control

Results 2051 - 2075 of 2111Sort Results By: Published Date | Title | Company Name
Published By: Lieberman Software     Published Date: Mar 27, 2012
Download "Privileged Identity Management: An Executive Overview" to learn where privileged identities can be found on your network; the challenges to discover, secure and manage them; and why unsecured privileged account credentials are dangerous.
Tags : 
privileged identity management, enterprise password management, administrator access control, privilege account management, security management, it security audit, enterprise security
    
Lieberman Software
Published By: Visible Technologies     Published Date: Jul 24, 2009
The impact of the social conversations has dramatically increased. More than 133 million blogs have been indexed since 2002. Twitter has doubled in size this year alone to roughly 30 million users, who create 1,500 new "Tweets" every second. Facebook's 35-year-old-plus demographic grew to 12 million users in the first quarter of 2009. But that's only part of the story. The results from search engines are even more important. 2,300 searches are performed every second of every day.
Tags : 
social networking, digital age, reputation, social networking, visible technologies, facebook, twitter, youtube, blog, blogs, wiki, communication, control conversations, reputation management, web 2.0, media channels, collaboration, collaborative, alerts, saas
    
Visible Technologies
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.
Published By: RackSpace Hosting     Published Date: Feb 17, 2010
Managed Colocation, is the hosting choice of many businesses because it provides the desired level of control while offloading some of the inconvenience, financial risk and upfront capital.
Tags : 
rackspace managed colocation, platform hosting, traditional colocation, web hosting, networking, cloud computing
    
RackSpace Hosting
Published By: Intacct Corporation     Published Date: Jan 02, 2014
If you need better reporting, more automation, tighter internal controls, and greater visibility into your operations, it may be time to switch to a new accounting system. If you're like most small businesses, you've been using QuickBooks to manage your company's financials. It's well known. It's easy. It works. And it offers the functionality a business needs when it's starting out. But if your business has moved beyond the entry level, you may find you're doing more outside of QuickBooks—which is affecting your organization's productivity. If you need better reporting, more automation, tighter internal controls, and greater visibility into your operations, it may be time to switch to a new accounting system. How can you be sure? Discover why now's the time to graduate to a new financial management and accounting system.
Tags : 
quickbooks, new accounting system, small business, company financials, financial management, accounting system, cloud computing, automation, business technology
    
Intacct Corporation
Published By: Infoblox     Published Date: Nov 07, 2013
Attacks on the computing infrastructure directly impact network management teams. Security is also a network management issue. This paper explains how your network management team is key to securing your business against cyber-attacks.
Tags : 
infoblox_dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns, domain_name_server, dhcp, dynamic_host_configuration_protocol, ipam, ip_address_management, internet_protocol_address_management, ddi, dns server, dhs_dhcp_server, network_control, network_automation, network_availability
    
Infoblox
Published By: Tripwire     Published Date: Jun 30, 2009
Learn the 5 core competencies of compliance and how to institute an automated compliance solution.
Tags : 
tripwire, banking, confidence, institution, regulatory, compliance, automated, solution, system, institution, change, documentation, control, security, audit, accountability
    
Tripwire
Published By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institute’s 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection, security network, networking, software development
    
Venafi
Published By: EVault Inc.     Published Date: Aug 22, 2012
Learn best practices for guarding your endpoint corporate data so you can mitigate the risk of regulatory and financial exposure, and more. This white paper explores: . Defining security policies for endpoint backup and recovery . Enforcing endpoint controls . Ensuring employee adoption . Keeping IT costs in check
Tags : 
white, paper, best, practices, for protecting, laptop, data, endpoint, corporate, risk, regulatory, financial, exposure, security, policies, backup and recovery, storage, data center
    
EVault Inc.
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
The popularity of integration platform as a service (iPaaS) started with business users looking to gain control and share data among their proliferating SaaS apps?without needing IT intervention. iPaaS was then adopted by IT to support business users to ensure security measures were being maintained and to provide more of a self-service environment. Now, iPaaS has evolved from a niche solution to taking a much bigger role: Read this whitepaper to learn about: Drivers for cloud integration Five emerging uses cases for iPaaS that enable better responsiveness, APIs, event-driven capabilities, human workflows, and data analysis Questions to ask when evaluating your current solution
Tags : 
    
TIBCO Software APAC
Published By: Skillbridge Training     Published Date: Sep 20, 2013
What was once considered futuristic science fiction, Cyber warfare is now today’s reality. Whether in the form of unmanned drones controlled by an operator thousands of miles away from a target, or viruses that travel that same distance in a nanosecond, like it or not, the cyber domain is the next war front.
Tags : 
    
Skillbridge Training
Published By: Centrify     Published Date: May 26, 2016
In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service.
Tags : 
security, endpoint security, access control, authentication
    
Centrify
Published By: CrowdStrike     Published Date: Aug 01, 2017
Download this white paper to learn:?The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence?How fileless attacks exploit trusted systems —the types of processes compromised, the specific exploit tactics used to gain a foothold, and more?Why traditional technologies fail to protect against fileless attacks and what you can do to better defend your organization against them
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks will be subsiding anytime soon. Read this white paper to get the important information you need to successfully defend your company against stealthy fileless attacks. Download this white paper to learn: • The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence • How fileless attacks exploit trusted systems — the types of processe
Tags : 
    
CrowdStrike
Published By: Citrix Systems     Published Date: Nov 10, 2014
Today’s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce costs and datacenter sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, data management
    
Citrix Systems
Published By: Box     Published Date: Nov 24, 2015
The adoption of enterprise content collaboration solutions has exploded as individuals sought ways to easily access, manage, and collaborate on content. Accordingly, businesses want to leverage those easy-to-use solutions but can’t compromise when it comes to enterprise-grade administrative control, security, and business insights.
Tags : 
box, dropbox, business, productivity, collaboration, content, enterprise, knowledge management, data management, business technology
    
Box
Published By: HotSchedules     Published Date: Aug 14, 2017
Well-run restaurants go beyond just creating schedules and take the extra steps to optimize labor, manage compliance and engage with employees. Successful restaurant managers and operators take extra steps to manage labor, including mastering scheduling. In this ebook we will walk you through tried and true best practices so you are better prepared to: Improve Sales Performance and Guest Satisfaction Control Labor Costs Optimize Staff Productivity Attain Company Goals Reach Your Professional Goals
Tags : 
    
HotSchedules
Published By: Forcepoint     Published Date: Apr 20, 2016
This will appear under the headline in some cases; in other cases, just the long description will appear. Both descriptions should work independently of each other and not be super redundant if possible: Relying on point products to protect your network is a losing strategy. Having tools than your IT team can handle raises costs, complexity and risk. Deploying enterprise security architecture with control over enforcement, coordination, end-to-end visibility and process automation from a single pane of glass, is the winning approach.
Tags : 
security, security protection, security architecture, security, protection
    
Forcepoint
Published By: Auditrax     Published Date: Jun 28, 2011
Benefits of Procurement Audits for Private Equity Firms & Portfolio Companies
Tags : 
accounts payable audit, cash flow, recovery audit, procurement audit, financial audit, audit, accounts payable, business solutions, private equity, controller, cfo
    
Auditrax
Published By: Astaro     Published Date: Aug 10, 2009
Previously, the network at the City of Lake Wales didn't possess any firewalls, intrusion protection or web filtering solutions. As a result the network, which is spread out to multiple locations (including law enforcement), was left wide open to security breaches and caused system performance problems as users unwittingly picked up spyware and malware.
Tags : 
astaro, security, gateway, cisco pix, web filtering, intrusion protection, firewall, firewalls, network, spyware, malware, astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine lake wales, failover
    
Astaro
Published By: Project Success, Inc.     Published Date: Jun 23, 2008
For some projects, tracking actuals is unnecessary or is not worth the effort required. In other cases, however, tracking actual costs and resource usage is an essential aspect of the project control function. Why then is tracking actual costs and resource usage on a project ever worth the effort required to accomplish it?
Tags : 
project management, project success, psi
    
Project Success, Inc.
Published By: VMware AirWatch     Published Date: Feb 21, 2017
More organizations are choosing Horizon 7 over Citrix XenDesktop and XenApp because Horizon offers a more comprehensive and feature-rich solution. The three key architectural advantages that Horizon has over Citrix are a trusted platform, flexible delivery options, and workspace environment management. Download this whitepaper to learn how VMware Horizon® 7 helps IT manage, control, and protect all Windows resources at the speed required and with the efficiency that business demands, delivering desktops and applications through a single platform to end users anytime, anywhere, on any device.
Tags : 
    
VMware AirWatch
Published By: F5 Networks Inc     Published Date: May 03, 2017
Building out a dedicated infrastructure with the agility, scalability, and effciency of a public cloud—while enjoying increased levels of control and security—can help enterprises boost agility and improve operational ef?ciency. However, while most private cloud networking services provide basic load balancing functionality, they lack important application delivery features, putting the performance, availability, and security of applications at risk. As private clouds increasingly host mission-critical production applications, advanced application delivery services for layers 4 through 7 are becoming essential. End-to-end integration, orchestration, and automation of the needed application delivery networking and security services are also critical to improve application time-to-market and operational ef?ciency.
Tags : 
cloud, cloud security, efficiency, security, public cloud
    
F5 Networks Inc
Published By: Juniper Networks     Published Date: Feb 05, 2018
Data center requirements are shifting as the business environment evolves to leverage new technologies. Organizations are turning to multicloud environments comprising a mix of private cloud, public cloud, and on-premise infrastructure to best address their unique needs. Understandably, this shift is putting a renewed emphasis on security, automation, orchestration, and agility. IT leaders are responding by building and deploying multicloud data center networks that leverage automation and software-defined networks (SDN) as a cost effective means of providing dynamic network control. Of course, while many organizations are recognizing the need for a data center upgrade, not all have the same drivers. All, however, need to make a business case for the investment. Here are four common inflection points that can help you to justify the need for data center upgrades that support business goals.
Tags : 
network, performance, data, security, efficiency, iot
    
Juniper Networks
Published By: Cambium Networks     Published Date: Nov 17, 2016
Today’s cloud-based controllers provide scalable, reliable management, while reducing time spent by administrators on hardware installation and maintenance.
Tags : 
cambium networks, wifi, wireless deploy, cloud, cloud managed, networking
    
Cambium Networks
Start   Previous    71 72 73 74 75 76 77 78 79 80 81 82 83 84 85    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.