framework

Results 351 - 375 of 521Sort Results By: Published Date | Title | Company Name
Published By: BlueCat     Published Date: Jul 09, 2008
A number of factors are fueling the demand for a new, intelligent approach to IP Address Management (IPAM). This document describes these factors while highlighting deficiencies in the legacy IPAM solutions and manual management techniques commonly used today. It also introduces the 'Five Pillars of IPAM Intelligence', BlueCat's framework for articulating its revolutionary, holistic approach to IPAM, and the foundation for the design of Proteus, BlueCat's next generation, intelligent IPAM platform.
Tags : 
ipam, ip address management, address management, dns, dhcp, ip address, bluecat, blue cat
    
BlueCat
Published By: Information Shield     Published Date: Jan 07, 2009
How mature is your information security policy program? Do you have a set of outdated documents stored in a binder or intranet site? Or do you have a documented management program that keeps your policies up to date, your users informed and your internal auditors sleeping at night?
Tags : 
information shield, information security policies, privacy frameworks, hipaa, glba, information technology, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance, security, knowledge management
    
Information Shield
Published By: Information Shield     Published Date: Jan 13, 2009
Information security policy development should not be a one-time event. In order to effectively reduce risk and maintain a proper governance structure, organizations must periodically update written security policies as part of an ongoing management process.
Tags : 
information shield, legal exposure, iso/iec, security policies, security framework, hipaa, sarbanes-oxley act, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance, security, it management
    
Information Shield
Published By: Iovation     Published Date: Sep 25, 2009
ReputationManager is a real time fraud management solution and a forensic fraud analysis tool to identify and reduce the impact of online fraud such as chargebacks, stolen credit cards and identity theft, as well as abusive activity such as chat abuse, predatory behavior, and other forms of online harassment. This study illustrates the financial impact of using ReputationManager as part of a financial services organization's online credit card application process.
Tags : 
iovation, reputationmanager, real time fraud management solution, forensic fraud analysis tool, online fraud, online harassment, fraudulent applications, detection process, tei framework, client site development, vendor selection and testing, reducing fraud exposure, investment risk
    
Iovation
Published By: SAS     Published Date: Apr 13, 2011
BI usage among organizations with mobile BI has doubled compared to those companies that have not mobilized their BI. Learn about these results, the emerging best practices for mobile BI usage and the framework by which you can assess your own management capabilities for enterprise mobile BI adoption.
Tags : 
mobile bi, business intelligence, andrew borg, david white, aberdeen, performance management, data management, knowledge management, maturity, data security
    
SAS
Published By: SAS     Published Date: Mar 01, 2012
Learn about the emerging best practices for mobile BI usage and the framework by which you can assess your own management capabilities for enterprise mobile BI adoption.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Published By: SAS     Published Date: Sep 13, 2013
Insights from a webinar in the Applying Business Analytics Webinar Series
Tags : 
sas, hadoop, big data, software framework, webinar, business analytics webinar series, software development, it management
    
SAS
Published By: IBM Corporation     Published Date: Sep 20, 2010
The IBM WebSphere eXtreme Scale product provides a high-performance, scalable cache framework. This chapter is an introduction to WebSphere eXtreme Scale.
Tags : 
ibm caching and cloud, websphere extreme scale, scalable cache framework, query engine, network deployment
    
IBM Corporation
Published By: Bit9     Published Date: Mar 07, 2013
Download this white paper and learn how to use a progressive, three-step approach to build trust, monitor activity and tailor protection to your enterprise and build an adaptive application control framework.
Tags : 
security, risk management, roi, cost reduction, enterprise, cyber threat
    
Bit9
Published By: Samanage     Published Date: Aug 13, 2014
Join us for this educational webcast, presented by Randy Michaels of Knowledge ToolWorks, a leading expert on IT and business processes, to learn how you can make ITSM work for you without getting tangled up in its ugly tentacles.
Tags : 
samanage, randy michaels, itsm, it service management, knowledge toolworks, service driven organization, itsm framework, it management, knowledge management, enterprise applications
    
Samanage
Published By: Oracle Social Cloud     Published Date: Jan 14, 2015
When it comes to social media marketing, there is perhaps no other topic that is discussed more than determining and reporting return on investment, or ROI. This white paper sets out to make the case that ROI determination can be approached in a unified, structured and straightforward way. It also lays out a framework for expanding the definition of ROI and increasing organizational maturity for measurement and monetization. Finally, it dispels some of the myths around ROI and seeks to show the relationship between social KPIs organizations may be collecting today and how to align them with broader organizational and business-oriented goals and objectives.
Tags : 
social roi, facebook, social listening, social marketing, customer experience, digital, cmo, social business, socially enabled enterprise, marketing cloud, crm, data
    
Oracle Social Cloud
Published By: Polycom     Published Date: Mar 13, 2015
In the fall of 2013, Polycom and Microsoft commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Polycom voice solutions for Microsoft Lync. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Polycom voice solutions for Microsoft Lync within their organizations.
Tags : 
mobile, unified communication, concept, brand, enterprise, voice, products, services, innovative technology, manufacture, functionality, enterprise applications, data management
    
Polycom
Published By: Dell Cloud Marketplace     Published Date: Jan 07, 2015
This report will help CIOs, application architects, and IT decision-makers identify common patterns of implementation failures and successes and provide a framework for evaluating multi-cloud environments.
Tags : 
dell, cloud strategy, cloud computing, cloud services, application infrastructure, application architecture
    
Dell Cloud Marketplace
Published By: Intel Security     Published Date: Apr 06, 2016
This solution guide discusses how IT incident responders can unify the Protect, Detect, and Correct stages of managing threats in order to build a comprehensive security model that more efficiently combats targeted attacks.
Tags : 
threat management, adaptive security model, targeted attacks, agile, architecture, cybercrim, security connected framework, detection, analysis, intelligence
    
Intel Security
Published By: K2     Published Date: Apr 27, 2015
Download this white paper to learn how K2, a comprehensive business process application solution, gives you a better BPM through each step of the BPM lifecycle.
Tags : 
strategy and execution, business operations, traditional organizational hierarchy, collaborative efforts, end-to-end processes
    
K2
Published By: K2     Published Date: Jan 07, 2016
Is it time to reframe BPM through a modern lens? This is what a recent Forrester report claims, after conducting an online survey of over 3,300 businesses. While 33 percent of companies are already implementing or using a BPM solution and an additional 30 percent are interested in using BPM, only 17 percent of companies made a formal request to use BPM in the last year.
Tags : 
bpm, business process management, forrester report, bpm solutions, networking, security, it management, wireless
    
K2
Published By: Tripwire     Published Date: Mar 31, 2009
Learn the basics about security benchmarks, and specifically how the security benchmarks developed by the Center for Internet Security (CIS) can help you with your compliance initiatives.
Tags : 
center for internet security, cis, tripwire, compliance, internet security, cis-certified, framework, regulation, security investment, risk, risk management, it security, cis benchmark, e-commerce security, gramm-leach-bliley act (glba), sarbanes-oxley act (sox), health insurance portability, accountability act (hipaa), windows server, sysadmin
    
Tripwire
Published By: TRUSTe     Published Date: Jul 09, 2010
This paper outlines the key areas where businesses need to focus on as they assess their integrity practices. It also provides a steppingstone to developing a comprehensive framework that will underlie an effective business integrity strategy.
Tags : 
truste, coppa, privacy, protection, ecommerce, enterprise services, trust, hipaa
    
TRUSTe
Published By: IBM     Published Date: Jul 07, 2014
"Organizations have always looked for better ways to reach, communicate and engage seamlessly with customers, vendors, suppliers and employees. More often than not, this entails jumping from device to device in the course of a single interaction and orgnaiztaions look for consistency in delivery of contents across touchpoints. Learn how IBM’s portfolio enables leading organizations to provide a framework to build and maintain multichannel digital experiences that put them ahead of the competition"
Tags : 
ibm, omni-channel, digital, leading, digital experience, multichannel, business technology
    
IBM
Published By: SyberWorks     Published Date: Oct 21, 2008
In most cases, the biggest quandary an organization must solve is to put together a rational, i.e., a cost justified, business case why they should spend capital to invest in a learning management system. The focus of this white paper will outline the benefits of web-based training along with a practical framework for developing ROI when looking at the cost of traditional training methods verses e-Learning.
Tags : 
syberworks, e-learning, roi, global workforce, just-in-time learning, learning management systems, learning management system, e-learning, elearning, web based training, training management systems, training management system, online training software, web based training software, e-learning, sop automation, seminar logistics, classroom management, online survey tool, competency management
    
SyberWorks
Published By: IBM     Published Date: Jan 07, 2016
In this study, we set to explore, with the help of ISMG, how enterprises view mobile security risks, what capabilities they are currently deploying vis-a`-vis the four pillars of the framework and what their short-to- medium-term plans are to extend these capabilities.
Tags : 
ibm, security, maturity, mobile, wireless, business technology
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
IBM Executive Summary: 2015 CISO Insights Study: From Checkboxes to Frameworks. Identifying How Firms Manage Cybersecurity Investment.
Tags : 
ibm, ciso, insight, cybersecurity, it management, data center, data security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
CASBs provide CISOs with a critical control point for cloud service visibility, security and compliance. Use Gartner CASB frameworks to support continuous cloud service discovery, adaptive access, verification, protection and the prioritization of CASB evaluation criteria.
Tags : 
ibm, gartner, cloud, cloud security, casb, ciso, security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
In this study, we set to explore, with the help of ISMG, how enterprises view mobile security risks, what capabilities they are currently deploying vis-a`-vis the four pillars of the framework and what their short-to- medium-term plans are to extend these capabilities.
Tags : 
ibm, mobile security, mobile security maturity, ismg, security
    
IBM
Published By: IBM     Published Date: Nov 07, 2016
Apache Spark hit the scene in 2014 and has grown to be the most popular software project in the history of Open Source. Attend this webinar and learn more about; -What is Apache Spark? -Why, is it so popular? -Why is it important to you and your organization? Apache Spark is allowing companies to drive innovative ways to compete using one of the most valuable assets in the 21st century, Data! Apache Spark is the fastest growing framework for powering Big Data Analytics today and for the future. Register to attend this webcast and learn more.
Tags : 
ibm, big data, platform computing, apache spark, enterprise applications, business technology
    
IBM
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com