RSS feed Get our RSS feed

News by Topic

scribe

Results 301 - 325 of 813Sort Results By: Published Date | Title | Company Name
By: AWS     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
     AWS
By: Skytap     Published Date: Sep 01, 2017
In this report, Forrester answers these questions and prescribes a detailed model for assessing, budgeting and managing the migration of a traditional enterprise application to the cloud.
Tags : 
     Skytap
By: Okta APAC     Published Date: Dec 19, 2018
Cost savings, storage, ease of updates. The allure of the cloud is hard to ignore, with some reports citing over 90% of organizations using cloud services in some manner. But all the benefits of the cloud disappear if you can't keep your data and users safe. In a perimeter-less world, it's identity that becomes the heart of security. Join us to discover why modern security starts with identity first and how identity can help overcome cloud frustrations. We would like to keep you in our database in order to send you product, service, and event announcements from Okta, and to share your information with certain service providers and partners, as described in detail here You may unsubscribe from Oktas mailing list at any time, by following this process. Additional details about Oktas privacy practices are available in our Privacy policy.
Tags : 
     Okta APAC
By: Equinix APAC     Published Date: Feb 25, 2019
Security and Resilience in Cloud, Hybrid and Multicloud Deployments This white paper describes the challenges and motivations facing cloud, hybrid and multicloud users as they consider how to deliver traditional levels of security and robustness, while maintaining the API-enabled virtues of flexibility and short lead-times of cloud-enabled IT. Key Highlights: Critical considerations associated with cryptographic key management for multicloud users Implement solutions that are capable of maintaining an always-on service
Tags : 
     Equinix APAC
By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
John outlines the concept of Perfect Forward Secrecy and describes what it takes to achieve this level of security.
Tags : security, forward secrecy
     F5 Networks Singapore Pte Ltd
By: Oracle     Published Date: Dec 13, 2011
This white paper describes and analyzes the 5 most popular deployment scenarios to help IT and business decision makers pick the best options
Tags : on demand, oracle on demand, instant gratification, crm, customer relationship management, deployment, saas, software-as-service
     Oracle
By: Oliver Russell     Published Date: Oct 05, 2009
Can you name the 7 Deadly Sins of B2B Direct Marketing? Are you committing them? This entertaining and educational epistle written for B2B marketing disciples will describe the seven most damning mistakes made in B2B Direct Marketing, and identify the pathway to glorious B2B salvation.
Tags : oliver russell, measurability, b2b, b2b marketer, direct marketing, b2b direct marketing, interactive/pr agencies
     Oliver Russell
By: Micro Focus     Published Date: May 03, 2011
The explosion of data and consumer mobility trends put more pressure than ever on the back office systems across telecommunications companies, defense, transportation, healthcare, financial services and more. Using selected customer scenarios this webcast describes how VisiBroker, the market leading CORBA ORB, is the most cost effective, high performance solution to bring together tens of thousands of end points across distributed applications.
Tags : micro focus, visibroker, corba environment, distributed application
     Micro Focus
By: Centrify Corporation     Published Date: Dec 08, 2010
This white paper also describes Centrify DirectSecure's innovative, software-based approach to deploying a peer-to-peer IPsec solution that can dynamically isolate cross-platform systems and enable end-to-end encryption of data in motion.
Tags : centrify corporation, sensitive information, data protection, privacy and security, ipsec-based serve, domain isolation, microsoft active directory, data encryption
     Centrify Corporation
By: Cisco     Published Date: Jan 12, 2016
This white paper will discuss the challenges currently facing local educational entities, describe 10 exemplary local alliances that enabled connection to CalREN in California, and finish with a set of recommendations for other local entities wishing to create a successful local consortium that could duplicate this success for themselves and for their local educational ecosystems.
Tags : cisco, byod, connectivity, education, networking environment, security
     Cisco
By: HP     Published Date: Jun 02, 2008
VMware describes their partnership with HP storage and how the HP StorageWorks EVA4400 is a great fit for many small and medium businesses that want the advantages of virtualization.
Tags : hp eva 4000, hp eva 4400, storage, storage virtualization, virtualization, virtual storage
     HP
By: HP     Published Date: Oct 22, 2008
HP is pleased to introduce disk encryption for the HP StorageWorks XP24000 and HP StorageWorks XP20000 Disk Arrays. This white paper describes the encryption feature including the background of what the challenge is that the product addresses, what the feature consists of and how it is ordered.
Tags : disaster proof, 4aa2-2629enw, xp24000, xp20000, disk arrays, encryption, storageworks, security
     HP
By: Motorola     Published Date: Feb 06, 2008
This paper describes the key issues a multi-national enterprise needs to consider when determining the requirements for deploying a global wireless messaging project. It then outlines how the Good™ Mobile Messaging solution addresses those key issues. Also included are includes two case studies of recent Good Technology customer deployments.
Tags : motorola, motorola good, mobile messaging, wireless messaging, mobile applications, wireless applications, productivity, wireless
     Motorola
By: Computhink     Published Date: Nov 30, 2007
The Auburn-Washburn School District provides public education to approximately 5,300 Kindergarten through 12th graders in Topeka, KS. It consists of 128 square miles of rural and suburban areas. Descriptive terms like academically challenging, progressive, small classes, high-achievement, modern and excellent are all used to describe the district.
Tags : frcp, search and retrieval, email management, email archiving, email archive, viewwise, computhink, school
     Computhink
By: Elementool Inc.     Published Date: Jan 28, 2008
Elementool, a leading provider of web-based project management tools for developers, including bug, defect, time-tracking and help desk tools, has announced the release of a bug tracking add-in tool for developers using the Visual Studio.NET 2005 platform. It is available free to Elementool’s community of project management solution subscribers.
Tags : bug tracking, project management, software development, effective management process, defect tracking, dot net, .net, software testing
     Elementool Inc.
By: Hewlett-Packard     Published Date: May 13, 2008
Describes the growing need for data backup and recovery solutions, the advantages of disk-based systems, and the software required to manage these systems. The paper also looks at the role of Hewlett Packard's Data Protector software in this strategically important market.
Tags : hp data protection, data protection, idc, analyst, backup, storage, recovery, storage virtualization
     Hewlett-Packard
By: Marketo     Published Date: Jun 08, 2017
Unfortunately, weve all been there. Every now and then, we make cringe-worthy mistakes. But the mistakes that haunt us in our personal lives often arent as public as email marketing mistakes, which go out to hundreds and thousands of subscribers. Download this ebook to learn about the eight most common email marketing pitfalls and how you can avoid or fix them: Mistake 1: Unclear subject lines Mistake 2: Poor email list hygiene Mistake 3: Failure to measure email inboxing Mistake 4: No engagement segmentation Mistake 5: No re-engagement strategy Mistake 6: Using image-based CTA buttons Mistake 7: No mobile optimization Mistake 8: Bad testing decisions
Tags : continuously opened emails, engagement, unique clicks, multiple clicks, cleaning campaign, sender reputation, marketo, marketing
     Marketo
By: Dell Windows Server     Published Date: Jan 16, 2009
This Dell Virtualization Reference Architecture (RA) white paper describes Dell validated architectures for Windows Server 2008® Hyper‐V. The Virtualization RA is intended to provide customers with example virtualization solution configurations that can be used to consider, evaluate, and select the Dell virtualization solution components that best fit their requirements.
Tags : dell, microsoft windows server 2008, hyper-v, reference architecture, virtualization ra
     Dell Windows Server
By: Genesys     Published Date: May 14, 2009
Customer loyalty is a two-way street. Businesses around the world are finding greater success at winning, serving and retaining customers when they are able to respond quickly and effectively whenever they call. Intelligent Customer Front Door (iCFD) is a metaphor that describes a set of applications and technological resources that enable businesses to identify callers and quickly aggregate information about them to assist in successfully resolving their needs. Learn more today!
Tags : genesys, opus, customer loyalty, customer, crm, customer relationship management, retention, intelligent customer front door
     Genesys
By: Symantec.cloud     Published Date: Sep 01, 2010
This is the third part of a three-part white paper series. Part 3 describes how to move on from the basic controls and how each organization should decide which, of all the extra security controls available, are right to be brought in next.
Tags : messagelabs us, it security, smb, activity logging, vulnerability check
     Symantec.cloud
By: Okta     Published Date: Feb 24, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. Were seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in its complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : identity and mobility management, office 365, cloud, maximum user adoption
     Okta
By: NetIQ     Published Date: Dec 23, 2010
This white paper provides the steps to successfully implement the critical security controls listed in the CAG in order to avoid "adding another checklist" to an already overburdened and underfunded organization that is struggling to meet growing security and compliance demands. It also describes how NetIQ can help federal agencies implement and automate these controls.
Tags : netiq, consensus audit guideline, cag, security control, federal agencies, cyber security, information security management
     NetIQ
By: NetIQ     Published Date: Dec 23, 2010
This white paper describes three significant issues with Group Policy change management using native tools and describes a solution for applying best practices for change management.
Tags : netiq, change management, microsoft group policy, compliance auditing, recovery
     NetIQ
By: DataFlux     Published Date: Jan 07, 2011
This white paper describes a general approach for planning your organization's efforts to improve data quality, providing a data-example-driven perspective of some of the unique challenges of product data quality, as well as discuss and demonstrate three critical steps to improving product data quality.
Tags : dataflux, product data quality, standardization, matching
     DataFlux
By: Oracle Corporation     Published Date: May 11, 2012
This white paper describes how to build a better business case for BI, by understanding the level of ambition organizations can have and the layers in the business case that should contribute to that level of ambition.
Tags : oracle, busines intelligence, business intelligence applications, bi applications, bi apps, 11g, cross-value, decision
     Oracle Corporation
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics