Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

sam

Results 801 - 825 of 1090Sort Results By: Published Date | Title | Company Name
Published By: Information Shield     Published Date: Jan 07, 2009
How mature is your information security policy program? Do you have a set of outdated documents stored in a binder or intranet site? Or do you have a documented management program that keeps your policies up to date, your users informed and your internal auditors sleeping at night?
Tags : 
information shield, information security policies, privacy frameworks, hipaa, glba, information technology, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance, security
    
Information Shield
Published By: Information Shield     Published Date: Jan 13, 2009
Information security policy development should not be a one-time event. In order to effectively reduce risk and maintain a proper governance structure, organizations must periodically update written security policies as part of an ongoing management process.
Tags : 
information shield, legal exposure, iso/iec, security policies, security framework, hipaa, sarbanes-oxley act, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance, security, it management
    
Information Shield
Published By: McAfee Inc     Published Date: Oct 26, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, security, cyberattacks, midsize, cyberthreats, compliance, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security
    
McAfee Inc
Published By: DoubleTake     Published Date: Jul 14, 2010
SMBs in regulated industries are also subject to the same data availability and data protection requirements as large corporations for regulations such as HIPAA, FDA Part 11, Sarbanes-Oxley and SEC Rule 17, but without the budgets necessary to meet these requirements. This whitepaper provides six tips for an SMB approach to protecting data, such as confidential employee information, so download now to learn how keep your SMB protected from this critical loss of data.
Tags : 
double-take, smbs, server, midsize, backup, vulnerability
    
DoubleTake
Published By: DoubleTake     Published Date: Jul 14, 2010
The Department of Homeland Security puts businesses in two categories: those who have already experienced the pain of losing valuable electronic data, and those who will at some point in the future. Well-prepared businesses know that deploying the right resources, processes and technology to protect vital HR information is important, but having adequate resources and technology in place to protect the same invaluable data in branch offices is just as important, though often overlooked. This paper will teach you how real-time data replication software can automatically backup branch office data to a central server for a simpler, more reliable and cost-effective way to protect your branch.
Tags : 
double-take, data protection, branch offices, backup, vss, rpo, rto, cdp
    
DoubleTake
Published By: Arcserve     Published Date: Feb 26, 2015
In typical organizations, most data resides outside the data center, so it is important that the protection of desktop and laptop computers is given the same priority as file servers and application servers. Have you deployed the right data protection strategy for endpoints? We’re here to help! Arcserve UDP offers a FREE Workstation edition product that specifically focuses on backing up data on endpoints. Not only can desktops and laptops be protected for FREE with award-winning technology that minimizes bandwidth and storage requirements, but they can participate in the global deduplication schema offered by UDP (for 30 days), and have their data protected in public and private clouds, and more! This is too good to pass up! Get your FREE Arcserve UDP Workstation edition now.
Tags : 
arcserve, unified data protection, software download, bandwidth, deduplication, it management, enterprise applications
    
Arcserve
Published By: HR.BLR.com     Published Date: Dec 16, 2011
Access over 2,500 Sample Job Descriptions - Online and at Your Fingertips!
Tags : 
    
HR.BLR.com
Published By: CarbonBlack     Published Date: Mar 16, 2016
Today’s security battle is being waged on the endpoint, and traditional tools are ineffective against today’s sophisticated attackers. Every analyst firm is producing research about Next-Generation Endpoint Security (NGES), and they all reach the same conclusion: every organization needs to upgrade their endpoint security to a modern solution. Download this white paper to learn more.
Tags : 
next generation, endpoint security, nges, next generation endpoint security, security, security solutions
    
CarbonBlack
Published By: Amazon Web Services, Inc     Published Date: Sep 24, 2013
Amazon Web Services (AWS) provides a secure and dependable environment for deploying Microsoft Exchange Server 2010. Customers can use their existing Windows Server applications licenses, such as MS Exchange or SharePoint, on AWS without paying additional licensing fees. Take advantage of the pay-as-you-go-pricing, scalability, and data integrity of the AWS Cloud to run your Exchange Server workloads today. Download the Planning and Implementation Guide to learn more. This guide discusses planning topics, architectural considerations, and configuration steps to run a high-availability and site-resilient Exchange architecture. This guide is designed for Microsoft Exchange Server administrators, architects, and engineers. In the guide, we also provide a sample AWS CloudFormation template that is designed to help you easily provision the necessary AWS resources and update them in an orderly and predictable fashion. Learn more today!
Tags : 
aws, ms exchange, windows server, share point, pay as you go pricing, scalability, data integrity, cloud, server, technology, configuration, cloudformation, security, enterprise applications
    
Amazon Web Services, Inc
Published By: Skillbridge Training     Published Date: Sep 20, 2013
What was once considered futuristic science fiction, Cyber warfare is now today’s reality. Whether in the form of unmanned drones controlled by an operator thousands of miles away from a target, or viruses that travel that same distance in a nanosecond, like it or not, the cyber domain is the next war front.
Tags : 
    
Skillbridge Training
Published By: copperegg     Published Date: Dec 10, 2013
Monitor multiple servers at the same time, from the same interface. Whether your servers are physical, virtual, on-premise, in the cloud, or a combination of these, get the server performance insight you need from any location.
Tags : 
    
copperegg
Published By: Intacct     Published Date: Jan 08, 2014
In the last few years, the demands on the finance department—from real-time reporting to global consolidation—have increased significantly. At the same time, the choices for accounting and financial software have become much more complex. How do you begin to research, evaluate, and select the right software for your business? Download the 2015 Buyer's Guide to Accounting and Financial Software and discover: • Why most financial software systems hinder your ability to get good financial information • The six key questions you need to ask before considering a move to a cloud-based financial solution • Why the process for evaluating software is different for cloud solutions – and the seven SLA must-haves you should get in writing Get all the facts for a successful buying journey!
Tags : 
intaact, financial software, global consolidation, cloud, roi of cloud computing
    
Intacct
Published By: Samanage     Published Date: Apr 24, 2014
As you evaluate Service Desk and Asset Management solutions in the marketplace, you likely have a set of requirements for features and functionality. But have you considered other key factors that will set you up for success with a cloud-based ITSM solution that might not be so obvious? Not evaluating solutions based on these considerations can delay implementation, driving up costs and causing undue stress for the IT professional. Don’t let them stop you in your tracks; instead, consider these criteria when making your solution decision and to gain greater organizational acceptance.
Tags : 
samanage, service desk, asset management, itsm, it service management, itsm, itsm solutions, itsm tools, itam tools, itam solutions, it ticket management system, it workflow, it help desk, cloud-based solutions, saas solutions, it service desk, asset management, it service portfolio, it service catalog, itil software
    
Samanage
Published By: Samanage     Published Date: Aug 05, 2014
Does your IT department have a perception problem within your organization? Listen to the recorded webinar to learn how Shvonne Williams, Director of IT Services at MediFit Corporate Services, was able to turn around her team’s image and transform the IT department into a strategic business partner within the organization.
Tags : 
samanage, medifit corporate services, it deparment, itsm solution, itsm, it management, enterprise applications
    
Samanage
Published By: Samanage     Published Date: Aug 05, 2014
In this webinar recording, you will hear how Caleb Wagnon and Michael Arnold from the Sheridan School District were able to get fully implemented within 14 days with Samanage. In migrating to a unified Service Desk & Asset Management Solution, they were able to benefit from Samanage's Google Apps integration as well as map all of their assets accurately within minutes.
Tags : 
samanage, case study, asset management solution, integration, performance, budget, service desk, enterprise applications
    
Samanage
Published By: Samanage     Published Date: Aug 13, 2014
Join us for this educational webcast, presented by Randy Michaels of Knowledge ToolWorks, a leading expert on IT and business processes, to learn how you can make ITSM work for you without getting tangled up in its ugly tentacles.
Tags : 
samanage, randy michaels, itsm, it service management, knowledge toolworks, service driven organization, itsm framework, it management, enterprise applications
    
Samanage
Published By: Samanage     Published Date: Aug 22, 2014
One of the oldest and largest global private equity firms, The Riverside Company was fed up with their complex ITSM solution, the costly consultants it required to maintain, and the sub-par customer service they received from their vendor. In this webinar, Eric Feldman, Director of IT at Riverside, shares behind-the-scenes details of how they regained control of their domain, including: "IT"SM…and Beyond – Cross functional business challenges that drove their requirements The journey – What they learned about cloud ITSM along the way The tangible benefits – Immediate business impact and what’s now possible including more accurate budgeting and building economies of scale If you’re actively looking at, or merely thinking about a new IT Service Management (ITSM) solution for your organization, this is one conversation you don’t want to miss. Like Riverside, you can get control and become master of your own IT domain.
Tags : 
samanage, itsm, riverside, itsm solutions, vendors, it management, enterprise applications
    
Samanage
Published By: Oracle Social Cloud     Published Date: Jan 14, 2015
Did you know that 97% of business executives want social integrated across their enterprise? According to a recent Oracle global study, respondents nearly unanimously sang the praises of becoming a social business. Social gives you a window into the consumer like never before, revealing affinities that allow your business to understand and personalize engagements that build stronger customer relationships. Consumers don’t see social as a “marketing channel”. They just view it as part of their communications; it’s embedded in their daily mobile and digital experiences. Businesses should be thinking the same way. As Altimeter sees it, social business is the deep integration of social media and social methodologies into the organization to drive business impact
Tags : 
command center, social listening, influencers, digital, social marketing, social intelligence, cmo, oracle, research, social business; marketing cloud
    
Oracle Social Cloud
Published By: Incapsula     Published Date: Jul 11, 2014
DDDoS attacks are bigger, smarter and more dangerous than ever. Incapsula's research shows that almost 33% of Network (Layer 3&4) DDoS attacks exceeded 20 Gbps. At the same time, DDoS botnets used to wage Application (Layer 7) attacks are up by 240% compared to 2013. This report details our findings and insights into the latest DDoS attack trends.
Tags : 
threat, landscape, report, intelligent traffic, filtering, solutions, technology, ddos bots, networking, security, it management
    
Incapsula
Published By: Exablox     Published Date: Jan 27, 2015
When it comes to the increasingly complex task of managing data storage, many small and midsize organizations face even greater challenges than large, global enterprises. Small and midsize companies have ever-increasing volumes of information to manage and secure, and they are confronting a number of difficulties when it comes to storage. Among the biggest hurdles: ›› Scaling storage as the business grows rapidly ›› Meeting the rising expense of data storage capacity ›› Dealing with the complexity of management and architecture ›› Devoting precious staff time managing storage and data backup Whereas larger organizations have significant IT budgets and staff to handle storage-related challenges, small and midsize companies lack the IT resources to dedicate to storage management. Fortunately, there are new approaches to data storage on the market that can help such companies address their data storage needs without requiring dedicated storage management resources, while at the same ti
Tags : 
scaling storage, data storage capacity, data backup, data protection, data management, exablox, oneblox
    
Exablox
Published By: Campaigner     Published Date: Apr 30, 2015
We created this handbook to help you become the world’s greatest email marketer. On these pages, we will introduce some of the same advanced email marketing techniques and tactics used by marketing departments at the largest and most sophisticated companies.
Tags : 
content marketing, email marketing, smart content, data analytics, crm, customer engagement, email campaigns
    
Campaigner
Published By: ForeScout     Published Date: Aug 15, 2017
When it comes to network security, most organizations face a daunting situation. IT infrastructure continues to grow more complex, driven by an onslaught of mobile devices and BYOD, Internet of Things (IoT) adoption, and increasing use of cloud computing. At the same time, the threat landscape becomes increasingly dangerous as organizations face a rise in sophisticated targeted attacks.
Tags : 
    
ForeScout
Published By: Lola Travel Company     Published Date: Jan 24, 2019
As a finance manager, there are a lot of hurdles you encounter that make managing business travel more difficult than it needs to be: chasing receipts, keeping track of multiple employees traveling, making sure everyone’s on the same page with spend, etc. Thankfully, Lola.com has an answer. Check out our latest guide,”How to Simplify Your Company’s Travel Expenses” and learn: -The vital importance of eliminating paper receipts -How simple guidelines improve employee compliance -Why a digital platform helps you easily monitor and control budget
Tags : 
    
Lola Travel Company
Published By: Tripwire     Published Date: Feb 25, 2008
Find out how to maintain the same level of stability and security across both virtual and physical environments, using the same software and approach.
Tags : 
virtual machine, virtual, virtualize, virtualized, virtualization, virtual server, configuration, configuration management, tripwire
    
Tripwire
Published By: AON     Published Date: Oct 25, 2016
The unfortunate reality is that not all of your employees are going to be engaged. You can institute every program imaginable - there will always be a subset of your organization that do not Say positive things about your company, do not feel motivated to Strive to give extra effort, and do not intend to Stay with your company. All the same, this shouldn’t deter you from creating a culture of engagement.
Tags : 
    
AON
Start   Previous    26 27 28 29 30 31 32 33 34 35 36 37 38 39 40    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.