bsp

Results 276 - 300 of 410Sort Results By: Published Date | Title | Company Name
Published By: VeriSign Incorp.     Published Date: Jul 13, 2009
Enhance your online brand with trusted security from VeriSign.  In this paper you will gain insights on how to encrypt sensitive information and help improve customer confidence. Learn more today!
Tags : 
verisign, phishing, extended validation, ev ssl, ssl, encryption, online safety, online security, security solutions, trust, seucrity
    
VeriSign Incorp.
Published By: VeriSign Incorp.     Published Date: Jul 13, 2009
Online visitors are becoming ever so wary about transacting online.  One way to reassure them about transacting on your site is to make sure you have the latest in SSL on your site.  Read this guide to learn about the latest in SSL. Learn more today!
Tags : 
verisign, trust, seal, trust mark, ssl, extended validation (ev) ssl
    
VeriSign Incorp.
Published By: Solidcore     Published Date: Jan 07, 2008
Demonstrating ROI for service management investments can be difficult, especially with multi-phase deployments like ITIL that can require significant up-front investment in exchange for returns produced in the future.  Learn how setting milestones and measuring the value of each phase of an ITIL implementation can help prove the project’s value and shape its focus.
Tags : 
itil, roi, service, service management, solidcore, return on investment, cmdb, change management, configuration management
    
Solidcore
Published By: HP SAS     Published Date: Sep 24, 2008
Designed for CIOs, IT managers, data center managers and grid computing architects seeking to improve performance, SAS Grid Computing on the HP BladeSystem. C-Class helps accelerate growth and mitigate risks with a simplified, consolidated infrastructure that’s agile enough to efficiently handle change. SAS Grid Manager on HP BladeSystem can lower costs through automation, virtualization and improved IT efficiency.   Download  HP's "Quick Sizing Guide for SAS Grid running on HP BladeSystem and EVA Storage" to learn more about the equipment needs to deploy SAS Grid Manager on HP BladeSystem.
Tags : 
hewlett packard, bladesystems, grid manager, grid computing, polyserve matrix, eva storage, data management
    
HP SAS
Published By: IBM Corporation     Published Date: Sep 20, 2010
This IBM® Redguide™ publication provides a high level overview of the new IBM WebSphere® CloudBurst™ Appliance, including current issues being faced in the information technology (IT) industry and how WebSphere CloudBurst can address many of these issues.
Tags : 
application servers, enterprise software, ibm websphere, application server, middleware, cloudburst appliance, server provisioning
    
IBM Corporation
Published By: SAP     Published Date: Jun 22, 2009
Traditional BI solutions face many obstacles and limitations.  However, the need for timely and succinct business intelligence (BI) continues to grow.  
Tags : 
sap, dashboard, dashboards, business intelligence, business solutions, integration, ziff davis, live data, it solutions, data management, interactivity, c-level, accurate information, information
    
SAP
Published By: Nemx Software Corporation     Published Date: Oct 23, 2007
Email compliance, security and content policy enforcement is a growing priority for all organizations.  Email content control solutions provide real-time scanning of email traffic and provide the foundation for proactive enforcement of regulatory and corporate policies.  However, the administrative burden associated with policy management imposed by most such products is significant.
Tags : 
email security, security management, policy administration, policy management, policy-based, policy based, email compliance, compliance, nemx
    
Nemx Software Corporation
Published By: DataSynapse     Published Date: Feb 26, 2007
High availability (HA) configurations seek to bring downtime to zero - but can increase complexity across the IT organization, often in the form of excess technology, financial, and human capital investments.  Learn how application virtualization can reduce planned and unplanned downtime, and deliver greater flexibility.
Tags : 
high availability, it management, productivity, total cost of ownership, return on investment, configuration management, flexibility, data synapse, datasynapse
    
DataSynapse
Published By: IBM     Published Date: Apr 07, 2015
Future proof your investment with IBM WebSphere - Your gateway to cloud, mobile and Internet of Things.
Tags : 
ibm, websphere, cloud, mobile, analytics, iot, tibco, migrate, solutions
    
IBM
Published By: IBM     Published Date: Jul 10, 2009
A complex IT infrastructure is a stumbling block for many businesses seeking greater agility in these uncertain times. This white paper shows how a service oriented architecture (SOA) helps align the infrastructure with business needs in order to achieve maximum flexibility.
Tags : 
soa, service oriented architecture, ibm smart soa, it infrastructure, integration, websphere, change management, costs, connectivity, messaging-oriented middleware, mom, middleware, api, application programming interface, enterprise service bus, esb, web services description language, wsdl, java, it management
    
IBM
Published By: RiskWatch     Published Date: Jan 17, 2007
Risk assessment is the cornerstone of security.  The risk assessment process includes gathering information about the assets of the organizations, including all information assets, and all physical assets.
Tags : 
risk assessment, compliance assessment, risk management, security, it management, security management, infrastructure, vulnerability, intrusion detection, ids, risk, riskwatch
    
RiskWatch
Published By: Secure Computing     Published Date: Feb 20, 2008
Reputation systems add a critical first line of advanced protection to help organizations accurately detect and block all types of threats to their messaging, web, and network environments.  In simplest terms, deploying a reputation service at the network edge is analogous to having a peephole in the front door of your house.  You let in people you know and trust, question the ones you don’t know and shun the ones who look suspicious.  Just by taking these simple measures you reduce your risk.
Tags : 
it spending, whitelist, whitelisting, email security, spam, antispam, cast iron, castiron, roi, storage
    
Secure Computing
Published By: Landslide Technologies     Published Date: Apr 21, 2008
What sales is has not changed. How sales are accomplished is changing radically. In this first of a two-part whitepaper,  we present an overview of the state of sales today, supported by metrics from our 2007 Sales Performance Optimization survey.  The differences between S1.0 and S2.0 are represented in the comparison between old-style circus companies and  the modern circus (think Ringling Bros. vs. Cirque du Soleil).
Tags : 
sales, sales 2.0, landslide, crm, metrics
    
Landslide Technologies
Published By: LandslideCRM     Published Date: May 17, 2012
What sales is has not changed. How sales are accomplished is changing radically. In this first of a two-part white paper,  we present an overview of the state of sales today, supported by metrics from our 2007 Sales Performance Optimization survey.  The differences between S1.0 and S2.0 are represented in the comparison between old-style circus companies and  the modern circus (think Ringling Bros. vs. Cirque du Soleil).
Tags : 
sales, sales 2.0, landslide, crm, metrics
    
LandslideCRM
Published By: Vocus, Inc     Published Date: Dec 16, 2008
Identify ways to increase rankings in search engines and drive traffic to your website.  Get tips to optimize your press releases for search engines—reach a broader audience, deliver your message & drive traffic to your website.
Tags : 
seo press release, seo press releases, optimized press release, vocus, search engine optimization
    
Vocus, Inc
Published By: Guardian Digital     Published Date: Oct 02, 2007
Guardian Digital's EnGarde Secure Linux is the world's premier secure operating platform engineered from Open Source Technologies.  Written in an easy to read, plain-language format, you will get introduced to the full range of benefits that makes EnGarde "Secure By Design."
Tags : 
open source, open source security, network security, adaptability, security management, email security, guardian digital, digital guardian
    
Guardian Digital
Published By: Clearswift     Published Date: Jun 09, 2008
This white paper provides a comprehensive look at spam; from its early days to where we are today in terms of managing the daily threats.  With a strong policy, education and policy enforcement, and a multi-layer content security solution, organizations can address every kind of threat to its networks and its business; regardless of whether the threats are inbound or outbound.
Tags : 
clearswift, network security, internet security, web security
    
Clearswift
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Gaining the trust of online customers is vital for the success of any company that transfers sensitive data over the Web. When shopping online, consumers are concerned about identity theft and are therefore wary of providing untrusted sources with their personal information, especially their credit card details. Other types of online businesses require different but equally sensitive information. People are reluctant to provide their national insurance numbers, passwords, or other confidential personal information, or sometimes even just name, address, and phone number. Perhaps the information will be intercepted in transit, they fear, or perhaps the destination itself is manned by imposters with ill intent.  The result is an abandoned transaction.
Tags : 
security, ssl, trust, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption, secured seal, extended validation, extended validation ssl, extended validation ssl certificates, extended validation ssl certificate, extended validation certificate
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Nixu     Published Date: Nov 06, 2006
This white paper is an overview of the Nixu Security System and the various security principles it encompasses.  Topics discussed include security design, application security, OS hardening, patch management, and more.
Tags : 
network security, patch management, firewall, intrusion prevention, application security, security management, nixu
    
Nixu
Published By: YouSendIt     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report
    
YouSendIt, Inc.
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
Sephora is a leading retail beauty chain selling more than 8,000 unique products and 250 brands of perfume and premium cosmetics.  A fully owned subsidiary of the world’s leading luxury products company, LVMH Moët Hennessy Louis Vuitton, Sephora operates 500+ stores in 14 countries worldwide, with an expanding base of more than 125 stores across North America where it is the largest retailer of perfume and cosmetics.
Tags : 
neolane, sephora, direct mail campaigns, increase response rates, reduce campaign analysis time, spss integration, crm software, custom content, deliverability, e-commerce, email marketing, emerging marketing, international marketing, lead generation, rich media
    
Neolane, Inc.
Published By: Genesys     Published Date: Aug 13, 2009
Your company likely has a contact center that efficiently and effectively handles customer interactions via telephone calls as well as through channels such as text chat, SMS, and e-mail. Yet are you aware that the contact center handles just a fraction of the activities that impact the customer experience throughout your business?
Tags : 
genesys, conferencing, text chat, sms, e-mail, email, customer experience, contact center, voip, service delivery optimization, lob, line-of-business, sla, service level agreement, backlog, websphere, backlog, workload distribution, iwd, customer interaction management
    
Genesys
Published By: IBM     Published Date: Apr 23, 2008
Imagine using your personal desktop on any computer. You can, with the IBM Virtual Client Solution. This demo explains the backend process of server-hosted services, shows how a user’s desktop is delivered through a remote connection, and demonstrates how an administrator can shift servers for IT simplification without interrupting users.  Watch the demo now.
Tags : 
ibm, ibm opt it, opt it, remote desktop, vnc, virtual client, virtual machine, virtual desktop, remote access
    
IBM
Published By: SubscriberMail     Published Date: Dec 12, 2008
If you’ve ever heard George Carlin’s famous “Seven Dirty Words” you can’t say on TV, you can safely avoid using all seven in your subject lines – they will definitely get you blocked. Here is a list of 100 more that you should avoid using as well. Top 100 words NOT to use in your subject  lines.
Tags : 
email marketing, subscribermail, spam words, junk words, subject line titles
    
SubscriberMail
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.