Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

enterprise compliance

Results 1 - 25 of 190Sort Results By: Published Date | Title | Company Name
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
Many companies claim to offer enterprise grade communications solutions. But how is “enterprise grade” measured and what should you look for? This fact-filled white paper outlines 8 ways to determine whether or not your provider is equipped to offer an enterprise-grade communications solution. Download this complimentary white paper: The 8 Criteria for Enterprise-Grade Communications as a Service 8x8 shares full technical details on what to expect from an enterprise-grade service platform that stands above the rest. You’ll learn the 8 criteria to look for including: What to expect when it comes to service level guarantees What geo-routing technology is and why it’s critical for optimizing global call clarity and reliability What you should look for in your communications provider’s network for global operations and superior service Which security and compliance certifications to expect from your provider Specific uptime and reliability metrics to ask your provider for How analytics
Tags : 
communications, enterprise grade, communications solution, 8x8, geo-routing
    
8x8 Inc.
Published By: Aberdeen Group     Published Date: Jul 11, 2011
This document outlines key concerns that exist for both IT and line-of-business videoconferencing stakeholders and is intended to allow both of these constituencies to better understand the holistic challenges and value propositions of videoconferencing.
Tags : 
aberdeen group, business enterprise videoconferencing, compliance, virtualizing video application, unified communications, video solutions, roi, value proposition
    
Aberdeen Group
Published By: Aberdeen Group     Published Date: Jul 11, 2011
This document outlines key concerns that exist for both IT and line-of-business videoconferencing stakeholders and is intended to allow both of these constituencies to better understand the holistic challenges and value propositions of videoconferencing.
Tags : 
aberdeen group, business enterprise videoconferencing, compliance, virtualizing video application, unified communications, video solutions, roi, value proposition
    
Aberdeen Group
Published By: Acronis EMEA     Published Date: May 19, 2015
This paper provides information on how Acronis Access Advanced enables enterprise IT to provide their users using any device to securely access, sync and share corporate content while maintaining control over security and compliance.
Tags : 
security, security content, mobile enterprise, mobility, acronis, acronis access advanced, security access, compliance
    
Acronis EMEA
Published By: Actiance, Inc.     Published Date: Nov 04, 2014
Despite the range of functionality offered in Office 365, like any cloud-based offering, it cannot be all things to all customers. There are features missing in Office 365 that will prompt some customers to consider the use of third-party, cloud-based, or on-premise tools to enhance Office 365’s native capabilities. Specifically, these third-party enhancements are focused primarily on the security, archiving, and encryption capabilities built into Office 365. Read now!
Tags : 
actiance, microsoft office 365, security, compliance, control, it management
    
Actiance, Inc.
Published By: Actiance, Inc.     Published Date: Nov 13, 2014
The overall archiving market was $1.76 billion in 2013 and is expected to grow at an 11.4% compound annual growth rate (CAGR) through 2019. EIA is emerging as a commonly used technology underpinning for higher-level use cases supporting compliance, information governance, e-discovery and historical preservation of data. Read the report now and learn more!
Tags : 
actiance, gartner, magic quadrant, enterprise information archiving, cagr, eia, compliance, e-discovery
    
Actiance, Inc.
Published By: Adobe     Published Date: Feb 20, 2014
Award-winning design practice advances architecture, interior design, and planning excellence by standardizing on Adobe Creative Cloud and Adobe Acrobat® Pro.
Tags : 
adobe, adobe creative cloud, software, software deployment, enterprise agreement, license management, document security, compliance
    
Adobe
Published By: Adobe     Published Date: Feb 20, 2014
U.K. planning and design consultancy creates sustainable, dynamic, and progressive places for people to live, work, and play by standardizing on Adobe solutions.
Tags : 
adobe, adobe creative cloud, standardization, collaboration, tco, total cost of ownership, enterprise agreement, software deployment
    
Adobe
Published By: Adobe     Published Date: Feb 20, 2014
As a valued customer, Adobe understands that your enterprise takes extensive advantage of our software, with anywhere from hundreds to thousands of licenses for a variety of Adobe solutions. With the Adobe Enterprise Term License Agreement (ETLA), we are now making the management and procurement of your Adobe software simpler, more flexible, and predictable.
Tags : 
adobe, adobe software, enterprise term licensing, etla, adobe solutions, software management, software compliance, tco
    
Adobe
Published By: Ahead     Published Date: Nov 15, 2018
If your business is like many other organizations that are in the process of enabling a Microsoft Azure public cloud platform, then you might be struggling with the guardrails needed to secure and manage cost, while at the same time enabling flexibility for the teams consuming cloud services. While the Azure platform is already very secure, it also allows a great deal of flexibility in configuration. In order to avoid accidentally creating security holes and out-of-control spend, a Governance Framework is required. We created the AHEAD Azure Governance framework to allow enterprises to develop and maintain a fully optimized, and secure environment. The resulting framework will be tailored to your organization’s specific business and compliance needs, as every enterprise is different. This guide will introduce you to the components of this necessary Azure Foundational Governance Design.
Tags : 
    
Ahead
Published By: Akamai     Published Date: Jul 01, 2011
The whitepaper shows how merchants can rid their systems of sensitive payment information.
Tags : 
akamai, enterprise payment security 2.0, payment security management, edge tokenization, pci compliance, credit card data, cybersource, payment data capture
    
Akamai
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: ArcSight     Published Date: Mar 03, 2009
This whitepaper presents ArcSight EnterpriseView, a solution designed to help customers understand who is on the network, what data they are seeing, and which actions they are taking with that data. While doing so, EnterpriseView provides the context to understand whether the business faces additional risk of data loss, compliance breach, or fraud.
Tags : 
idm, identity management, user monitoring, identityview, enterpriseview, logs, siem, event logs
    
ArcSight
Published By: ASG Software Solutions     Published Date: Jul 13, 2009
Enterprise content is growing at an average rate of 200% per year-and the risks of noncompliance are growing even faster. This paper examines the business and technical difficulties of managing content from disparate systems and presents the most viable alternatives for addressing these challenges.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce
    
ASG Software Solutions
Published By: Attachmate     Published Date: Mar 20, 2013
Traditional fraud detection methods, such as application logging, can’t address the scale and sophistication of today’s threats. Find out how to get the visibility you need to better and manage enterprise risk with Luminet.
Tags : 
luminet, intellinx, enterprise fraud management, fraud management, fraud detection, fraud compliance, failed security audit, enterprise fraud management
    
Attachmate
Published By: Attachmate     Published Date: Mar 20, 2013
Insider threats continue to challenge organizations, particularly as BYOD brings complexity to enterprise risk management. The latest Ponemon research highlights recent trends, risk factors and what organizations need to do now to reduce risk.
Tags : 
luminet, intellinx, enterprise fraud management, fraud management, fraud detection, fraud compliance, failed security audit, enterprise fraud management
    
Attachmate
Published By: Aveksa     Published Date: Dec 07, 2007
Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.
Tags : 
access control, access certification, compliant, certification, rules, compliance, governance, risk management
    
Aveksa
Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance
    
Aveksa
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance. With Blue Coat you can deliver business continuity by protecting against threats and data loss, extend protection and policy to users in any location on any device ,safely deploy and consume all types of applications, align IT infrastructure with business priorities to assure and accelerate user experience across the extended enterprise and make risk management tradeoffs and enforce compliance.
Tags : 
technology, bluecoat, infrastructure
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL – such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps – are commonplace. Even email applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps. It’s clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need the ability to preserve complete network and web histories from encrypted network and web traffic for compliance, regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
Tags : 
blue coat, ssl, ssl visibility, server hardware, servers, small business networks
    
Blue Coat Systems
Published By: BMC ESM     Published Date: Nov 06, 2009
Leading bank shares best practices, results of IT compliance implementation. Zions Bancorporation is a leader in SBA lending, public finance advisory services, and agricultural finance. Which means compliance is critical, both to internal workflows and legal mandates like Sarbanes-Oxley.With nearly 25% of the enterprise virtualized, it became clear to IT leaders at Zions that an advanced solution to IT compliance was required. Attend the webinar.
Tags : 
bmc esm, zions, it compliance, virtualization, roi
    
BMC ESM
Published By: BMC Software     Published Date: Jul 22, 2015
In this white paper, you’ll discover an enterprise approach to Big Data that leverages workload automation to: - Integrate Hadoop workflows into your enterprise processes to deliver new applications faster - Resolve issues faster with predictive analytics, automated alerts, and early problem detection - Achieve compliance and governance adherence
Tags : 
big data, business processes, enterprise systems, hadoop, compliance
    
BMC Software
Published By: Box     Published Date: Jun 22, 2018
Like other IT leaders, you know you have to modernize your IT infrastructure to become more productive, efficient, agile and competitive. So what's holding you back? Many organizations are still devoting anywhere from 60% to 80% of their time, energy, human resources and budget to supporting legacy systems rather than develop transformative solutions. Our new eBook, Your 3-step roadmap to IT modernization, will help you align your approach to IT with the way your business works today — and the way you will work in the digital age: • Increased mobility, multiple device formats and distributed workgroups • Greater collaboration with outside organizations, including customers, suppliers and partners • Essential enterprise risk management features such as compliance, legal, security and data governance Here you'll learn the three stages of IT modernization — from realigning your infrastructure to updating business processes — so you take the right steps.
Tags : 
    
Box
Published By: C2C Systems     Published Date: Apr 24, 2013
Download this white paper to see how PST Enterprise enables corporate IT to regain control of distributed corporate email found in PST files to manage compliance, support discovery and minimize risk associated with this data. It enables full discovery of all PST files, regardless of their location or status, and it provides the information needed to take intelligent action on the data within. Such actions include owner determination, in-place retention, data migration, and file copy, move, disconnect and deletion.
Tags : 
pst enterprise, files, emails, data migration, file copy, distribution
    
C2C Systems
Published By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.