RSS feed Get our RSS feed

News by Topic

control

Results 1951 - 1975 of 2259Sort Results By: Published Date | Title | Company Name
By: Quocirca     Published Date: Apr 08, 2009
The automation of traditional paper based processes with technology can lead to unnecessary complexity. This leads to increased costs and other challenges which can be avoided if solutions are simple and fit closely to the business task in hand.
Tags : quocirca, paper systems, it systems, it infrastructure, mobile technologies, functionality, capacity, cost control
     Quocirca
By: Quocirca     Published Date: Oct 17, 2009
Managed print services (MPS) offer organisations the opportunity to control costs, reduce the complexity of managing a heterogeneous infrastructure and improve business processes. With many organisations striving to do more with less, MPS can cut both capital and operational expenses. Now is the time to tackle the huge cost and productivity drain represented by an unmanaged print environment. MPS passes control of this complex infrastructure to the experts leaving an organisation to focus on its core business competencies.
Tags : quocirca, data loss, encryption, data security, laptops, information protection, winmagic, information sharing
     Quocirca
By: Opalis     Published Date: Nov 06, 2006
Automating repetitive Data Center Operations into best practices makes response times faster, more reliable, and less costly. Learn how to extend your current IT systems to do more of the routine work, freeing up IT staff for higher-value projects.
Tags : process automation, automation, business process automation, bpa, data centers, datacenter, datacenters, response time
     Opalis
By: Opalis     Published Date: Nov 06, 2006
This paper highlights how Run Book Automation Software provides the new level of automation required to automate IT operations and traditional job scheduling tasks, without the costs and management burden associated with custom programming and scripts.
Tags : automation, process automation, it automation, scheduling, schedule, cost control, it management, opalis
     Opalis
By: Evolveware     Published Date: Nov 06, 2006
Software analysis, documentation, migration, upgrades or replacements are daunting and risky endeavors because they are primarily manual and time-consuming. EvolveWare’s S2T Technology provides a solution to these problems with tools that automate the process up to 90%, thus reducing the time and cost of such initiatives by as much as 40-60%.
Tags : software analysis, software documentation, software migration, migration, software upgrades, patch management, s2t, software management
     Evolveware
By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing
     Aomega
By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : enterprise security, perimeter, security appliance, information management, data protection, data integrity, smb, smbs
     KACE
By: NetIQ Corporation     Published Date: Apr 05, 2007
Learn why organizations need to limit IT administrator power to ensure operational integrity and assure compliance and how to implement robust change control processes and tools with this white paper.
Tags : insider threat, network security, it administrator, comply with regulations, it infrastructure, compliance, change management, it management
     NetIQ Corporation
By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn about the key challenges of PCI DSS v1.1 and how NetIQ Security Management, Configuration Control and Enterprise Administration solutions can help you demonstrate PCI compliance.
Tags : pci, pci dss, compliance, credit card, payment card, pci compliance, customer privacy, privacy
     NetIQ Corporation
By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how Secure Configuration Manager can help with compliance requirements in the IT controls areas of entitlement reporting & segregation of duties. Discover how to make your compliance program more sustainable & repeatable, while gaining visibility into sources of vulnerability & risk exposure.
Tags : compliance, netiq, net iq, policy management, configuration management, unix, risk management, change management
     NetIQ Corporation
By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how to meet regulatory requirements for system change and user activity monitoring with NetIQ Change Guardian for Windows, without the need for performance-hindering native auditing.
Tags : pci, pci dss, data protection, compliance, netiq, net iq, change management, monitoring
     NetIQ Corporation
By: NetIQ Corporation     Published Date: Nov 27, 2007
Learn how delegating administrative privileges can aid in improving administrative productivity, system availability and security, while satisfying the demands of auditors.  Read this new white paper from NetIQ today.
Tags : access control, security, audit, auditor, auditing, change management, net iq, netiq
     NetIQ Corporation
By: SoftLanding Systems     Published Date: Nov 18, 2006
If you are spending too much time and money on SOX compliance, this white paper will help you identify where investments in technology could really pay off in time for your next SOX audit.
Tags : compliance, sarbox, sox, sarbanes oxley, sarbanes-oxley, sox compliance, sox audit, change management
     SoftLanding Systems
By: SoftLanding Systems     Published Date: Dec 04, 2006
This white paper describes five practical steps that you can take to make your development process more predictable and reliable. By following his five steps, Paul maintains that you can build better software more quickly with less cost and less risk.
Tags : software development, lower cost, application development, database development, streamline, streamlining, build software, cost control
     SoftLanding Systems
By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : application security, auditing, authentication, financial, compliance, vulnerability management, software compliance, regulatory compliance
     Cenzic
By: Winshuttle     Published Date: Dec 04, 2006
This paper describes how to easily integrate Excel data with SAP solutions and the resulting benefits from such integration – reduction in financial closing time, reduction in data entry resources, and availability of timely data for reporting.
Tags : excel, sap, integration, spreadsheet, reporting, productivity, cost control, erp
     Winshuttle
By: Winshuttle     Published Date: Dec 04, 2006
This white paper describes some easy-to-use data management tools that many companies are using to let business users do complex data updates and reporting tasks effortlessly. This technology is not only easing their Sarbanes-Oxley compliance, but is also saving these companies large amounts of time and money.
Tags : compliance, sox, sarbanes, sarbox, sarbanes-oxley, sarbanes oxley, data management, cost control
     Winshuttle
By: Avalere     Published Date: Apr 02, 2007
Sensitive documents, files and intellectual property are extracted from a central repository such as a database, records management system, or document management system to complete daily tasks, however, extracting this information can lead to a security breach.  Avalere provides the tools you need to control the proliferation of sensitive information throughout your organization.
Tags : security, security management, database admin, dba, records management, database management, document management, data security
     Avalere
By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
     Avalere
By: Avalere     Published Date: Apr 02, 2007
Companies struggle with cleanly separating an employee, contractor or consultant with their company and critical information.  Avalere enables companies to review how information has been used prior to an employee’s departure in order to protect the company and the employee.
Tags : data protection, employee performance, fired, employee departure, employee quit, employee resigned, access control, avalere
     Avalere
By: RiskWatch     Published Date: Feb 05, 2007
The integration of information security and physical security is an important trend that is becoming more widespread across both private corporations and government agencies. Read more about how and why you should implement a more holistic security strategy in this whitepaper.
Tags : security, network security, access control, compliance, secure content management, information security, physical security, holistic
     RiskWatch
By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the network access control capabilities of LANDesk® Trusted Access™ available within LANDesk Security Suite 8.6 help organizations protect and secure their enterprise networks at their endpoints to reduce malicious attacks and the resulting downtime, lost productivity, and lost revenues.
Tags : network security, access control, nac, network access control, intrusion prevention, landesk
     LANDesk
By: LANDesk     Published Date: Feb 12, 2007
This paper shows how LANDesk Process Manager can allow you to design processes once, automate them everywhere and refine them as needed - saving money, ensuring compliance and keeping even the most complex processes running reliably.
Tags : it management, productivity, change management, project management, groupware workflow, automating it, it automation, process management
     LANDesk
By: LANDesk     Published Date: Feb 12, 2007
This white paper examines some of the business benefits and potential cost savings that can accrue to an organization that implements a BPM solution.
Tags : it management, productivity, business process management, bpm, return on investment, roi, bpa, business process automation
     LANDesk
By: Infor     Published Date: Feb 27, 2007
Infor Discrete Manufacturing Essentials are built exclusively for discrete manufacturers, with specific functionality that addresses the industry's essential challenges. The result? For one typical Infor customer, a 50 percent reduction in data processing costs and fully automated management of more than 11,000 items and 200 suppliers.
Tags : supply chain management, enterprise resource planning, erp, scm, enterprise performance management, supplier relationship, customer relationship management, infor
     Infor
Start   Previous    72 73 74 75 76 77 78 79 80 81 82 83 84 85 86    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics