RSS feed Get our RSS feed

News by Topic

format type

Results 76 - 89 of 89Sort Results By: Published Date | Title | Company Name
By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : data security, compliance, technology, network security, regulatory compliance, security
     Intralinks
By: Liaison Technologies     Published Date: Feb 07, 2014
Data integration and management can pave the way for quick realization of M&A success and time-to-value for every transaction. Have you looked into M&A?
Tags : liaison, data integration, data management, it resources, business continuity, systems and processes, autonomous acquisitions, information segregation
     Liaison Technologies
By: Liaison Technologies     Published Date: Feb 07, 2014
Big Data holds the promise of a virtually unlimited ability to gain insight – and foresight – to sharpen strategies and improve tactical execution but only if it can be harnessed and managed. Through this whitepaper, you can learn how.
Tags : liaison, data integration, data management, it resources, business continuity, systems and processes, autonomous acquisitions, information segregation
     Liaison Technologies
By: Aruba Networks     Published Date: Nov 15, 2013
Le lieu de travail nouvelle génération repose sur la mobilité. À l’heure où le nombre d’appareils mobiles connectés à Internet dépasse la population mondiale, il est essentiel que les services informatiques soient en mesure d’offrir à chaque catégorie d’utilisateurs (employés, entrepreneurs, invités et clients) une connectivité fluide et adaptée à leurs besoins et types d’équipement. Outre les atouts évidents pour les utilisateurs et l’effet bénéfique sur la productivité, la migration vers la mobilité est source de nombreux avantages pour les services informatiques. Téléchargez ce livre blanc pour les découvrir…
Tags : just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs
     Aruba Networks
By: Mimecast     Published Date: Apr 04, 2013
Enterprise information archiving is contributing to organizational needs for e-discovery and compliance requirements, and reducing primary storage costs. Gartner evaluates vendors offering products and services that provide archiving for email, files and other content types.
Tags : enterprise, information archiving, email, ediscory, compliance, primary storage costs, roi, storage
     Mimecast
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Gaining the trust of online customers is vital for the success of any company that transfers sensitive data over the Web. When shopping online, consumers are concerned about identity theft and are therefore wary of providing untrusted sources with their personal information, especially their credit card details. Other types of online businesses require different but equally sensitive information. People are reluctant to provide their national insurance numbers, passwords, or other confidential personal information, or sometimes even just name, address, and phone number. Perhaps the information will be intercepted in transit, they fear, or perhaps the destination itself is manned by imposters with ill intent.  The result is an abandoned transaction.
Tags : security, ssl, trust, authentication, online security, online business, ssl certificates, ssl certificate
     VeriSign Authentication Services, now a part of Symantec Corp.
By: SAS     Published Date: Apr 13, 2011
This paper will outline the value and methods involved in data mining across both quantitative and qualitative data. In addition, it will describe the data transformations necessary before doing such work, and the tools that are particularly valuable for mining mixed data types.
Tags : business intelligence, michael lock, predictive analytics, business insight, business visibility, small to medium sized business
     SAS
By: TopLayer     Published Date: Aug 21, 2009
This white paper is intended for Information Security and Information Technology professionals interested in understanding Zero-day Attacks, the various protection schemes available today and how Top Layer Network's Intrusion Prevention System (IPS) solutions provide the best mechanisms for protection from these types of attacks.
Tags : network security, intrusion prevention, ips, cso, server protection, toplayer, top layer, security
     TopLayer
By: SRC,LLC     Published Date: Jun 01, 2009
Today, organizations are collecting data at every level of their business and in volumes that in the past were unimaginable. Data sets are stored in different database systems or in files with distinctive formats, all reflecting business process, application, program software, or information type dependencies. Adding to this complexity is the distribution of these data sets across the enterprise in silos requiring a varied set of tools and/or specialized business rules for data transformation, classification, matching, and integration. Because of the massive amounts of data stored in a variety of representation formats, decision makers strain to derive insights and create business solutions that adequately span and integrate information from these disparate technology islands. Learn more today!
Tags : src, data transformation, classification, business value, geographic business intelligence, geo-bi, etl, extract
     SRC,LLC
By: Eyeblaster, Inc.     Published Date: Apr 02, 2009
One of the big challenges faced by online marketers and agencies that handle large online budgets is maximizing conversions and optimizing online budgets at zero or minimum cost. This issue of the Eyeblaster Analytics Bulletin presents findings on conversions and a multitude of methods that can be deployed to ensure a better yield of successful digital campaigns.
Tags : eyeblaster, click-thru rate, conversion rate, format type, conversion rate, rich media, data capture, ctr
     Eyeblaster, Inc.
By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
     Trend Micro SaaS
By: IBM     Published Date: May 30, 2008
Not all data is created equal, however, and deriving business value from information dispersed over many different sources means integrating, analyzing and optimizing heterogeneous types and sources of information throughout its lifecycle. Find out how, when deployed together in the same environment, IBM TotalStorage Productivity Center, IBM System Storage SAN Volume Controller and IBM Tivoli Storage Manager deliver the core technologies need to help customers tier their storage based on classes of service.
Tags : information lifecycle, information management, tivoli, storage management, leveraging information, ibm, ibm li, li campaign
     IBM
By: Microworld     Published Date: Dec 12, 2007
Unwanted PopUp Ads are intrusive Internet advertisements that are displayed when you access web pages. This white paper provides information about different type of PopUp Ads, losses they cause, how they work and suggests key features that a good PopUp Ad Filter software should have.
Tags : pop-up, popup, ads, pop-up ad, pop-up ads, internet security, online security, virus
     Microworld
By: Aveksa     Published Date: Dec 07, 2007
Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.
Tags : access control, access certification, compliant, certification, rules, compliance, governance, risk management
     Aveksa
Start   Previous    1 2 3 4     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics