Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

solutions

Results 4751 - 4775 of 5287Sort Results By: Published Date | Title | Company Name
Published By: ASG Software Solutions     Published Date: Feb 18, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITILŪ) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, asg ddm, cab, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ESET     Published Date: Feb 17, 2010
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology.
Tags : 
eset, endpoint security, networkwide platform, integrated security management, heuristic scanning, antimalware, enterprise security, network security
    
ESET
Published By: Websense     Published Date: Feb 16, 2010
This paper from Osterman Research highlights the cost savings of hybrid Web security with data loss prevention, and demonstrates how your organization can save time, money, and resources thereby lowering the cost of securing your enterprise. Register to access a complimentary copy of this Osterman Research white paper on the benefits of hybrid Web security and learn more.
Tags : 
tco, websense, web security, osterman, hybrid, security solutions
    
Websense
Published By: Dependable Solutions     Published Date: Feb 16, 2010
A critical challenge for many companies in 2009 was to stay on top of licensees' obligations, payments, receipts and royalties, along with growing volume of approvals.
Tags : 
dependable solutions, licensing, edi, electronic data interchange, sku
    
Dependable Solutions
Published By: Mimecast     Published Date: Feb 05, 2010
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage
    
Mimecast
Published By: Microsoft Windows Phone     Published Date: Feb 05, 2010
This paper compares the Research In Motion BlackBerry solution (BlackBerry mobile devices and BlackBerry Enterprise Server) with the Microsoft® mobile solution (Microsoft Windows Mobile® and Microsoft Exchange Server 2007 SP1 with Microsoft ActiveSync® technology) by analyzing features of the user experience and the administrator experience.
Tags : 
microsoft windows mobile, mobile work, blackberry, smartphone, exchange server 2007 sp1, activesync, secure mobile messaging, security, tco
    
Microsoft Windows Phone
Published By: EMC Backup & Recovery Solutions     Published Date: Feb 05, 2010
Read this IDC white paper to understand the various approaches to solving today's backup and recovery challenges leveraging deduplication. The paper discusses how to dramatically improve IT economics by optimizing network bandwidth, backup windows, and storage footprint requirements in distributed and datacenter locations alike.
Tags : 
emc, data domain, efficiency, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication
    
EMC Backup & Recovery Solutions
Published By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire provides IT organizations with enhanced file integrity monitoring, configuration assessment and log management that automates continuous PCI compliance.
Tags : 
tripwire, pci compliance, file integrity monitoring, configuration assessment, log management, malware, security, event management
    
Tripwire, Inc
Published By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire Enterprise combines real-time change detection, comprehensive configuration auditing, continuous policy compliance management, and rapid configuration remediation in a single solution. By integrating these Tripwire solutions, you can correlate all suspicious events with changes to take control of threats across all events and changes.
Tags : 
tripwire enterprise, log and event management, security, compliance, configuration audit, total cost of ownership, tco, siem
    
Tripwire, Inc
Published By: NEC     Published Date: Jan 28, 2010
Case Study: NEC provided intuitive and user friendly technology to enrich the whole guest experience with improved service times, personalized assistance and quality communications.
Tags : 
nec, peninsula shanghai, hotel, network solutions, real-time communication, productivity, ip telephony server, wireless technology, unified communications, ip networks, ip telephony, network management
    
NEC
Published By: Athena Security     Published Date: Jan 28, 2010
SIEM solutions detect real attacks from the thousands of events that are happening in the network. When an unexpected and potentially dangerous event is recognized, engineers take a quick (temporary) action to block the security leak, diagnose what really went wrong, determine what else is at risk, and decide on a fix.
Tags : 
firewalls, security, sim, siem, network security, risk, firewall analytics, security incident, threat, firewall change, network configuration
    
Athena Security
Published By: Tripwire     Published Date: Jan 26, 2010
Learn why that's so, why traditional log and event management solutions don't provide the answer, and how a modern integrated product does.
Tags : 
tripwire log center, event management, security event analysis, database, graphical tool, centralized dashboard, activity monitoring, security alert, integrated configuration control
    
Tripwire
Published By: SDL Web Content Management Solutions     Published Date: Jan 22, 2010
This paper examines the ways in which organizations can tap into Web 2.0 interaction as part of the marketing strategy and tactics to create customer engagement by matching your visitors' passion and to figure out the "best fit" for the new opportunities that present themselves.
Tags : 
sdl tridion, a/b, crm, ecm, web 2.0, social networks, dam, wcm, web content management, multisite functionality, content management
    
SDL Web Content Management Solutions
Published By: SDL Web Content Management Solutions     Published Date: Jan 22, 2010
Organizations face many challenges when creating a constellation of global Web sites. They need to maintain brand consistency while allowing for variations that reflect local culture. Creating truly localized Web sites can be a daunting process, in which corporate and local marketing teams need to work together to provide relevant information to many different target audiences.
Tags : 
sdl tridion, a/b, crm, ecm, blueprinting, flysn, wcm, dam, wcm, web content management, multisite functionality, network architecture, network management, content management
    
SDL Web Content Management Solutions
Published By: SDL Web Content Management Solutions     Published Date: Jan 22, 2010
Online marketing needs to be coordinated and consistent with marketing communication and business objectives. To compete in today's marketplace, marketing professionals need a solution that allows them to react to changing market conditions cost effectively: coordinated marketing communication at a lower cost.
Tags : 
sdl tridion, a/b, multi-channel marketing, branding, crm, ecm, rss, xml, wcm, dam, wcm, web content management, multisite functionality, infrastructure, network architecture, network performance, content management
    
SDL Web Content Management Solutions
Published By: SDL Web Content Management Solutions     Published Date: Jan 22, 2010
This white paper provides examples of how organizations can use BluePrinting technology to achieve a smooth, global Web operation-and explains how organizations can combine Content Management technology with translation technologies for even greater efficiency.
Tags : 
sdl tridion, a/b, crm, ecm, blueprinting, flysn, wcm, dam, websites, translation
    
SDL Web Content Management Solutions
Published By: SDL Web Content Management Solutions     Published Date: Jan 22, 2010
This paper examines the ways in which organizations can tap into Web 2.0 interaction as part of the marketing strategy and tactics to create customer engagement by matching your visitors' passion and to figure out the "best fit" for the new opportunities that present themselves.
Tags : 
sdl tridion, a/b, crm, ecm, web 2.0, social networks, dam, wcm, web content management, wcm, customer experience
    
SDL Web Content Management Solutions
Published By: Unica Corporation     Published Date: Jan 19, 2010
Most web analytics solutions were initially architected to generate reports using only aggregate data. Next generation web analytics solutions use both aggregate and individual level data to achieve interactive marketing success. This free interactive infographic, includes live links that will guide you through a valuable framework for web analysis and gives insight into your overall website performance and visitors' behaviors. Learn how to optimize your visitors' website experiences and turn those experiences into actions.
Tags : 
interactive web analytics map, next generation web analytics, website optimization, multi-channel analytics, aggregate level analytics, individual level analytics, website performance, behaviorial targeting, website personalization
    
Unica Corporation
Published By: Vidyo, Inc.     Published Date: Jan 18, 2010
Videoconferencing endpoints will grow by an order of magnitude in the next few years. The videoconferencing use model is going through a tremendous transformation. The decades-old conference room model is quickly giving way to more effective solutions. Download this whitepaper to discover more.
Tags : 
vidyo, telepresence, video communication, communication, mcu, h.264, svc, avc, endpoints, conferencing, cloud, content management
    
Vidyo, Inc.
Published By: Guaranteed Direct     Published Date: Dec 22, 2009
How do you stand out from the rest of the pack, while trying to spend less and deliver better results? This paper examines 5 secrets to one overlooked media that is paying big dividends for organizations in a range of industries.
Tags : 
guaranteed direct, direct marketing, marketing solutions, newspapers, online, door hangers, visibility
    
Guaranteed Direct
Published By: Vision Solutions     Published Date: Dec 04, 2009
The newest edition of this unique report is filled with survey findings from over 4,000 individuals responsible for the resilience and protection of AIX and IBM i (i5/OS) environments. Discover if and how your peers are meeting recovery-time and recovery-point objectives, disaster recovery plans and more.
Tags : 
vision solutions, ibm power systems, aix users, data protection, recovery and optimization, it availability
    
Vision Solutions
Published By: Double-Take Software     Published Date: Dec 03, 2009
Download this paper today to learn about new solutions that use real-time data replication software to automatically backup branch office data to a central server to provide a simpler, more reliable and cost-effective way to protect your branch offices.
Tags : 
double-take, data protection, branch offices, backup, vss, rpo, rto, cdp
    
Double-Take Software
Published By: Vision Solutions     Published Date: Dec 03, 2009
Download this paper today to learn about new solutions that use real-time data replication software to automatically backup branch office data to a central server to provide a simpler, more reliable and cost-effective way to protect your branch offices.
Tags : 
double-take, data protection, branch offices, backup, vss, rpo, rto, cdp, vision
    
Vision Solutions
Published By: NetApp     Published Date: Dec 01, 2009
This technical report (TR) provides guidelines and best practices for integrated architectures and implementations of Microsoft® Hyper-V with NetApp® storage solutions.
Tags : 
netapp, storage, microsoft virtualization, technical report, integrated architectures, hyper-v, cluster network, configuration, back up and recovery, disaster recovery
    
NetApp
Published By: Trend Micro SPN     Published Date: Nov 24, 2009
How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, infected, recovering, instant messaging
    
Trend Micro SPN
Start   Previous    184 185 186 187 188 189 190 191 192 193 194 195 196 197 198    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.