enterprise

Results 5626 - 5650 of 6530Sort Results By: Published Date | Title | Company Name
Published By: Imprivata     Published Date: Aug 21, 2009
This white paper is intended to make the ESSO evaluation process simpler and faster by identifying the critical questions you need to ask ESSO vendors as you evaluate their solutions.
Tags : 
enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, authentication, imprivata
    
Imprivata
Published By: Imprivata     Published Date: Aug 21, 2009
Enterprise Single Sign-On (ESSO) has emerged with a similar potential to transform enterprise security. This white paper takes a closer look at ESSO, the problems it solves, and how it will fundamentally change the way corporations address their security needs.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, authentication, imprivata
    
Imprivata
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Use of instant messaging applications-like AOL Instant Messenger, Yahoo! Messenger, MSN Messenger and ICQ-and peer-to-peer applications has grown significantly. Although the benefits of real-time communication offer a productivity benefit to corporate environments, instant messaging and peer-to-peer applications add significant vulnerabilities and risks to an enterprise's security posture.
Tags : 
instant messaging, instant messenger, icq, internet security, web security, virus, anti virus, anti-virus, antivirus, worms, vulnerability management, internet security systems, it management
    
Internet Security Systems
Published By: ISYS     Published Date: Aug 21, 2009
Discover the difference between today's newer consumer desktop search products and the mature, tried-and-true business-oriented solutions. Includes a 12-step checklist to help you better evaluate desktop search for the enterprise.
Tags : 
search, desktop search, enterprise software, isys
    
ISYS
Published By: ISYS     Published Date: Aug 21, 2009
ISYS Search Software's Founder Ian Davies discusses the keys to realizing maximum value from your enterprise search implementation.
Tags : 
search engine, search, desktop search, enterprise software, davies, isys, isys search
    
ISYS
Published By: ISYS     Published Date: Aug 21, 2009
Learn about Intranet Search Engines and how to choose the one to suit your needs. Includes a template for specifying your requirements and evaluating vendors.
Tags : 
search engine, search, desktop search, enterprise software, davies, isys, isys search, intranet search, search engines
    
ISYS
Published By: ISYS     Published Date: Aug 21, 2009
The benefits to an effective search function on your website can be substantial. This white paper leads you through the process of designing and selecting your website search engine, in four easy steps.
Tags : 
search engine, search, desktop search, enterprise software, davies, isys, isys search, web site search, search engines, site search, knowledge management
    
ISYS
Published By: LookSoftware     Published Date: Aug 21, 2009
SOA is a set of architectural and design principles that are probably new to most iSeries people. SOA considers an enterprise as consisting of many processes and services. SOA comes with the expected set of acronyms and jargon, such as "loose coupling" and "granularity" and is typically implemented with Web Services.
Tags : 
service oriented architecture, web service management, soa, application integration, look software, looksoftware, as/400, software development
    
LookSoftware
Published By: Meru Networks     Published Date: Aug 21, 2009
This paper explains the numerous places where VoWLAN can go to work, why most offerings fail to make it work, and how only Meru Networks' standard-based solution puts the power of VoWLAN to work at enterprise-scale.
Tags : 
voip, voice over ip, wlan, wlans, vowlan, enterprise software, communications, wireless communications, wireless voip, meru, meru networks
    
Meru Networks
Published By: Meru Networks     Published Date: Aug 21, 2009
This white paper is for the enterprise IT administrator tasked with deploying a wireless LAN (WLAN) of any scale, the significant investment in equipment, time and resources to properly plan and install the deployment is daunting.
Tags : 
wlan, wireless lan, wlan deployment, wlan investment, wlan cost, it spending, cost control, meru, meru networks, wireless
    
Meru Networks
Published By: Meru Networks     Published Date: Aug 21, 2009
As wireless LAN deployments and usage has increased, coupled with the near ubiquity of embedded Wi-Fi in laptops and smart phones, many enterprises are experiencing complaints from their users of slow or even dropped connections.
Tags : 
wlan, wireless lan, wifi, wi-fi, wlan deployment, pervasive wlan, ubiquitous wlan, microcells, macrocell, macrocells, wlan reliability, virtual cell, meru, meru networks, wireless
    
Meru Networks
Published By: Meru Networks     Published Date: Aug 21, 2009
Pervasive wireless LAN deployments require much larger, broader deployment of Wi-Fi access points than hot spots, cafes or isolated guest access in the enterprise. Clearly new solutions and deployment methodologies should be considered to make pervasive wireless LAN deployments feasible and economical.
Tags : 
wlan, wireless lan, wifi, wi-fi, wlan deployment, pervasive wlan, ubiquitous wlan, microcells, macrocell, macrocells, meru, meru networks, wireless
    
Meru Networks
Published By: Metafuse     Published Date: Sep 26, 2007
In speaking with project managers, directors of operations, vice presidents of professional services, chief financial offers, and other project team members every day, we hear familiar stories repeatedly and there are some trends, or commonalities. This document outlines five of the most common project management challenges.
Tags : 
project management, document management, project planning, project, enterprise resource planning, erp, planning, metafuse, project insight
    
Metafuse
Published By: Metafuse     Published Date: Sep 26, 2007
We are often asked how Project Insight differs from the Microsoft solution. There is no simple, 30 second answer to that question, as every software package is unique. Rather than attempt to detail a feature by feature comparison, here we offer the reader an overview of what we view as the main differences.
Tags : 
project management, document management, project planning, project, enterprise resource planning, erp, planning, metafuse, project insight, microsoft, microsoft enterprise
    
Metafuse
Published By: NetSuite     Published Date: Aug 21, 2009
This Yankee Group White Paper, compliments of NetSuite, shows how on-demand applications can significantly reduce cost vs. on-premise applications. See how to reduce the total cost of ownership (TCO) of deploying & integrating CRM & accounting/ERP applications.
Tags : 
crm, accounting, cost control, tco, total cost of ownership, customer relationship management, erp, enterprise resource planning, enterprise software, analyst report, netsuite, it management, enterprise applications
    
NetSuite
Published By: NetSuite     Published Date: Mar 09, 2007
This exclusive Yankee Group White Paper reveals and examines how mid-size businesses can now build a real-time enterprises and leverage real-time information. Learn how to reduce scattered information and silo databases that prevent your enterprise from achieving operational excellence.
Tags : 
crm, netsuite, erp, real time enterprise, mid-size businesses, silo database, customer relationship management, enterprise resource planning, netsuite, it management, knowledge management, enterprise applications
    
NetSuite
Published By: netVigilance     Published Date: Aug 21, 2009
This white paper explains the evolving needs for vulnerability assessment, the special requirements inherent within large enterprises, and how SecureScout SP from netVigilance meets those needs.
Tags : 
vulnerability management, ips, intrusion prevention, security management, hackers, hacker, hacker detection, network security, net vigilance, netvigilance, security
    
netVigilance
Published By: NitroSecurity     Published Date: Aug 21, 2009
NitroSecurity's Security Event Aggregation and Correlation Engine (N-SEAC) is a patented, key differentiator of the NitroSecurity IPS solution. It allows enterprise customers the ability to collect and analyze threat information more efficiently and in an accurate and timely manner.
Tags : 
intrusion prevention, ips, n-seac, intrusion detection, ids, security management, nitrosecurity, nitro security, security
    
NitroSecurity
Published By: Okiok     Published Date: Aug 21, 2009
Global Trust is a comprehensive Permission Management Infrastructure that centrally controls and manages user access Permissions to Web-based resources, servlets, Beans or any external application. Download this white paper and learn how the Global Trust solution enforces your policy consistently across your e-business and associates according to the planned security model (delegation, user's type, roles, policies, etc).
Tags : 
password management, access control, network access control, nac, permissions management, security management, okiok
    
Okiok
Published By: OpSource     Published Date: Aug 21, 2009
Building a scalable, secure, and highly available SaaS infrastructure can be a daunting undertaking for a software company. This step-by-step guide lets you know what you need to consider.
Tags : 
infrastructure, content delivery, enterprise software, software as a service, opsource, software development, enterprise applications
    
OpSource
Published By: OutlookSoft     Published Date: Aug 21, 2009
Learn how you can transform Excel from a personal planning tool to an enterprise-scale, collaborative solution. Read this informative article to learn more.
Tags : 
excel, spreadsheet, workbook, collaboration, performance management, corporate performance management, business process management, bpm, business analytics, analytics, business plan, business planning, outlooksoft, outlook soft
    
OutlookSoft
Published By: OutlookSoft     Published Date: Apr 03, 2007
Never has the need for a modern corporate performance management (CPM) solution -- one that unifies the "big three" processes of planning, budgeting, and forecasting -- been more critical to regaining and sustaining the accuracy, consistency, and transparency you expect from your numbers. Read this white paper to learn more.
Tags : 
performance management, business management, business process management, bpm, forecasting, finance, accounting, erp, enterprise resource planning, outlook soft, outlooksoft, enterprise applications
    
OutlookSoft
Published By: PKWARE     Published Date: Aug 21, 2009
The Butler Group provides a technology audit on PKWARE's SecureZIP cross-platform data file security software.
Tags : 
data security, security audit, auditing, compression, data compression, zip file, zip, compress, pkware
    
PKWARE
Published By: Pointsec     Published Date: Aug 21, 2009
This paper will help security officers and staff of large organizations seeking to protect sensitive data on mobile computing devices.
Tags : 
wireless security, network security, laptop security, mobile computing, secure mobile, data protection, access control, vulnerability management, pointsec
    
Pointsec
Published By: Preventsys     Published Date: Aug 21, 2009
Much has been written and discussed about Enterprise Risk Management (ERM) as it relates to compliance, corporate governance, financial controls and the Sarbanes-Oxley Act of 2002 (SOX). Until now, there was very little available to the risk manager on how to apply ERM to day-to-day operations.
Tags : 
sarbox, sox, sarbanes oxley, sarbanes-oxley, risk management, finance, compliance, regulatory compliance, security management, preventsys, it management
    
Preventsys
Start   Previous    219 220 221 222 223 224 225 226 227 228 229 230 231 232 233    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com