keys

Results 101 - 125 of 206Sort Results By: Published Date | Title | Company Name
Published By: LogRhythm     Published Date: Nov 16, 2011
This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.
Tags : 
security, compliance, threats, insider threats, monitor, monitoring, attack, security, privileged users, damage
    
LogRhythm
Published By: Symantec.cloud     Published Date: Sep 12, 2012
In this e-book, you'll learn how to protect your valuable assets without the expense or time commitment of building a full IT infrastructure.
Tags : 
database security, data management, data and security, smb, cloud based security, security, business technology, data center
    
Symantec.cloud
Published By: Riverbed     Published Date: Nov 12, 2012
This Forrester white paper examines the trends driving the new wave of dynamic web content in enterprises to understand its sources, its shape, and its impact on current web architectures and networks. Learn more about the keys to content management
Tags : 
dynamic web, web content management, wcm, web architecture, enterprise applications, business technology
    
Riverbed
Published By: McAfee     Published Date: Apr 16, 2014
This paper examines what US federal agencies and organizations should look for in log management strategy and integration into and support of applicable and prospective security and compliance programs and initiatives.
Tags : 
siem, log management, federal agency, compliance, situational awareness, visualization, security
    
McAfee
Published By: Siemens     Published Date: Jun 06, 2014
This white paper examines some of the critical success factors for a sustainable population health management program and how the CareXcell™ solution can provide the IT infrastructure needed to address new value-based care requirements.
Tags : 
siemens, hie, clinical workflows, care coordination, reduce costs, streamline communication, healthcare
    
Siemens
Published By: OnBase by Hyland     Published Date: Jun 09, 2015
You’ve determined how ECM can help your organization automate manual tasks, improve workflows and eliminate paper-based processes. Next is developing an ECM solution based on your business needs.
Tags : 
enterprise content management, ecm, automation, workflow, paperless, it management, knowledge management, enterprise applications, data management
    
OnBase by Hyland
Published By: Oracle_Hospitality Hotels     Published Date: Feb 22, 2017
Innovative thinking, combined with the power of cloud technologies, can tackle the seemingly impossible. Learn how with the 5 Keys to Redefining Hotel Leadership.
Tags : 
    
Oracle_Hospitality Hotels
Published By: SafeNet     Published Date: Jul 13, 2010
This white paper is the second in a series following An Enterprise Guide to Understanding Key Management which introduces different types of cryptography and keys used in modern data protection applications.
Tags : 
safenet, enterprise security policy, key management, cryptography, data protection application, integrated security platform, encryption
    
SafeNet
Published By: Limelight Networks     Published Date: Feb 14, 2012
Learn how to turn content assets into online consumer engagement andhigher web conversion rates. In this report, you'll find: An overview of content marketing strategies and solutions Keys to content development success Must-haves for content
Tags : 
    
Limelight Networks
Published By: Limelight Networks     Published Date: Feb 14, 2012
An effective mobile website experience is essential to your brand's success. In this report, learn insights on how to extend your brand image effectively across mobile devices and tips for targeting multiple mobile platforms
Tags : 
    
Limelight Networks
Published By: Kaseya     Published Date: Mar 12, 2015
Cloud migrations will not be successful if organizations can’t deal with the “real” cloud rather than the one they see in TV commercials.
Tags : 
cloud management system, cloud computing, cloud architecture, byod, capital preservation, strategic initiatives, cloud migration, data center design and management
    
Kaseya
Published By: Work4™     Published Date: Nov 18, 2013
Download this whitepaper to learn the 3 Keys to sourcing the best candidates through Graph Search and for tips on how your organization can experience the joy of Facebook recruiting.
Tags : 
facebook, facebook recruiting, recruiting, human resources, graph search, organic search, facebook company page, social network recruiting
    
Work4™
Published By: Payscale, Inc     Published Date: Apr 04, 2018
The war for talent has never been fiercer. This isn’t 2008; we’re years past the height of the recession. No wonder hiring managers are finding it harder and harder to attract the right kind of talent, because talent has more choices and options than ever before.
Tags : 
    
Payscale, Inc
Published By: mindSHIFT Technologies     Published Date: Jul 01, 2014
In this whitepaper, you will learn 11 features and benefits your company should consider when deploying a hosted private cloud.
Tags : 
mindshift, hosted private cloud, security, servers, infrastructure, data privacy, data management, private cloud, business technology
    
mindSHIFT Technologies
Published By: Microsoft     Published Date: Jul 20, 2018
SaaS represents an opportunity for ISVs to fundamentally transform their business to deliver greater value to customers, sell software to a broader range of customers, and streamline their internal operations. The market for software is quickly changing to demand this mode of delivery, as software buyers start considering total ownership costs, ease of use, and flexibility in their purchase decisions. ISVs need to prepare for such a transition. This paper will discuss the benefits that stem from changes to an ISV’s business model (how it competes in the marketplace) and operating model (how the ISV executes on its business model) as well as suggestions on how to prepare for a SaaS transition, based on the experience of 20 ISVs who successfully transitioned from a traditional software licensing and delivery model to SaaS.
Tags : 
    
Microsoft
Published By: Balihoo     Published Date: Apr 29, 2010
As a product manufacturer reaching your customers through a reseller network, you know it's critical to coordinate and leverage marketing activities with them. More than ever your marketing budgets are under scrutiny, while at the same time there's ever-growing pressure to achieve sales goals. Download this whitepaper to learn the 5 Keys to Optimizing your Co-op or MDF Advertising Program and seamlessly translate your national strategies into local execution.
Tags : 
balihoo, marketing, co op marketing, integrated marketing, romi, marketing automation
    
Balihoo
Published By: IBM Software     Published Date: Jul 29, 2010
Sales Force Productivity, Sirius Decisions: This brief video looks at the keys to improving overall customer satisfaction by looking at customer behaviors and the insights they provide.
Tags : 
ibm software, cognos, customer satisfaction, sales force productivity, consumer behavior, sales analytics, performance, marketing and sales
    
IBM Software
Published By: Cisco     Published Date: Mar 10, 2011
Read this white paper to recognize the most vital features of any business phone system.
Tags : 
cisco, business phone system, voice over internet protocol, voip
    
Cisco
Published By: StorageCraft® Technology Corporation     Published Date: Jun 21, 2011
Whether due to problems with hardware, attacks from external influences, viruses or a poorly written application can cause information to become corrupt. Download this white paper to learn the five keys to preventing data corruption.
Tags : 
storagecraft, data corruption, storage environment, backup media, corrupt data
    
StorageCraft® Technology Corporation
Published By: Equinix     Published Date: Aug 01, 2012
The following is an excerpt from the GigaOM Pro report,"Migrating Interactive Media and Web Applications to the Private Cloud"
Tags : 
equinix, cloud computing, saas gigaom, business technology
    
Equinix
Published By: Kaseya     Published Date: Oct 03, 2013
Eight Keys to Cloud Friendly System Management
Tags : 
kaseya, cloud, cloud computing, system management, cloud migrations, lan, public cloud, private cloud, hybrid cloud, byod, software development, it management
    
Kaseya
Published By: SafeNet     Published Date: Jan 14, 2014
The demands for heightened security through the use of multi-factor authentication are pressing, but so is the need to control budgets and give users convenient access to the data and services they need. It is growing increasingly clear that organizations can’t meet these demands with legacy platforms—they need next-generation authentication. This paper examines why this need for next-generation authentication is so vital, and it offers a detailed look at the key characteristics that distinguish these platforms from other alternatives.
Tags : 
authentication, next-generation, cloud computing, internet security, safenet
    
SafeNet
Published By: NAVEX Global     Published Date: Nov 18, 2013
Download this paper to explore the 4 areas that are key to managing social media use by employees in your organization.
Tags : 
social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra, retaliation, harassment, mobile training, risk assessment, data, culture assessment, program assessment
    
NAVEX Global
Published By: Hyland Software     Published Date: Dec 17, 2013
Businesses are discovering how to create efficiencies and meet constantly evolving business needs with an enterprise content management (ECM) solution. Make ECM work for your organization by researching best practices and knowing your options.
Tags : 
emc, enterprise content management, emc solution, automated processing, workflow, integration, emc strategy, onbase, hyland software, knowledge management, enterprise applications, data management
    
Hyland Software
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com