protect

Results 1 - 25 of 3165Sort Results By: Published Date | Title | Company Name
Published By: (ISC)²     Published Date: Oct 15, 2010
A four-step approach to establishing leading data protection practices.
Tags : 
isc2, data leak, protection planning, data protection, cloud computing, security, employee
    
(ISC)²
Published By: 123Together     Published Date: Sep 19, 2008
Today's economy is especially hard on small businesses. How does your small business keep revenue coming in when your customers are spending less? How do you attract new customers in a cost efficient manner? How do you protect your businesses' valuable information assets without making a huge technology investment?
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services
    
123Together
Published By: Aberdeen Group     Published Date: Jun 02, 2011
The focus of this document is to quantify the cost of IT-induced business downtime.
Tags : 
aberdeen, datacenter uptime, roi, disaster recovery, best-in-class, industry average, laggard, sla, service level agreement, business continuity, business interruptions, cost of downtime, data protection
    
Aberdeen Group
Published By: Aberdeen Group     Published Date: Jun 02, 2011
Aberdeen has ascertained that companies that backup critical data and systems at remote locations have a faster recovery time from computer-generated business interruptions.
Tags : 
aberdeen, disaster recovery, business disruption, remote data storage, data archiving, data protection
    
Aberdeen Group
Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user, data regulation, encryption
    
Absolute Software
Published By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : 
absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
View this flash demo to see Absolute in action and how you can monitor installed software/hardware and track location and take action if device is lost or stolen.
Tags : 
absolute, computrace, secure, tracking, security, manage, protect
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace, laptop
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 14, 2012
Kansas City, Kansas Public Schools looked to establish a 1:1 computing program that would provide 6,000 Apple computers to its students and teachers. Find out more in this case study!
Tags : 
kansas, kansas city, education, public schools, computrace, 1:1, education, absolute
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
IT leaders today are reinventing their infrastructure to support a mobile workforce and a complex array of connected devices. Against this backdrop of mobility and connectivity, Healthcare IT is tasked with meeting compliance challenges in an intricate and transformational regulatory environment. With a host of new data protection regulations and increasingly high settlement fees for data breaches, data security has never been more important to Healthcare organizations
Tags : 
mobility, mobile computing, best practices, data security
    
Absolute Software
Published By: Absolute Software     Published Date: May 14, 2014
Three simple steps to legally secure and manage employee-owned devices within a corporate environment
Tags : 
byod, workforce mobility, enpoint protection, mobile devices, absolute software
    
Absolute Software
Published By: Absolute Software     Published Date: May 14, 2014
Based on the reality of the changing workforce, Absolute Software provides the top four reasons IT should re-evaluate their endpoint protection strategies.
Tags : 
endpoint protection stategy, byod, workforce mobility, absolute software, own device
    
Absolute Software
Published By: Absorb     Published Date: May 10, 2018
In a business environment where being able to build and maintain a solid brand reputation and lasting relationships with your customers is essential for ongoing success, effective compliance training for team members is critical. Assembling quality course content, either through purchasing off-the-shelf compliance courseware or developing training material in-house or in partnership with an external developer, and delivering that material in a consistent manner, can help protect your organization and minimize the damage from compliance transgressions.
Tags : 
elearning, training, business, brand, reputation, relationship, building
    
Absorb
Published By: Accelrys     Published Date: Feb 08, 2012
This Perspective highlights Accelrys' Biological Registration, a new product solution with the ability to more effectively register, track, and manage promising biologics, resulting in more efficient biological product development. Find out more!
Tags : 
accelrys, idc, biological, registration, research, r&d, tracking, biologics, product development, protect discoveries, drugs to market, drugs
    
Accelrys
Published By: Acquia     Published Date: Aug 03, 2009
Not doing Social Publishing? You’re behind. Social technologies on the web have changed forever how organizations of all sizes interact with their customers to gather feedback, improve customer service, and protect and grow their brands. Effective web content management must now include social and community capabilities.
Tags : 
social publishing, acquia, customer service, brands, web content, social media, publishing, publish, journalism, blog, blogging, rich content, myspace, facebook, orkut, meebo, wikis, forum, tagging, twitter
    
Acquia
Published By: AcquireWeb     Published Date: Jan 22, 2007
This article addresses one of the biggest challenges associated with e-mail marketing programs – establishing meaningful contact with customer targets in order to increase sales, while protecting and enhancing your brand. It illustrates that successful e-mail marketing designed to drive sales and build brands requires adopting a methodology that includes more precise prospect targeting, better permission-based models, a better overall consumer experience and better quality lists.
Tags : 
email marketing, best practices, permission marketing, brand management, direct marketing, newsletter design, acquireweb, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing, franchise marketing, acquisition marketing
    
AcquireWeb
Published By: Acronis     Published Date: Apr 28, 2011
Based on Acronis' patented disk imaging and bare metal restore technologies, Acronis® Backup & RecoveryT 10 Advanced Server Virtual Edition is the next generation of the Acronis True Image family of products, engineered specifically for virtualized environments. Acronis Backup & Recovery 10 Advanced Server Virtual Edition enables organizations of all sizes to extend the cost-saving benefits of virtualization by protecting virtual machines running on a single physical host for a low, fixed price.
Tags : 
acronis, backup and recovery, 10 advanced server virtual edition, patented disk imaging, bare metal restore, true image, disaster recovery, remote server
    
Acronis
Published By: Acronis     Published Date: Dec 28, 2011
Taneja Group recently carried out a competitive assessment to put Acronis vmProtect 6 against Veeam in a head to head shoot-out. vmProtect 6 delivered across the board - demonstrating better simplicity, higher performance, and lower resource consumption.
Tags : 
virtualization, virtualization software, disaster recovery, backup virtual machines, vmware backup, p2v, vmware data recovery, backup virtual server, virtualization backup, virtual backup, server migration, migrate from physical to virtual, v2v, migrate from virtual to virtual, acronis, veeam, vmprotect, acronis vmprotect, vm protection
    
Acronis
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.