• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

abs

Results 351 - 375 of 492Sort Results By: Published Date | Title | Company Name
By: InMage     Published Date: Feb 24, 2009
This paper describes a series of tests run to determine the viability of continuous data protection (CDP) using InMage DR Scout along with Agami Systems AIS 3000 series of unified storage systems.
Tags : 
inmage, dr scout, accenture, cdp, continuous data protection, agami systems ais 3000, backup, data management, disaster recovery, network file systems, nfs, common internet file systems, cifs, raid, backup and recovery, data protection, database security
    
InMage
By: Cornerstone OnDemand     Published Date: Oct 13, 2017
The majority of training and performance management processes don’t lead to more skilled and productive employees. So what’s different about the ones that do? Download our brief, The Absolute Must-Do’s to Build an Agile Organization, and learn: • How to increase employee productivity by 37% • What separates world-class learning and performance from ho-hum • Real business examples of this in action
Tags : 
    
Cornerstone OnDemand
By: GoToMeeting     Published Date: Jul 08, 2011
In 2.7 seconds, a prospect will decide whether to read, forward or delete your email. (How are we doing so far?) This new eBook by Jill Konrath, sales strategist and author, explores how to craft an email message that grabs the attention of prospects and compels them to continue the conversation.
Tags : 
citrix, sales, email prospecting campaign, ebook, jill konrath, value proposition, snap factors, credibility, bad email, good email, email blast, crafting effective prospecting emails
    
GoToMeeting
By: GoToMeeting     Published Date: Oct 06, 2011
Want to connect with today's phone-averse, time-starved prospects? Use email. Sure, most emails get deleted upon arrival, but that's because most emails aren't written right. Watch this on-demand webinar to learn from sales expert Jill Konrath as she explores how to craft an email message that grabs the attention of prospects and compels them to continue the conversation.
Tags : 
citrix, marketing, prospects, email, email marketing, webinar
    
GoToMeeting
By: Cisco     Published Date: Feb 17, 2015
Analyst brief brought to you by NSS Labs. Where the goal of cyberprevention has been to reduce the probability of an attack against the organization, cyber resilience looks to reduce the impact of these attacks through cyber risk management. A cyber resilience program still considers detection and prevention techniques, but it also assumes that a breach is likely. This stance emphasizes anticipation, agility, and adaptation. Not every attack can be prevented, but with a cyber resilience program, damage can be mitigated or avoided altogether.
Tags : 
cisco, nss, cyber, prevention, risk management, resilience, firewall, security, protection, epp, breach, cyberattack, operations, network, best practices
    
Cisco
By: Esker     Published Date: Dec 19, 2016
In today’s highly competitive business environment, many organizations are expanding through mergers and acquisitions (M&As). Unfortunately, success comes at a cost. Growth via M&A activity often involves absorbing disparate ERP applications, which, over time, can create significant inefficiencies — particularly in the accounts payable (AP) department. The good news is, AP automation is emerging as an end-to-end solution that forward-thinking organizations can use to eliminate AP-related silos and maximize their market potential. Businesses with a complex ERP environment have several choices when it comes to AP automation solutions. This white paper is intended to assist AP and finance leaders, along with ERP system administrators, in evaluating their options, simplifying the decision-making process, and getting the absolute most out of their AP automation investment.
Tags : 
    
Esker
By: IBM     Published Date: Jan 09, 2014
Simply put, software defined storage is the abstraction of storage services from storage hardware. This term is more than just marketing hype, it’s the logical evolution of storage virtualization from simply being a storage aggregator to the end goal of storage as a service. To achieve this goal, software defined storage needs a platform from which to centralize.
Tags : 
ibm, storage switzerland, storage platform, sds, software defined storage, data center, storage virtualization, data protection, shared storage, storage capacity, centric systems, high performance databases, storage efficiency, range of solutions, vendor options, volume management, software selection, data service, data management, performance loss
    
IBM
By: Cisco     Published Date: Apr 08, 2015
NSS research indicates that NGFW devices are typically deployed to protect users rather than data center assets, and that the majority of enterprises will not tune the IPS module separately within their NGFW. Therefore, NSS evaluation of NGFW products is configured with the vendor pre-defined or recommended,“out-of-the-box” settings, in order to provide readers with relevant security effectiveness and performance dimensions based upon their expected usage.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution, security, data management
    
Cisco
By: McAfee     Published Date: Feb 08, 2013
NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.
Tags : 
mcafee, epp, endpoint, protection, threats, malware, nss, hacker detection, intrusion prevention, phishing, data protection
    
McAfee
By: Cisco     Published Date: Dec 19, 2016
NSS Labs performed an independent test of the Cisco Firepower 8120 with NGIPS v6.0 and Advanced Malware Protection v5.3.2016071117. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v3.0, available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : 
    
Cisco
By: Markforged     Published Date: Sep 14, 2018
3D printed composite parts are said to be up to 23x stronger than ABS, giving you the reliability you need to keep production lines running smoothly. Request your sample part today, and test the strength yourself.
Tags : 
markforged, 3d printing, composite parts, 3d printers, manufacturing tools, infrastructure, internetworking hardware, product lifecycle management, project management, information management, productivity, manufacturing execution systems
    
Markforged
By: IBM     Published Date: Feb 11, 2015
Safety certification for avionics hardware and software is an expensive, complicated process, but absolutely necessary to ensure safe skies for commercial aircraft passengers and military jets flying in the national airspace. Now unmanned aircraft flight critical electronics will also have to meet these same safety requirements as the U.S. Federal Aviation Administration (FAA) starts to open up the national airspace to unmanned aerial systems (UASs). While the rules are still being drawn up, embedded software and hardware designers are already looking at ways for UAS platform integrators to solve certification challenges and manage the process of compliance with safety certification standards such as DO-178B & C. This webcast of industry experts will discuss how to enable safety certification of UAS platforms through efficient and cost-effective solutions.
Tags : 
uas platforms, safety certification, avionics hardware, cost-effective solutions, certification challenges, it management, platforms, business analytics, business intelligence
    
IBM
By: Cornerstone OnDemand     Published Date: Feb 05, 2018
The majority of training and performance management processes don’t lead to more skilled and productive employees. So what’s different about the ones that do? Download our brief, “The Absolute Must-Do’s to Build an Agile Organization”, and learn: • How to increase employee productivity by 37% • What separates world-class learning and performance from ho-hum • Real business examples of this in action
Tags : 
performance management, performance, performance appraisal, employee engagement, goals, reviews, learning management system, performance management software, 360 degree feedback, workforce development, talent management, performance management software
    
Cornerstone OnDemand
By: Apple Corporation     Published Date: May 29, 2012
Please join us at this on-demand online seminar. It'll take about an hour and it's absolutely free.
Tags : 
ipad, ipod, apple, ipad2, tablet, ipad tablet, apple iphone, itunes, ipod mp3 player, airport, displays, isight, magic mouse, magic trackpad, remote, superdrive, time capsule, wireless keyboard, keyboards, security
    
Apple Corporation
By: Apple Corporation     Published Date: Aug 29, 2012
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
apple, online seminar, ipad, training, sales, business analytics
    
Apple Corporation
By: Apple Corporation     Published Date: Aug 30, 2012
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
apple, live online seminar, september 17th, ipad
    
Apple Corporation
By: Apple Corporation     Published Date: Jan 09, 2013
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
    
Apple Corporation
By: Apple Corporation     Published Date: Jan 09, 2013
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
apple, ipad, live online seminar, free, ipad in business
    
Apple Corporation
By: Apple Corporation     Published Date: Feb 07, 2013
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
    
Apple Corporation
By: Apple Corporation     Published Date: Feb 08, 2013
Please join us at this exclusive live online seminar. It'll take about half an hour and it's absolutely free.
Tags : 
knowledge management, enterprise applications, electronics
    
Apple Corporation
By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, hacker detection, identity management
    
Absolute Software
By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user, data regulation, encryption
    
Absolute Software
By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments, vulnerability management, web application security, anti spam, anti spyware, anti virus, application security, identity management, internet security, policy based management, security management, security policies, web service security
    
McAfee
By: McAfee     Published Date: Nov 09, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, risk management, security, security management, security threats, vulnerability assessments, vulnerability management, anti spam, anti spyware, anti virus, application security, identity management, internet security, intrusion prevention, security policies
    
McAfee
By: Astaro     Published Date: Aug 10, 2009
The complete absence of a spam filter at Kauffman Tire, a wholesale and retail distributer of tires, was inhibiting employee productivity.
Tags : 
astaro, spam, spam filters, security gateways, vpm, remote workers, proxy server, vpn, 320, gateway, protection, content filtering, kauffman, protection, security, anti spam, internet security, security management
    
Astaro
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter