Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

guida

Results 201 - 225 of 366Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: Jan 24, 2014
The Deprecation of Internal Server Names and Reserved IP Addresses
Tags : 
entrust, fqdn's, security, internal server, reserved ip addresses
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
On November 22, 2011, the CA/Browser Forum adopted “Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Version 1.0” (hereafter referred to as the “BR 1.0”) to take effect on July 1, 2012. This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.
Tags : 
entrust, non fqdns, certificates, forum changes, publicly trusted certificates, networking, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.
Tags : 
non-fqdns, depreciation, internal server names, reserved ip addresses
    
Entrust Datacard
Published By: CollabNet     Published Date: Jan 11, 2013
This paper is written to provide guidance for teams new to continuous integration or wanting to explore ways to improve their implementations.
Tags : 
agile, software development, integration, process, continuous integration, value stream maps, antipatterns
    
CollabNet
Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This short white paper will examine some of the important aspects of insider threat and will offer some guidance on how to reduce the risk.
Tags : 
credant technologies, insider threat, risk management, security, encryption, vulnerability
    
CREDANT Technologies
Published By: Citrix Systems     Published Date: Oct 07, 2014
Bring-your-own-device (BYOD) programs and policies empower people to choose the best device to get their work done, including personally-owned consumer smartphones, tablets and laptops. This white paper provides guidance for introducing BYOD to help people become more mobile and productive while IT adapts to consumerization in a simple, secure and controlled manner.
Tags : 
best practices, secure, simple, consumerization, byod, program, device, smartphones, tablets, laptops, mobile, productive, it management, wireless
    
Citrix Systems
Published By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint provides practical advice for developing such a code that will go beyond “window dressing” and inspire leaders and employees alike to build and sustain a compliant and ethical culture. While acting ethically is important for its own sake, the authors also provide pragmatic reasoning for fostering such a culture: ethical organizations earn the trust — and loyalty — of employees, customers, and investors. Accordingly, the code should be simple to understand, widely circulated, and aggressively enforced. But most importantly: adherence starts at the top.
Tags : 
skillsoft, ethical workplace, compliance, code of conduct, industry standards, rules, employee behavior, corporate behavior, enterprise applications
    
Skillsoft
Published By: CDW     Published Date: Nov 13, 2012
Guidance for finding a vendor who can provide advice and insight into your unique security environment.
Tags : 
cdw, security assessor, unique security environment.
    
CDW
Published By: CDW     Published Date: Nov 13, 2012
Guidance on the pertinent steps that will yield the most value from an assessment.
Tags : 
cdw, security assessment project, successful security assessment
    
CDW
Published By: CDW     Published Date: Jun 18, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program.
Tags : 
cdw, byod, bring your own device, mobile computing, smartphones, tablets, wireless, security
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
Guidance on the strategies and tools needed for a secure and productive bring-your-own-device program. Security is a prime concern with a BYOD initiative and organizations must adjust their security strategy to accommodate increased mobility, particularly for BYOD users.
Tags : 
device defense, security, mobile device, byod, mobile security, encryption, secure software, securing data, storage encryption, encryption prevention, mobile policy
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
Increasing staff productivity while lowering costs tied to this growing enterprise resource. A productive mobile program starts with holistic research and planning. Approaching mobility from a lifecycle standpoint will help an organization focus on optimizing each stage of the process. Having some guidance on what to expect at the different points of the mobility lifecycle is valuable for planning purposes.
Tags : 
mobile solutions, byod, mobile safety, mobile strategies, data access, secure foundation, applications, mobile app, app security, secure network
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability, device liability, technology vendors, mdm, sarbanes oxley, sensitive data, mobile data, mobile information, vpn, virtual private networks, wireless, access control, mobile application security
    
CDW
Published By: Aruba Networks     Published Date: Jul 03, 2013
The purpose of this paper is to provide a level of guidance towards the migration to 802.11ac.
Tags : 
802.11ac, mobile technology, migration, 5ghz
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
The content for this excerpt was taken directly from the IDC MarketScape: Worldwide Enterprise WLAN 2013-2014 Vendor Analysis by Rohit Mehra (Doc # 231686). All or parts of the following sections are included in this excerpt: IDC Opinion, In This Study, Situation Overview, Future Outlook, Essential Guidance, and Synopsis.
Tags : 
idc, marketscape, enterprise wlan, vendor analysis, brod, wireless lan, increase mobility, mission-critical mobility applications, cloud services, alternative architects, traffic flow, enterprise communications, unified communications, service providers, wlan infrastructure, wlan market
    
Aruba Networks
Published By: Adobe     Published Date: Jun 26, 2019
The Digital Trends 2019 survey closed with more than 12,500 responses worldwide! The results are in for 2019 and once again, businesses have their sights set on improving customer experience. Data continues to dominate, with an understanding that smarter use will lead to greater rewards. Data ownership and compliance are top-of-mind. And technological advances are an exciting prospect for many. But some need more guidance to understand the benefits for their business. Discover what your top digital priorities for 2019 should be with the 2019 Digital Trends report by Econsultancy in association with Adobe. Key topics that you’ll read more about in this year’s report: • Optimising customer experience and delivering personalised experiences in real time. • Using data better for smarter audience segmentation and targeting. • Be wary of walled gardens. Control and own the data, and always be compliant. • Automation is the future. Understand the benefits, learn how to use it.
Tags : 
    
Adobe
Published By: Polycom     Published Date: Mar 13, 2018
With the increase in mobility and the growth of distributed teams, it’s essential that you select audio devices that offer the best flexibility, quality and reach needed to support collaboration anywhere on any device. To meet these requirements, Polycom offers a broad selection of easy-to-use, high-quality desk phones, conference phones, and applications. The phones support crystal-clear conversations and seamlessly integrate with a wide range of communication environments including open-SIP and Skype for Business and Office 365. This comprehensive guide will provide you: Guidance on selecting devices for different workspaces Information on the newest collaboration features and benefits Overview and comparison of the latest Polycom desk phones and conference phones
Tags : 
voice collaboration, communication environments, polycom, microsoft office 365, skype for business
    
Polycom
Published By: CradlePoint     Published Date: Sep 04, 2014
The automotive environment can be particularly harsh for electrical equipment such as routers and mobile devices. Power in automotive systems is not stable and is often subject to fluctuations and noise. This paper will provide background on the problems and solutions as well as guidance for the installation of CradlePoint devices. We’ll recommend some commercially available products to help minimize the effects of the harsh automotive power environment.
Tags : 
cradlepoint, unstable power in automotive systems, harsh automotive power environment
    
CradlePoint
Published By: HP     Published Date: Sep 14, 2015
The early days of enterprise mobile app development focused on creating a functional experience and getting it out the door quickly, leaving “quality” as a problem for another day. As organizations mature their development and delivery of mobile applications, traditional software quality fundamentals settle back into the life cycle, with some key changes to testing processes and team structure. App performance is an example of how mobile changes quality assurance. Performance is a key pillar of quality that mobile shops often overlook in their race to market. This report dives into the problem areas that impede mobile performance, and provides guidance on this not-so-black-and-white area of quality.
Tags : 
    
HP
Published By: Factiva     Published Date: Dec 01, 2015
When compliance managers think about the good old days, they do not have to look back too far. In fact, prior to 2008, the world was a much simpler place: the U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) published a list of sanctioned companies and individuals, and as long as their company was not doing business with any person on that list, they seemed to be in good shape. This was definitely not an easy task. However, after 2008, it became more complicated when OFAC guidance stated that an ownership interest of 50% or more by a sanctioned subject was blocked or otherwise limited.
Tags : 
compliance, ofac, sanction
    
Factiva
Published By: LogRhythm     Published Date: Aug 08, 2016
THE TIME HAS come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly.
Tags : 
cyber threat, cyber risk, technology, best practices, security
    
LogRhythm
Published By: Zebra Technologies     Published Date: Jun 15, 2017
Mobile devices help clinicians improve the quality of patient care and save lives by improving staff communication and collaboration, and by providing instant access to a wealth of mission-critical information — from real-time lab results to a change in a patient’s condition or verification of the “5 rights” of medication administration at the patient bedside. In addition, mobility also helps healthcare organizations comply with important governmental and regulatory safety standards, without tasking an already overburdened nursing staff with additional paperwork. This white paper provides guidance for planning and implementing a clinical mobility solution in today’s healthcare environment, including a five-step roadmap to help key stakeholders identify needs.
Tags : 
clinical, mobility, strategy, best practices, device, save lives
    
Zebra Technologies
Published By: Epson     Published Date: May 10, 2018
This paper aims to: • Summarize recent developments in the current state of mobile transaction technology, with an emphasis on line busting as a part of mPOS systems • Highlight studies that point to mobile transaction’s projected significant short-term growth • Outline the business benefits of both mobile transactions and line busting • Provide in-depth guidance on how to evaluate mPOS systems for line-busting applications
Tags : 
    
Epson
Published By: Red Hat     Published Date: Mar 26, 2019
The rise of digital platforms and their rapid adoption by customers has created significant opportunities for financial service organizations. Industry leaders are capturing additional revenue streams and creating new value chains by investing in this distribution channel. Regulators are also encouraging participation in open banking through either guidance or mandate, aiming to improve competition in the financial services marketplace. Lastly, the pace of technical innovation is reducing the barrier to market entry, driving interest in open banking by incumbents and challengers alike. However, the full value of open banking might be not always be so clear. Below are five benefits for organizations that embrace open banking.
Tags : 
    
Red Hat
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.