Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

saas

Results 301 - 325 of 888Sort Results By: Published Date | Title | Company Name
Published By: Webroot     Published Date: Jul 08, 2011
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
Tags : 
webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center
    
Webroot
Published By: Webroot     Published Date: Dec 06, 2011
Unlock the true business value of IT security, and learn why companies of all sizes are choosing SaaS over on-premise solutions.
Tags : 
saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring
    
Webroot
Published By: Blue Coat Systems     Published Date: Oct 24, 2011
Learn how to proactively address the latest trends in WAN traffic. Tomorrow is here: video, Web 2.0, and SaaS applications are overtaking the WAN.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, network architecture, network management, network performance, network performance management
    
Blue Coat Systems
Published By: Workday     Published Date: Jul 30, 2019
How do you know which HCM or financial management vendor will enable you to achieve the true benefits SaaS has to offer? Read this whitepaper to learn what characteristics to look for when considering a SaaS solution.
Tags : 
    
Workday
Published By: Intralinks     Published Date: May 29, 2013
SaaS-based (Software as a Service) collaboration and information sharing repositories are paramount for secure file/document sharing – yet, not all GCs are truly aware of the benefits they can bring to an organization.
Tags : 
saas, software as a service, collaboration, information sharing, file, document sharing, secure, security
    
Intralinks
Published By: Adaptive Planning     Published Date: Sep 16, 2013
Learn how to improve your total cost of ownership by implementing SaaS-Based Budgeting and how it will eliminate the need for your organization to purchase, deploy, and maintain IT infrastructure or application software.
Tags : 
software delivery, saas, software applications, it infrastructure, applications, solutions, technlogy
    
Adaptive Planning
Published By: ServiceSource     Published Date: Nov 01, 2013
In this book we describe best practices honed through 13 years of experience and partnership with some of the leading technology companies in the world. These best practices will give you insight into three key areas: • Data management & renewal opportunity generation • Sales strategy & execution • Continuing the renewal cycle We hope you enjoy this book!
Tags : 
reducing customer churn, servicesource, recurring revenue, higher profit margins, drive innovation, drive performance, saas companies, competitive markets
    
ServiceSource
Published By: Riverbed     Published Date: May 08, 2015
Applications are the life of any enterprise and key enablers of workforce productivity and business agility. But, the application landscape is changing rapidly - the number and type of applications is increasing, the move to cloud and SaaS for application delivery is growing, bandwidth costs are decreasing and the reliability of the Internet has improved. Inevitably, there are also changes in network and infrastructure topologies.
Tags : 
hybrid, riverbed, saas, applications, enterprise, it management
    
Riverbed
Published By: AT&T     Published Date: Jul 28, 2015
Download this white paper to learn how IT pros should be able to leverage essential cloud services while meeting enterprise security requirements by taking into consideration a number of fundamental security principles and best practices, by understanding the specific security needs of an enterprise and evaluating different cloud environments and models, and by asking vendors the right questions
Tags : 
enterprise it, cloud deployments, cloud platorms, public cloud, private cloud, hybrid cloud, saas, iaas
    
AT&T
Published By: Okta     Published Date: Nov 09, 2015
The adoption rate of Software as a Service (SaaS) applications has been dramatic. However, the tendency of SaaS applications to be siloed has made identity management, user access and authorization an increasing challenge. Read this whitepaper to learn the top three ways to extend Active Directory to your SaaS apps.
Tags : 
okta, active directory, cloud, cloud apps, saas, software as a service, identity management, it management
    
Okta
Published By: InsightSquared     Published Date: May 04, 2016
Like fine-tuning the sales process itself, managing your Pipeline requires you to closely inspect (and clearly define) each opportunity stage, carefully track the right sales metrics, and keep a close eye on the opportunities that your reps are working on.
Tags : 
salesforce reporting, salesforce analytics, sales analytics, sales reporting, sales pipeline, sales forecasting, pipeline management, sales performance
    
InsightSquared
Published By: InsightSquared     Published Date: May 04, 2016
If you want to improve your sales team's results, you need to start by asking the right questions. Download this new best-practices eBook to learn about the 12 key questions for data-driven Sales Managers. This informative guide will help you: - Determine Key Metrics For Sales Management - Improve Sales Team Productivity - Closed-Won More Deals Download a free copy of "12 Must-Ask Questions for Data-Driven Sales Managers" today.
Tags : 
salesforce reporting, salesforce analytics, sales analytics, sales reporting, sales pipeline, sales forecasting, pipeline management, sales performance
    
InsightSquared
Published By: InsightSquared     Published Date: May 04, 2016
How confident are you in the accuracy of your sales forecast? If the end of every quarter is a surprise and you're never sure if you'll hit your number, you probably need to change the way you forecast.
Tags : 
salesforce reporting, salesforce analytics, sales analytics, sales reporting, sales pipeline, sales forecasting, pipeline management, sales performance
    
InsightSquared
Published By: Cloudroute     Published Date: Jun 01, 2016
Keep your employees productive on their essential applications and favorite devices, and your company data protected with enterprise mobility solutions. Deliver and support Single sign-on to thousands of popular SaaS applications like Salesforce, Concur, and Workday. Manage iOS, Android, and Windows computers and mobile devices from one platform. And, finally, get enterprise grade security for your organization by identifying threats before they can damage your business.
Tags : 
    
Cloudroute
Published By: Adobe     Published Date: Mar 02, 2017
Read this Info-Tech white paper, Security Concerns Overcome: Customers moving to SaaS, and learn five ways you can work with your SaaS vendor that will inspire your confidence in their security skills.
Tags : 
security, saas, customer experience, cloud computing
    
Adobe
Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s employees demand greater flexibility, productivity, and mobility. And while cloud and BYOD policies have answered that call, they’ve also added unforeseen complexities the way IT manages data security and compliance. How can you balance productivity and risk in SaaS environments? “A Guide to Achieving SaaS Security and Compliance” deconstructs the idea that cloud security and user productivity are mutually exclusive. This whitepaper includes guidance on how to: Select SaaS providers that follow the very same external standards (e.g., PCI DSS) as your organization. Apply the same in-house security, governance, and compliance principles to cloud services. Leverage tools and processes to gain visibility, control access, and protect data in your SaaS environment.
Tags : 
    
Forcepoint
Published By: Tricentis     Published Date: Jan 22, 2019
With today’s enterprise IT landscape evolving faster than ever, it’s hardly surprising that IT teams find it difficult to keep pace with the seemingly non-stop testing requirement for new software. That’s particularly the case in the SAP arena, where end-to-end SAP-enabled business processes now frequently span multiple SAP applications and platforms, and increasingly draw on multiple SaaS applications – all with their own separate release cycles.
Tags : 
    
Tricentis
Published By: Tenable     Published Date: Nov 06, 2018
"What steps should you take to enable the effective and secure use of public cloud services? According to Gartner, “CIOs need to ensure their security teams are not holding back cloud initiatives with unsubstantiated cloud security worries. Instead, they should encourage their teams to apply imagination and energy to develop new approaches to securely and reliably leverage the benefits of SaaS, PaaS and IaaS.” By reading, “Clouds Are Secure: Are You Using Them Securely?,” you will gain insight into Gartner’s recommended practices for effective and secure adoption of public cloud services, including: Develop an enterprise cloud strategy, including guidance on what data can be placed into which clouds and under what circumstances. Implement and enforce policies on cloud ownership, responsibility and risk acceptance by outlining expectations for form, significance and control of public cloud use. Follow a life cycle approach to cloud governance that emphasizes the operational control of
Tags : 
    
Tenable
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understanding—and Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Un nuevo modelo de seguridad que merece la pena entender y emular. Tradicionalmente, en materia de seguridad empresarial, se ha confiado en una estrategia tipo fuerte que blindaba los terminales de los usuarios y creaba muros en torno a la red. En la actualidad, esta estrategia no puede posibilitar ni proteger el uso de dispositivos móviles y funciones de SaaS, que se encuentran al otro lado del fuerte. En consecuencia, los directores de seguridad de la información (CISO, por sus siglas en inglés) se han dedicado a buscar nuevas soluciones capaces de proteger estas tecnologías actuales, así como de adaptarse a medida que cambian las necesidades empresariales y las amenazas.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Un nuovo modello di sicurezza che vale la pena di studiare, e di imitare. La sicurezza enterprise si basa, tradizionalmente, su una strategia che blocca gli endpoint degli utenti e posiziona la rete all'interno di una sorta di perimetro fortificato. Oggi, questa strategia non è in grado di supportare né proteggere l'uso di device mobile e le funzionalità SaaS, che esistono al di fuori di quel perimetro. Di conseguenza, i Chief Information Security Officer (CISO) sono alla ricerca di soluzioni nuove, in grado di tutelare queste tecnologie e di adattarsi al modificarsi di minacce ed esigenze di business.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Ein neues Security-Modell, das Sie verstehen und nachahmen sollten. Die Security in Unternehmen ähnelte bisher einer Festungsstrategie, die Anwenderendpunkte abschottete und Mauern um das Netzwerk baute. Heutzutage kann diese Strategie die Nutzung von Mobile Devices und SaaS-Funktionen (Software-as-a-Service), die sich außerhalb der Festung befinden, nicht mehr unterstützen. Daher haben sich Chief Information Security Officers (CISOs) nach neuen Lösungen umgesehen, die diese Technologien heute sichern können und die sich einer Zeit anpassen, in der sich sowohl Bedrohungen als auch Unternehmensanforderungen verändern.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Un nouveau modèle de sécurité qui mérite d’être étudié... et reproduit. Traditionnellement, la sécurité des entreprises a toujours été fondée sur une stratégie de « forteresse », chargée de sécuriser les terminaux utilisateur et de former une barrière de protection autour du réseau. Aujourd’hui, cette stratégie n’est pas en mesure de supporter ou de sécuriser l’utilisation des périphériques mobiles et des fonctionnalités SaaS, qui existent en-dehors de la forteresse. Les responsables de la sécurité des informations (CISO, Chief Information Security Officer) sont donc tenus de trouver de nouvelles solutions à même de sécuriser ces technologies actuelles, et de s’adapter aux menaces et aux besoins métier en évolution.
Tags : 
    
CA Technologies EMEA
Published By: CCMI     Published Date: Jul 12, 2011
Most organizations waste millions of dollars every year by improperly managing mobile device and network service expenses. Learn the critical steps to mobile expense management (MEM) and how a SaaS solution can provide immediate return on your mobility investments while ironing out every unnecessary cost.
Tags : 
ccmi, xigo, mobile expense management, mem, telecom expense management, tem, enterprise mobility, mobile expenses
    
CCMI
Published By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : 
eset, security, threatsense, malware, threat trends, conficker, virus, agent
    
ESET
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search