RSS feed Get our RSS feed

News by Topic

control

Results 1926 - 1950 of 2260Sort Results By: Published Date | Title | Company Name
By: Trusted Network Tech     Published Date: Aug 21, 2009
Authentication technologies such as tokens and smart cards help meet the challenges of protecting sensitive data and securing application access. This white paper presents four cases in which an identity-based solution provides a compelling, low-cost alternative or complement to strong authentication technologies.
Tags : network management, network security, access control, nac, network access control, identity management, security management, authentication
     Trusted Network Tech
By: Trusted Network Tech     Published Date: Nov 06, 2006
This paper addresses several issues organizations should consider when analyzing the efficacy and costs of NAC solutions and looks at a complementary alternative technology based on TNT’s Identity™, which helps address and overcome some limitations of NAC solutions.
Tags : access control, nac, network, identity management, network access control, security, internet security, trusted network tech
     Trusted Network Tech
By: Villanova     Published Date: Aug 21, 2009
Earned value (EV) has grown in popularity over the last several years. With 76% of IT projects failing (Crawford, 2002), project management and control systems must be implemented to ensure IT project success.  Learn how EV links to the work breakdown structure (WBS) the schedule and the budget.
Tags : project management, employee performance, budget, project success, villanova
     Villanova
By: Villanova     Published Date: Aug 21, 2009
Professionals who master Six Sigma disciplines can become recognized leaders, guiding key projects that result in breakthrough improvements, improving bottom-line results.  This white paper discusses how Project Managers can deliver projects as much as 90% faster, and reduce costs by 25%.
Tags : project management, project management tips, 6 sigma, lean methods, lean, pmp, cost control, productivity
     Villanova
By: Winward     Published Date: Aug 21, 2009
To succeed in today's business environment, the enterprise must manage the effects of three realities: the recent, massive investment in technology has significantly increased IT complexity; the Internet has altered customers' expectations of availability, cost, and service; and the new economic climate highlights the need to leverage existing assets and improve the return on investment for new initiatives.
Tags : business management, cost control, it spending, analytical applications, report design, it investment, technology spending, roi
     Winward
By: XOsoft     Published Date: Aug 21, 2009
Mitigate risk and lower costs by letting your disaster recovery replica server double as a server for performing an offsite backup. This informative white paper will teach you how...
Tags : disaster plan, backup plan, backup and recovery, redundant, server replication, cost control, it spending, disaster recovery
     XOsoft
By: XOsoft     Published Date: Aug 21, 2009
The primary information management concern in the enterprise today is to ensure that the knowledge necessary to drive critical business processes is available where it needs to be, when it needs to be. The costs of failure to do this are high. 
Tags : cost control, data loss, data protection, information management, data management, business process management, xosoft, storage
     XOsoft
By: EMC     Published Date: Nov 06, 2006
The following tips can help you select Web-based collaboration software that offers all the features you need to get your entire team working together effectively.
Tags : top 10, collaboration, web-based collaboration, online collaboration, web collaboration, team building, cost control, cost-effective collaboration
     EMC
By: Symantec     Published Date: Nov 02, 2006
Remote control software has proven to be a cost-effective way of providing remote support. This paper examines how these products provide a cost-effective help desk tool and defines necessary security requirements.
Tags : remote control, help desk, remote access, remote network management, remote support, network security, symantec
     Symantec
By: Symantec     Published Date: Nov 02, 2006
The IT threat landscape has changed from individual hackers disrupting network operations to organized crime stealing confidential information. Antivirus technology must be joined by a coordinated, multilayered defense that includes proactive vulnerability-based intrusion prevention, file-based intrusion prevention, and inbound and outbound traffic control.
Tags : security, hacker detection, internet security, crimeware, spyware, intrusion prevention, anti virus, hacker prevention
     Symantec
By: Symantec     Published Date: Nov 09, 2006
Security and compliance risks are greater than ever, and businesses depend on their data being protected when stored internally and taken offsite. New encryption capabilities offered by Backup Exec 11d for Windows Servers offer secure protection from unauthorized access. Learn more about encryption capabilities in Backup Exec 11d.
Tags : backup, backup and recovery, disaster recovery, compliance, data protection, encryption, access control, backup exec
     Symantec
By: Symantec     Published Date: Jun 12, 2008
Looking for a network security solution? Whether you've already adopted NAC for your enterprise or are researching options, download this helpful survey presented by IDC about NAC benefits and vendor overviews.
Tags : network access control, network security, security, nac, symantec
     Symantec
By: Dell Software     Published Date: Jul 18, 2012
Manage Permissions Across Servers
Tags : windows permissions, registries, scheduled tasks, sharepoint, sql, sql server, exchange server, sid
     Dell Software
By: Dell Software     Published Date: Jul 18, 2012
Control your software and licenses
Tags : software, licenses, technology
     Dell Software
By: Dell Software     Published Date: Jul 18, 2012
Take the Active Directory management quiz!
Tags : quiz, active sirectory, microsoft, directory service, server, domain controller, enforce security, powershell
     Dell Software
By: Quocirca     Published Date: Sep 13, 2007
The general public is becoming increasingly cynical about the environment claims of businesses and with much bad press around data centers, information technology (IT) is in the front line. But data centers are actually the easiest bit of IT to control and consolidating infrastructure into them can help reduce the overall energy usage of IT and, if used well, IT itself can help businesses reduce their overall carbon footprint.
Tags : environment, environmental, green, green business, efficient, efficiency, energy, energy efficient
     Quocirca
By: Quocirca     Published Date: Mar 20, 2008
After years of uncontrolled growth, many data centers face a crisis as they run into space and power constraints. While remedies exist, present business practices do not encourage the prioritization of power reduction within one of the most power hungry areas of a business — the data center.
Tags : quocirca, scalability, power, data centre, data center, servers, network management, it management
     Quocirca
By: Quocirca     Published Date: Jul 03, 2008
As enterprises recognize the costs associated with an uncontrolled printing environment, many are turning to specialist managed print services (MPS) providers. MPS services encompass the assessment, optimization and management of the print environment. Increasingly, MPS providers are now adopting a partnered out-tasking approach by delivering flexible services that can be tailored to individual customer requirements.
Tags : managed print services, mps, quocirca
     Quocirca
By: Quocirca     Published Date: Sep 18, 2008
Even when facing challenging economic times, businesses still need to communicate and rely on technology to connect with customers, partners, suppliers and their own employees. Cutting back on communications spending will have a negative effect in a long downturn.  It will leave any business that does so with fewer options when conditions improve and at a disadvantage compared to competitors that continue to invest.  However, there are 10 steps that can be taken to grow the value and use of communications, while controlling costs.
Tags : telecom, telecoms, quocirca
     Quocirca
By: Quocirca     Published Date: Oct 01, 2008
The internet has grown rapidly from a random collection of mainly academic networks and military control and routing protocols into a global, integrated and sophisticated commercial utility. No longer simply an 'Information Superhighway', it has extended to embrace voice telephony, video and mobile communications as part of a converged network. Connection options and services have expanded, with opportunities for internet service providers (ISPs) to add value beyond simply forwarding bit and bytes.
Tags : quocirca, isp, isps, internet service provider, convergence, ip telephony, voip
     Quocirca
Start   Previous    71 72 73 74 75 76 77 78 79 80 81 82 83 84 85    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics