RSS feed Get our RSS feed

News by Topic

control

Results 1901 - 1925 of 2261Sort Results By: Published Date | Title | Company Name
By: MBG     Published Date: Aug 21, 2009
While overall costs for telecommunications services have been going down, the consumption of these services by corporations is on the rise. This white paper explores how corporations can manage the consumption of telecom services by implementing polices designed to impact behavior that can lead to lower costs.
Tags : phone, telecom, telecommunications, communications, it spending, cost control, phone bill, voip
     MBG
By: Meru Networks     Published Date: Aug 21, 2009
This white paper is for the enterprise IT administrator tasked with deploying a wireless LAN (WLAN) of any scale, the significant investment in equipment, time and resources to properly plan and install the deployment is daunting.
Tags : wlan, wireless lan, wlan deployment, wlan investment, wlan cost, it spending, cost control, meru
     Meru Networks
By: Mirage Networks     Published Date: Aug 21, 2009
This industry report gives you the information you need to make decisions about how to secure your network by controlling access and by preventing endpoint infections and policy violations.
Tags : network security, nac, network access control, access control, endpoint security, end-point security, intrusion prevention, policy based
     Mirage Networks
By: NetSuite     Published Date: Aug 21, 2009
This Yankee Group White Paper, compliments of NetSuite, shows how on-demand applications can significantly reduce cost vs. on-premise applications. See how to reduce the total cost of ownership (TCO) of deploying & integrating CRM & accounting/ERP applications.
Tags : crm, accounting, cost control, tco, total cost of ownership, customer relationship management, erp, enterprise resource planning
     NetSuite
By: netVigilance     Published Date: Aug 21, 2009
Managing network vulnerabilities will be the biggest challenge for C-Level executives in the coming years. Intrusions are more frequent and more malicious, so the security of corporate networks, and therefore the security of the entire corporation are dependent on the ability to quickly identify, prioritize and remediate vulnerabilities in the network.
Tags : cost control, it spending, network security, budget, ids, intrusion prevention, vulnerability management, net vigilance
     netVigilance
By: Okiok     Published Date: Aug 21, 2009
Global Trust is a comprehensive Permission Management Infrastructure that centrally controls and manages user access Permissions to Web-based resources, servlets, Beans or any external application. Download this white paper and learn how the Global Trust solution enforces your policy consistently across your e-business and associates according to the planned security model (delegation, user's type, roles, policies, etc).
Tags : password management, access control, network access control, nac, permissions management, security management, okiok
     Okiok
By: PassGo     Published Date: Aug 21, 2009
The law in the United Kingdom has various influences on organizational information security policy. As well as protecting the rights of individuals and organizations, it also imposes many duties and responsibilities. For organizations to meet their legal obligations a number of technical controls can be put in place.
Tags : information security, europe, security policies, policy based management, compliance, united kingdom, european, database security
     PassGo
By: PassGo     Published Date: Aug 21, 2009
Management of user ID accounts is expensive for business, frustrating for users, and open to abuse. A user account Helpdesk in a large organization typically deals with many thousands of Helpdesk calls each year, and the costs surrounding this are significant. Any operation that requires human intervention can become a bottleneck during especially busy periods.
Tags : crm, customer relationship management, customer service, helpdesk, help desk, support, cost control, productivity
     PassGo
By: PKWARE     Published Date: Aug 21, 2009
Data storage demands are growing exponentially every year. PKWARE gives you hard data on getting the most out of storage space without costly hardware upgrades using PKZIP.
Tags : storage, data archiving, cost control, data storage, return on investment, roi, zip, zip file
     PKWARE
By: Pointsec     Published Date: Aug 21, 2009
This paper will help security officers and staff of large organizations seeking to protect sensitive data on mobile computing devices.
Tags : wireless security, network security, laptop security, mobile computing, secure mobile, data protection, access control, vulnerability management
     Pointsec
By: Preventsys     Published Date: Aug 21, 2009
Much has been written and discussed about Enterprise Risk Management (ERM) as it relates to compliance, corporate governance, financial controls and the Sarbanes-Oxley Act of 2002 (SOX). Until now, there was very little available to the risk manager on how to apply ERM to day-to-day operations.
Tags : sarbox, sox, sarbanes oxley, sarbanes-oxley, risk management, finance, compliance, regulatory compliance
     Preventsys
By: PTC     Published Date: Aug 21, 2009
Download this white paper to see the results of a study conducted by IDC, the premier global provider of market intelligence, in which 600 companies were surveyed to identify common information tasks and their costs.
Tags : business intelligence, information management, cost control, total cost of ownership, tco, productivity, efficiency, ptc
     PTC
By: PTC     Published Date: Aug 21, 2009
How many times has your product gone to prototype, test or assembly and not worked quite right? How can you address all dependencies before testing and assembly? Find out in this free white paper.
Tags : product lifecycle, product lifecycle management, plm, product development, productivity, electromechanical, product testing, quality assurance
     PTC
By: PTC     Published Date: Aug 21, 2009
In today's complex global life sciences marketplace, the ability to manage product information is a daunting task. The ability to ensure greater control over this critical product information has led to the development of a standard for product information throughout the European Union. If your company as not begun to think about PIM, now is the time, download this white paper immediately.
Tags : best practices, enterprise resource planning, enterprise software, product lifecycle management, plm, pim, product information, catalog
     PTC
By: Sanbolic     Published Date: Aug 21, 2009
Enterprise data requirements grow at 50 - 100 percent a year, creating a constant storage infrastructure management challenge. As new storage is brought into the environment, it is typically added within inflexible single server-silos.
Tags : storage, storage area network, storage area networks, san, sans, ip san, ip networks, ip storage
     Sanbolic
By: Secure Computing     Published Date: Aug 21, 2009
This paper outlines the types of threats that leverage the Internet as a means of delivery and the risks that they pose to your organization. Learn the key drivers of a corporate security policy and how you can protect against HTTP-based threats using Web filtering as part of a multi-layered content security strategy.
Tags : security, anti spyware, malware prevention, malware, access control, hacker detection, internet security, security management
     Secure Computing
By: SeeControl     Published Date: Aug 21, 2009
Facing increasing customer demands for equipment uptime and rapid service response, many companies servicing critical equipment and machinery are turning to on-customer-site spare parts inventory strategies. To maximize the benefits of this approach, leading companies are 'reverse engineering' their service chains to build restocking plans and manage performance based on parts consumption, not distribution, patterns.
Tags : service chain, supply chain management, scm, efficiency, consumption-based, supply and demand, service business, customer service
     SeeControl
By: Sigaba     Published Date: Aug 21, 2009
This white paper describes how Sigaba's secure email solutions minimize the burden on IT organizations through a combination of easy integration with existing enterprise systems and simple maintenance.
Tags : access control, email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba
     Sigaba
By: Sigaba     Published Date: Aug 21, 2009
This paper presents the business case for secure messaging, which extends far beyond compliance issues. In fact, choices about when to implement secure messaging affect every aspect of banking.
Tags : financial, bank, access control, email security, security management, security policies, secure instant messaging, intranets
     Sigaba
By: Soffront     Published Date: Aug 21, 2009
In the decade since customer relationship management (CRM) software first appeared on the market, implementation of the enterprise application suite that helps businesses find new customers, retain existing customers and otherwise increase revenues have gained a reputation as being risky ventures, subject to user rejection, cost overruns, and missed deadlines.
Tags : crm, customer relationship mangement, crm software, crm application, crm app, customer retention, customer satisfaction, lead generation
     Soffront
By: Solidcore     Published Date: Aug 21, 2009
This white paper outlines the issues faced by IT managers in meeting their compliance requirements and explains how Solidcore can be a core component of a sustainable and cost-effective SOX compliance program.
Tags : sox, sox compliance, sarbox, sarbanes oxley, archiving, finance, cost control, solid core
     Solidcore
By: Solidcore     Published Date: Jan 28, 2008
Are you about to implement change management using BMC Remedy Service Management or BMC IT Service Management for Mid-sized Businesses (a.k.a. Magic or Service Desk Express)? Have you already implemented one of these systems and want to maximize the return on your investment? Get this white paper to see how others have optimized their change management implementation approach to derive the most value from their investment by adding closed-loop control.
Tags : cmdb, change management, service management, bmc, remedy, bmc remedy, it management, roi
     Solidcore
By: St Bernard Software     Published Date: Aug 21, 2009
Download this white paper from St. Bernard Software to read about a variety of contemporary, Internet-borne threats that are making it foolhardy for any business to provide unfettered Internet access for its users.
Tags : filtering, email security, firewall, access control, employee internet access, internet security, web security, restrictions
     St Bernard Software
By: Texas Instruments     Published Date: Nov 06, 2006
Download this free whitepapers to learn how Remote Management can transform this challenge into an opportunity to stand apart from other service providers in a very competitive market.
Tags : access control, remote access, remote management, remote support, service provider, service providers, ip networks, ip tv
     Texas Instruments
By: TopLayer     Published Date: Aug 21, 2009
Enterprises without a sound intrusion prevention strategy across the three threat dimensions - undesired access, malicious content, and rate-based attacks - open the door to unacceptable risks and costs, especially from hybrid attacks.
Tags : intrusion prevention, network security, ips, access control, hacker, top layer, toplayer, 3-d multi-layered
     TopLayer
Start   Previous    70 71 72 73 74 75 76 77 78 79 80 81 82 83 84    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics