Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical

Results 2326 - 2350 of 2613Sort Results By: Published Date | Title | Company Name
Published By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : 
mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
    
Avalere
Published By: Avalere     Published Date: Apr 02, 2007
Companies struggle with cleanly separating an employee, contractor or consultant with their company and critical information.  Avalere enables companies to review how information has been used prior to an employee’s departure in order to protect the company and the employee.
Tags : 
data protection, employee performance, fired, employee departure, employee quit, employee resigned, access control, avalere
    
Avalere
Published By: Xactis     Published Date: Feb 02, 2007
Learn the 'bottom-up' approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.  This is a "how-to" presentation addressing how to get started and eventually establish an internal L2S Center of Excellence.
Tags : 
soa, service oriented architecture, service-oriented architecture, business rules extracting, legacy system, erp, enterprise resource planning, mainframe
    
Xactis
Published By: Xactis     Published Date: Feb 05, 2007
Learn the ‘bottom-up’ approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.
Tags : 
soa, service oriented architecture, service-oriented architecture, business rules extracting, software development, c++, quality assurance, legacy system
    
Xactis
Published By: Jumpnode Systems     Published Date: Jun 07, 2007
Get this free whitepaper now and read how a newer architecture, Appliance-enabled Software (AeS) services, combines a plug-in monitoring appliance with a hosted dashboard application to provide the benefits of SaaS (Software-as-a-Service) along with failover out-of-band communication capabilities for dependable alert notification and escalation.
Tags : 
saas, software as a service, monitoring, network monitoring, network management, remote access, remote network management, architecture
    
Jumpnode Systems
Published By: Infor     Published Date: Feb 27, 2007
In today's process manufacturing environment, innovation is viewed as critical to sustainable growth and profitability. While open innovation is regarded as the answer, few companies can effectively measure the return on R&D investment, have acceptable product success rates, achieve acceptable promotional effectiveness, or have visibility into their compliance risks or operational readiness for new product launches.
Tags : 
collaboration, return on investment, holistic, process manufacturing, manufacturing, supply chain management, scm, product lifecycle management
    
Infor
Published By: Infor     Published Date: Apr 19, 2007
To all but the savviest technologists, today's typical Web-architected enterprise product diagram is a confusing jumble of acronyms and buzzwords and pledges of "true enterprise wide" deployments. Separating the hype from reality is critical for end-users to select enterprise products that deliver the full benefits of true enterprise Web deployment.
Tags : 
enterprise software, deployment, web deployment, architecture, j2ee, eam, enterprise asset management, ejb
    
Infor
Published By: Infor     Published Date: May 04, 2007
What Distinguishes Strategic CFOs? What are their secrets? Why do CEOs consider their guidance so critical? How do they provide critical insight that enhances strategic planning and decision-making? Find out how strategic CFOs set themselves apart from the rest... and apply their secrets to your financial organization.
Tags : 
sox, sarbox, sarbanes-oxley, sarbanes oxley, financial, cfm, corporate financial management, finance
    
Infor
Published By: GFI     Published Date: Sep 16, 2008
Email is a primary source of documentation for many organizations and it has taken on an increasingly critical role in corporate litigation and court cases. The need to archive all email correspondence is growing in importance because companies are realizing that being in a position to retrieve an old email could save them thousands of dollars (euros) in legal fees and fines as well as their credibility.
Tags : 
email, archive, archiving, sox, sarbox, sarbanes oxley, sarbanes-oxley, gfi
    
GFI
Published By: GFI     Published Date: Jun 03, 2009
More than ever, SMBs need to focus on security as part of their IT infrastructure, building around it rather than considering it as an afterthought. This has become even more critical over the past few years as many businesses have unwittingly lost their customers’ personal data due to security breaches, and as states and countries have responded by enacting laws to force the businesses to implement additional levels of protection.
Tags : 
gfi, smbs, small, medium, business, it infrastructure, security, windows nt
    
GFI
Published By: Knoa     Published Date: Jul 17, 2007
What is often overlooked is that application performance is just one of three key drivers of return on investment (ROI) from your Siebel application. An efficient infrastructure is critical. It's important to optimize the Siebel application for your own unique business environment, user needs and usage patterns. But, it's all for naught if you do not build and sustain adoption and efficient and effective use of the Siebel application by your end users.
Tags : 
epm, performance management, experience management, knoa, siebel, crm, customer relationship, end user
    
Knoa
Published By: Ecora Software     Published Date: Aug 15, 2007
Do you need to implement corporate policies regarding security and confidential health information? Learn: How to use IT documentation to prepare for and pass Security audits; What IT data is critical for Security Standards; What is the difference between Security and IT Audits. You can implement a sustainable HIPAA Security Standard – Read this paper to learn more.
Tags : 
hipaa, hippa, health care, healthcare, compliance, privacy, consumer data, data privacy
    
Ecora Software
Published By: Interactive Intelligence     Published Date: Feb 27, 2013
Workforce management is more than just software, It requires a large amount of process definition and organizational consideration. These considerations are critical to the success of any workforce management program -- read on to learn more!
Tags : 
workforce management, more than just software, interactive intelligence, organizational consideration
    
Interactive Intelligence
Published By: Interactive Intelligence     Published Date: Feb 28, 2013
Representatives from the debt collection industry make billions of contacts with consumers on behalf of creditors every year. With compliance being necessary -- this paper will explore critical sites of outbound calling compliance.
Tags : 
outbound calling, calling compliance, fdcpa, debt collection industry, compliance tips and suggestions, hot button issues, interactive intelligence, enterprise applications
    
Interactive Intelligence
Published By: Interactive Intelligence     Published Date: Sep 11, 2013
Contact centers have long played a vital role in the insurance industry. Prospects and customers use them to get product information and quotes and then submit applications. Insurance agents and advisors rely on contact centers to tap into expertise and handle business and technical issues. Policyholders and members make inquiries or changes to their policies, or conduct financial transactions. Claimants call in to report accidents and check on the status of their claims. The list could go on, but the meaning is clear. Contact centers are major contributors to many key parts of the insurance business, especially the parts that require direct interaction with customers or agents. As a result, contact centers now play a critical role in an insurerís journey toward becoming more customer-centric.
Tags : 
interactive intelligence, contact centers, insurance industry, prospects, customers, product information, quotes, members
    
Interactive Intelligence
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
ERP Outsourcing for the Mid-Market discusses the nuances of outsourcing and critical success factors for mid-market companies.  Specifically, how companies can effectively select a compatible outsourcing partner who understands both parts of the equation - business and technology - and how to create a governance environment that fosters a successful outsourcing relationship.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, j.d. edwards, oracle, baan
    
OneNeck IT Services
Published By: Asentria Corporation     Published Date: Sep 04, 2007
One of the greatest challenges to any advanced wireless operation is the maintenance of continuous and economical service. Today’s networks have evolved into business-critical services that organizations rely upon every day. However, unplanned remote site downtime due to equipment and power failure, and adverse environmental conditions can severely impair network service.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Simple voicemail has evolved into complex integrated messaging platforms and the generic black handset has been replaced by a plethora of devices. Service providers can become critical partners for companies looking to ensure availability of their voice network.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
With horror stories in the news every week about lost or stolen laptops and backup tapes, the senior management team at Oregon Community Credit Union knew they had to do everything within their powers to protect their critical data as it traveled offsite to a third-party tape vaulting vendor. They were tasked with finding an affordable solution that would strike a balance between security, ease of use, and scalability.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Informatica     Published Date: Oct 26, 2007
The goal of pervasive BI applications is to take the data that produced the back office ROI of more than 400% and deliver it to front-line employees in a form appropriate to their job functions – with similar results. There are thousands of business process steps in a typical enterprise where pervasive BI insights can be added. What are leading companies doing with pervasive BI?
Tags : 
business intelligence, database, enterprise data warehouse, data mart, data warehouse, data mining, active data warehousing, active data warehouse
    
Informatica
Published By: Netwrix     Published Date: Aug 01, 2013
Netwrix Auditor takes a holistic approach to IT infrastructure auditing, providing the visibility, intelligence, security and control you need to keep your business up and running, minimize troubleshooting, meet regulatory compliance standards and make sure your critical IT assets are secure - and stay that way
Tags : 
netwrix, free trial, netwrix auditor, it infrastructure, configuration, it systems, configuration auditing, active directory auditing
    
Netwrix
Published By: ITManagement     Published Date: Nov 06, 2007
ITManagement delivers the critical information you need quickly, easily and concisely. We know you don't have time to spend researching the latest innovations in data network solutions and finding free third party information is near impossible... we have done it for you.
Tags : 
networking, network management, switch, ethernet networking, gigabit networking, mbps, gigabit, ethernet
    
ITManagement
Published By: Computhink     Published Date: Jan 31, 2008
Download this informative webcast by Doug Brennecke, VP Sales at Computhink, featuring Tom von Gunden, chief editor of enterprise content management news and solutions site ECM Connection.
Tags : 
document management, compliance, content management, computhink, video
    
Computhink
Published By: VMware Dell     Published Date: Sep 29, 2008
LifeLink Foundation needed to provide business continuity and DR of critical transplant related information to multiple locations and needed to manage DR planning and implementation in a hurricane zone. Learn how VMware & Dell EqualLogic worked together to implement two remote sites providing consolidated virtual storage, snapshot-based backup and recovery.
Tags : 
vmware, dell, lifelink, healthcare, windows, server, sql server, microsoft
    
VMware Dell
Start   Previous    87 88 89 90 91 92 93 94 95 96 97 98 99 100 101    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.