RSS feed Get our RSS feed

News by Topic

secure processes

Results 26 - 40 of 40Sort Results By: Published Date | Title | Company Name
By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: ē Securely store and share your firm's and your clients' tax information data. ē Protect your firm's reputation while meeting clients' cyber security expectations. ē Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing.
Tags : data security, data breach, data encryption, data compliance, accounting, data protection
     Citrix ShareFile
By: IBM     Published Date: Mar 04, 2009
Celina Insurance case study that shows cost reduction and increased productivity - faster, better service to agents and their customers due to integrated systems and real-time collaboration; being “easy to do business with” secures agent loyalty; 50 percent reduction in phone calls and costs due to instant messaging option, and 40 percent reduction in head count while maintaining the same volume of business due to streamlined processes.
Tags : lotus software, ibm, celina insurance, lotus extranet, streamlined processes, reduction in intranet traffic, integrated systems, lotus notes
     IBM
By: IBM     Published Date: Jun 16, 2009
As products go to market quicker, employees, customers, and business partners need the ability to collaborate and access business data—when, where, and how ever they choose. Watch this illustrated demo to see how IBM offers a smarter, business-driven approach to Identity and Access Management. And how IBM’s extensive integration capabilities can enhance productivity without compromising security.
Tags : identity, access management, secure, ibm, mmdg, enterprise single sign on, user data, security
     IBM
By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. Itís not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents
     OpenText
By: MobileIron     Published Date: Oct 21, 2016
To help increase employee productivity and customer satisfaction, Edward Rose and Sons developed a new mobility initiative to provide its leasing and maintenance staff with company-owned iOS mobile devices and apps to accelerate and secure critical business processes. Download now to see how MobileIron helped Edward Rose & Sons.
Tags : 
     MobileIron
By: DocuSign     Published Date: Mar 23, 2016
"Businesses are increasingly aware that digitization ó converting or migrating non-digital information, practices, and processes into digital formatsó can increase agility, productivity, and cost savings. According to a recent IDG Research survey, however, even organizations that are actively moving toward greater digitization have ample room for improvement. Discover how to move past the organizational bottlenecks and build a strong business case for further digitization as a competitive advantage with all the vital benefits DocuSign + Office 365 solution delivers. Download this white paper to learn more about DocuSign and Microsoft Office 365 solution and how you can: -Reduce the time needed to complete business transactions -Create and automate workflows to ensure transactions are safe and secure -Improve a user's ability to control and monitor these processes
Tags : 
     DocuSign
By: AWS     Published Date: Jul 16, 2018
The Internet of Things (IoT) is composed of sensor-embedded devices and machines that exchange data with each other and the cloud through a secure network. Often referred to as ďthingsĒ or ďedge devicesĒ, these intelligent machines connect to the internet either directly or through an IoT gateway, enabling them to send data to the cloud. Analyzing this data can reveal valuable insights about these objects and the business processes theyíre part of, helping enterprises optimize their operations. Devices in IoT deployments can span nearly any industry or use case. Each one is equipped with sensors, processing power, connectivity, and software, enabling asset control and other remote interactions over the internet. Unlike traditional IT assets, these edge devices are resource-constrained (either by bandwidth, storage, or processing power) and are typically found outside of a data center, creating unique security and management considerations.
Tags : 
     AWS
By: Lumension     Published Date: Aug 29, 2014
Server systems are, by definition, more important than individual endpoints. They must provide services to hundred, or even thousands, of endpoints and, naturally, must be secure. Traditional anti-virus (AV) solutions can provide protection for servers. However, constantly running AV processes, along with potentially frequent signature updates, can consume resources that could otherwise be used to provide application services to users. Read this evaluation by Tolly, commissioned by Lumension, as the dive into the impact on server resources of the alternative application control solution compared with traditional AV solutions from Microsoft Corp, Symantec Corp, and Trend Micro, Inc.
Tags : server, security, anti-virus, endpoint security
     Lumension
By: ASG Technologies     Published Date: Apr 25, 2017
In todayís business model, organizations must provide support and flexibility in addressing the needs of a growing mobile workforce, and interactions with external partners, suppliers, and clients. In short, todayís business model must look beyond corporate walls and extend their business processes and access to business information in an effective, and secure manner regardless of device type. In this way, cloud applications can be leveraged to enhance and extend business processes beyond their corporate walls and support the increasing use of mobile devices. This paper presents the challenges and benefits of implementing an integrated cloud solution that provides the flexibility, agility, and security business organizations need to increase operational efficiency, and responsiveness.
Tags : 
     ASG Technologies
By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. Itís not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents
     OpenText
By: Cisco     Published Date: Aug 28, 2015
IDC research shows that an increasing number of organizations are looking to deploy OpenStack as the foundation for their cloud environments to provide a more agile but secure IT backbone to enable, and in some cases transform key business processes.
Tags : openstack, enterprise, cloud computing, agile
     Cisco
By: Delphix     Published Date: Mar 24, 2015
With the recent spike in data theft and cybercrime, data masking is becoming an invaluable element of organization's security strategies. Delphix Agile Masking transforms secure data delivery, and enhances compliance and security while accelerating data management processes across the board.
Tags : 
     Delphix
By: IBM     Published Date: Jun 07, 2017
Read this eBook to get insight on the essential elements of a modernized B2B integration architecture. Companies need a strategy as they think about modernizing their B2B integration capabilities. This eBook describes what to look for and how IBM can help. Youíll learn about: ∑ Operating a single, secure B2B integration gateway ∑ Simplified onboarding and partner management. ∑ High availability business operations and disaster recovery ∑ Adaptable capabilities to help react to changes to your business processes ∑ Visibility and analytics that provide actionable insight over those processes ∑ Supporting a mix of hybrid deployment models including on-premises and cloud
Tags : b2bi, ibm, b2b integration, modernization, b2b architechture
     IBM
By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate Ė a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organizationís DevOps practice, Tenable encourages you to read the Gartner report, ď10 Things to Get Right for Successful DevSecOps.Ē Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and misconĀgurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : secure devops, gartner, analyst report, container security
     Tenable
By: Tenable     Published Date: Mar 07, 2018
"Answers to five questions that are top-of-mind for infosec leaders today. The challenge of secure DevOps is top of mind for many infosec and IT leaders. To help you understand the latest trends, Tenable reached out to Christina Richmond, Program Director for IDCís Security Services Research Group, for her answers to the following five questions: 1. How do organizations ensure that the security team adapts seamlessly to development processes and tools to create a cohesive program? 2. What are some common mistakes you see companies make when attempting to integrate their DevOps and security processes? 3. How can security leaders assist organizations with making the transition to secure DevOps? 4. In the world of agile methodologies and DevOps, how do security teams need to evolve to be more effective in managing cyber risk? 5. What are some examples of secure DevOps principles among cloud native technologies? Written for infosec leaders responsible for integrating security int
Tags : secure devops, idc, analyst report, container security
     Tenable
Previous    1 2     Next   
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics