Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

information technology

Results 351 - 375 of 471Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro     Published Date: Oct 12, 2012
Download this free white paper to learn exactly what you need to avoid any trouble without sacrificing innovation or impeding the progress of your business today and in the future.
Tags : 
cloud computing, information security, information technology, trend micro, security, servers, virtualization
    
Trend Micro
Published By: Trend Micro     Published Date: Oct 12, 2012
See which security solution is the fastest and most efficient in this FREE analysis
Tags : 
ation security, information technology, trend micro, security, auditing, security management
    
Trend Micro
Published By: Trend Micro     Published Date: Oct 12, 2012
Learn how agentless security architectures can maintain a high level of security while lowering costs
Tags : 
information security, information technology, protection, security, data protection, virtualization
    
Trend Micro
Published By: Medical Group Management Association (MGMA)     Published Date: Mar 16, 2009
Read this white paper from the Medical Group Management Association (MGMA) – the most respected association for the leaders of medical group practices. You’ll learn how you can take advantage of this niche audience and about technologies that these small and medium-sized businesses dedicated to health care need to run smoothly.
Tags : 
mgma, technology, service, medical groups, medical group management association, smb, healthcare, health-care information technology, hit, electronic medical records, emr, chronic care management, consumer-driven health care
    
Medical Group Management Association (MGMA)
Published By: IFS, Inc.     Published Date: Apr 01, 2010
Understanding how to take responsibility for proper implementation and truly taking ownership of an enterprise application as a crucial business asset will go a long way to getting the full value out of your information technology investment.
Tags : 
ifs, enterprise applications, erp implementation, enterprise resources planning, carsound, roi, enterprise resource planning, enterprise software, return on investment, erp software
    
IFS, Inc.
Published By: Q1 Labs     Published Date: Feb 01, 2012
Is it time? Are you waving the white flag? Has your first gen SIEM failed to meet expectations despite your investment? If you are questioning whether your existing product or service can get the job done, you are not alone. Read this Securosis white paper to learn how easy it can be to replace your SIEM with a next generation solution.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
In this study, IANS interviewed two Q1 Labs customers using QRadar to assess their Return On Security (ROS). The two customers were providers of service to the U.S. Government and had highly secure environments dealing with extremely sensitive data. The data yielded from the interviews showed substantial benefit to the organizations for the cost, both in money and staff time.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, continuous monitoring, access control, network security appliance, data protection, vulnerability management
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, access control, authentication, identity management, internet security, intrusion prevention, data protection
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : 
siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, pci compliance, log management, log data, log management solution, access control, identity management, internet security, intrusion detection
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, log management solution, threat detection, fraud prevention, risk management
    
Q1 Labs
Published By: Symantec     Published Date: Aug 12, 2013
Symantec has been positioned as a Leader in Gartner Magic Quadrant for Secure Email Gateways. Gartner is the world's leading information technology research and advisory company. Vendors in the Magic Quadrant are evaluated based on ability to execute and completeness of vision. Read Gartner's Magic Quadrant for Secure Email Gateways to learn more about why Symantec is positioned as a leader.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology, knowledge management
    
Symantec
Published By: Logicalis     Published Date: Aug 20, 2014
Today’s IT organizations face huge challenges such as the ever-increasing number of applications, virtualization, the cloud, and the rising value of information stored in data centers. The combined effect of these factors is placing pressure on IT infrastructures to increase performance and operate more efficiently while reducing costs. An emerging technology, flash storage technology, is helping business and technology leaders address these issues by making their IT infrastructures more operationally efficient. Learn more in this white paper from Logicalis.
Tags : 
logicalis, flash storage, flash memory, data storage, solid state drives, solid state storage, it transformation, it efficiency, storage, data warehousing
    
Logicalis
Published By: Hewlett-Packard Company     Published Date: May 15, 2014
Traditional server management and provisioning can create unnecessary burdens for many organizations. Information technology (IT) administrators in today’s business environments need a more streamlined process to manage servers throughout the IT life cycle, including tools to help them diagnose problems and procedures for efficiently resolving errors. This white paper provides an in-depth look at the key capabilities of HP Integrated Lights-Out (iLO) embedded in every ProLiant Gen8 server, the solution’s scalable licensing offerings, and mobile-app features that support IT staff—anywhere, anytime.
Tags : 
server management, ilo, proliant gen8 server, it management, enterprise applications
    
Hewlett-Packard Company
Published By: Hewlett-Packard Company     Published Date: May 15, 2014
Storing, protecting, and analyzing greater amounts of digital content can strain already limited information technology (IT) resources and put heavy demands on business managers’ attention. Learn how to overcome these challenges, with scalable server technology that automates routine tasks and improves system performance with minimal supervision.
Tags : 
cloud, server, proliant gen8, it management, data management
    
Hewlett-Packard Company
Published By: Polycom     Published Date: Dec 18, 2014
In the next few years we shall see explosive growth in the use of video conferencing as a fundamental tool for businesses to enhance communication and collaboration between employees, partners and customers. The technology has developed considerably from early adopters to its current form of mass market roll-out. It’s anticipated that nearly half of information workers will have some type of personal video solution in 2016, up from just 15% today. With video conferencing becoming a core component of IT infrastructure that enables communication and collaboration, businesses will be looking to providers of telephony, business applications and network infrastructure services to include this capability as part of their offering. This report will examine the basic components of the technology, considerations for deploying video conferencing solutions, and will introduce the Polycom® RealPresence® Platform to readers
Tags : 
business, video, conference, multicultural, meetings, communication, cio, digital, information, marketplace, infographic, global, trends, it management, knowledge management, enterprise applications, data management, human resource technology
    
Polycom
Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management, enterprise applications
    
OpenText
Published By: HP     Published Date: Aug 26, 2014
Eliminate the guesswork from selecting products and services for your evolving network access and business protection needs. HP Just Right IT portfolio solutions help avoid business interruptions by ensuring reliable access to your data. HP servers and storage solutions help consolidate islands of business information while delivering cost savings, reliability, and agility. HP offers the industry’s most comprehensive data protection and retention portfolio for midsize businesses like yours. And through its cloud-based support portal, HP Technology Services can proactively identify and fix them remotely to keep your business running smoothly. Discover how
Tags : 
data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection, guesswork, agility, cost-saving, quality of service, servers, productivity
    
HP
Published By: Ring Central     Published Date: Mar 21, 2016
Gartner Inc., the world’s leading information technology research and advisory firm, has positioned RingCentral in the Leaders Quadrant of the 2015 report, Magic Quadrant for Unified Communications as a Service (UCaaS), Worldwide,* as a result of its ability to execute and the completeness of vision.
Tags : 
ring central, gartner, unified communications, cloud, phone systems, wireless, enterprise applications
    
Ring Central
Published By: IBM     Published Date: Feb 27, 2014
This white paper describes software as the invisible thread that links product parts into an intelligent whole. It examines software delivery for smart products and strategies for evolving software development into a business process.
Tags : 
ibm, ibm software, innovation, software development, smart products, product delivery, smart software, consumerization, unified platform, control risks, software delivery, manage big data, automation, configuration data, error-free data, information technology, lifecycle risks, it management, access control, business intelligence
    
IBM
Published By: LeftHand Networks, Inc.     Published Date: Jan 15, 2009
Carefully protecting and managing the storage that holds a company’s data has become one of the most important missions of today’s Information Technology (IT) organizations. With data being a company’s most valuable asset, many are turning to Storage Area Networks (SANs) as a way to meet a number of challenges.  This White Paper looks at how a well built SAN can provide real benefits to your organization and improve overall efficiency within you network.
Tags : 
lefthand networks, san, storage area networks, simplification of storage, central data storage, international computing
    
LeftHand Networks, Inc.
Published By: GeoTrust     Published Date: Aug 09, 2013
Do you know if you or your customers are being sent phishing emails? Others may be trying to acquire information and by taking the first step to reading this white paper may just help stop any kind of phishing.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, phishing, website protection, phishing scams, sensitive information, extended validation, validation, ssl technology, spam, scam, ev ssl, safety threats, ecommerce
    
GeoTrust
Published By: GeoTrust     Published Date: Aug 09, 2013
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution, website protection, sensitive information, extended validation, validation, ssl technology, ev ssl, safety threats, ecommerce, online threats, online security, certificates, network connection
    
GeoTrust
Published By: Symantec     Published Date: Sep 19, 2012
Symantec vulnerability assessments help to reduce the cost and complexity of vulnerability management with automated scans, actionable reports, and a cloud-based architecture that requires no software installation or maintenance.
Tags : 
hackers, information technology, symantec, verisign, web applications, security, network security, web service security
    
Symantec
Published By: Symantec     Published Date: Sep 19, 2012
This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Tags : 
applications, information technology, symantec, verisign, web security, security, network security, web service security, database security
    
Symantec
Published By: Symantec     Published Date: Sep 19, 2012
The solutions to problems of computing security are varied and must be explored individually, but one technology shows up often: TLS or Transport Layer Security, often known by the name of the predecessor technology, SSL or Secure Sockets Layer.
Tags : 
business computing, information technology, symantec, verisign, web security, security, network security, web service security
    
Symantec
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search