Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

policies

Results 276 - 300 of 415Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry     Published Date: Dec 22, 2009
Over a decade ago, mobile telephony entered the enterprise through the back door: employees who could afford mobile phones occasionally used them for business; specific business units budgeted for employee mobiles and then procured them locally; policies surrounding the usage of mobile phones for work were - where they existed at all - haphazard; there was little means of policy enforcement; and in no case were these mobile phones integrated into a business's fixed telephony strategy, let alone its IT strategy. This stands in sharp contrast to other office technologies, such as PCs, faxes, and copiers.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 23, 2010
With sleek designs and a variety of user-friendly features, smartphones have implanted themselves on the public's consciousness-so much so that one leading industry research firm reports that a record 54.5 million such mobile devices were shipped in the fourth quarter last year. With sales rising nearly 40 percent over the same quarter in 2008, the message is clear: Smartphones are hot, and not just for mobile workers.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Information Shield     Published Date: Jan 07, 2009
How mature is your information security policy program? Do you have a set of outdated documents stored in a binder or intranet site? Or do you have a documented management program that keeps your policies up to date, your users informed and your internal auditors sleeping at night?
Tags : 
information shield, information security policies, privacy frameworks, hipaa, glba, information technology, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance, security
    
Information Shield
Published By: Information Shield     Published Date: Jan 13, 2009
Information security policy development should not be a one-time event. In order to effectively reduce risk and maintain a proper governance structure, organizations must periodically update written security policies as part of an ongoing management process.
Tags : 
information shield, legal exposure, iso/iec, security policies, security framework, hipaa, sarbanes-oxley act, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance, security, it management
    
Information Shield
Published By: Numara Software     Published Date: Jan 04, 2010
This white paper moves beyond the hype of green IT and provides substantial support for implementing practical, yet cost effective power management policies and tools to "green" your IT environment and boost your bottom line.
Tags : 
numara, green it, energy efficient, green policies, power management, energy consumption, power, cooling, government energy, network architecture, network management, traffic management, green computing, power and cooling
    
Numara Software
Published By: Osterman Research, Inc.     Published Date: Aug 01, 2011
A recent survey by Osterman Research has confirmed that social media usage by employees has dramatically increased over the past few years. In short, you will leave this Webinar with a better understanding of the usage, trends, and diverse risks posed by social media.
Tags : 
osterman research, social media, commvault, mcafee, live event, web 2.0 security, policies, archiving, compliance, malware
    
Osterman Research, Inc.
Published By: Osterman Research, Inc.     Published Date: Aug 16, 2011
Read this white paper to learn more about the risks, rewards, and potential pitfalls of social networking.
Tags : 
osterman research, social media, commvault, mcafee, live event, web 2.0 security, policies, archiving, compliance, malware, security
    
Osterman Research, Inc.
Published By: AuditBoard     Published Date: Nov 26, 2018
When the IASB and FASB issued a joint press release on May 28, 2014 1 announcing new revenue recognition standards for revenue from contracts with customers, the adoption deadline seemed a long way off. After pushback from companies across various industries, the implementation date was extended by one year, granting companies more time to update their policies and systems to adhere to the new standards.
Tags : 
    
AuditBoard
Published By: Group M_IBM Q2'19     Published Date: Apr 25, 2019
Learn how IBM InfoSphere Virtual Data Pipeline enables developers and DBAs to instantly provision or refresh database copies, regardless of size, on-premises or in any cloud; integrate database copy creation and presentation with developer tools like IBM UrbanCode, Chef, Puppet, Ansible or Salt; and deliver database copies while ensuring that all security policies are maintained including access controls, masking and encryption. With a combination of real-world customer examples and live demonstration, this session will provide a practical understanding of the InfoSphere VDP solution, the business and technical impact delivered, and how to get started quickly.
Tags : 
    
Group M_IBM Q2'19
Published By: Tripwire     Published Date: Apr 28, 2008
Learn more about the security risks and vulnerabilities faced by organizations, and the elements of a proactive security approach. Then find out how Tripwire helps organizations attain and maintain a good security posture using industry-leading configuration assessment and change auditing to harden systems against security breaches, automate compliance with security standards and policies, identify configuration changes, and resolve vulnerabilities.
Tags : 
tripwire, security, risk management, configuration management, change management, change audit, change auditing, security policies
    
Tripwire
Published By: IBM     Published Date: May 28, 2014
Different types of data have different data retention requirements. In establishing information governance and database archiving policies, take a holistic approach by understanding where the data exists, classifying the data, and archiving the data. IBM InfoSphere Optim™ Archive solution can help enterprises manage and support data retention policies by archiving historical data and storing that data in its original business context, all while controlling growing data volumes and improving application performance. This approach helps support long-term data retention by archiving data in a way that allows it to be accessed independently of the original application.
Tags : 
ibm, data retention, information governance, archiving, historical data, integrating big data, governing big data, integration, best practices, big data, ibm infosphere, it agility, performance requirements, hadoop, scalability, data integration, big data projects, high-quality data, leverage data replication, data persistence
    
IBM
Published By: IBM     Published Date: Oct 10, 2016
Read this IBM white paper to learn why all retailers, no matter their size, need the ability to efficiently manage and execute accurate prices, improve their responsiveness to competitor pricing, and ensure compliance with their strategic pricing policies and goals.
Tags : 
ibm, commerce, omni-channel, merchandising, retail, retailers, enterprise applications
    
IBM
Published By: IBM     Published Date: Nov 17, 2016
Read this IBM white paper to learn why all retailers, no matter their size, need the ability to efficiently manage and execute accurate prices, improve their responsiveness to competitor pricing, and ensure compliance with their strategic pricing policies and goals.
Tags : 
ibm, commerce, analytics, retail, merchandising, pricing, intelligent pricing, enterprise applications
    
IBM
Published By: SyberWorks     Published Date: Oct 21, 2008
This blind case study focuses on the operations division of a Fortune 500 company had significant challenges training its franchisees. They struggled with an 8 to 12 month backlog in providing training for their new franchisees coming on board. Anecdotally, when they did get around to training new people, the requirements and curriculum were outdated and in the process of being revised. Their franchisees and employees were never current on updated company policies and procedures. These franchises were spread all over the country, so it was costly to train their franchisees using traditional onsite training methods.
Tags : 
syberworks, learning management system, roi, learning management systems, learning management system, e-learning, elearning, web based training, training management systems, training management system, online training software, web based training software, e-learning, sop automation, seminar logistics, classroom management, online survey tool, competency management, schedule simulation, fda 21 cfr part 11
    
SyberWorks
Published By: HireRight     Published Date: Jul 31, 2013
As state E-Verify legislation becomes more ubiquitous, coupled with federal legislation and increasingly stringent enforcement policies, it has never been more important for all organizations, regardless of size or industry.
Tags : 
hireright, i-9 compliance, ice fines, e-verify legislation, human resources
    
HireRight
Published By: HireRight     Published Date: Jul 31, 2013
As talent management leaders create and refine their hiring policies, increasingly they are driven by overarching strategic themes,
Tags : 
hireright, human resources, 2013 employment screening, benchmarking report, employment screening practices
    
HireRight
Published By: Group M_IBM Q3'19     Published Date: Aug 05, 2019
Expectations for government agencies are rising at a rapid and sometimes overwhelming pace. New laws, mandates and policies combined with rising citizen demands for usability and technology driven services put pressure on the public sector to deliver with current or even shrinking resources.
Tags : 
    
Group M_IBM Q3'19
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod, manufacturing
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : 
mobile device management, manufacturing, mobile devices, smartphone, tablet, byod, networking, security, it management, wireless
    
IBM MaaS360
Published By: IBM     Published Date: Feb 11, 2015
IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.
Tags : 
ibm security, business-centric strategies, security solutions, it policies, security, it management
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM Security provides integrated access management solutions to validate who is who when users connect from inside or outside the enterprise, and to enable proactive access policies on cloud, social and mobile channels, helping improve control and security in complex online environments.
Tags : 
ibm security, access management solutions, mobile channel security, advanced threats, byod, security, it management
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
IBM® Operational Decision Manager Advanced brings together data from different sources to recognize meaningful trends and patterns. It empowers business users to define, manage and automate repeatable operational decisions. As a result, organizations can create and shape customer-centric business moments.
Tags : 
ibm, customer-centric business, operational manager, decision manager, business policies, it management, enterprise applications
    
IBM
Published By: IBM     Published Date: Mar 11, 2015
Read the IBM white paper, “Protecting corporate credentials against today’s threats”, to learn why traditional approaches to protecting corporate credentials no longer work in today’s threat landscape and what steps CISOs must take to prevent credentials theft.
Tags : 
ibm, corporate credentials, credentials theft, identity management policies, anti-malware software, security, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
This whitepaper is about protecting data, enabling mobility and empowering users; unified endpoint management.
Tags : 
data protection, mobility, endpoint management, governance policies, consumerization, byod, security platforms, enterprise mobility, compliance
    
IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.