Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

ssm

Results 301 - 325 of 555Sort Results By: Published Date | Title | Company Name
Published By: Melissa Data     Published Date: Nov 18, 2008
Learn what a Web Service is and how it works, the advantages of using a Data Quality Web Service, the technology assessment for implementation, and several case studies (Saab and other real world case studies) to demonstrate real life successes.
Tags : 
melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software, data quality tools, data quality management, data quality objects, data quality api, address quality, data cleanse, data hygiene, data quality, data quality analysis, data quality api, data quality assurance, data quality control
    
Melissa Data
Published By: Progress Software Corporation CEP     Published Date: Oct 23, 2009
IDC Report: Complex Event Processing Opportunity Analysis and Assessment of Key Products Read this excerpt of the 2009 IDC study by Maureen Fleming and Jeff Silverstein looking at complex event processing. The excerpt includes IDC opinion on the market for CEP, what defines CEP and independently profiles Progress Apama, which was ranked "Top CEP Innovator" in the report.
Tags : 
progress software, idc, complex event processing, business intelligence, cep, mom
    
Progress Software Corporation CEP
Published By: Progress Software BTA Financial     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : 
soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security, it governance, soa, soa governance
    
Progress Software BTA Financial
Published By: Progress Software BTA Telecommunications     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : 
soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security, it governance, soa, soa governance
    
Progress Software BTA Telecommunications
Published By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire provides IT organizations with enhanced file integrity monitoring, configuration assessment and log management that automates continuous PCI compliance.
Tags : 
tripwire, pci compliance, file integrity monitoring, configuration assessment, log management, malware, security, event management
    
Tripwire, Inc
Published By: IBM Software     Published Date: Nov 04, 2010
Read this Harvard Business Review article to learn how smart organizations are improving decision-making by identifying and prioritizing decisions; examining factors involved in each decision; designing roles, processes, systems and behaviors to improve decisions; and institutionalizing the new approach through training, refined data analysis, and outcome assessment.
Tags : 
ibm cognos, harvard business review, data analysis, decision management
    
IBM Software
Published By: HP Intel     Published Date: Sep 15, 2010
See Paul's checklist for assessing your data center needs for today - and for the future of your business.
Tags : 
hp intel, upgrade data center, hardware assessment, server age, storage, computing power, cooling system, server hardware, servers, cloud computing, power and cooling, data center design and management
    
HP Intel
Published By: Lumension     Published Date: Jan 11, 2012
Learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security
    
Lumension
Published By: Lumension     Published Date: Mar 31, 2012
Don't leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security, it management
    
Lumension
Published By: Lumension     Published Date: Mar 31, 2012
Streamline your compliance efforts by implementing these five tips that will help you better tie together security deployments and processes, business goals and compliance activities.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security, it management
    
Lumension
Published By: SugarCRM     Published Date: Jan 17, 2014
Das neueste Release von Sugar gibt Nutzern neue Tools für den Aufbau bester Kundenbeziehungen. Lesen Sie eine Analyse von Ovum über Sugar’s optimierte Leistungsfähigkeit, die Unternehmen beim Ausbau der Kundenbindung und –zufriedenheit unterstützt. (Report nur in Englisch verfügbar.)
Tags : 
swot assessment, sugarcrm, catalyst, software, crm, sugarcrm v7, relationship management, customer relationship, ovum, public cloud
    
SugarCRM
Published By: IBM Unica     Published Date: Feb 09, 2012
Our CMO Study is the latest in IBM's series of C-suite Studies, encompassing interviews with more than 15,000 top executives over the past seven years. The study casts light on the challenges public and private sector CMOs confront - and the opportunities they envision - in increasingly complex times. It also illustrates how closely CMOs' perception of the marketplace mirrors previous assessments by CEOs.
Tags : 
cmo, ibm, marketing, chief marketing officer study, c-suite, customers, customer satisfaction, consumers
    
IBM Unica
Published By: TeamQuest     Published Date: Aug 21, 2012
Take this 15-question assessment to identify the maturity level at which your IT organization is currently operating. Have your colleagues complete it, too, so you can compare answers and results. It makes for some productive discussions!
Tags : 
teamquest, assessment, capacity management
    
TeamQuest
Published By: TeamQuest     Published Date: Sep 06, 2012
Your answers to these 15 questions will give you a good indication of the maturity level at which your IT organization is currently operating.
Tags : 
capacity planning, teamquest, information technology
    
TeamQuest
Published By: IBM     Published Date: Oct 01, 2012
Customers require flexible, agile and easy to consume IT solutions to succeed in business. Harvard Research Group (HRG) has taken a closer look at IBM PureSystems and and how it compares to Cisco UCS.
Tags : 
ibm, cisco, expert integrated systems, servers, storage, networking, management, security, operating systems, infrastructure
    
IBM
Published By: CDW     Published Date: Aug 07, 2015
How you benefit from VMware vSphere with Operations Management
Tags : 
data center, storage, cloud, risk management, data center design and management
    
CDW
Published By: SilverSky     Published Date: Dec 11, 2014
Forrester's 26-criteria evaluation of managed security service providers (MSSPs) included the 13 most significant vendors in the North American market that security and risk professionals can turn to for solving some of their most important security challenges. Forrester’s assessment evaluates MSS offerings based on current offering, market presence and strategy. SilverSky was named a “leader” in the report, with highest marks for delivery capabilities and services and its market presence in North America. Forrester states in the report that, “SilverSky capabilities rival those of larger companies."
Tags : 
mssps, managed security service, security challenges, security professionals, security, it management, enterprise applications
    
SilverSky
Published By: Dell SecureWorks     Published Date: Sep 09, 2013
The Dell SecureWorks Security and Risk Consulting practice delivers the independent expertise, experience and perspective you need to address your security, risk and compliance concerns.
Tags : 
dell, dell secureworks, risk consulting, cyber security, security
    
Dell SecureWorks
Published By: NAVEX Global     Published Date: Nov 18, 2013
Download this whitepaper to learn the 4 fundamental steps to creating an effective third party compliance program like the elaborate, richly funded programs that are so prominent in the news.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance, third party compliance, risk assessment
    
NAVEX Global
Published By: NAVEX Global     Published Date: Nov 18, 2013
Download this paper to explore the 4 areas that are key to managing social media use by employees in your organization.
Tags : 
social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra, retaliation, harassment, mobile training, risk assessment, data, culture assessment, program assessment
    
NAVEX Global
Published By: NAVEX Global     Published Date: Mar 04, 2014
If you are looking for a deeper understanding of how to effectively and efficiently manage your organization’s employee handbook, code of conduct, and policies and procedures, The Definitive Guide to Policy Management is your all-inclusive resource.
Tags : 
navex global, ethics and compliance, code of conduct, policy management, perspectives, assessment tools, best-practice, automation, policy management software, policy development, company vision, decision making, prevent and detect
    
NAVEX Global
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.