Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

sam

Results 1 - 25 of 1069Sort Results By: Published Date | Title | Company Name
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Customers now expect the same level of service on social media from financial firms, insurance providers, and other regulated enterprises as they receive from technology and retail companies. But without the right compliance controls in place, your organization could violate customer privacy rules and other regulatory guidelines. Are you taking the right steps to ensure compliance?
Tags : 
compliance, social media, social media management, enterprise, hootsuite
    
uberVU via HootSuite
Published By: Seamless     Published Date: Sep 13, 2013
Are you in charge of ordering food for the office? Do colleagues ask for last-minute catering and complain about eating the same thing all the time? Do you have to track budget codes and billing information? If you think there has to be a better way, you’re right. Join us for this 30-minute educational webinar and learn how online food ordering services can help eliminate all of these hassles while saving you time and money. From individual meals and group orders, to catered meetings and company parties, if you order food into the office, you don’t want to miss this webinar.
Tags : 
save money, save time, online food ordering, food, ordering food online, seamless
    
Seamless
Published By: Seamless     Published Date: Sep 13, 2013
Are you in charge of ordering food for the office? Do colleagues ask for last-minute catering and complain about eating the same thing all the time? Do you have to track budget codes and billing information? If you think there has to be a better way, you’re right. Join us for this 30-minute educational webinar and learn how online food ordering services can help eliminate all of these hassles while saving you time and money. From individual meals and group orders, to catered meetings and company parties, if you order food into the office, you don’t want to miss this webinar.
Tags : 
    
Seamless
Published By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
    
OKTA
Published By: CDW     Published Date: Feb 24, 2015
Software asset management (SAM) solutions promise to fix all that. They present a set of tools, practices and processes that take the uncertainty out of software licensing and enable organizations to fully optimize software inventories.
Tags : 
software license, software compliance, software asset management, sam, strategic license management, cloud-based services, virtualization, network security
    
CDW
Published By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
Published By: IBM     Published Date: Oct 10, 2012
It is clear that we live in a land of the survival of the fittest. This same scenario is certainly not news to the CIO of any enterprise data center, especially in the data center with a mission-critical infrastructure.
Tags : 
it infrastructure, data, servers, unix, ibm, data center
    
IBM
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets, it management
    
CDW
Published By: Uberall     Published Date: Apr 12, 2019
Ein Online-Filialfinder ist einer der wichtigsten Bestandteile Ihrer Website. Er sorgt dafür, dass Online-Suchende zu Offline-Kunden werden. Die Voraussetzung: Ein optimales Nutzererlebnis. Wir haben die 10 Schlüsselfaktoren zusammengestellt, die Ihren perfekten Filialfinder ausmachen.
Tags : 
locator, uberall, store locator, location marketing, local listings, filialfinder, lokale standortseiten, ropo
    
Uberall
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Die Suche nach dem richtigen Cloudsicherheitsanbieter ist kein einfaches Unterfangen. Viele Anbieter scheinen auf den ersten Blick gleich: ähnliche Kennzahlen, ähnliche Versprechungen. Um allerdings einen echten Vergleich ziehen zu können, müssen Sie Informationen sammeln, Fragen stellen und Details herausfinden, die viele Cloudanbieter nur ungern preisgeben. Mithilfe dieser Liste können Sie sich anhand fundierter Informationen für den richtigen Cloudsicherheitsanbieter entscheiden, der Ihr Unternehmen vor Cyberangriffen schützt.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 24, 2017
Die Suche nach dem richtigen Cloudsicherheitsanbieter ist kein einfaches Unterfangen. Viele Anbieter scheinen auf den ersten Blick gleich: ähnliche Kennzahlen, ähnliche Versprechungen. Um allerdings einen echten Vergleich ziehen zu können, müssen Sie Informationen sammeln, Fragen stellen und Details herausfinden, die viele Cloudanbieter nur ungern preisgeben. Mithilfe dieser Liste können Sie sich anhand fundierter Informationen für den richtigen Cloudsicherheitsanbieter entscheiden, der Ihr Unternehmen vor Cyberangriffen schützt.
Tags : 
    
Akamai Technologies
Published By: Riverbed     Published Date: Sep 05, 2014
If you work on a network operations team, you know how increasingly hard it is to understand and ensure application performance for your end users. You need visibility into areas where issues may occur – end-user devices, network and infrastructure – in order to identify and diagnose problems quickly and minimize downtime. But it hasn’t been easy to gain this level of visibility across the WAN or hybrid network without deploying additional probes, packet capture devices or remote site technicians. Blind spots are everywhere making it difficult to focus on managing and monitoring the applications that matter the most to your business. And when nearly 50% of a network’s traffic is web-based and it all looks the same to the network, identifying your important applications and staying ahead of their performance problem is more difficult than ever. That could mean inefficient troubleshooting, longer time to resolution, and an overall lack of application intelligence. Who wants that?
Tags : 
application, network, performance, nirvana, visibility, infrastructure, enterprise applications
    
Riverbed
Published By: ARX (Algorithmic Research)     Published Date: Feb 14, 2008
As the traditional “paper-based” world gives way to digital documentation and transactions, enterprises are demanding innovative solutions for digitally signing and authenticating such documents, files, and forms with iron-clad protection against forgery. Solutions must guarantee non-repudiation and promise the same level of security and trust that exists with conventional documentation. At the same time, such a solution should be simple to use, easy to deploy and offer a rapid ROI.
Tags : 
digital signature, electronic signature, digital signatures, electronic signatures, digital signature, arx, algorithmic research, pki, public key, authentication, document management
    
ARX (Algorithmic Research)
Published By: Akamai Technologies     Published Date: May 05, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cyberattacks, cloud service, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cloud solutions, data analysis, cyberattacks
    
Akamai Technologies
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
    
Limelight Networks
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Published By: New Voice Media     Published Date: May 22, 2017
Business is going through rapid, unprecedented change. We are accustomed to having access to information and resources wherever we are. Our anticipations and expectations of business have changed, and we expect the same when we deal with any organization, whether as a customer, employee, stakeholder or partner.
Tags : 
    
New Voice Media
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
It doesn’t matter whether you’re new to Oracle Retail, have an active implementation project that is running or have an existing deployment in production. The same issue applies: You are making a significant investment in the technology and need to develop a reliable and efficient batch schedule. If you’re new to Oracle Retail, you are no doubt embarking on a major project to improve your competitive position in the retail market. With that in mind, your goals will be to shrink the time-to-market for your retail implementation, lower the reliability risks associated with in-house developed solutions and improve the visibility and control of retail business processes. In this eBook you will discover a series of recommendations for operating a fail-safe and efficient Oracle Retail operational environment. You will also understand how automation enables you to streamline the execution of your Oracle Retail batch operations and increase the day-to-day efficiency of your operations teams.
Tags : 
    
CA Technologies_Business_Automation
Published By: Adobe     Published Date: Mar 21, 2017
The 2017 Digital Trends in Financial Services and Insurance report is based on a sample of almost 850 FSI respondents1 who were among more than 14,000 digital professionals taking part in the annual Digital Trends survey carried out in November and December 2016.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 21, 2017
The 2017 Digital Trends in Retail report is based on a sample of almost 500 retail respondents who were among more than 14,000 digital professionals taking part in the annual Digital Trends survey carried out in November and December 2016.
Tags : 
    
Adobe
Published By: Anaplan     Published Date: Sep 07, 2018
Sie können sich sicherlich noch an den Planungsprozess der letzten Jahre erinnern. An die vielen Spreadsheets, die vielen Überstunden und die Tatsache, dass die Pläne der verschiedenen Unternehmensbereiche und Abteilungen nicht wirklich miteinander vernetzt waren. Lesen Sie nach, warum Sie sich nicht mehr auf altmodische, unübersichtliche und überkomplizierte Spreadsheets verlassen sollten, wenn es um Ihre Planung geht. Anaplan wurde in der Studie “The Planning Survey 2017” von BARC in 21 von insgesamt 31 Bewertungskategorien auf den 1. Platz gewählt. In den übrigen 10 Kategorien hat Anaplan den 2. Platz erreicht – zum Teil weit vor den anderen Mitbewerbern. Speziell in den Kategorien “business benefits”, “planning functionality”, integrated planning” und “flexibility” konnte Anaplan durch erste Plätze überzeugen. Laden Sie sich Ihr persönliches Exemplar der Studie herunter und lesen Sie selbst nach, warum Anaplan so herausragende Ergebnisse bei den Anwendern erzielen konnte.
Tags : 
    
Anaplan
Published By: Bridgeline Digital     Published Date: Oct 28, 2013
This eBook is for designers that are tired of creating the same bland emails, the content marketers who find themselves at a loss while coming up with the right words in their subject line, and, most of all, for the frustrated marketing teams that are sick of wondering why their campaigns fail to produce desired results.
Tags : 
email marketing, email marketing campaign, email marketing strategies, content marketing, maximizing customer engagement, email design, autoresponders, automated emails
    
Bridgeline Digital
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 28, 2018
Die Cloud ist in fast jedem Bereich des Enterprise Computing zur Normalität geworden. Sie ist ein wesentlicher Bestandteil der Geschäftswelt und sollte als neuer Standard betrachtet werden. Datensicherung – insbesondere Backup, Archivierung und Disaster Recovery – steht zurzeit ganz oben auf der Liste der Cloud-Aktivitäten. Doch haben Sie auch Ihren Public Cloud Vertrag vor der Unterzeichnung sorgfältig durchgelesen und ausgehandelt, sodass er Ihren Geschäftsanforderungen entspricht? Oder haben die zahllosen Seiten mit rechtlichen Bestimmungen Sie dazu verleitet, zu schnell zu unterschreiben Ihre Rechtsabteilung muss selbstverständlich das gesamte Dokument umfassend prüfen. Im Folgenden finden Sie zudem drei wichtige Punkte, die Sie bei der Zusammenarbeit mit Ihrem Cloud-Anbieter berücksichtigen sollten.
Tags : 
unterzeichnung, public, cloud, vertrages, beachten, sollten
    
AstuteIT_ABM_EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.