RSS feed Get our RSS feed

News by Topic

concerns

Results 276 - 300 of 323Sort Results By: Published Date | Title | Company Name
By: Crownpeak     Published Date: Sep 21, 2016
Topics Include: - IaaS vs. PaaS vs. SaaS - Addressing concerns around cloud security, integration and customizability - Availability of cloud solutions in the major DX categories - The urgency for adopting cloud solutions
Tags : crownpeak, forrester research, cloud, digital experience platforms, cloud solutions, saas, digital experience management, web content management
     Crownpeak
By: Secure Computing     Published Date: Feb 27, 2007
Driven by increasing regulatory scrutiny and the need to protect key corporate assets, concerns about compliance and data leakage have risen to the top of the priority list for today's corporate executives. This paper discusses multiple policies, procedures and processes corporations must consider to remain secure and compliant.
Tags : security, security management, compliance, security policies, hipaa compliance, data protection, database security, corporate governance
     Secure Computing
By: 8e6 Technologies     Published Date: Jan 12, 2007
Add spyware to the list of urgent security concerns. With resources already stretched thin in fighting viruses and stopping spam, companies now also have to defend against a threat that strikes silently and does much of its damage before it’s even detected.
Tags : spyware, anti spyware, malware, vulnerability management, anti virus, virus, viruses, hipaa compliance
     8e6 Technologies
By: TSFactory     Published Date: Jan 29, 2007
In lieu of Sarbanes-Oxley, HIPAA, and other regulations, one of the main concerns in the IT industry today is security. In this white paper, we take a deeper look at the security concerns, the available solutions, their drawbacks, and a new complementary way of addressing today's security issues.
Tags : auditing, windows, compliance, tsfactory, sarbanes-oxley, sox, audit, ts factory
     TSFactory
By: PEAK Technologies, Inc.     Published Date: Jul 05, 2007
Today's competitive, agile business demands anytime/anywhere connectivity and access to real time data. Outdated technology, security concerns and compliance requirements are forcing companies throughout industries to consider migrating to advanced wireless systems for supply chain operations.
Tags : scm, supply chain management, mobile computing, mobile data systems, real-time data, wireless systems, supply chain productivity, supply chain compliance
     PEAK Technologies, Inc.
By: GAO RFID Inc.     Published Date: Feb 28, 2007
Professionals who manage the supply chain have many concerns, including lost revenues, productivity, and securing the source of goods. Read how RFID technology delivers solutions to all these needs.
Tags : rfid, rfid tags, supply chain management, productivity, supply chain productivity, assembly line, gao rfid, gao
     GAO RFID Inc.
By: Breece Hill, LLC     Published Date: Mar 15, 2007
Once a business clears the financial hurdle and begins to plan their data protection strategy the choices can appear daunting. Do they select tape or disk? Apply differential or incremental backups? How much will a new system cost and how much time will it take to implement? What data should be included in the backup? This article attempts to address these concerns.
Tags : smb, storage, archiving, backup, hardware, small business networks, storage, backup and recovery
     Breece Hill, LLC
By: Blue Lane     Published Date: Oct 01, 2007
The healthcare industry has benefited from the breakneck pace of digitization - spanning everything from payments to patient records to X-ray film - but it has also been increasingly exposed to greater risk. Efforts to increase healthcare provider productivity via increased digitization and system interconnectivity have to be counterbalanced against the growing concerns for patient privacy and a backdrop of increasing liability.
Tags : healthcare, health care, patient privacy, privacy, patch management, patch, patch server, hipaa
     Blue Lane
By: GFI     Published Date: Jan 11, 2008
2008 brings with it new challenges and issues that network and systems administrators should be aware of, particularly vulnerabilities brought on by users. This white paper examines the top concerns which network security professionals should be prepared to face in 2008, and how they can be mitigated.
Tags : gfi, employees, employee vulnerability, vulnerability management, vulnerability, vulnerabilities, security concerns, internal threats
     GFI
By: Perimeter     Published Date: Jul 17, 2007
What is the difference between a risk, a threat, a vulnerability and an exploit? Which product or solution can be employed to address my institution’s information security and compliance needs? This paper provides some clarity on the first question, and in the process, it should help to offer an answer to the second question, one of aligning concerns with solutions with vulnerability management.
Tags : risk management, vulnerability assessment, ips, intrusion prevention, ids, intrusion detection, firewall, exploit
     Perimeter
By: optionsXpress     Published Date: Feb 09, 2009
The dynamics of today’s global supply chain are changing rapidly because of volatile fuel costs, increasing wages in overseas locations, post-9/11 security concerns, and global economic issues.In this environment, some U.S. manufacturers and parts suppliers are exploring ways to claim a competitive advantage by bringing operations back to, or near to, the United States.
Tags : exel, global supply chain, supply chain, right shoring, global sourcing, crossing borders, offshoring, global economy
     optionsXpress
By: Elastic Collision     Published Date: Feb 14, 2008
Media coverage of Second Life typically favors the opinions of industry analysts and naysayers. All too often, the concerns of regular users are overlooked. In October 2007, as part of a larger survey, we asked more than 800 Second Life residents what advice they would give to real-world organizations establishing a presence in Second Life.
Tags : elastic collision, virtual, virtual world, virtual reality, sims, avatar, avatars, social networking
     Elastic Collision
By: Identity Engines     Published Date: Mar 24, 2008
Guests, contractors, vendors, business partners, and other temporary users require and expect certain level of network access within organizations that they visit. Corporate network access has been typically open; internal LAN connections have seldom required authentication. Today however, regulatory and other security concerns demand that organizations adopt a more secure posture towards these short-term users.
Tags : idengines, id engines, identity engines, access control, authentication
     Identity Engines
By: HP - Enterprise     Published Date: Jun 05, 2013
There is no question that mobile computing is growing at an exponential rate. This rapid transformation has seen security concerns outpaced by the ease of use, flexibility, and productivity of mobile devices. When vulnerabilities are exploited, the security of mission-critical data becomes a serious concern. Here we take a look at three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Tags : mobile apps, applications, security threats, mobile computing, security vulnerabilities
     HP - Enterprise
By: SAP     Published Date: Mar 29, 2011
Consider issues as to why IT projects are at a risk to run late, over budget and not meet the goals. To address these concerns, software and service vendors are creating packaged solutions resulting in smaller, modularized implementations. Read how your company can benefit from packaged solutions.
Tags : packaged solutions, sap deployment solutions, saas
     SAP
By: MessageLabs     Published Date: Jun 03, 2009
Planning to implement an email archiving system? There are many issues to consider – legal risks, storage concerns and data security – it can seem a complex topic!Download this guide to help you make informed decisions about your archiving requirements
Tags : email archiving, it manager, symantec, messagelabs, search, retrieval, communications, retention
     MessageLabs
By: MessageLabs     Published Date: Jul 02, 2009
This whitepaper looks at the value of email and outlines the issues and concerns of IT Managers involved in managing and maintaining business critical emails systems. Learn more today!
Tags : messagelabs, email manager, email, it management, microsoft exchange server, viruses, spyware, spam
     MessageLabs
By: Aberdeen Group     Published Date: Jul 11, 2011
This document outlines key concerns that exist for both IT and line-of-business videoconferencing stakeholders and is intended to allow both of these constituencies to better understand the holistic challenges and value propositions of videoconferencing.
Tags : aberdeen group, business enterprise videoconferencing, compliance, virtualizing video application, unified communications, video solutions, roi, value proposition
     Aberdeen Group
By: TriNet     Published Date: Jun 13, 2011
Top 5 HR Compliance Concerns for Small Business
Tags : trinet, compliance, smb, small business, human resources, infrastructure, retirement, health
     TriNet
By: TriNet     Published Date: Sep 13, 2016
Top 5 HR Compliance Concerns for Small Business
Tags : trinet, compliance, human resources
     TriNet
By: Aberdeen Group     Published Date: Jul 11, 2011
This document outlines key concerns that exist for both IT and line-of-business videoconferencing stakeholders and is intended to allow both of these constituencies to better understand the holistic challenges and value propositions of videoconferencing.
Tags : aberdeen group, business enterprise videoconferencing, compliance, virtualizing video application, unified communications, video solutions, roi, value proposition
     Aberdeen Group
By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : pci, compliant, data, centers, engagement, connect, ecommerce, compliance
     Dell Storage
By: Quest Software     Published Date: Oct 25, 2012
Reduce the security risk and compliance concerns of unstructured data: emails, documents and spreadsheets. Unlike native tools, ChangeAuditor offers comprehensive, easy-to-use auditing, and more, to ensure security and regulatory compliance.
Tags : security, data security, file share security, sharepoint, file servers, netapp
     Quest Software
By: BlackBerry     Published Date: Oct 03, 2012
In this FAQ, discover answers to your top questions about balancing the security of your corporation and its confidential information with the usability and convenience that your end-users want on their mobile devices.
Tags : mobile user needs, mobile security, mobile devices, blackberry
     BlackBerry
By: BlackBerry     Published Date: Oct 03, 2012
In this FAQ, learn how to establish harmony between security and usability with the BlackBerry PlayBook OS 2.0. Get the answers to your most pressing questions and make BYOD a success for your enterprise.
Tags : mobile device management, mobile device, mobile communications, managing mobility, mobile management, mobile security, mobile usability
     BlackBerry
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics