bsp

Results 301 - 325 of 410Sort Results By: Published Date | Title | Company Name
Published By: VMware Dell     Published Date: Jan 31, 2008
Aternity, Inc. is the leader in Frontline Performance Intelligence for Global 1000 enterprises. Two of the biggest challenges Aternity faces as a software developer are: 1) testing its software in different IT environments; and 2) deploying its software at customer sites.  Fortunately, VMware software was able to address both these challenges.
Tags : 
vmware, software testing, virtual, virtualization, virtualize, virtual server, server, servers, virtual machine, virtual machines, productivity, vmware
    
VMware Dell
Published By: ESET     Published Date: Jan 30, 2008
As another year draws to a close, few can have failed to notice the plagues of malicious software, floods of fraudulent emails and the generally increased pestilence of our online world, marking out 2007 as one of the most remarkable in the history of malware.  This report covers the top malware threats in 2007 and provides monthly summaries.
Tags : 
malware, global threats, 2007, threats, email, threat summary, threat report, viruses, eset, antivirus, nod32, internet threats, web-borne threats, phishing, trojans, spam, attacks, exploits, computers, malicious software
    
ESET
Published By: ESET     Published Date: Jan 30, 2008
Steganography is the science of hiding data inside of items, such as sound and picture files.  Listen to this podcast to learn more about steganography and the potential IT security concerns it poses.
Tags : 
embedded files, steganography, hiding data, secret files, coding, av signatures, traditional antivirus, norton, symantec, trend micro, mcafee, malware, threats, email, viruses, eset, antivirus, nod32, internet threats, web-borne threats
    
ESET
Published By: Panda Security     Published Date: Jan 16, 2008
A new white paper from Panda Security discusses the new breed of silent online threats that can bypass traditional antivirus programs and penetrate even the most highly 'protected' networks.  Additionally, the sheer volume of malware has overwhelmed the antivirus industry as a whole. Collective Intelligence is a new global security model specifically designed to combat the next evolution of malicious code.
Tags : 
malware, virus, anti-virus, spyware, anti-spyware, anti-malware, bot, botnet, trojan, dos, denial of service, hacker, phish, phishing, panda, panda security
    
Panda Security
Published By: Solidcore     Published Date: Jan 15, 2008
New report issued by Fortrex, Emagined Security and Solidcore reveals the cost of PCI compliance is justified. These PCI requirements exist to protect sensitive data - yet, research indicates that these are among the least satisfied requirements across Level 1 merchants, with almost 40% non-compliance. 
Tags : 
    
Solidcore
Published By: Everest Software     Published Date: Jan 11, 2008
This white paper examines how small and medium sized business can grow their businesses by streamlining their processes, creating employee empowerment, reducing IT costs, increasing productivity and improving their customers experience by implementing an integrated, real-time software solution. 
Tags : 
business management, small business, mid-sized business, smb, smbs, soho, productivity, erp, software integration, integration, business integration, cost control, growth, everest, everest software
    
Everest Software
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
In 2005, O’Hare International Airport began a project to relocate and modernize a 2.1 million ft.2 runway. Five independent firms worked on the project design with the IT/data management led by Milhouse Engineering and Construction, Inc.  Milhouse implemented GlobalSCAPE WAFS which mirrors critical files to all sites. This provided fast local access to all project files automatically without any administrative burden and with no delays.
Tags : 
globalscape, data management
    
GlobalSCAPE
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
Patton Harris and Rust and Associates has 13 branches.  Management and IT needed a way to help these offices work on projects together to optimize company resources.  Using GlobalSCAPE WAFS gave PHR+A fast file access across branches using minimal system resources. No management is required as it operates in the background and real time byte level differencing not only reduces bandwidth usage and spikes but also the changes are sent as they happen – not when they are needed.
Tags : 
wafs, wan, wans, wide area networks, file transfer, file transmission, secure file transfer, mft, eft, managed file transfer, enhanced file transfer, globalscape, file access
    
GlobalSCAPE
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
Jordan & Skala Engineers is a growing company with 5 offices.  It needed a scalable solution to optimize their network and their resources as more and more work was distributed across sites. Using GlobalSCAPE WAFS files mirror instantly in real time using byte-level differencing.  So as soon as a file is saved or closed, the file deltas appear in every other location on the network. Users are never waiting for files to upload, download, or open across a network.
Tags : 
wide area networks, wan, wans, wafs, wafs, file transfer, file transmission, globalscape, ftp, eft, mft, managed file transfer, case study, networking
    
GlobalSCAPE
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
AON’s Human Capital division needed a better way to automate their data transfer processes. They wanted a simple yet flexible system that didn’t require customization to adapt to growing needs.  They wanted to consolidate their sensitive data transfers and ensure the security of this data and to provide integration with current workflow and key legacy applications. AON deployed the GlobalSCAPE EFT (Enhanced File Transfer) server.
Tags : 
file transfer, file transmission, eft, mft, secure file transfer, data transfer, data transmission, globalscape
    
GlobalSCAPE
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
Williams Lea is a leading global provider of customized corporate information solutions. The company needed to reliably, easily and securely transfer sensitive files and implement a system to share files and ensure a business continuity/disaster recovery plan.  Today, Williams Lea uses the GlobalSCAPE’s Enhanced File Transfer (EFT) solution to provide secure protocol support and encryption to protect data in transit and at rest.
Tags : 
eft, enhanced file transfer, managed file transfer, mft, disaster recovery, business continuity, data protection, globalscape
    
GlobalSCAPE
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
Disaster can strike when you least expect it.  So how do you back up and maintain control of your data and still provide access to data in a distributed organization?  The challenges are clear...large and growing amounts of data need to be distributed across many sites yet complications such as bandwidth usage, file coherence, version consistency, and file latency all result in lost productivity.
Tags : 
globalscape
    
GlobalSCAPE
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
The Payment Card Industry Data Security Standard is a detailed series of 130+ requirements that anyone who stores or transfers credit card data has to comply with.  However due to the protection it offers, the PCI DSS is fast becoming a security standard for all sensitive data that needs to be protected.  The goal of the standard is to ensure security of data in transit and at rest while ensuring compliance is maintained. 
Tags : 
pci, pci dss, pci compliance, compliance, credit card, credit cards, payment card, data protection, data transmission, secure file transfer, file transfer, globalscape
    
GlobalSCAPE
Published By: Solidcore     Published Date: Jan 07, 2008
This IT audit checklist guide includes advice on assessing the effectiveness of change management in a variety of areas.   As companies grow more dependent on interdependent IT systems, the risks associated with untested changes in development and production environments have increased proportionately.
Tags : 
audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, auditor, change management, configuration management, solidcore, fortrex
    
Solidcore
Published By: Solidcore     Published Date: Jan 07, 2008
It is widely acknowledged that unauthorized changes made to an IT Infrastructure cause up to 80% of system unavailability.  Learn how adding change control to your existing or planned change management infrastructure can help improve IT service availability, lower compliance costs, and accelerate your ITIL implementations.
Tags : 
control change, change management, high availability, change control, sla, service level, solidcore, infrastructure, itil
    
Solidcore
Published By: Solidcore     Published Date: Jan 07, 2008
Demonstrating ROI for service management investments can be difficult, especially with multi-phase deployments like ITIL that can require significant up-front investment in exchange for returns produced in the future.  Learn how setting milestones and measuring the value of each phase of an ITIL implementation can help prove the project’s value and shape its focus.
Tags : 
itil, roi, service, service management, solidcore, return on investment, cmdb, change management, configuration management
    
Solidcore
Published By: WebEx     Published Date: Dec 14, 2007
With the growing array of hardware, software, and systems necessary to support businesses, today more than ever, software-as-a-service or on-demand solutions offer feature-rich, real-time functionality without the burden associated with deploying, managing and supporting an in-house approach.  See if it’s right for you.
Tags : 
service management, saas, software as a service, customer service, smb, small business, soho, midsize, mid-size, on-demand, webex
    
WebEx
Published By: Computhink     Published Date: Dec 10, 2007
In the arena of corporate governance and compliance, the Sarbanes-Oxley Act (SOX) has commanded considerable attention; in the healthcare industry, it's  HIPAA; similar regulations target the financial services and energy sectors. Organizations can use technology to meet compliance demands in a cost-effective way.
Tags : 
compliance, computhink, hipaa, sox, sarbox, sarbanes oxley, content management
    
Computhink
Published By: NetSuite     Published Date: Nov 27, 2007
Where should mid-market companies invest valuable resource? Two out of three businesses are either buying or considering buying software via the subscription model.  This white paper will explain how Software-as-a-Service is revolutionizing the economics of growing businesses.
Tags : 
saas, software as a service, on demand, on-demand, software development, development, programming, web services, netsuite
    
NetSuite
Published By: NetSuite     Published Date: Nov 27, 2007
But what is "BI" and how do small/mid size business owners acquire it without too much cost?  This Executive White Paper will outline the issues and solutions for the "BI" requirements of growing companies.
Tags : 
analytics, business analytics, business intelligence, bi tools, business planning, erp data, netsuite
    
NetSuite
Published By: NetIQ Corporation     Published Date: Nov 27, 2007
Learn how delegating administrative privileges can aid in improving administrative productivity, system availability and security, while satisfying the demands of auditors.  Read this new white paper from NetIQ today.
Tags : 
access control, security, audit, auditor, auditing, change management, net iq, netiq
    
NetIQ Corporation
Published By: Shunra     Published Date: Nov 27, 2007
How SAP uses Shunra VE to keep production problems at bay with pre-production testing on the virtual WAN.  These testing approaches and methodologies  reached far beyond conventional application testing and have become the preferred approach to ensure success. SAP does it, so should you!
Tags : 
soa, application testing, application testing software, sap, sap case study, soa applications, testing, virtual wan, wide area network, shunra, ppi
    
Shunra
Published By: ProjectLocker     Published Date: Nov 19, 2007
Learn how you can transform your website into a marketing machine that attracts qualified prospects and converts a higher percentage of them into paying customers.  This Internet marketing whitepaper discusses 5 tips you can implement today to leverage the Internet and reach your customers more effectively.
Tags : 
website marketing, search engine, sem, seo, online marketing, blogging, adwords, google adwords, marketing, ppc, pay per click, google search, paid search, hubspot
    
ProjectLocker
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Clear Image was awarded a contract to supply and fit CCTV and Access control to NISA, one of the largest picking warehouses in Europe. The company runs 3 shifts per day and wanted to allocate lockers to employees. The simple solution would have been to give each employee a locker, but between Borer and Clear Image, a better solution was devised. Thanks to our technology, we can create one to many relationships between our devices. 
Tags : 
security, security management, access control, identity management, iam, authentication, nisa, physical security, tracking, workforce, workforce management, employee management, borer, nisa, clear image, borer, borer data systems, access control, muster, roll call
    
Borer Data Systems Ltd.
Published By: InsideCRM.com     Published Date: Nov 05, 2007
Considering adding a contact center to your business? Our analyst-written buyer's guide is a great place to start your search. We provide you with an in depth  market overview, a rundown of standard and advanced features and will point you in the direction that will be most beneficial and efficient for your organization.
Tags : 
software, call center, call center software, contact center, contact center software, crm, customer relationship management, insidecrm, inside crm, buying guide, buyers guide
    
InsideCRM.com
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.