info tech

Results 501 - 525 of 820Sort Results By: Published Date | Title | Company Name
Published By: Cumulus Networks     Published Date: Dec 30, 2016
As one of the fastest moving industries in terms of innovation and change, Information Technology is rife with predictions for what will be "the next big thing". Networking is undergoing a shift with the adoption of web-scale and open networking approaches. Fill out the form to the right to view our webinar and hear experts from Cumulus Networks, IPspace, and Facebook discuss their predictions for what will be the biggest changes and evolutions in data centers this year.
Tags : 
    
Cumulus Networks
Published By: Dell Software     Published Date: Sep 26, 2012
Manage a successful help desk!
Tags : 
help desk, information technology, end user, tracking issues, business technology
    
Dell Software
Published By: VeriSign Incorp.     Published Date: Oct 01, 2009
This 45-page e-Book gives you the tools you need to detect security vulnerabilities, build an information security strategy, and plan your investment in security technology.
Tags : 
verisign, phishing, extended validation, ev ss, ssl, encryption, online safety, online security, security solutions, security vulnerabilities, information security
    
VeriSign Incorp.
Published By: Skillsoft     Published Date: Oct 13, 2011
The IT department for Christiana Care Health Care Systems supports various projects throughout the health system that often require specialized training or expertise in particular IT areas, as well as project management skills. Following a recent reorganization and re-evaluation of job roles, the IT department needed to find a way to train existing staff quickly and cost-effectively to support various information technology needs.
Tags : 
skillsoft, technology, human resources, christiana care, health care systems, case study
    
Skillsoft
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Tags : 
trend micro, trend, e-discovery
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn, litigation, fines, personally identifiable information, pii, pci, payment card industry, phi, protected health information, pfi, personal financial information, pfi access control, audit
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: GoToMeeting     Published Date: Jun 09, 2010
This new Forrester white paper provides a snapshot of a typical day in the life of a U.S. information worker. It reveals how workers are employing new technologies and applications, interacting with their teams and engaging in mobile activities.
Tags : 
citrix gotomeeting, information worker, knowledge management, desktop computers, remote access employee
    
GoToMeeting
Published By: Microsoft Corporation     Published Date: Nov 08, 2010
This hosted solution helps organizations reduce the costs of managing and maintaining business systems, which frees information technology resources and enables staff to focus on initiatives that can deliver competitive advantage to the business.
Tags : 
microsoft online services, microsoft exchange, collaboration, productivity, sharepoint, live meeting, real time communication
    
Microsoft Corporation
Published By: Quark, Inc.     Published Date: Apr 28, 2011
Quark dynamic publishing software addresses the challenges of DITA by providing a friendly, familiar authoring interface based on Microsoft® Word.
Tags : 
quark, dita, pg bartlett, darwin information typing architecture, product documentation, technical publications, html, xml editing, cms, content management system, project management
    
Quark, Inc.
Published By: Quark, Inc.     Published Date: Apr 28, 2011
Download this white paper to learn how to deal with the challenge of delivering high-quality information and how to overcome the inherent limitations of traditional publishing techniques.
Tags : 
quark, compliance, high-quality, accessibility, traditional publishing, data integration, collaboration, personalization, dynamic publishing, ecm, enterprise content management
    
Quark, Inc.
Published By: Quark, Inc.     Published Date: Apr 28, 2011
Quark dynamic publishing software addresses the challenges of DITA by providing a friendly, familiar authoring interface based on Microsoft® Word.
Tags : 
quark, dita, pg bartlett, darwin information typing architecture, product documentation, technical publications, html, xml editing, cms, content management system, project management
    
Quark, Inc.
Published By: Quark, Inc.     Published Date: Apr 28, 2011
Download this white paper to learn how to deal with the challenge of delivering high-quality information and how to overcome the inherent limitations of traditional publishing techniques.
Tags : 
quark, compliance, high-quality, accessibility, traditional publishing, data integration, collaboration, personalization, dynamic publishing, ecm, enterprise content management
    
Quark, Inc.
Published By: Quinstreet - Infosec     Published Date: Jun 11, 2012
There are wide variations in the level of SIEM technology support for specific use cases, so understanding them is a prerequisite for selecting the best product in a given situation
Tags : 
    
Quinstreet - Infosec
Published By: IBM     Published Date: Dec 21, 2012
Recent Gartner research indicates that the confluence of information generated by new technologies and sources such as cloud computing will create a nexus of forces that could be even more disruptive than the dot-com and e-business booms of the 1990s
Tags : 
ibm, company, business intelligence, analytics, information, nexus of inforamtion
    
IBM
Published By: Silver Peak     Published Date: Feb 12, 2013
If you find yourself in need of a WAN optimization solution you’ll want to download this report to understand what’s new in the WAN optimization market, what vendors are the key players, and which products are most appropriate for your needs.
Tags : 
wan, virtualization, optimization, data center, network
    
Silver Peak
Published By: TIBCO     Published Date: May 15, 2013
According to Forrester, most organizations today are only using 12% of their available data and only 37% of organizations are planning some type of big data technology project. At a time when companies are seeing volume of information increase quickly, it’s time to take a step back and look at the impact of big data. Join Mike Gualtieri, Principal Analyst at Forrester, for this webcast exploring the importance of integration in your big data initiatives. Discover how your ability to operate, make decisions, reduce risks and serve customers is inextricably linked to how well you’re able to handle your big data. Continue on to gain insight into: •3 key big data management activities you need to consider •Technologies you need to create for your big data ecosystem •A multi-dimensional view of the customer is the holy grail of individualization •Overcoming key integration challenges And more!
Tags : 
big data, integration, architecture, database, data warehousing, operations management
    
TIBCO
Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, business technology
    
Intralinks
Published By: Intralinks     Published Date: Jan 16, 2015
As the tide of data continues to rise, the burden of protecting sensitive data and preventing security breaches can be crushing. This Forrester TechRadar ™: Data Security report provides a framework for developing a long-term approach to keeping your organization’s information secure. This TechRadar evaluates 20 of the key traditional and emerging data security technologies that can be used to support the key recommendations and best practices of Forrester’s Data Security and Control framework. Key Contents: - Why the Future of Data Security Matters - Why Do These 20 Technologies Appear in the TechRadar?- Most Tech is Still in the Early Stages
Tags : 
data security, sensitive data, secure information, control framework
    
Intralinks
Published By: TIBCO     Published Date: Aug 18, 2014
Digitalization—the process of exploiting digital information to maximize business success—has increased the value of your data to the point where it is arguably your most important asset. This paper explains why mastery will not be possible with merely adequate integration technology.
Tags : 
tibco, integration, data integration, business integration, business intelligence, intelligence, analytics, digitalization, information management, business technology
    
TIBCO
Published By: ReadyTalk     Published Date: Jul 07, 2016
Let’s face it, employees in Information Technology have a tough job. You’re the technical experts, responsible for hardware and software as well as business processes and sometimes project management. You’re also charged with being experts in communications, sales, marketing, psychology, counseling, and more just to get your company to adopt new ways of doing things or new technology. This is especially true when trying to deliver everything on time and on budget.
Tags : 
best practices, business optimization, business management, productivity, information technology, communication
    
ReadyTalk
Published By: Mitel     Published Date: Jun 29, 2016
After years of being chained to the old ideas of office productivity, businesses are realizing that liberated employees are empowered employees. When you free people from the tethers of the office, amazing things start to happen: productivity rises, borders and barriers disappear, innovation replaces enervation, and the quality of work improves as employees’ quality of life improves.
Tags : 
productivity, best practices, business intelligence, business management, information technology, solutions
    
Mitel
Published By: Demand Frontier     Published Date: Mar 03, 2016
Infographic showing the top 10 facts and figures regarding marketing and sales technologies.
Tags : 
marketing, business development, sales, business practices
    
Demand Frontier
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.