bsp

Results 26 - 50 of 409Sort Results By: Published Date | Title | Company Name
Published By: Clearswift     Published Date: Jun 09, 2008
This white paper provides a comprehensive look at spam; from its early days to where we are today in terms of managing the daily threats.  With a strong policy, education and policy enforcement, and a multi-layer content security solution, organizations can address every kind of threat to its networks and its business; regardless of whether the threats are inbound or outbound.
Tags : 
clearswift, network security, internet security, web security
    
Clearswift
Published By: Clearswift     Published Date: Jun 09, 2008
Websites that did not exist five years ago are now at the top of the most visited and used sites on the Web.  Yesterday's teenagers and college students, who have grown up using MySpace, YouTube and other Web 2.0 sites are bringing their social habits into the workplace, and creating a number of challenges for employers.
Tags : 
enterprise security, web 2.0, gartner, clearswift, clearswift, social media, social networking
    
Clearswift
Published By: BMC ESM     Published Date: Aug 20, 2009
IT executives are under intense pressure to cut costs, and that pressure is significantly increased by the current grim economic outlook.  So, how can your organization weather this economic storm? Surprisingly, a variety of opportunities for IT are hidden within today’s financial challenges.
Tags : 
bsm, bmc, it executives, it costs, it management, process management, business management, workflows
    
BMC ESM
Published By: BMC ESM     Published Date: Aug 20, 2009
What if you could predict disruptive IT events and automate their resolution — all before they disrupt your business?  Software Consultant Ron Coleman provides a demonstration and discusses the key points of Service Assurance from BMC Software.
Tags : 
service assurance, bmc, it events, it automation, software demo, automate, it management
    
BMC ESM
Published By: BMC ESM     Published Date: Aug 20, 2009
BMC Service Automation automates repetitive, manual tasks (such as provisioning, patching and compliance) to reduce the margin for error, allowing IT to get things done more quickly, and across organizational silos.  Software Consultant Ron Coleman provides a demonstration and discusses the key points of Service Automation from BMC Software.
Tags : 
bmc, automation, service automation, silos, software, margin for error, error reduction, patching, provisioning, compliance, manual task, business process automation
    
BMC ESM
Published By: dynatrace     Published Date: Feb 01, 2013
New application performance management systems can deliver rapid time-to-value and ROI for IBM WebSphere implementations by reducing the amount of time isolating problems and repairing them throughout the entire WebSphere stack.
Tags : 
    
dynatrace
Published By: Gleanster Research     Published Date: Aug 30, 2013
Learn how content management and WebSphere Commerce integration puts the power of real-time website updates in the hand of marketers and removes dependence on IT for small changes.
Tags : 
    
Gleanster Research
Published By: Gleanster Research     Published Date: Aug 30, 2013
Supercharge your online shop! By combining the First Spirit CMS and IBM WebSphere Commerce you get the freedom and flexibility you need to establish a meaningful and personalized consumer experience across almost any touch-point. That means more flexibility and more revenue.
Tags : 
    
Gleanster Research
Published By: Gleanster Research     Published Date: Aug 30, 2013
WebSphere Commerce and content management integration allows retail marketers to quickly make changes in the ecommerce platform directly from within the content management system. No coding. No dependence on IT. Find out how with e-Spirit.
Tags : 
    
Gleanster Research
Published By: Solidcore     Published Date: Aug 21, 2007
Learn how change control technology helps organizations comply with PCI DSS by tracking changes to critical files, determining if changes are authorized, and selectively preventing unauthorized change.  Read this white paper on how you can relieve the burden of out-of-process and other unauthorized changes by using real-time monitoring and selective enforcement software. 
Tags : 
pci data, credit card, payment card, pci, compliance, privacy, customer information, data security, database security, solidcore, solid core
    
Solidcore
Published By: Solidcore     Published Date: Jan 07, 2008
This IT audit checklist guide includes advice on assessing the effectiveness of change management in a variety of areas.   As companies grow more dependent on interdependent IT systems, the risks associated with untested changes in development and production environments have increased proportionately.
Tags : 
audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, auditor, change management, configuration management, solidcore, fortrex
    
Solidcore
Published By: Solidcore     Published Date: Jan 07, 2008
It is widely acknowledged that unauthorized changes made to an IT Infrastructure cause up to 80% of system unavailability.  Learn how adding change control to your existing or planned change management infrastructure can help improve IT service availability, lower compliance costs, and accelerate your ITIL implementations.
Tags : 
control change, change management, high availability, change control, sla, service level, solidcore, infrastructure, itil
    
Solidcore
Published By: Solidcore     Published Date: Jan 07, 2008
Demonstrating ROI for service management investments can be difficult, especially with multi-phase deployments like ITIL that can require significant up-front investment in exchange for returns produced in the future.  Learn how setting milestones and measuring the value of each phase of an ITIL implementation can help prove the project’s value and shape its focus.
Tags : 
itil, roi, service, service management, solidcore, return on investment, cmdb, change management, configuration management
    
Solidcore
Published By: Solidcore     Published Date: Jan 15, 2008
New report issued by Fortrex, Emagined Security and Solidcore reveals the cost of PCI compliance is justified. These PCI requirements exist to protect sensitive data - yet, research indicates that these are among the least satisfied requirements across Level 1 merchants, with almost 40% non-compliance. 
Tags : 
    
Solidcore
Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, pci, compliance, payment card industry, data security standards, data management
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Oct 16, 2008
Is open source secure? How much business risk is introduced with it?  Fortify surveyed the open source community for an answer and revealed that open source projects lack the three essential elements of security:  people, process and technology.  Read this research to discover what actions can reduce these risks within your organization.
Tags : 
fortify, open source, business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Oct 16, 2008
The hacking community has shifted its effort toward a new frontier:  the application layer.  How are companies responding?  Business Software Assurance – the capability to address the problem of application risk within an enterprise.  This whitepaper provides an overview of the severity of the problem along with everything needed to develop Business Software Assurance in your organization. 
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Oct 23, 2008
Fortify's report summarizes electronic as well as traditional methods of voting including absentee ballots.  This voting guide will provide recommendations for voters who want to make sure their vote counts and for federal and state governments on how to devise efficient and accurate voting processes and systems.
Tags : 
fortify, application security, security risks, voting, fortify, fortify software, election process, local government, state government, federal government, privacy, vulnerability voting, election
    
HP - Enterprise
Published By: SAP Inc.     Published Date: Jul 28, 2009
While historically consumer packaged goods (CPG) organizations have made significant investments in data collection and integration, much of the data stored in their IT infrastructures has not been analyzed or deployed to further the firms' business performance.  Those enterprises that learn to effectively harness the vast quantities of information generated by their IT systems - both within and outside the corporation - will enjoy a substantial competitive advantage.
Tags : 
sap, business intelligence, business processes, consumer packaged goods, integrating cross-enterprise processes, data management
    
SAP Inc.
Published By: SAP Inc.     Published Date: Jul 28, 2009
Although many organizations have made significant investments in data collection and integration (through data warehouses and the like), it is a rare enterprise that can analyze and redeploy its accumulated data to actually drive business performance.  In the years to come, as globalization and increased reliance on the Internet further complicate, accelerate and intensify marketplace conditions, actionable business intelligence promises to deliver a formidable competitive advantage to firms that leverage its power.
Tags : 
sap, business intelligence, business insight, business transparency, cross-enterprise data, inter-enterprise data, data integration, data management
    
SAP Inc.
Published By: HP     Published Date: Jul 29, 2008
This white paper describes an energy audit tool which can lead to significant decreases in the costs of running a data center.  Thermal Zone Mapping (TZM) is a visualization tool developed to present in graphical format high level thermal metrics developed by HP and targeted for use as part of the HP Data Center Thermal Assessment service. This tool uses data generated from computer models of the data center and generates metrics, which are then post-processed and visualized in the three-dimensional data center space.
Tags : 
heat, data center, heat monitoring, hardware, datacenter, mission critical
    
HP
Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale, pos, application-layer vulnerabilities, web 2.0, virtual servers, service oriented architecture (soa), lightweight technologies, insider threat, holistic control model, software development lifecycle, sdlc, wafs
    
VeriSign Incorp.
Published By: Adaptive Growth     Published Date: Mar 12, 2008
ERP system acquisition projects are rarely deemed to fail.  All the well-advertised failures come later, during implementation and afterward.  Nevertheless, the seeds of these failures are invariably planted in the earliest stages of ERP acquisition planning.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth
Published By: Adaptive Growth     Published Date: Mar 12, 2008
ERP implementations fail – when they do – because implementation projects allow a few well-known risks to go unmanaged. These risks go unmanaged because the control of results slips from buyer to seller.  It doesn’t have to work that way.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth
Published By: Adaptive Growth     Published Date: Mar 12, 2008
It is a truism that in any complex activity, the critical, defining decisions should be made as early in the process as possible.  In ERP implementation projects this principle is routinely undermined by the nearly universal practice of separating acquisition and implementation activities into separate projects, performed by separate teams operating under separate control.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.