giant replaced its in-house system with a “proactive risk management” solution. Today, Huntsman leverages a supply chain risk management partner’s expertise and experience to effectively track and evaluate suppliers and contractors. The platform also gives Huntsman instant data access in a database they could never develop internally, allowing the company to benchmark against peers and uncover opportunities to improve
Tags : 
    
Avetta
Published By: Avetta     Published Date: Jul 11, 2018
With almost 30,000 cell towers globally, many in remote locations, SBA Communications subcontracts repair and upgrade services to a network of almost 2,500 independent contractors. Given the potentially dangerous working environments at the cell tower sites, SBA wanted to ensure its contractors were compliant with government safety regulations and insurance requirements. After a spike in cell-tower-related injuries in 2014, SBA wanted a contractor safety and compliance solution.
Tags : 
    
Avetta
Published By: Absolute Software     Published Date: Jan 27, 2010
Deploying patches in a timely fashion soon after they become available helps secure the OS and prevent the majority of data breaches. However, many computer systems are often not patched for months or not at all.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Applix     Published Date: Mar 13, 2007
This whitepaper will help organizations understand how driver based planning and control activities can be transformed into the proactive management function that add greater value through faster decision making.
Tags : 
productivity, best practices, business process management, bpm, business management, erp, enterprise resource planning, applix
    
Applix
Published By: DataSynapse     Published Date: Feb 26, 2007
Business continuity and disaster recovery are made more difficult by the pace of business change.  Adapting to market changes requires proactive IT. For the first time, you can consolidate business continuity and disaster recovery (DR) planning in a heterogeneous IT environment with a single, central automated solution. 
Tags : 
disaster recovery, backup and recovery, business continuity, business process automation, server virtualization, server automation, datasynapse, data synapse, enterprise applications, application integration
    
DataSynapse
Published By: IBM     Published Date: Feb 08, 2008
As manufacturing goes global, initiatives to standardize processes and key performance measurements across the enterprise to unite the greater supply chain are emerging. The main catalyst? Driving down costs in response to customer and market pressures. However, mid-size companies in particular are driving performance improvements with a more proactive, strategic vision for improving performance than reactively responding to cost pressure.
Tags : 
scm, supply chain, manufacturing, manufacturer, bpm, business process, erp, enterprise resource planning, business intelligence, ibm
    
IBM
Published By: IBM     Published Date: Jun 19, 2008
Reliable IBM System x servers help businesses stand apart from their competition. Scalable systems and proactive tools help you simplify your IT so you can manage complexity, growth and risk. In addition, energy efficiency, consolidation and virtualization help you lower costs. Discover the features, functions and benefits of the family of IBM System x servers and find out which one is the right choice for your business.
Tags : 
ibm, express seller, servers, system x, systemx, green
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
Today, an IT-driven, customer-centric business approach isn’t a luxury — it’s imperative. More and more businesses are moving out of a cost-centric view of their IT potential and into a realization that IT can transform business processes. This white paper shows how you can maximize your IT function by leveraging ITIL best practice processes. These guidelines can help you effectively manage IT changes, assets, personnel and service levels all while reducing costs—going beyond simple IT asset management to deliver proactive IT business improvements.
Tags : 
itil, best practices, service management, asset management, ibm, ibm mi, ibm grm
    
IBM
Published By: IBM     Published Date: Nov 13, 2008
This white paper discusses how The IBM Tivoli® Netcool® customer experience management solution offers the ability to monitor all aspects of the customer experience, to help increase satisfaction, reduce service calls, monitor the performance of new and existing services and device types — and help operations identify which issues have the greatest impact on valuable enterprise customers. It delivers the visibility you need to improve the customer experience as they interact with different aspects of your business — to help increase loyalty and drive new revenue opportunities.
Tags : 
ibm, tivoli, service quality management, service level agreement
    
IBM
Published By: IBM     Published Date: Jan 22, 2009
This white paper explains the IBM Tivoli® Netcool® customer experience management solution which offers the ability to monitor all aspects of the customer experience, to help increase satisfaction, reduce service calls, monitor the performance of new and existing services and device types — and help operations identify which issues have the greatest impact on valuable enterprise customers.
Tags : 
ibm, tivoli netcool, enterprise customers
    
IBM
Published By: PerformanceIT     Published Date: Aug 21, 2009
With the current demands on today's CIO and IT Managers, implementing a top notch, easy-to-use proactive network, application and server support structure that meets budgetary confines can seem like a daunting task. Until now...
Tags : 
infrastructure, network management, server management, application performance management, server support, performance management, performanceit, performance it
    
PerformanceIT
Published By: Secure Computing     Published Date: Aug 21, 2009
This white paper discusses how HTTPS filtering (SSL scanning) from Secure Computing provides companies with the means to counter these threats by fully extending their Internet usage policies to HTTPS traffic, and thereby proactively closing that last known major network security hole.
Tags : 
ssl, vpn, secure socket layer, virtual private network, traffic management, security management, https, internet security, secure computing, securecomputing
    
Secure Computing
Published By: Secure Computing     Published Date: Feb 22, 2007
This paper outlines these new threats and discusses the limited effectiveness of reactive legacy Web security solutions against those threats.  The paper then outlines the new reputation based, proactive security paradigm that is necessary for securing Web 2.0 applications.
Tags : 
web 2.0, web 20, web security, application security, web app security, internet security, network security, hacker detection, intrusion prevention, secure computing, securecomputing
    
Secure Computing
Published By: TopLayer     Published Date: Aug 21, 2009
This white paper written by Reymann Group, compliance consultant firm, showcases thought leadership on how intrusion prevention solutions can enable proactive security responses necessary to protect today's corporate enterprise and its customers from real time threats posed by widespread cyber terrorists, hackers, and rogue insiders.
Tags : 
sarbanes, intrusion prevention, ips, sox, sarbanes-oxley, sarbox, network security, cybercrime, hacker, intrustion detection, toplayer, compliance, top layer
    
TopLayer
Published By: Symantec     Published Date: Nov 02, 2006
The IT threat landscape has changed from individual hackers disrupting network operations to organized crime stealing confidential information. Antivirus technology must be joined by a coordinated, multilayered defense that includes proactive vulnerability-based intrusion prevention, file-based intrusion prevention, and inbound and outbound traffic control.
Tags : 
security, hacker detection, internet security, crimeware, spyware, intrusion prevention, anti virus, hacker prevention, access control, high availability, symantec
    
Symantec
Published By: Quocirca     Published Date: Feb 23, 2009
Networked printers and multifunction peripherals often require a high level of support and manual intervention. Secure remote monitoring platforms reduce device downtime through automating service alerts, providing proactive toner replenishment and automatic meter reading. End users benefit through improved device uptime, and manufacturers and their service partners can build proactive service relationships which can drive greater customer loyalty.
Tags : 
quocirca, printers, networked printers, multifunction peripherals, secure remote monitoring, document output devices, remote monitoring, managed print service (mps), service portal
    
Quocirca
Published By: Quocirca     Published Date: Jul 27, 2009
Across the mid-market, inefficiencies are compounded by the lack of visibility into pertinent data, of processes being adequately and flexibly automated, and for the performance of the business to be monitored on a constant basis. Without such capabilities, businesses will find it difficult to survive the current financial conditions – yet creating an environment where information can be easily aggregated and viewed has never been easier. Also, business performance can be easily monitored with small proactive, and even reactive, actions ensuring effective responses to market forces and enabling organisations to compete with local and more global business threats.
Tags : 
quocirca, business intelligence, performance management
    
Quocirca
Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing, security audit, glba, hipaa compliance, aomega
    
Aomega
Published By: Lumension     Published Date: Oct 17, 2008
The realities of security and compliance have changed considerably since patch management faced its first big paradigm shift some years ago. At that time many organizations wrestled with the transition from manual patching and remediation to an automated process. Of course, nothing in security is ever static, so it is no surprise that patch management has continued to evolve since then. Though still automated, today’s best patch management tools and techniques are significantly different from their predecessors. In this whitepaper, Lumension Security’s Matt Mosher, Senior Vice President of the Americas, gives an historical perspective on how this evolution unfolded and why it is important for organizations to evolve their patch management technology in order to remain on top of increasing security attacks.
Tags : 
lumension, unix, linux, web 2.0, windows, cve
    
Lumension
Published By: LANDesk     Published Date: Feb 12, 2007
As IT departments work to transition from "firefighting mode" to becoming more proactive and responsive, a key step along the path is to implement labor-saving automation tools that allow more tasks to be done more rapidly, using fewer resources and with greater predictability and reliability.
Tags : 
it management, productivity, project management, service management, groupware workflow, business process automation, bpa, it automation, automating it, security management, landesk
    
LANDesk
Published By: GFI     Published Date: Jul 09, 2007
This white paper identifies the problems encountered in addressing network security risks through vulnerability management. It describes how automated vulnerability management contributes to compliance with industry standards such as the Payment Card Industry Data Security Standard (PCI DSS) and assists you in proactively identifying security weaknesses before these are exploited.
Tags : 
security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability, vulnerability management, cardholder, data protection, database security, consumer data, consumer privacy, customer data, customer privacy, gfi
    
GFI
Published By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Microworld     Published Date: Dec 12, 2007
At the Mail Gateway, MailScan for SMTP Servers scans and cleans mails that flow between all local users and mails between the Internet and Mail Server. It protects organizations against Viruses, Worms, Trojans, Backdoors and many other malware, blocks Spam and Phishing mails, while providing total Content Security for email traffic.
Tags : 
mailscan, mail scan, email security, filtering, filter, email filter, blocking, internet security, virus, spam, anti-virus, anti-spam, anti spam, anti virus, malware, microworld
    
Microworld
Published By: CA ITAM     Published Date: Sep 09, 2008
This white paper discusses how to make the leap from basic asset tracking to a more robust asset management program that can improve decision-making and service levels, reduce costs and mitigate risks. The focus is the CA IT Asset Management solution's ability to accelerate your IT Asset Management program's maturity by providing asset ownership information (the complement to discovery information).
Tags : 
    
CA ITAM
Published By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
When a company creates a custom web application, it also creates a custom challenge. Traditional monitoring does not cover everything, but alerts if something goes wrong with the application are more important than ever. Learn the benefits of custom application monitoring and how NeoSpire can help. . Dramatically reduces the time to troubleshoot a failed web application . Provides complete overview of web transaction and web application performance, to proactively locate and fix bottlenecks in your web system . Improves customer experience and increase customer satisfaction with excellent performance of your web applications and e-business transactions . Eliminates the risk of loss of revenue and credibility . Increases the efficiency of mission-critical e-business operations and web applications
Tags : 
application monitoring, load balancing system, neospire, benefits of testing, hardware monitoring, disk utilization, memory utilization, cpu load, service monitoring, port check (standard and custom ports), number of processes running, specific process monitoring, database monitoring, mysql replication monitoring, oracle rman backup monitoring, vpn monitoring: farend ping test, load-balanced ip monitoring, external url monitoring, centralized ids, logging monitoring
    
NeoSpire Managed Hosting
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.