intralinks

Results 1 - 25 of 48Sort Results By: Published Date | Title | Company Name
Published By: Intralinks     Published Date: Feb 23, 2016
This report highlights a range of products to help address the collaboration challenge.
Tags : 
intralinks, mobile, enterprise, collaboration
    
Intralinks
Published By: Intralinks     Published Date: Feb 23, 2016
To explore the impact of evolving data privacy regulations and data sovereignty, Ovum was commissioned in Q3 2015 by Intralinks to conduct an international survey of 366 IT decision-makers.
Tags : 
intralinks, data privacy, ovum, data security, data management
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
Download this detailed, insightful article and follow Volterra Fietta’s journey to their “just right” solution.
Tags : 
intralinks, mwd, volterra fietta, goldilocks zone, security, file sharing, information rights, networking, business technology
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
There are multiple options for organizations with intellectual property and restricted information that must be shared between staff and business partners to adopt in order to avoid inadvertent release of restricted information to unauthorized personnel.
Tags : 
kuppingercole, information sharing, security, data, intralinks, business technology
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
This report focuses on the use of CFSS tools in the workplace, the problems that their use causes, and it offers several recommendations as well as data from an in-depth survey on file-sharing practices conducted by Osterman Research during July 2015.
Tags : 
osterman, enterprise, file sync, share solutions, file-share, cfss, efss, networking, knowledge management
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
Use this guide to clarify the process, and move toward the right solution.
Tags : 
enterprise, intralinks, collaboration, security, data, knowledge management, business technology
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
intralinks, security, data, threat, business technology
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns.
Tags : 
intralinks, content, security, data, regulatory, information, management, it management
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
Download this research report now to find out the extent of the risk associated with unsecure file sharing, the individual behaviors driving and organizational responses to information loss and the key considerations for securing information in the collaborative enterprise
Tags : 
intralinks, file sharing, security, data, data management, business technology
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
Download this white paper to learn how Intralinks VIA for Financial Services can help you control your communications with regulators and other third parties.
Tags : 
intralinks, financial services, financial crisis, compliance requirements, financial protection, business technology
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
Download this white paper to learn more about Intralinks VIA™ for Managing Regulatory Examinations.
Tags : 
intralinks, regulatory examinations, via, data, information, it management, knowledge management
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
This Buyer’s Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as infrastructure and extended collaboration, including Information Rights Management (IRM).
Tags : 
intralinks, infrastructure, information rights management, data management, business technology, data center
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015
Tags : 
intralinks, security, data, threat, business technology
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns.
Tags : 
intralinks, content, security, data, regulatory, information, management, it management
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
Download this research report now to find out the extent of the risk associated with unsecure file sharing, the individual behaviors driving and organizational responses to information loss and the key considerations for securing information in the collaborative enterprise
Tags : 
intralinks, file sharing, security, data, data management, business technology
    
Intralinks
Published By: Intralinks     Published Date: Oct 14, 2015
A quick-reference guide to defining your organization’s collaboration needs – and finding the right vendor to meet them.
Tags : 
enterprise, intralinks, collaboration, security, data, knowledge management, business technology
    
Intralinks
Published By: Intralinks     Published Date: Oct 14, 2015
Download this detailed, insightful article and follow Volterra Fietta’s journey to their “just right” solution.
Tags : 
intralinks, mwd, volterra fietta, goldilocks zone, security, file sharing, information rights, networking, business technology
    
Intralinks
Published By: Intralinks     Published Date: Oct 14, 2015
There are multiple options for organizations with intellectual property and restricted information that must be shared between staff and business partners to adopt in order to avoid inadvertent release of restricted information to unauthorized personnel. This document will help in the selection of an optimal solution.
Tags : 
kuppingercole, information sharing, security, data, intralinks, business technology
    
Intralinks
Published By: Intralinks     Published Date: Oct 14, 2015
This report focuses on the use of CFSS tools in the workplace, the problems that their use causes, and it offers several recommendations as well as data from an in-depth survey on file-sharing practices conducted by Osterman Research during July 2015.
Tags : 
osterman, enterprise, file sync, share solutions, file-share, cfss, efss, networking, knowledge management
    
Intralinks
Published By: Intralinks     Published Date: Aug 28, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations.
Tags : 
it management, knowledge management, data management, business technology
    
Intralinks
Published By: Intralinks     Published Date: Aug 28, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes.
Tags : 
it management, knowledge management, data management, business technology
    
Intralinks
Published By: Intralinks     Published Date: Aug 28, 2015
In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
it management, data management, business technology
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
The truth is that they can get a lot worse – and no one is immune. Your company’s data has never been at greater risk. There is no doubt that 2014 was a dire year for many organizations, as they failed to properly protect their computer systems and the data held upon them. As if it wasn’t bad enough keeping on top of new zero-day vulnerabilities, targeted attacks, and revelations of state-sponsored espionage, users are potentially exposing companies’ most important data by not following best practices and using consumer-grade cloud services that aren’t built with enterprise needs in mind. An ever more mobile workforce wants to work on their files remotely but may be taking dangerous risks with sensitive corporate data at the same time. In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
    
Intralinks
Previous   1 2    Next    
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.