Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical it

Results 1851 - 1867 of 1867Sort Results By: Published Date | Title | Company Name
Published By: Jumpnode Systems     Published Date: Jun 07, 2007
Get this free whitepaper now and read how a newer architecture, Appliance-enabled Software (AeS) services, combines a plug-in monitoring appliance with a hosted dashboard application to provide the benefits of SaaS (Software-as-a-Service) along with failover out-of-band communication capabilities for dependable alert notification and escalation.
Tags : 
saas, software as a service, monitoring, network monitoring, network management, remote access, remote network management, architecture, jumpnode, jumpnode systems, network architecture
    
Jumpnode Systems
Published By: Third Brigade     Published Date: May 25, 2007
This white paper identifies twelve critical questions that organizations need to consider when selecting a Host Intrusion Prevention System product. These questions relate to protection, manageability, integration and speed.
Tags : 
host ips, ips, hips, intrusion prevention, vendor selection, software selection, security, hacker prevention, hackers, anti virus, anti spyware, network security, cybercrime, third brigade
    
Third Brigade
Published By: eFax     Published Date: May 15, 2007
If faxing is a critical component to your business, you want to be sure you make a wise decision on how to do it. This paper offers 10 tips to help you sort through the myriad of choices in order to get the best combination of features and flexibility.
Tags : 
fax, faxing, ip faxing, ip telephony, fax over ip, efax, infrastructure, ip networking, ip networks, integrated communications, communications integration, communication, communications, convergence, fax services, outsourcing, vendor selection, protus, protus ip solutions
    
eFax
Published By: Infor     Published Date: May 04, 2007
What Distinguishes Strategic CFOs? What are their secrets? Why do CEOs consider their guidance so critical? How do they provide critical insight that enhances strategic planning and decision-making? Find out how strategic CFOs set themselves apart from the rest... and apply their secrets to your financial organization.
Tags : 
sox, sarbox, sarbanes-oxley, sarbanes oxley, financial, cfm, corporate financial management, finance, erp, bpm, accounting, infor
    
Infor
Published By: Infor     Published Date: Apr 19, 2007
To all but the savviest technologists, today's typical Web-architected enterprise product diagram is a confusing jumble of acronyms and buzzwords and pledges of "true enterprise wide" deployments. Separating the hype from reality is critical for end-users to select enterprise products that deliver the full benefits of true enterprise Web deployment.
Tags : 
enterprise software, deployment, web deployment, architecture, j2ee, eam, enterprise asset management, ejb, web architecture, infor, erp, software development
    
Infor
Published By: OutlookSoft     Published Date: Apr 03, 2007
Never has the need for a modern corporate performance management (CPM) solution -- one that unifies the "big three" processes of planning, budgeting, and forecasting -- been more critical to regaining and sustaining the accuracy, consistency, and transparency you expect from your numbers. Read this white paper to learn more.
Tags : 
performance management, business management, business process management, bpm, forecasting, finance, accounting, erp, enterprise resource planning, outlook soft, outlooksoft, enterprise applications
    
OutlookSoft
Published By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : 
mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
    
Avalere
Published By: Avalere     Published Date: Apr 02, 2007
Companies struggle with cleanly separating an employee, contractor or consultant with their company and critical information.  Avalere enables companies to review how information has been used prior to an employee’s departure in order to protect the company and the employee.
Tags : 
data protection, employee performance, fired, employee departure, employee quit, employee resigned, access control, avalere
    
Avalere
Published By: Quocirca     Published Date: Mar 06, 2007
Arguably IP is the most successful open standard ever, but as network communications converge under a single standard used for an increasing number of applications, we need to understand how effectively these critical assets are being managed. Read more in this white paper now.
Tags : 
networking, ip networks, ip telephony, voip, convergence, voice over ip, network management, telecommunications, ip convergence, communications convergence, quocirca
    
Quocirca
Published By: Infor     Published Date: Feb 27, 2007
In today's process manufacturing environment, innovation is viewed as critical to sustainable growth and profitability. While open innovation is regarded as the answer, few companies can effectively measure the return on R&D investment, have acceptable product success rates, achieve acceptable promotional effectiveness, or have visibility into their compliance risks or operational readiness for new product launches.
Tags : 
collaboration, return on investment, holistic, process manufacturing, manufacturing, supply chain management, scm, product lifecycle management, plm, knowledge management, infor
    
Infor
Published By: ForeSee Results     Published Date: Feb 05, 2007
Free shipping, undoubtedly, is necessary to compete in the critical holiday season. But, is it really a competitive advantage? Does it drive short-term sales and long-term loyalty? And, are free shipping offers equally effective for repeat customers as for those that buy from a retail site for the first time?  ForeSee Results found some interesting answers to these questions.
Tags : 
e-commerce software, loyalty and retention, free shipping, e-tailers, e-commerce, foresee, foresee results
    
ForeSee Results
Published By: OgilvyOne     Published Date: Jan 22, 2007
This presentation addresses the critical aspects that define a successful enewsletter: content, deliverability and rendering, and engagement. Learn how to improve all three with insight from the eNewsletter gurus at OgilvyOne.
Tags : 
email marketing, newsletter design, deliverability, engagement, ogilvyone, e-newsletter, e-newsletters
    
OgilvyOne
Published By: SpringCM     Published Date: Dec 06, 2006
You’ve made the decision: the overall ease and economics of implementing Software-as-a-Service (SaaS) appeal to you, and you have selected an application that delivers what you need for your business.  The last hurdle is the service component itself — making sure that critical factors like security, speed, and reliability that will affect your users’ experience meet your standards.
Tags : 
saas, on-demand, on demand, real time, real-time, appication selection, vendor selection, software selection, service provider, springcm, spring cm, it management, enterprise applications
    
SpringCM
Published By: Third Brigade     Published Date: Nov 27, 2006
This white paper identifies critical vulnerabilities that most organizations overlook when they secure their web applications. It also introduces host intrusion defense with deep packet inspection as a new, effective  approach for shielding these vulnerabilities.
Tags : 
web application security, application security, web security, web service security, security management, internet security, ips, intrusion prevention, intrusion detection, hacker detection, third brigade, security, it management, platforms
    
Third Brigade
Published By: Cenzic     Published Date: Nov 21, 2006
Enterprises are responding to new threat on communication protocols by hardening Web applications, and they are increasingly turning to Web application security assessment tools to improve the security of their applications. This report examines why high accuracy is critical to the effectiveness of the tools, and it discusses how Cenzic Hailstorm addresses this problem.
Tags : 
application security, web application security, hacker detection, cenzic, cenzic hailstorm, security, ip networks, network security
    
Cenzic
Published By: Texas Instruments     Published Date: Nov 06, 2006
Download this free whitepapers to learn how Remote Management can transform this challenge into an opportunity to stand apart from other service providers in a very competitive market.
Tags : 
access control, remote access, remote management, remote support, service provider, service providers, ip networks, ip tv, customer service, customer satisfaction, texas instruments, remote network management
    
Texas Instruments
Published By: Symantec     Published Date: Nov 02, 2006
IT administrators need to minimize downtime for critical IT services by rapidly recovering entire systems to dissimilar hardware platforms or virtual environments. Symantec Backup Exec System Recovery Server Edition combines the speed and reliability of disk-based, bare-metal Windows system recovery with dissimilar hardware restoration and lights-out operation.
Tags : 
backup, infrastructure, internetworking hardware, networking hardware, network management, high availability, windows server, server, backup and recovery, servers, symantec, network provisioning
    
Symantec
Start   Previous    61 62 63 64 65 66 67 68 69 70 71 72 73 74 75     Next   End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.