RSS feed Get our RSS feed

News by Topic

microsoft

Results 1 - 25 of 964Sort Results By: Published Date | Title | Company Name
By: Entrust Datacard     Published Date: Jun 14, 2017
Document signing certificates enable organizations to digitally sign Adobe, Microsoft Office® and other document types, marking them with visual trust indicators that verify the publisher’s identity—an indication that the document has not been altered.
Tags : 
     Entrust Datacard
By: Entrust Datacard     Published Date: Apr 26, 2017
Document signing certificates enable organizations to digitally sign Adobe®, Microsoft Office® and other document types, marking them with visual trust indicators that verify the publisher’s identity—an indication that the document has not been altered. With document signing certificates organizations can authenticate documents, allowing for secure and efficient electronic transmission of official papers including legal documents, invoices, engineering plans and diagrams, diplomas, charters and more while reducing costs associated with printing and maintaining paper files. This white paper will discuss: The history of document signing What digital signatures are and how they function The benefits and objectives of implementing document signing certificates Real world use cases of document signing certificates
Tags : 
     Entrust Datacard
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     Proofpoint
By: Proofpoint     Published Date: Jun 22, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected. For more information, visit: www.proofpoint.com/office365
Tags : security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
     Proofpoint
By: MobileIron     Published Date: Feb 08, 2017
Enterprise organizations around the world are rapidly shifting their corporate apps and data to the cloud to drive IT efficiency and expand employee access to business processes. This applies not only to productivity suites like Microsoft Office 365, but also to enterprise mobility management (EMM) solutions like MobileIron.
Tags : 
     MobileIron
By: Microsoft     Published Date: Mar 31, 2017
Visual Studio 2015 hilft Ihnen dabei, großartige Ideen in großartige Geschäftsanwendungen zu verwandeln. Mit unserer flexiblen Cloudplattform und den für Unternehmen konzipierten DevOps-Tools können Sie nun noch einfacher skalierbare, hochmoderne Geschäftsanwendungen für jede beliebige Plattform (Web, mobile Geräte, Cloud oder lokal) entwickeln. Erstellen Sie mit der leistungsstarken Entwicklungsumgebung von Visual Studio beeindruckende Apps für Windows, Android, iOS und das Web. Arbeiten Sie über die Cloud zusammen – mit Versionskontrolle, Agilität, Continuous Delivery und App-Analysen sowie mit jeder beliebigen Programmiersprache und für jede beliebige Plattform.
Tags : mobile applications, mobile apps, ios, .net, devops, android
     Microsoft
By: Entrust Datacard     Published Date: Jun 09, 2017
The rapid adoption of Office 365 means that work created using the Microsoft product contains a large amount of the business world’s sensitive information. In fact, in most enterprises using Office 365, more than half of that highly valuable information — including business plans, sales data, product designs, M&A details and financial forecasts — is contained within Excel, PowerPoint, Word, Outlook and other Microsoft software. Securing the information created with its products has emerged as a primary concern for CSOs, CIOs, IT departments and other C-level executives.
Tags : 
     Entrust Datacard
By: Microsoft     Published Date: Jun 13, 2017
Read our Cloudreach ebook to show how cloud is the new normal for all.
Tags : cloud, cloud adoption, microsoft, migration, migration
     Microsoft
By: Microsoft     Published Date: May 04, 2017
If you’re looking for a simpler, less costly approach to phone and business communications, E5’s voice capabilities can help you reduce office space, host larger meetings and collaborate more effectively. Here’s an overview of the benefits.
Tags : microsoft office, 365, enterprise, business communications, collaboration
     Microsoft
By: Microsoft     Published Date: May 04, 2017
Read on to find out how predict demand, personalise your offer and pre-empt operational issues to stay ahead.
Tags : business analytics, business intelligence, data, marketing
     Microsoft
By: Bell Micro     Published Date: Jun 14, 2010
In this Customer Solution Profile a Fortune five organization put the IBM XIV storage system through its paces in their Microsoft Exchange 2003 environment.
Tags : bell micro, microsoft exchange, ibm xiv storage system, resilience, performance, email system
     Bell Micro
By: Polycom     Published Date: May 22, 2017
Microsoft and Polycom are long-term partners, helping businesses improve productivity, efficiency, and collaboration. With the introduction of three exciting new services for Office 365, this partnership will take business communications even further.
Tags : 
     Polycom
By: Polycom     Published Date: May 22, 2017
Collaboration takes many forms, a simple message and response, a quick phone call, a brief meeting or a formal video conference. Whatever form it takes, collaboration can deliver many business benefits, so it’s important to give employees the right tools for the right environment.
Tags : 
     Polycom
By: Polycom     Published Date: May 22, 2017
Effective, engaging collaboration that leverages video conferencing should incorporate features like content sharing, clear participant rosters, easy call management controls and Instant Messaging. But, according to Microsoft research, some 97 percent of meeting rooms aren’t adequately equipped to handle video.
Tags : 
     Polycom
By: Amazon Web Services     Published Date: Jun 02, 2017
Read the IDG Research whitepaper to see why 54% of respondents plan to adopt and use AWS to help them execute their cloud strategies. Learn how AWS can help you: - Increase business agility - Rapidly deploy and scale new business applications - Reduce total cost of ownership (TCO)
Tags : cloud, cloud computing, business agility, business applications, microsoft, microsoft apps, aws, amazon web service
     Amazon Web Services
By: Amazon Web Services     Published Date: Jun 02, 2017
Read 451 Research’s whitepaper to see how you can: - Increase agility and on-demand scalability - Get enterprise-grade security - Gain precision performance
Tags : cloud, cloud platform, amazon, aws, microsoft
     Amazon Web Services
By: Amazon Web Services     Published Date: Jun 02, 2017
Das 451 Research Whitepaper zeigt Ihnen wie Sie Ihre: - Agilität und On-Demand-Skalierbarkeit erhöhen - IT Sicherheit auf Industriestandard bringen - Präzision und Leistungsfähigkeit erhöhen.
Tags : cloud, cloud platform, amazon, aws, microsoft
     Amazon Web Services
By: Amazon Web Services     Published Date: Jun 02, 2017
Dem folgenden IDG Whitepaper können Sie entnehmen, warum 54% der Befragten für Ihre Cloud Strategie AWS adoptieren wollen. Mit AWS können Sie: - Ihre Agilität steigern - Neue Geschäftsanwendungen bereitstellen und vorhandene skalieren - Ihre Gesamtbetriebskosten (TCO) senken
Tags : cloud, cloud computing, business agility, business applications, microsoft, microsoft apps, aws, amazon web service
     Amazon Web Services
By: Amazon Web Services     Published Date: Jun 02, 2017
Prenez quelques minutes pour lire les résultats de la recherche d’IDG dans ce livre blanc. Vous y comprendrez notamment pourquoi 54% des répondants prévoient d’utiliser AWS pour les aider à déployer leur stratégie cloud. Découvrez comment AWS peut vous aider à : -Améliorer l’agilité de votre entreprise -Déployer rapidement de nouvelles applications métiers et adapter leurs ressources -Réduire votre dette technologique (diminuer votre coût de possession)
Tags : cloud, cloud computing, business agility, business applications, microsoft, microsoft apps, aws, amazon web service
     Amazon Web Services
By: Amazon Web Services     Published Date: Jun 02, 2017
Dans ce livre blanc de 451 Research, vous découvrirez notamment comment : - Améliorer votre agilité et la gestion automatique de vos ressources - Passer au niveau supérieur en termes de sécurité de votre environnement - Gagner en performance
Tags : cloud, cloud platform, amazon, aws, microsoft
     Amazon Web Services
By: Synnex     Published Date: May 12, 2017
This playbook is meant for all Microsoft partners—including SIs, hosters, resellers and VARs—looking to tap into this massive opportunity and set up a managed services business on Azure. This book provides a framework for those looking to build a managed services practice—and some best practices for those who are a little further along on their cloud MSP journey. This book is especially valuable for partners who are either transacting or looking to transact via the CSP platform and license structure. The insights in this playbook are sourced from interviews and surveys with more than 50 Cloud MSPs. These interviews were conducted by AMI Partners Inc.
Tags : playbook, microsoft, resellers, cloud optimization, license structure, surveys, managing services
     Synnex
By: Synnex     Published Date: May 30, 2017
Most companies have decided they need the business agility and want the cost savings that come when moving to the cloud. But with the bewildering amount of contradictory information floating around on the Internet, not many really understand exactly what that means or what it entails. Companies considering Microsoft Office 365 as their first step in moving applications to hosted solutions face similar inconsistencies, making it difficult to separate fact from fiction. For example, some businesses incorrectly believe Office 365 is simply a version of Office accessed by a browser. That’s just one of the misconceptions about Office 365 we want to correct, which is why we created this myth-busting guide to help you. When considering Office 365 to power your organization, you need to know the facts. Your business depends on it. Ready to learn which of the top nine Office 365 business cloud myths you may have thought were true—but aren’t? Read on.
Tags : office 365, cloud, microsoft, office, cloud migration, skype
     Synnex
By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : backdoor trojans, trojan protection, malware, malware protection
     McAfee
By: 123Together     Published Date: Mar 17, 2009
With the current state of the economy, IT executives are being asked to stretch their budgets in order to keep their businesses profitable. In 2008, Median IT spending per user fell to $6,667 from the previous year's $7,397, according to Computer Economics. This represents a 6.2% reduction, consistent with the fact that IT managers were supporting an increasing number of users without corresponding increases in IT spending. IT spend continued to decline in 2009 and uncertainty and caution is still prevalent in 2010.
Tags : 123together, it strategies, economy, stability, collaboration, green it, outsourcing, microsoft exchange
     123Together
By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 123together, it strategies, ediscovery, finra, regulation, security, finra, contact management
     123Together
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics