Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

paper based

Results 376 - 400 of 429Sort Results By: Published Date | Title | Company Name
Published By: Secure Computing     Published Date: Aug 21, 2009
This paper outlines the types of threats that leverage the Internet as a means of delivery and the risks that they pose to your organization. Learn the key drivers of a corporate security policy and how you can protect against HTTP-based threats using Web filtering as part of a multi-layered content security strategy.
Tags : 
security, anti spyware, malware prevention, malware, access control, hacker detection, internet security, security management, web service security, secure computing, securecomputing, network security
    
Secure Computing
Published By: Secure Computing     Published Date: Feb 22, 2007
This paper outlines these new threats and discusses the limited effectiveness of reactive legacy Web security solutions against those threats.  The paper then outlines the new reputation based, proactive security paradigm that is necessary for securing Web 2.0 applications.
Tags : 
web 2.0, web 20, web security, application security, web app security, internet security, network security, hacker detection, intrusion prevention, secure computing, securecomputing, security
    
Secure Computing
Published By: Third Brigade     Published Date: Aug 21, 2009
Businesses today are under intense pressure to open up their networks, comply with increasingly rigorous regulatory requirements, AND ensure their IT assets are protected from attacks. This white paper explores these security challenges and explains how host-based Intrusion Prevention Systems  play a critical role in an organization's overall security strategy.
Tags : 
intrusion prevention, security, network security, compliance, security compliance, attacks, hacker detection, ips, intrusion prevention system, security strategy, security management, third brigade
    
Third Brigade
Published By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : 
intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips, security strategy, third brigade, security
    
Third Brigade
Published By: Trusted Network Tech     Published Date: Aug 21, 2009
Authentication technologies such as tokens and smart cards help meet the challenges of protecting sensitive data and securing application access. This white paper presents four cases in which an identity-based solution provides a compelling, low-cost alternative or complement to strong authentication technologies.
Tags : 
network management, network security, access control, nac, network access control, identity management, security management, authentication, smart card, token, trusted network tech, security
    
Trusted Network Tech
Published By: Trusted Network Tech     Published Date: Nov 06, 2006
This paper addresses several issues organizations should consider when analyzing the efficacy and costs of NAC solutions and looks at a complementary alternative technology based on TNT’s Identity™, which helps address and overcome some limitations of NAC solutions.
Tags : 
access control, nac, network, identity management, network access control, security, internet security, trusted network tech, local area networking, network security
    
Trusted Network Tech
Published By: Quocirca     Published Date: Apr 08, 2009
The automation of traditional paper based processes with technology can lead to unnecessary complexity. This leads to increased costs and other challenges which can be avoided if solutions are simple and fit closely to the business task in hand.
Tags : 
quocirca, paper systems, it systems, it infrastructure, mobile technologies, functionality, capacity, cost control, cost cutting, ongoing costs, tco, total cost of ownership, anoto, automating business processes, paperless office, paper-based processes, network connection reliability, wi-fi, bluetooth, hardware choices
    
Quocirca
Published By: KACE     Published Date: Nov 14, 2006
This paper explores how Appliance-based Software Delivery (AbSD) provides a better alternative to both software and Software as a Service (SaaS).
Tags : 
appliance, network security, saas, absd, hosted model, on-demand model, software development, value-add, value-added, security appliance, kace, it management, enterprise applications, platforms
    
KACE
Published By: Online Insight     Published Date: Dec 12, 2006
This white paper describes Online Insight's vision for the next generation in sales and marketing, driven not by guesstimates about a customer based on ancient demographics and historical purchases, but by up-to-the second needs and preferences measured real-time in a first-hand "collaborative customer conversation."
Tags : 
marketing, crm, customer relationship management, customer support, customer service, customer interaction, customer experience, csr, online insight, enterprise applications
    
Online Insight
Published By: GFI     Published Date: Jun 12, 2007
Examining the different kinds of email threats and email attack methods, this paper describes the need for a solid server-based content-checking gateway to safeguard your business against email viruses and attacks as well as information leaks.
Tags : 
network security, virus, anti virus, anti-virus, content checking, mailsecurity, gfi, anti trojan, trojan, trojans
    
GFI
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace
Published By: Ecora Software     Published Date: Aug 15, 2007
This whitepaper will teach you the necessary steps any organization must take to comply with the Gramm-Leach-Bliley Act (GLBA). Based on the experienced insight of Alex Bakman, Founder, Chairman & Chief Technology Officer at Ecora Software and Khalid Kark, Senior Research Analyst at Forrester Research, this paper discusses how any organization can reduce compliance costs by automating the process of attaining and maintaining proper financial privacy and consumer data safeguard procedures.
Tags : 
gbla, glba, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Interactive Intelligence     Published Date: Feb 21, 2013
Does a cloud-based contact center make sense for your business? In this white paper, we go over the many questions about a cloud based contact center -- about deployment of cloud centers, the TCO's of owning a cloud based contact center and more.
Tags : 
cloud, datacenter, contact center, deployment, tco's, enterprise applications, data center
    
Interactive Intelligence
Published By: AT&T     Published Date: Jun 30, 2008
In 2000, ICEE began to scrutinize the inefficiencies they found in the ICEE machine repair process. With so many field technicians servicing so many machines, streamlining the process would be no small feat. The company's existing paper-based system required that field technicians fill out paper work orders at the end of each job. One copy was given to the customer, one was filed at the regional office, and another was sent to headquarters in Ontario. This left a long, inefficient and error-prone paper trail.
Tags : 
wireless, field technicians, repair, mobile service, service, on-site repair, on-site service, wireless data systems, field service, field service automation, at&t, att
    
AT&T
Published By: WiMAX 20/20     Published Date: Sep 27, 2007
This white paper presents how a radically consolidated, scalable core network architecture based on multi-core processor technology can significantly reduce the cost of the core network and thereby reducing the cost to serve the first WIMAX subscribers.
Tags : 
cost, cost efficient, cost efficiency, wimax, wireless connection, broadband, broadband wireless, dsl, cable, scalability, roi, wimax 20/20, wimax 2020, wireless, network management
    
WiMAX 20/20
Published By: TamoSoft     Published Date: Sep 28, 2007
This white paper examines the problems related to the deployment and usage of software-based network monitoring solutions, methods of achieving network traffic visibility in various network configurations that include hubs, switches, routers, etc.
Tags : 
monitoring, lan, wan, best practices, networking, wlan, wireless security, tamosoft, local area networking, network security
    
TamoSoft
Published By: SPAMfighter     Published Date: Nov 27, 2007
This paper will discuss the shortcomings of some established filtering methods and outline how SPAMfighter's community-based approach to filtering can result in it performing much better than competing products and delivering a far superior return on investment.
Tags : 
spam, anti spam, anti-spam, spamfighter, spam fighter, exchange, productivity, costs, spending, spend management, email security, exchange server, servers
    
SPAMfighter
Published By: Tideway Systems     Published Date: Dec 11, 2007
IT service providers need to offer services that deliver new business opportunities whilst increasing levels of availability, controlling risks and reducing costs. This paper provides you with practical guidance based on the practices in ITIL® V3 that will help you manage application and infrastructure changes and configurations.
Tags : 
service management, itil, change management, configuration management, knowledge management, service strategy, service design, tideway, tideway systems
    
Tideway Systems
Published By: RenderX     Published Date: May 27, 2008
This paper presents a complete, generic framework for creating modifiable, flowing PDF forms, based on XML content and standard XSL templates. It requires no programming to generate dynamic, fillable, custom PDF forms by mapping some RenderX XSL FO extensions to form elements.
Tags : 
itext, xsl fo, pdf, pdf forms, dynamic forms, xep, xepwin, fill-able forms, custom forms, form fields, postscript, afp, pinpoint, form field elements, memorystream, renderx
    
RenderX
Published By: Enhancement Software     Published Date: Jan 30, 2009
This white paper is intended to explore the process of secure and efficient paper‐based document marking and printing using Microsoft® Word. At the same time it will explore the savings that can be realized by implementing an automated practice that reduces risk of unintended use.
Tags : 
enhancement software, stampit, automated document marking, document integrity, corporate accountability, compliance, risk management, roi
    
Enhancement Software
Published By: Ademero     Published Date: Oct 04, 2010
Managing accounts payable is a common practice in every commercial establishment. Whether you deal with goods or provide services, materials and supplies have to be purchased to conduct ordinary business.
Tags : 
document management, paper capture, paper scanning, workflow management, paperless office, document storage, automated workflow, retention policies, document versioning, content central, browser based, web based
    
Ademero
Published By: GoToMeeting     Published Date: Apr 04, 2011
This Telework Research Network white paper examines how results-based management addresses the values and demands of today's workforce and provides companies with a multitude of cost-saving, people-retaining benefits.
Tags : 
citrix gotomeeting, results-based management, rowe, engaged consulting, trn
    
GoToMeeting
Published By: PolarLake USA     Published Date: Jun 09, 2008
This paper provides an overview of the benefits and challenges for firms wishing to implement XML-based systems and explores how PolarLake can be used to address these challenges.
Tags : 
polarlake, xml, reference data management, reference data distribution, xml based integration, financial integrations
    
PolarLake USA
Published By: CA Technologies     Published Date: Jul 06, 2011
Written by Malcolm Fry, this whitepaper is based on the service life cycle approach to service management and it provides a great foundation to organisations who want to reduce risk and gain maximum benefit from cloud computing.
Tags : 
ca. service management, it service management, cloud-computing, cloud, servicedesk, itsm, private-cloud, cloud computing, white paper, whitepaper, whitepapers, white papers, public cloud, technology white paper, analyst report.
    
CA Technologies
Published By: Webroot     Published Date: Jul 08, 2011
This paper reviews the business value of IT security, illustrates the business case for SaaS over "do it yourself" premise-based solutions, and outlines what to look for in SaaS solutions you can adopt with confidence and count on as you grow.
Tags : 
webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center, information security
    
Webroot
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.