ca sm

Results 1626 - 1650 of 1838Sort Results By: Published Date | Title | Company Name
Published By: Quocirca     Published Date: Dec 02, 2008
The need to share information has never been greater as cross-organizational business processes become deeper and more complex. The movement of digital information, both within a business and across its increasingly porous boundaries to external individuals and organizations, carries more and more risk as regulations are tightened around data protection and personal privacy.
Tags : 
quocirca, content security, aep networks, clearswift, symantec, trend micro, websense, smtp
    
Quocirca
Published By: Quocirca     Published Date: Dec 02, 2008
The internet offers any business the opportunity to present a commercial image independent of the organization's size and location. Small and medium sized businesses (SMBs) across the UK have exploited the internet as it has evolved from an interesting medium for the technology-aware to an essential commercial platform. With this increasing importance, and the internet’s ability to extend the reach of a business, it is valuable to realize precisely what different internet service providers (ISPs) offer before buying. This includes evaluating service level and support capabilities and understanding how these vary throughout the UK.
Tags : 
quocirca, smbs, internet service providers, information technology, security
    
Quocirca
Published By: Quocirca     Published Date: Jul 27, 2009
Across the mid-market, inefficiencies are compounded by the lack of visibility into pertinent data, of processes being adequately and flexibly automated, and for the performance of the business to be monitored on a constant basis. Without such capabilities, businesses will find it difficult to survive the current financial conditions – yet creating an environment where information can be easily aggregated and viewed has never been easier. Also, business performance can be easily monitored with small proactive, and even reactive, actions ensuring effective responses to market forces and enabling organisations to compete with local and more global business threats.
Tags : 
quocirca, business intelligence, performance management
    
Quocirca
Published By: Aomega     Published Date: Jan 18, 2007
This white paper summarizes Enterprise Video Communications (EVC) and includes a high level plan to perform an EVC assessment helping ensure deployment success.
Tags : 
video conference, video conferencing, video communications, ip networks, video conference, video on demand, aomega
    
Aomega
Published By: Cenzic     Published Date: Nov 21, 2006
Enterprises are responding to new threat on communication protocols by hardening Web applications, and they are increasingly turning to Web application security assessment tools to improve the security of their applications. This report examines why high accuracy is critical to the effectiveness of the tools, and it discusses how Cenzic Hailstorm addresses this problem.
Tags : 
application security, web application security, hacker detection, cenzic, cenzic hailstorm
    
Cenzic
Published By: Cenzic     Published Date: Nov 29, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  The solution is automated security assessment products that leverage stateful processing to comprehensively examine web applications and reveal vulnerabilities in hours rather than weeks.  Find out how Cenzic's ClickToSecure solution can help you secure your applications.
Tags : 
compiance, internet application security, it spending, application security, vulnerability management, identity management, security assessment, security audit
    
Cenzic
Published By: Cenzic     Published Date: Nov 11, 2008
This white paper highlights Cenzic’s recommendation of a process of continuous assessment for applications in development and production environments -- a process that can equally apply to Intranet and public facing applications alike. Continuous testing can now be easily and safely done in a virtualized environment; no longer putting production web applications at risk. Companies can now easily and quickly, add vulnerability testing to their list of activities for all of their Web applications including production applications. Using a testing methodology across a company’s Web application portfolio will significantly enhance the security of all Web applications.
Tags : 
web application security, testing web applications, cenzic, assessments for web applications
    
Cenzic
Published By: Winshuttle     Published Date: Dec 04, 2006
This article describes an easy non-technical alternative to LSMW to update customer master records in SAP in fewer steps than LSMW, without technical involvement, and without requiring authorizations in SAP.
Tags : 
sap, master record, master records, legacy system migration workbench, lsmw, data migration, data management, winshuttle
    
Winshuttle
Published By: Magonaga     Published Date: Jan 17, 2007
This white paper examines how the failure to structure equitable relationships, establish ethical foundations for action and correct blinding group think led to the catastrophic death of a specific corporate organism.
Tags : 
corporate culture, team dynamics, project management, team management, people management, magonaga, it management
    
Magonaga
Published By: Surado Solutions, Inc.     Published Date: Jan 29, 2007
The purpose of this whitepaper is to educate small business owners on what, why and how CRM can retain existing customers and help their business grow.
Tags : 
enterprise applications, customer relationship management, customer service, crm, crm software, surado
    
Surado Solutions, Inc.
Published By: Provenir     Published Date: Mar 14, 2007
Mobile banking - banking on mobile devices including mobile phones, iPhones, Blackberries, and PDAs is taking off again, and financial institutions around the world are rushing to leverage the technology to gain new customers. This white paper describes the mobile banking "revolution", the state of the technology, the challenges, and the benefits.
Tags : 
wireless, wireless application software, wireless security, wireless phones, pda, smart phones, mobile computing, banking
    
Provenir
Published By: Business Assyst     Published Date: Mar 26, 2007
This paper considers whether smart cards really do have a role to play in loyalty systems or whether they are simply being promoted by the suppliers of smart card technology into what they see as a fast growing, profitable marketplace.
Tags : 
customer satisfaction, customer relationship management, customer interaction service, customer experience management, smart card, smart cards, access control, business assyst
    
Business Assyst
Published By: Vocalocity     Published Date: Apr 18, 2007
Hosted PBX phone solutions are revolutionizing how small and medium-sized businesses (SMBs) serve their customers, grow their business, and support their employees. Delivering the same enterprise level, professional phone system capabilities large businesses use at a much lower cost, hosted PBX is helping SMBs save money while putting their customer services on par with much larger organizations.
Tags : 
pbx, phone, phone system, ip telephony, telecom, telecommunications, voip, voice over ip
    
Vocalocity
Published By: Blue Lane     Published Date: Jan 07, 2008
Quantros’ business—an ASP for the health care industry—requires a secure network and maximal uptime—all with a small IT department and a small budget. Quantros was challenged to implement and enforce sound security policies and to keep up with the continuous stream of vendor patches.
Tags : 
high availability, server, virtual server, network security, server vulnerability, vulnerability, vulnerabilities, quantros
    
Blue Lane
Published By: Trapeze Networks     Published Date: Apr 16, 2007
This paper identifies the requirements for next-generation WLANs, examines the limitations of existing approaches, and describes an innovative WLAN architecture from Trapeze Networks called Smart Mobile™, which overcomes those limitations.
Tags : 
802.11n, wireless, wi-fi, wireless local area network, wlan, wireless network, mobile, voice over ip
    
Trapeze Networks
Published By: GFI     Published Date: Jun 12, 2007
GFI MailSecurity can be deployed as an SMTP gateway or as a VS API version for Exchange 2000/2003. This technical white paper describes each operating mode and helps you decide which to deploy and whether you should deploy both.
Tags : 
gfi, mailsecurity, email security, anti virus, virus, network security, deployment, implementation
    
GFI
Published By: GFI     Published Date: Jun 14, 2007
This technical white paper describes the different ways in which GFI FAXmaker for Exchange/SMTP 12 can be deployed, depending on your mail server type/version and network infrastructure.
Tags : 
ip fax, ip faxing, infrastructure, network infrastructure, faxmaker, gfi, microsoft exchange, exchange server
    
GFI
Published By: GFI     Published Date: Jun 14, 2007
This technical white paper gives an overview of how GFI EventsManager works and discusses installation and deployment issues whilst enabling you to calculate the number of GFI EventsManager instances required on your network.
Tags : 
event manager, events manager, events management, log management, security event, event log, gfi
    
GFI
Published By: InsideCRM.com     Published Date: Dec 28, 2007
Until recently, ERP solutions were considered out of the question for all but the largest companies, due to the technology's complexity and large price tags. However, these days, midmarket companies have more choices than ever when it comes to ERP solutions, as competition between vendors has heated up. This Buyer's Guide can help you answer the big (and small) questions so you can make an informed buying decision.
Tags : 
erp, enterprise resource planning, erp solution, erp software, erp vendor, erp provider, vendor selection, erp vendor selection
    
InsideCRM.com
Published By: Ecora Software     Published Date: Aug 15, 2007
Our guide shows you how automation can create a sustainable control and reporting system – a must-have with mandated quarterly and annual assessments. If you've already prepared for, and experienced, your first Sarbanes-Oxley audit, you'll want to read this guide on sustainability.
Tags : 
sox, sarbox, sox compliance, sarbanes oxley, sarbanes-oxley, enron, compliance, information management
    
Ecora Software
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
In 2004, J.W. Childs had the opportunity to acquire the Sunny Delight Beverage Co. (SDBC) through a unique carve-out of brands by Procter & Gamble. An accurate and in-depth assessment of the infrastructure required to support SunnyD’s business going forward would be absolutely essential to Childs’ decision to purchase the company.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, jw childs, j.w. childs, sunny d
    
OneNeck IT Services
Published By: AT&T     Published Date: Jun 25, 2008
Class of Service (CoS) functionality can help optimize network performance. For a successful deployment, network designers should identify all applications, understand requirements associated with each application, designate appropriate mapping for groups of applications and provide mechanisms in the underlying network to deliver CoS. CoS mapping and deployment are important; adhering to tested strategies and avoiding common misconceptions helps IT managers advance optimization across the wide area network.
Tags : 
class of service, service management, traffic management, bandwidth, at&t, att, network performance management
    
AT&T
Published By: AT&T     Published Date: Jun 25, 2008
Whether you’re implementing new technologies, upgrading existing infrastructure or evaluating current needs, consultants can help you identify and document the gap between your current situation and a desired future state. When an assessment is done correctly, it can provide a solid foundation for successful implementation and improvement. The consultant first interviews stakeholders, analyzes data, and compares your business against best practices or specific industry competitors.
Tags : 
consulting, consult, consultant, management, expert, expertise, guidance, implementation
    
AT&T
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Telecom operations typically have sophisticated network and systems management (NSM) software in place to monitor their servers, workstations and routers. Such systems often utilize Simple Network Management Protocol (SNMP) as a means of transmitting and receiving network monitoring information. Great - if you run only modern equipment. 
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
As an equipment provider for worldwide, national and regional radio and television facilities, Transcom Corporation, headquartered in Huntingdon Valley, Pa., has been meeting the broadcasting capability needs of stations worldwide since 1978. Transcom specializes in distributing new TV transmitters, antenna, cable, Studio Transmitter Link (STL) and audio equipment that enable television and radio stations to transmit sound and video from the studio to the antenna.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Start   Previous    61 62 63 64 65 66 67 68 69 70 71 72 73 74    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.