RSS feed Get our RSS feed

News by Topic

effective enterprise

Results 151 - 175 of 177Sort Results By: Published Date | Title | Company Name
By: Social Text.     Published Date: Jul 21, 2009
Read this paper to learn the steps to successfully roll out an enterprise collaboration solution and help your organization embrace a more collaborative, transparent and effective way of working. Introducing a social software solution carries with it a unique set of challenges and opportunities, and requires a new roll-out approach. The approach outlined in this paper has been honed over thousands of customer implementations to generate the fastest adoption across your enterprise.
Tags : socialtext, social networking, collaboration, enterprise collaboration, social media, twitter, linkedin, facebook
     Social Text.
By: BMC Control M     Published Date: Jul 16, 2009
Companies running legacy job scheduling products suffer from higher costs, inefficient use of resources, and greater IT complexity, according to independent analyst firm Enterprise Management Associates. Read their findings, and see why consolidating on a single, comprehensive workload automation solution is an easy win for IT and the business.
Tags : smart, modular, cost-effective, ema, enterprise management associates, it complexity, workload automation, bmc
     BMC Control M
By: BMC Software     Published Date: Jun 30, 2009
Companies running legacy job scheduling products suffer from higher costs, inefficient use of resources, and greater IT complexity, according to independent analyst firm Enterprise Management Associates. Read their findings, and see why consolidating on a single, comprehensive workload automation solution is an easy win for IT and the business.
Tags : smart, modular, cost-effective, ema, enterprise management associates, it complexity, workload automation, bmc
     BMC Software
By: Trend Micro SPN     Published Date: May 15, 2009
Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.
Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
     Trend Micro SPN
By: VeriSign Incorp.     Published Date: Apr 15, 2009
Get your guide today and discover a smart, new strategy for managing SSL security across your network. With VeriSign's Managed PKI for SSL Web-based service, you can centrally manage all of your SSL Certificates with a simple, Web-based interface.
Tags : mpki for ssl, managed security solutions, ssl, verisign, http protocol, secure sockets layer, public key infrastructure, certification-authority (root ca)
     VeriSign Incorp.
By: BlackBerry     Published Date: Mar 03, 2009
Companies that are interested in securing their mobile workers and preventing unauthorized access to important company resources need to implement an enterprise wireless security strategy. Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
Tags : blackberry, mobile applications, mobile security, cio, pim, voip, smartphones, it communication
     BlackBerry
By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : ibm integrated data management, siebel crm, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth
     IBM
By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : ibm integrated data management, oracle e-business suite, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution
     IBM
By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : ibm integrated data management, jd edwards, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution
     IBM
By: IBM     Published Date: Jan 13, 2009
In business, no two challenges are the same. To be effective now and in the future, organizations must be able to adapt with speed and agility. Read this white paper to learn how enterprise mashups can help you use existing IT assets and projects to solve situational problems and take advantage of business opportunities.
Tags : ibm, enterprise mashups, it assets, situational applications, information mashing, governance, supply chain management
     IBM
By: LockLizard     Published Date: Dec 08, 2008
This paper covers why DRM is required for data leakage prevention from within and outside of the enterprise for use as an effective document control system. It covers why encryption and access control are only effective inside the enterprise to secure information.
Tags : locklizard, data leakage, information leakage, secure information, security
     LockLizard
By: CA WA 2     Published Date: Oct 01, 2008
VMware and CA have collaborated to develop integrated solutions that enable your organization to effectively deploy, optimize, manage and secure physical and virtual systems across the enterprise.
Tags : virtualization, virtual, vmware, ca wa, ca wa 2
     CA WA 2
By: VMware Dell     Published Date: Sep 29, 2008
Virtualized IT infrastructures can simplify management and facilitate business continuity while helping minimize power consumption and procurement costs. Virtualization also helps organizations automate disaster recovery plans. Dell EqualLogic PS Series arrays and VMware® Site Recovery Manager (SRM) software provide integrated, cost-effective, automated site recovery and testing for enterprise data centers.
Tags : vmware, dell, iscsi, equallogic, site recovery manager, navicure, disaster recovery
     VMware Dell
By: Senn Delaney     Published Date: Sep 05, 2008
It's become a business imperative to maximize operational effectiveness, trim costs, standardize and streamline processes, achieve economies of scale and increase competitive advantage. Today's most successful leaders do this in a way that balances the greater good of the enterprise with the competing demands of their autonomous businesses that must respond to the individual needs of their markets. A more collaborative model that helps leaders of complex businesses to maximize effectiveness is gaining traction. Four prominent business leaders discuss their challenges and successes in shifting to this shared business model.
Tags : senn delaney, customer focused, brand management, customer-centric, employee management, employee engagement, other
     Senn Delaney
By: BlueCat     Published Date: Jul 09, 2008
This paper briefly traces some of the challenges involved with IP address distribution over the past two decades, to the current adoption of DHCP as the dynamic protocol of choice for pain-free management of network resources. Integral to the theme of secure yet reliable network administration is the integration of DNS and DHCP into a single network device called the Adonis DNS/DHCP Appliance which ensures that traditional barriers to secure and effective resource allocations are overcome with an efficient yet easy-to-use solution that enhances enterprise information security.
Tags : ipam, ip address management, address management, dns, dhcp, ip address, bluecat, blue cat
     BlueCat
By: ActivPlant     Published Date: Jun 22, 2008
For complex manufacturing environments, OEE (Overall Equipment Effectiveness) falls short when it comes to delivering improvements in productivity. That's because OEE tools were originally developed to measure the performance of stand-alone equipment or the total output of a particular line. Today's enterprises need more. This paper describes an evolution in thinking: focusing on product flow through the process.
Tags : equipment, scm, manufacturing, productivity, output, line output, volume, product lifecycle management
     ActivPlant
By: CA SM     Published Date: Jun 02, 2008
Telecom assets are a special class of IT assets that require an accurate inventory for effective financial management. Enterprises should consider the benefits of establishing a "single version of the truth" that comes from linking management of IT and telecom assets with their other systems and processes. An accurate inventory is critical for effective financial management. Managers need accurate information that supports their business decisions.
Tags : ca sm, ca service management, service management, telecom, business management, asset management, business integration, convergence
     CA SM
By: Oce Business Services     Published Date: Mar 24, 2008
Effective records management has never been more crucial to meeting corporate governance, risk management and operational mandates. Yet half of enterprises lack a fully implemented records management program. Download this white paper to learn how strategic outsourcing can help you mitigate risks, apply best practices, meet compliance mandates and improve overall records management ROI.
Tags : oce, records management
     Oce Business Services
By: Ultraseek     Published Date: Mar 07, 2008
The value of effective site and intranet search is clear. Finding the most relevant document helps your organization identify and capitalize on opportunities, accelerate business cycles, and implement and execute effective strategies. But whether you have a few thousand pages on your public website or a few million documents scattered across the globe, selecting the right search solution for your enterprise can challenge even the most seasoned technology buyer.
Tags : ultraseek, search
     Ultraseek
By: SAP     Published Date: Feb 05, 2008
Many CEOs have told us that business transformation needs to be done effectively and efficiently, without much disruption to the business. And it should be a continuous process, not a one-time event. Continuous business transformation, accomplished over time, requires a new degree of flexibility and adaptability in all parts of the enterprise. So how do you get ready to change and continue to change?
Tags : sap, business transformation, enterprise applications, market leadership
     SAP
By: Netwrix     Published Date: Oct 10, 2007
This white paper covers account lockout management process and introduces new cost-effective workflows of account lockout resolution, describing significant ROI enterprises can achieve through the use of automated management solutions.
Tags : authentication, account lockout, access control, network security, lockout, user lockout, user authentication, user validation
     Netwrix
By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
     Neoscale Systems, Inc.
By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
With horror stories in the news every week about lost or stolen laptops and backup tapes, the senior management team at Oregon Community Credit Union knew they had to do everything within their powers to protect their critical data as it traveled offsite to a third-party tape vaulting vendor. They were tasked with finding an affordable solution that would strike a balance between security, ease of use, and scalability.
Tags : storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
     Neoscale Systems, Inc.
By: Indicative Software     Published Date: Aug 24, 2007
Learn about agent-based versus agentless monitoring approaches to enterprise management, and how a combination of data collection technologies can realize the benefits of both.
Tags : enterprise management, enterprise monitoring, data collection, data collection engines, agent-based monitoring, agentless monitoring, performance monitoring, application performance
     Indicative Software
By: Motorola     Published Date: Aug 09, 2007
Wireless access to enterprise information is going mainstream. However, while the groundswell of enthusiasm for wireless access is coming from the bottom up, the management of wireless access needs to be driven from the top down. Learn how you can build a solid wireless strategy for your organization.
Tags : wireless, mobility, mobile computing, wireless security, remote access, fleet management, mobile workforce, mobile worker
     Motorola
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics