solutions

Results 4776 - 4800 of 5416Sort Results By: Published Date | Title | Company Name
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Voice over Internet Protocol (Voice over IP or VoIP) allows users to make phone calls over the Internet, or any other IP network, using the packet switched network as a transmission medium rather than the traditional circuit transmissions of the PSTN. As the technology has become more reliable in recent years, companies have been moving to VoIP for a number of reasons.
Tags : 
voip, voice over ip, ip telephony, voip security, secure voip, pstn, network security, internet security, internet security systems
    
Internet Security Systems
Published By: ISYS     Published Date: Aug 21, 2009
Discover the difference between today's newer consumer desktop search products and the mature, tried-and-true business-oriented solutions. Includes a 12-step checklist to help you better evaluate desktop search for the enterprise.
Tags : 
search, desktop search, enterprise software, isys
    
ISYS
Published By: Meru Networks     Published Date: Aug 21, 2009
Pervasive wireless LAN deployments require much larger, broader deployment of Wi-Fi access points than hot spots, cafes or isolated guest access in the enterprise. Clearly new solutions and deployment methodologies should be considered to make pervasive wireless LAN deployments feasible and economical.
Tags : 
wlan, wireless lan, wifi, wi-fi, wlan deployment, pervasive wlan, ubiquitous wlan, microcells, macrocell, macrocells, meru, meru networks, wireless
    
Meru Networks
Published By: NetSuite     Published Date: Aug 21, 2009
This Yankee Group White Paper, compliments of NetSuite, shows how on-demand applications can significantly reduce cost vs. on-premise applications. See how to reduce the total cost of ownership (TCO) of deploying & integrating CRM & accounting/ERP applications.
Tags : 
crm, accounting, cost control, tco, total cost of ownership, customer relationship management, erp, enterprise resource planning, enterprise software, analyst report, netsuite, it management, enterprise applications
    
NetSuite
Published By: NetSuite     Published Date: Nov 27, 2007
But what is "BI" and how do small/mid size business owners acquire it without too much cost?  This Executive White Paper will outline the issues and solutions for the "BI" requirements of growing companies.
Tags : 
analytics, business analytics, business intelligence, bi tools, business planning, erp data, netsuite
    
NetSuite
Published By: OutlookSoft     Published Date: Aug 21, 2009
As vendors rush to embrace and exploit predictive analytics, only those with a truly unified solutions will succeed in capitalizing on this powerful and promising technology. Read this insightful white paper to learn more.
Tags : 
analytics, business analytics, performance managment, business process management, bpm, business activity monitoring, metrics, business metrics, activity monitoring, corporate performance management, outlooksoft, outlook soft, it management
    
OutlookSoft
Published By: PKWARE     Published Date: Aug 21, 2009
The Butler Group provides a technology audit on PKWARE's SecureZIP cross-platform data file security software.
Tags : 
data security, security audit, auditing, compression, data compression, zip file, zip, compress, pkware
    
PKWARE
Published By: Roaring Penguin     Published Date: Aug 21, 2009
This white paper from Roaring Penguin Software reviews the most common approaches to spam management on higher education and K-12 campuses and details how a suitable anti spam solution must address particular challenges for campus IT administrators.
Tags : 
spam, antispam, anti-spam, university, universities, college, colleges, school, education, institution, dormitory, spam management, email security, roaring penguin
    
Roaring Penguin
Published By: Safe Software     Published Date: Aug 21, 2009
This paper by S. Raghavendran of Pixel Infotek Pvt Ltd on GIS Interoperability and Spatial ETL solutions was presented at the GSDI conference in India and provides an excellent description of the interoperability challenges that Safe's products address.
Tags : 
spatial, geographic information system, geographic information systems, geological, information management, data processing, database, data transfer, safe, safe software
    
Safe Software
Published By: Salesboom     Published Date: Aug 21, 2009
The high price and complexity of traditional, installed-on-premise enterprise software has left SMBs unable to obtain true integrated Customer Relationship Management (CRM) and Enterprise Resource Planning (ERP) software. On-demand software-as-a-service is changing all that. This white paper discusses the benefits of the on-demand, or hosted CRM and ERP vs on premise CRM and ERP solution and the benefits to the SMB.
Tags : 
crm, customer relationship management, smb, smbs, small business, enterprise resource planning, erp, resource management, saas, software as a service, application integration, sales software, salesboom, enterprise applications
    
Salesboom
Published By: Sanbolic     Published Date: Aug 21, 2009
NAS solutions built using the Windows Storage Server 2003 on standard Intel platforms provide a very cost effective solution to file serving. Servers built on this platform can export file services using CIFS, NFS, and other protocols, which provides a convenient platform to consolidate files.
Tags : 
network attached storage, network-attached storage, scalability, scalable storage, flexible storage, windows, windows server, nas appliance, sanbolic, storage
    
Sanbolic
Published By: Secure Computing     Published Date: Feb 22, 2007
This paper outlines these new threats and discusses the limited effectiveness of reactive legacy Web security solutions against those threats.  The paper then outlines the new reputation based, proactive security paradigm that is necessary for securing Web 2.0 applications.
Tags : 
web 2.0, web 20, web security, application security, web app security, internet security, network security, hacker detection, intrusion prevention, secure computing, securecomputing, security
    
Secure Computing
Published By: Sigaba     Published Date: Aug 21, 2009
This white paper reviews the five most common current approaches to messaging security. While the five approaches discussed here are not the comprehensive list of available solutions, they are the basis for most variations of messaging security solutions available today.
Tags : 
email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba, security
    
Sigaba
Published By: Sigaba     Published Date: Aug 21, 2009
This white paper describes how Sigaba's secure email solutions minimize the burden on IT organizations through a combination of easy integration with existing enterprise systems and simple maintenance.
Tags : 
access control, email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba, security
    
Sigaba
Published By: Signiant     Published Date: Aug 14, 2008
Moving content from raw form to finished form and delivering it to cable head-ends and Telco providers has its own unique set of challenges. How does content flow from the person or companies who are producing and post-producing the content to the companies that are hosting the content for consumption? IPTV content must be transformed in some fashion, such as various bit rates, resolutions, aspect ratios, file formats, etc.
Tags : 
signiant, information management, file transfer, ftp, large file transfer, digital media
    
Signiant
Published By: Spectra Logic     Published Date: Aug 21, 2009
To put it simply, data protection is complicated. Simplifying it involves assessing solutions for their near-term and long-term value. This paper examines the less obvious- but not less important - issues in simplifying backup.
Tags : 
backup, data protection, back-up, tape-based backup, tape backup, disk-based backup, disk backup, simple backup, backup system, spectra logic, spectralogic
    
Spectra Logic
Published By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : 
security management, mobile device, mobile security, wireless security, secure laptop, secure pda, secure blackberry, network security, compliance, sybase, wireless
    
Sybase
Published By: TopLayer     Published Date: Aug 21, 2009
This white paper written by Reymann Group, compliance consultant firm, showcases thought leadership on how intrusion prevention solutions can enable proactive security responses necessary to protect today's corporate enterprise and its customers from real time threats posed by widespread cyber terrorists, hackers, and rogue insiders.
Tags : 
sarbanes, intrusion prevention, ips, sox, sarbanes-oxley, sarbox, network security, cybercrime, hacker, intrustion detection, toplayer, compliance, top layer
    
TopLayer
Published By: TopLayer     Published Date: Aug 21, 2009
This white paper is intended for Information Security and Information Technology professionals interested in understanding Zero-day Attacks, the various protection schemes available today and how Top Layer Network's Intrusion Prevention System (IPS) solutions provide the best mechanisms for protection from these types of attacks.
Tags : 
network security, intrusion prevention, ips, cso, server protection, toplayer, top layer, security
    
TopLayer
Published By: Tridion     Published Date: Aug 21, 2009
Organizations have been implementing intranets for a number of years, expecting to gain efficiencies and improve information exchange among their employees. Based on an organization's objectives, an intranet can take many different forms, ranging from a corporate information and communication platform to a pragmatic approach to Knowledge Management. This White Paper specifically focuses on the lifeblood of intranets: content.
Tags : 
collaboration, content, intranet, corporate communication, workforce management, internal communication, team management, web site management, intranet management, tridion
    
Tridion
Published By: Trusted Network Tech     Published Date: Aug 21, 2009
Authentication technologies such as tokens and smart cards help meet the challenges of protecting sensitive data and securing application access. This white paper presents four cases in which an identity-based solution provides a compelling, low-cost alternative or complement to strong authentication technologies.
Tags : 
network management, network security, access control, nac, network access control, identity management, security management, authentication, smart card, token, trusted network tech, security
    
Trusted Network Tech
Published By: Trusted Network Tech     Published Date: Nov 06, 2006
This paper addresses several issues organizations should consider when analyzing the efficacy and costs of NAC solutions and looks at a complementary alternative technology based on TNT’s Identity™, which helps address and overcome some limitations of NAC solutions.
Tags : 
access control, nac, network, identity management, network access control, security, internet security, trusted network tech
    
Trusted Network Tech
Published By: Symantec     Published Date: Jun 12, 2008
An effective email management solution is essential for organizations in today's litigious environment. Learn more from Gartner research about the market and top vendors providing active archive solutions today. Download this research study to learn more.
Tags : 
symantec, email management, email archiving, archive, archiving, storage
    
Symantec
Published By: Quocirca     Published Date: Sep 13, 2007
A sound IT infrastructure is fundamental to today’s businesses and when that infrastructure fails the consequences can be far reaching. Whether it is business-to-business, business-to-consumer or public sector organizations serving citizens, applications and the services they drive increasingly need to be available all day, every day. Many organizations find it hard to achieve such service levels. This briefing looks at some possible solutions.
Tags : 
data center, datacenter, data centers, datacenters, data centre, data centres, infrastructure, mission critical, high availability, small business, smb, smbs, outsourcing networking, network management, symantec, quocirca
    
Quocirca
Start   Previous    185 186 187 188 189 190 191 192 193 194 195 196 197 198 199    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com