Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

content access

Results 1 - 25 of 85Sort Results By: Published Date | Title | Company Name
Published By: Commvault     Published Date: Jul 06, 2016
Email is the backbone of today’s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers, vendors, partners and investors. It is arguably today’s most pervasive and critical business application within which is stored the most valuable business content. To protect this vital information while working to eliminate risk, lower management costs and improve business insight, companies require a comprehensive email archiving solution. This solution should not only work to effectively retain email information in a searchable repository, the best email archiving solutions also provide a smarter approach to collecting, retaining and accessing data so that it can deliver true business value.
Tags : 
commvault, email archiving, data protection, email archiving solution, mailbox archiving, reduce bloat, o365, it management, storage, best practices
    
Commvault
Published By: Infosys     Published Date: May 30, 2018
Customers today are far more concerned about the contents and origin of a product than ever before. in such a scenario, granting them easy access to product information, via digital initiatives such as SmartLabel™, goes a long way in strengthening customer trust in a brand. But it also means expending several man-hours of effort processing unstructured data, with the possibility of human error. Intelligent automation can help save effort and time, with virtually error-free results. A consumer products conglomerate wanted a smart solution to implement SmartLabel™ compliance. See how Infosys helped and the five key takeaways from the project.
Tags : 
automation, brand, information, digital, customer
    
Infosys
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Published By: CA Technologies     Published Date: Sep 29, 2011
CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.
Tags : 
technology, drivers, security, reduce risk, applications, online service, business, confidentiality, access control, identity management, intrusion prevention, security management, security policies, web service security, vulnerability management
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : 
technology, virtual, identity management, access control, security, protection, application security, authentication, internet security, intrusion prevention, security management
    
CA Technologies
Published By: Limelight Networks     Published Date: Feb 21, 2018
From the boardroom to the backroom, everyone is looking for ways to protect their digital content from cyber threats like DDoS attacks, unauthorized access or theft. In this white paper, we’ll discuss ten different ways to protect your digital content, ensure high availability and maintain superior quality of experience for every digital visitor.
Tags : 
    
Limelight Networks
Published By: Box     Published Date: Nov 24, 2015
The adoption of enterprise content collaboration solutions has exploded as individuals sought ways to easily access, manage, and collaborate on content. Accordingly, businesses want to leverage those easy-to-use solutions but can’t compromise when it comes to enterprise-grade administrative control, security, and business insights.
Tags : 
box, dropbox, business, productivity, collaboration, content, enterprise, knowledge management, enterprise applications, data management
    
Box
Published By: Box     Published Date: Nov 24, 2015
Organizations are struggling to ensure their content is appropriately secure, while remaining easily searchable, accessible and shareable both inside and outside of the enterprise.
Tags : 
box, business, enterprise, information governance, content, security, knowledge management, enterprise applications
    
Box
Published By: Onbase     Published Date: Feb 18, 2016
As a strategic framework, ECM can help organizations take control of their content; and, thereby boost productivity, encourage collaboration, help meet compliance initiatives, enable better content-centric processes and make information easier to share.
Tags : 
accounting, finance, finance management, best practices, business management, business process management
    
Onbase
Published By: Micron     Published Date: Oct 14, 2016
Today’s IT professionals are well aware that users expect fast, reliable access to ever-growing amounts of data – from web content, to videos, to business intelligence data and more. Meeting the challenges of this exponential growth is nearly impossible with existing, spinning media storage technology. Hard disk drives (HDDs) have been the standard in data storage for decades, but they can no longer satisfy. They create bottlenecks in data access, they fail to meet the growing demands of higher user expectations, and they consume too much power. Download to learn how to solve this issue.
Tags : 
    
Micron
Published By: Salsify     Published Date: Mar 15, 2019
Read this case study to learn how the makers of Duck® Tape leverage product experience management to increase efficiency and grow market share. “You need to both be able to create, generate, and optimize great content, and then deliver it to your customers in an efficient and effective way. And that's what I feel like Salsify has done for us - it’s given us that simple point of truth, the ability to manage and measure it, optimize it, and iterate.” - Scott Sommers, Director of Ecommerce Strategy With a wide range of globally recognized brands like Duck®, FrogTape® and Shurtape® brands, ShurTech needed to develop a more streamlined approach to the ecommerce presence that empowered his team to continually optimize and deliver impactful content to key retail channels like Amazon, Walmart and Essendant. Learn more about the step-by-step approach the ShurTech team took to: Build and maintain a centralized, consistent and accessible source of production information to arm all divisions
Tags : 
    
Salsify
Published By: IBM     Published Date: Apr 17, 2012
IBM social content management provides content in context -- to share ideas, locate expertise, and access relevant knowledge via professional social networks.
Tags : 
ibm, social content, social media, technology, digital content, mobile data systems, smart phones, wireless communications, application integration, application performance management
    
IBM
Published By: Acronis EMEA     Published Date: May 19, 2015
Download this paper to uncover the steps needed to mobilise your workforce and become more productive.
Tags : 
mobilise your workforce, mobility, productivity, content, data, access, mobile device management, security access, access control, mobile computing, mobile data systems, mobile workers, smart phones
    
Acronis EMEA
Published By: Acronis EMEA     Published Date: May 19, 2015
This paper provides information on how Acronis Access Advanced enables enterprise IT to provide their users using any device to securely access, sync and share corporate content while maintaining control over security and compliance.
Tags : 
security, security content, mobile enterprise, mobility, acronis, acronis access advanced, security access, compliance, share corporate content, sync, enterprise security, acronis access advanced solution, access control, application security, mobile computing, mobile data systems, pci compliance, mobile device management
    
Acronis EMEA
Published By: Hitachi Vantara     Published Date: Mar 20, 2018
ESG Lab performed hands-on evaluation and testing of the Hitachi Content Platform portfolio, consisting of Hitachi Content Platform (HCP), Hitachi Content Platform Anywhere (HCP Anywhere) online file sharing, Hitachi Data Ingestor (HDI), and Hitachi Content Intelligence (HCI) data aggregation and analysis. Testing focused on integration of the platforms, global access to content, public and private cloud tiering, data quality and analysis, and the ease of deployment and management of the solution.
Tags : 
    
Hitachi Vantara
Published By: McAfee     Published Date: Sep 15, 2014
URL filtering is a type of content filtering that allows or blocks users from accessing specific websites. The practice has become an essential one on enterprise networks, with the goal of blocking employees from accessing content that would be a detriment to their productivity or the company as a whole. Blocked sites may include those that threaten the security of the organization, have objectionable content, or are bandwidth-intensive enough to strain company resources.
Tags : 
best practices, url filtering, network security, blocked sites, security management
    
McAfee
Published By: MarkLogic     Published Date: May 15, 2017
Data is critical to the entertainment industry and not taking advantage of it can keep you from creating great experiences and delivering the right content to partners. And, more than that, it can make it hard for you to optimize operations, get insight into the content’s value and stay ahead of the many changes in how content is created, consumed and monetized. However, even with the new digital tools in production, there are many challenges to making use of this data. The effort involved can take time and resources away from film production, introduce security risks, and leave key data inaccessible to those that need it. In this paper, we review: • The current state of production data • The challenges the entertainment industry is facing in making use of data • A new “Smart Content” approach that is helping industry pioneers to reduce complexity on the set, drive reporting, and enable them to stay ahead of market changes
Tags : 
    
MarkLogic
Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks
Published By: Wasabi     Published Date: Nov 13, 2018
It is critical for media and entertainment companies that they get the most out of the content they’ve invested in. But for many monetization of their assets is being inhibited by slow and expensive tape-based archival solutions (LTO) as well as first generation cloud storage like Amazon. Wasabi Hot Cloud Storage, in partnership with Marquis Medway, is bringing media and entertainment companies a transformative new solution. Wasabi’s next generation cloud storage brings companies the speed they need to leverage their content, but costs far less than the traditional cloud storage options. Plus unlike Amazon and others, Wasabi does not charge you to retrieve your content—potentially a huge savings depending on how much you access it. To help you quickly and efficiently get assets from tape to cloud Wasabi has combined with Marquis Medway’s advanced workflow automation platform. To learn more about how this integrated solution can help you rapidly transition away from resource draining LT
Tags : 
    
Wasabi
Published By: Wasabi     Published Date: Nov 13, 2018
In this case study, read about how one major broadcaster discovered a whole new solution for accessing their archived content and saved a lot of money in the process. Needing on-demand access to archived promotional content this broadcaster was using both on-premise storage and off-promise tape storage with disappointing results. Seeking an alternative they looked to the cloud and Amazon S3. But before they could pull the trigger their media management company Acembly introduced them to Wasabi. It was a game changer. Wasabi’s Hot Cloud Storage is 80% cheaper and 6x the speed of even Amazon’s fastest offering. Plus, there’s free unlimited egress which is crucial for companies with unpredictable content needs. Download the case study to see how Wasabi’s revolutionary cloud storage technology is changing the possibilities for broadcasters and how they access their content.
Tags : 
    
Wasabi
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.
Tags : 
fortinet, content filtering, application filtering, web security, malware, web access control, web filtering solution, anti spam, anti spyware, anti virus, internet security, phishing, web service security, content management
    
Fortinet, Inc.
Published By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
For many years, traditional businesses have had a systematic set of processes and practices for deploying, operating and disposing of tangible assets and some forms of intangible asset. Through significant growth in our inquiry discussions with clients, and in observing increased attention from industry regulators, Gartner now sees the recognition that information is an asset becoming increasingly pervasive. At the same time, CDOs and other data and analytics leaders must take into account both internally generated datasets and exogenous sources, such as data from partners, open data and content from data brokers and analytics marketplaces, as they come to terms with the ever-increasing quantity and complexity of information assets. This task is clearly impossible if the organization lacks a clear view of what data is available, how to access it, its fitness for purpose in the contexts in which it is needed, and who is responsible for it.
Tags : 
    
Waterline Data & Research Partners
Published By: IBM     Published Date: Jan 19, 2017
This ebook takes you on a journey to discover a cloud-based content management solution that provides greater visibility and collaborative control over business content. Meet Mike, an IT Solutions Executive, looking for an innovative way to collaborate that's secure, easy to use, immediate and accessible -- all while meeting strict governance policies.
Tags : 
ibm, analytics, ecm, box, box for it, content, cloud, content management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 19, 2017
New technology and requirements for work in the digital workplace is driving new demand for enterprise content management solutions. Cloud and Mobile have forced companies to rethink how they access and interact with content. ECM has a rich history, evolving over time to meet the new demands for working with content. This short video will show you how ECM has evolved over time and where it is going. Learn how ECM is transforming and how companies are applying traditional ECM principles combined with new ECM capabilities to put business content to work for them in today’s cognitive era.
Tags : 
ibm, analytics, data, ecm, enterprise applications
    
IBM
Start   Previous   1 2 3 4    Next    End
Search