• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

key

Results 351 - 375 of 3592Sort Results By: Published Date | Title | Company Name
By: Entrust Datacard     Published Date: Nov 29, 2016
This guide outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
ssl, ssl certificate, lifecycle management process, ssl digital certificate, application security, security management, security policies
    
Entrust Datacard
By: Entrust Datacard     Published Date: Jun 14, 2017
Properly managed, multi-server and wildcard certificates can provide increased flexibility.
Tags : 
    
Entrust Datacard
By: Entrust Datacard     Published Date: Jun 14, 2017
This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
    
Entrust Datacard
By: ShoreTel     Published Date: Oct 26, 2012
Total cost of ownership is a key metric for assessing costs, benefits and risks of a UC solution, enabling organizations to properly evaluate competing solutions. This white paper examines the total cost of ownership measured in different ways.
Tags : 
shoretel, unified communications solutions, ucs, total cost of ownership, telecom, telecom solution, benchmarking, enterprise applications
    
ShoreTel
By: Dell EMC     Published Date: Jul 05, 2016
EMC Global Data Protection Index 2016 Key Findings and Results Report
Tags : 
data management, business practices, data center. data application, enterprise applications, business intelligence, security, best practices, database development, data protection, database security
    
Dell EMC
By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : 
mobile, app, performance, barriers
    
Akamai Technologies
By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : 
mobile, app, performance, barriers
    
Akamai Technologies
By: Sage People     Published Date: Jan 31, 2019
The way we work has completely transformed. New technology is changing how, where and when we work. In this new landscape, businesses face challenges around growth, talent acquisition and productivity. Employers need to embrace new technology to get ahead in this new world of work, and put people at the heart of their strategy. However, HR and People leaders are in fierce competition for that all-important slice of budget and that makes building the strongest business case for technology investment vital. This guide is designed to help HR and People leaders like you get the financial support you need. You’ll get practical, effective tips on: • Understanding and explaining the true benefits of investing in a new HR system and likely return on investment • Positioning HR as a leader of change throughout your business • Ensuring your HR vision fits in with the business strategy • Getting management and key stakeholder buy-in • Building the strongest business case and the most powerful el
Tags : 
    
Sage People
By: Venafi     Published Date: Aug 07, 2015
Public key infrastructure (PKI) is the foundation of today’s enterprise security. But most PKI lacks central visibility, consistent processes, and refresh progress validation.
Tags : 
pki refresh, public key infrastructure, system errors, system updates, automated key securit, certificate security, anti spam, anti spyware, anti virus, application security, pki, security management, security policies
    
Venafi
By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls, authentication, protect digital certificates, reduce risks, access control, anti spam, anti spyware, anti virus, application security, disaster recovery, security management, security policies
    
Venafi
By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals why enterprises are vulnerable to trust-based attacks.
Tags : 
cyberattacks, security, data security, cryptographic keys, digital certificates, authenticity, anti spam, anti spyware, anti virus, application security, authentication, internet security
    
Venafi
By: Venafi     Published Date: Aug 10, 2015
This paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches.
Tags : 
attacks, cyberattacks, protect certificates, how to remediate breaches, security, security applications, access control, anti spam, anti spyware, anti virus, security management, security policies
    
Venafi
By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institute’s 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection, security network, networking, software development, wireless security
    
Venafi
By: Venafi     Published Date: Nov 12, 2015
This infographic reveals the challenges that enterprises face with securing keys and certificates and an action plan to reduce risk.
Tags : 
security, internet security, privacy, digital security certificates, security keys, access control, application security, authentication, identity management, password management
    
Venafi
By: Venafi     Published Date: Nov 12, 2015
This infographic reveals the challenges that enterprises face with securing keys and certificates and an action plan to reduce risk.
Tags : 
security, internet security, privacy, digital security certificates, security keys, access control, application security, authentication, identity management, password management
    
Venafi
By: Akamai Technologies     Published Date: Mar 09, 2017
Is your site ready for the mobile opportunity? Mobile users buy more often and spend more money, but 75% of consumers see their mobile experience as slow. Read the Mobile is the Moneymaker infographic now to find out what mobile users expect from your e-commerce website. Compiled using data from Akamai’s recent consumer web performance expectations survey, this infographic reveals: • E-commerce engagement and spending habits for mobile consumers • Mobile consumer page load expectations • The real-world business impact of not being mobile ready • The key challenges to successful mobile experiences
Tags : 
financial services, financial data, mobile opportunity, e-commerce, mobile consumers, mobile experiences
    
Akamai Technologies
By: DellEMC and Intel®     Published Date: Sep 16, 2016
This infographic shows how VxRail is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments
Tags : 
vxrail, hyper-converged infrastructure, converged infrastructure, vmware, convergence, infrastructure
    
DellEMC and  Intel®
By: DellEMC and Intel®     Published Date: Sep 29, 2016
This infographic shows how VxRail is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments
Tags : 
vxrail, hyper-converged infrastructure, converged infrastructure, vmware, convergence, infrastructure
    
DellEMC and  Intel®
By: DellEMC and Intel®     Published Date: Sep 29, 2016
This infographic shows how VxRail is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das Intel Inside-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Intel Xeon Phi und Xeon Inside sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, das intel-logo, intel atom, intel atom inside, intel core, intel inside, das intel inside-logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, convergence, infrastructure
    
DellEMC and  Intel®
By: Workday APAC     Published Date: Apr 11, 2019
Technology today is shaking up the way we work. To help IT leaders navigate the best path forward, we created a digital magazine called CIO Perspectives. Read it for insights and guidance from leaders and visionaries on how to break free from day-to-day tasks and gain a greater perspective. Check it out now.
Tags : 
    
Workday APAC
By: Workday APAC     Published Date: Apr 11, 2019
Transform HR from a cost center into a profit center when you strengthen the partnership between the CFO and CHRO. When these two functions closely collaborate, you can greatly improve company strategy and culture. Read this eBook to learn how.
Tags : 
    
Workday APAC
By: Heiler     Published Date: Feb 22, 2012
Multiple channel distribution is becoming increasingly important, irrespective of whether the businesses in question are B2C or B2B-focused. The key drivers are the long tail, multi-site and changes in category management. Find out more now!
Tags : 
heiler, software, mdm of product data, 360-degree, pim/product information management, multichannel commerce, print-catalog, e-catalog, online-shop, sap, pim, productinformationsmanagement, product information management, productinformation, cross-selling, catalog, content services, consulting, supplier relationship management, srm
    
Heiler
By: Heiler     Published Date: Feb 22, 2012
This white paper provides insight on how PIM is changing process and offers 6 key factors on how to succeed in implementation and change management.
Tags : 
heiler, software, mdm of product data, 360-degree, pim/product information management, multichannel commerce, print-catalog, e-catalog, online-shop, sap, pim, productinformationsmanagement, product information management, productinformation, cross-selling, catalog, content services, consulting, supplier relationship management, srm
    
Heiler
By: Iron Mountain     Published Date: Aug 28, 2014
The terms disaster recovery and business continuity planning are often used interchangeably but, when you think about it, one is much preferable to the other. While disaster recovery makes clear that the organization will rise again, it does not let the world (and your patient population) know that the business of care will go on during the recovery process. In this important on-demand webinar, you’ll hear from one CIO who has given a lot of thought to keeping operations up and running no matter what gets thrown the organization’s way. With so many varieties of disaster lurking in wait, this is one webinar you can’t afford to miss.
Tags : 
iron mountain, healthcare it, disaster recover, business continuity plan, healthcare operation, business operations
    
Iron Mountain
By: IFS     Published Date: Jun 25, 2014
EAM software delivers key benefits to an organization that relies on expensive and complex assets. It gives senior management visibility and control over the drivers of cost and productivity of those assets. And it offers real maintenance management and risk management benefits. Learn the 5 steps to realizing EAM software benefits today!
Tags : 
ifs, eam software, enterprise applications, mrp, cmms, it management
    
IFS
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter