• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

document

Results 76 - 100 of 990Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco
By: Cisco     Published Date: Feb 16, 2016
This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques.
Tags : 
cisco, malware, data security, analytics, global security threat, security
    
Cisco
By: Cisco     Published Date: Apr 11, 2016
En este documento se identifican las funcionalidades esenciales necesarias en una solución de protección contra malware avanzado y las preguntas clave que debe formularle a su proveedor, y se muestra cómo Cisco combate los ataques de malware avanzado actuales mediante una combinación de cuatro técnicas
Tags : 
    
Cisco
By: iCompass Technologies     Published Date: Feb 06, 2015
You know every tax dollar counts: The post-recession drop in funding coupled with mounting financial commitments and legislative demands for improved access to information leave no choice but to make operations more efficient. Agenda automation software eliminates manual tasks associated with creating, distributing, and publishing agendas, reduces the prep time (by as much as 50% or more) and associated costs of meetings while introducing a flexibility that makes tight deadlines easier to manage. The impact is far reaching, from improved transparency to freeing up staff time to work on other priorities. It not only pays for itself in paper savings, it brings money back into the budget—from $300 to $1000 per meeting, depending on the size of the organization. Learn more about how easy it can be to automate your meeting agendas, and what you can get back as a result.
Tags : 
agenda management, meeting management, meeting management software, records management, records management software, paperless document management, local government transparency, agenda automation, local government software, municipal government software, city government software, e-government software, digital governing, agenda automation software, citizen engagement software, government transparency initiatives, granicus, iqm2, agenda pal, novus agenda
    
iCompass Technologies
By: IBM     Published Date: Jun 05, 2018
Keeping up with ever changing contract management work is challenging. Governing legal and procurement content is written by thousands of people and applied to hundreds of situations. To stay compliant, organizations employ knowledgeable professionals to analyze every sentence to determine the changes that need to be made to company contracts. The manual process of sifting through these dense, complicated documents is inefficient and prone to error. Watson Compare and Comply is trained on contract specific knowledge and classifications and can streamline contract workflows through semantic understanding. Join Director of Watson Offering Management, Adam Orentrichler, and Chief Data Scientist of SAP Ariba, David Herman, as they discuss how Watson can transform the way your company manages contract governance.
Tags : 
    
IBM
By: K2     Published Date: Jan 07, 2016
User adoption has always been something of an issue. Despite having ready access to SharePoint, many users cling to their file-shares, or more recently, adopt other ways of collaborating and sharing documents via web-based services. A third of the organizations surveyed feel that their SharePoint project has struggled to meet their original expectations, and a further 26% feel progress has stalled. Is this because of poor training and governance, restricted functionality of SharePoint, or simply the inevitable result of being the first ECM system to move beyond the safer boundaries of compliance-based aoperations? As we will see in this report, it is likely to be a combination of all of these.
Tags : 
aiim, microsoft sharepoint, user adoption, enterprise content management, networking, security, it management, wireless, knowledge management
    
K2
By: DocuSign     Published Date: Mar 23, 2016
Learn how Alameda County rose to the Green challenge and improved document turnaround time by 80%, digitized paper workflows and improved visibility to of documents status in the review cycle.
Tags : 
    
DocuSign
By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts,risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, rackspace, pci, pci dss, payment security, compliance, cloud pci, security, it management
    
Alert Logic and Rackspace
By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, cloud pci, security, it management
    
Alert Logic and Sungard Availability Services
By: Veeam '18     Published Date: Mar 13, 2018
Windows Server 2016 has been generally available since October 2016. This eBook has been updated to provide the latest and greatest additions within Window Server 2016 as it applies to virtualization; Hyper-V. This is the main topic we will be discussing in this eBook, Windows Server 2016 Virtualization — also known as Hyper-V 2016. Components within Hyper-V are updated or additional functionality is added with each release of Windows Server. Knowing this is important to understanding the increased functionality as well as the overall usability of Windows Server through documents such as this. Many of the new features and functionalities do require some basic usage of PowerShell. Throughout this eBook you will find sample PowerShell scripts documented as examples allowing IT professionals to leverage Hyper-V PowerShell within their own environments.
Tags : 
microsoft, windows, server, technology, organization, optimization
    
Veeam '18
By: NetApp     Published Date: Dec 08, 2014
This white paper focuses on the increasing importance of high availability as enterprises continue to build out a 3rd Platform–based computing infrastructure. As more mission-critical applications requiring extremely high availability are deployed on virtual infrastructure, enterprises must respond using the right storage solutions. The document identifies critical features in the storage infrastructure necessary to meet these requirements for availability and explores how one vendor, NetApp, meets them with its EF-Series AFA solutions portfolio.
Tags : 
all-flash, enterprise storage, platform-based, ef-series, afa solutions, it management
    
NetApp
By: NetApp     Published Date: Dec 09, 2014
This white paper focuses on the increasing importance of high availability as enterprises continue to build out a 3rd Platform–based computing infrastructure. As more mission-critical applications requiring extremely high availability are deployed on virtual infrastructure, enterprises must respond using the right storage solutions. The document identifies critical features in the storage infrastructure necessary to meet these requirements for availability and explores how one vendor, NetApp, meets them with its EF-Series AFA solutions portfolio.
Tags : 
all-flash, enterprise storage, platform-based, ef-series, afa solutions, it management
    
NetApp
By: Dell EMC     Published Date: Nov 03, 2016
IT managers are struggling to keep up with the “always available” demands of the business. Data growth and the nearly ubiquitous adoption of server virtualization among mid-market and enterprise organizations are increasing the cost and complexity of storage and data availability needs. This report documents ESG Lab testing of Dell EMC Storage SC Series with a focus on the value of enhanced Live Volume support that provides always-available access with great ease of use and economics.
Tags : 
storage, data, sql, architecture, storage management, data integration, data protection, database security
    
Dell EMC
By: Box     Published Date: Nov 28, 2012
This IDC Insight explores the emerging category of solutions that offer access to business content (folders, files, documents, etc.) on mobile devices.
Tags : 
collaboration, collaboration solutions, mobile workforce, mobility, mobile workers, mobile enterprise, wireless
    
Box
By: Gluster     Published Date: Mar 17, 2011
This document discusses some of the unique technical aspects of the Gluster architecture, discussing those aspects of the system that are designed to provide linear scale-out of both performance and capacity without sacrificing resiliency.
Tags : 
gluster, cloud computing, virtual environments, open source storage software, infrastructure, storage management, storage virtualization, open source
    
Gluster
By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
    
Menlo Security
By: E-SignLive by Silanis     Published Date: Oct 23, 2013
In this case study from Ombud Open Research, you will learn how US Bank is using electronic signature technology to streamline account openings and SMB loans. With e-signatures deployed across more than 3,000 branches, US Bank is leveraging both the Silanis on-premise e-signature solution and the Silanis cloud e-signature service for different processes. As a result, they have achieved operational efficiencies, improved customer experience and increased top-line revenue. The bank is currently e-signing 460,000 documents each week – a number that will continue to grow as US Bank’s initial implementation of electronic signatures is currently being re-purposed across the entire organization.
Tags : 
banking, account openings, financial services
    
E-SignLive by Silanis
By: Dell EMC     Published Date: Feb 08, 2016
This ESG Lab review documents hands-on testing of XtremIO all-flash storage and presents the findings of an ESG Lab five-year TCO analysis highlighting the economic benefits of mixed workload storage consolidation.
Tags : 
emc, xtremio, tco, consolidation, storage, flash storage, enterprise applications, data management
    
Dell EMC
By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar a escolha do dispositivo errado para sua aplicação. Para uma visão mais completa de cada consideração, faça download do nosso documento técnico. Ele destaca razões para escolher os dispositivos de nível empresarial em vez de dispositivos de consumo, incluindo: • As principais considerações sobre desempenho de digitalização • A importância do gerenciamento de energia e dos acessórios certos • A importância da conectividade e porque nem todos os dispositivos são feitos da mesma maneira
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
    
Zebra Technologies
By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar elegir el dispositivo incorrecto para su aplicación. Para saber más sobre cada consideración, descargue nuestro documento técnico. El documente provee razones convincentes para elegir los dispositivos de nivel empresarial en lugar de dispositivos de nivel de consumidor, incluyendo: • Las principales comparaciones de rendimiento de escaneo • La importancia de la gestión de energía y los accesorios correctos • La importancia de la conectividad y por qué no todos los dispositivos son iguales
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
    
Zebra Technologies
By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar elegir el dispositivo incorrecto para su aplicación. Para saber más sobre cada consideración, descargue nuestro documento técnico. El documente provee razones convincentes para elegir los dispositivos de nivel empresarial en lugar de dispositivos de nivel de consumidor, incluyendo: • Las principales comparaciones de rendimiento de escaneo • La importancia de la gestión de energía y los accesorios correctos • La importancia de la conectividad y por qué no todos los dispositivos son iguales
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
    
Zebra Technologies
By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar a escolha do dispositivo errado para sua aplicação. Para uma visão mais completa de cada consideração, faça download do nosso documento técnico. Ele destaca razões para escolher os dispositivos de nível empresarial em vez de dispositivos de consumo, incluindo: • As principais considerações sobre desempenho de digitalização • A importância do gerenciamento de energia e dos acessórios certos • A importância da conectividade e porque nem todos os dispositivos são feitos da mesma maneira
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55, tc75, mobility dna software, traceability, field operations, industrial facilities, mobile solutions, enterprise productivity, choosing the right technology, enterprise grade technology, field applications, high battery capacity, rugged handheld computers
    
Zebra Technologies
By: Burton Group     Published Date: Apr 08, 2008
In this Methodologies and Best Practices document, Burton Group Research Director Daniel Blum recounts customer perspectives on the anti-malware battlefield playing out at the enterprise level. The document explores lessons learned, and what keeps customers awake at night even after good defensive strategies are in place. The Reference RFI alone is valuable for those switching anti-malware products, or seeking new ones.
Tags : 
burton group, best practices, malware, security, email security, network security, content filtering, intrusion detection
    
Burton Group
By: MuleSoft     Published Date: Jul 06, 2017
DevOps has become not only trendy, but an important rethink of the IT culture at many organizations. And with good reason the benefits to adopting DevOps are well-documented. A recent study, conducted by Utah State University and sponsored by Puppet Labs, revealed that DevOps practices can boost IT performance and ultimately improve a business’s bottom line.
Tags : 
it culture, it performance, customer, experience
    
MuleSoft
By: Cytiva, Inc.     Published Date: Aug 30, 2010
This document is designed to give you a high level overview of the kind of information security practices you should expect from any applicant tracking vendor you evaluate or use.
Tags : 
data protection, security, applicant tracking, cytiva
    
Cytiva, Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter