RSS feed Get our RSS feed

News by Topic

mission

Results 976 - 1000 of 1003Sort Results By: Published Date | Title | Company Name
By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : access control, user access, access, permissions, risk, risk management, compliance, governance
     Aveksa
By: GlobalSCAPE     Published Date: Jan 08, 2008
Patton Harris and Rust and Associates has 13 branches.  Management and IT needed a way to help these offices work on projects together to optimize company resources.  Using GlobalSCAPE WAFS gave PHR+A fast file access across branches using minimal system resources. No management is required as it operates in the background and real time byte level differencing not only reduces bandwidth usage and spikes but also the changes are sent as they happen – not when they are needed.
Tags : wafs, wan, wans, wide area networks, file transfer, file transmission, secure file transfer, mft
     GlobalSCAPE
By: GlobalSCAPE     Published Date: Jan 08, 2008
Jordan & Skala Engineers is a growing company with 5 offices.  It needed a scalable solution to optimize their network and their resources as more and more work was distributed across sites. Using GlobalSCAPE WAFS files mirror instantly in real time using byte-level differencing.  So as soon as a file is saved or closed, the file deltas appear in every other location on the network. Users are never waiting for files to upload, download, or open across a network.
Tags : wide area networks, wan, wans, wafs, wafs, file transfer, file transmission, globalscape
     GlobalSCAPE
By: GlobalSCAPE     Published Date: Jan 08, 2008
AON’s Human Capital division needed a better way to automate their data transfer processes. They wanted a simple yet flexible system that didn’t require customization to adapt to growing needs.  They wanted to consolidate their sensitive data transfers and ensure the security of this data and to provide integration with current workflow and key legacy applications. AON deployed the GlobalSCAPE EFT (Enhanced File Transfer) server.
Tags : file transfer, file transmission, eft, mft, secure file transfer, data transfer, data transmission, globalscape
     GlobalSCAPE
By: GlobalSCAPE     Published Date: Jan 08, 2008
The Payment Card Industry Data Security Standard is a detailed series of 130+ requirements that anyone who stores or transfers credit card data has to comply with.  However due to the protection it offers, the PCI DSS is fast becoming a security standard for all sensitive data that needs to be protected.  The goal of the standard is to ensure security of data in transit and at rest while ensuring compliance is maintained. 
Tags : pci, pci dss, pci compliance, compliance, credit card, credit cards, payment card, data protection
     GlobalSCAPE
By: Stratus Technologies     Published Date: Jan 07, 2008
CIOs today are being called upon to interpret business strategy and priorities, then add value through information technology initiatives. At a time when "critical to the business" translates to "mission-critical IT", how do you ensure end-to-end availability and reliability of the IT resources that enable your company’s essential business processes.
Tags : business success, productivity, compliance, cost control, decrease spending, spend management, data integrity, meeting sla
     Stratus Technologies
By: Astrocom     Published Date: Dec 13, 2007
Enterprises with mission critical applications are exploring the benefits of disaster recovery sites for their data centers to ensure business continuity. Special network technology is needed to ensure that site failover and failback occurs reliably and predictably. An ideal solution should provide reliable network connections, manage inbound and outbound traffic over multiple WAN links, failover to a secondary data center if all links at the primary data center are down, and eliminate deployment barriers and costs of multi-homing with BGP (Border Gateway Protocol).
Tags : data center, datacenter, data centers, business continuity, disaster recovery, backup, recovery, failover
     Astrocom
By: Computhink     Published Date: Nov 30, 2007
The Marin Community Foundation (MCF) was established in 1986 with the assets of a trust created by long-time Marin residents Leonard and Beryl H. Buck. From the start, MCF’s mission was to use philanthropic contributions to help improve the human condition and enhance the quality of life in Marin County, CA. An unintended consequence was that they were swimming in paper.
Tags : electronic document, document management, information management, case study, marin, mcf, marin community foundation, workflow
     Computhink
By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : remote, remote access, remote network, network management, network security, hipaa, hippa, sox
     Axeda Corporation
By: Appistry     Published Date: Oct 11, 2007
Organizations serving the intelligence & defense community rely on the performance of their applications for more than revenue - national security depends upon those applications for mission-critical operations. This industry profile details how Appistry provides the reliability and performance demanded by intelligence & defense organizations.
Tags : application fabric, performance computing, application performance, grid computing, infrastructure, appistry
     Appistry
By: Stratus Technologies     Published Date: Sep 19, 2007
For mission-critical IT, service outages and data loss pose serious consequences.  This white paper examines how availability management, disaster recovery and business continuity support one another and offers insight to find success at all of them.
Tags : business continuity, disaster recovery, high availability, stratus, stratus technologies
     Stratus Technologies
By: Quocirca     Published Date: Sep 13, 2007
A sound IT infrastructure is fundamental to today’s businesses and when that infrastructure fails the consequences can be far reaching. Whether it is business-to-business, business-to-consumer or public sector organizations serving citizens, applications and the services they drive increasingly need to be available all day, every day. Many organizations find it hard to achieve such service levels. This briefing looks at some possible solutions.
Tags : data center, datacenter, data centers, datacenters, data centre, data centres, infrastructure, mission critical
     Quocirca
By: Quocirca     Published Date: Sep 13, 2007
File servers continue to proliferate, and email has moved from a basic tool for exchanging documents to an inherent part of an organization’s communication and collaboration portfolio. With such ad-hoc information sources now being a mission critical function, the need for data management and archival is becoming critical.
Tags : information management, servers, storage, quocirca
     Quocirca
By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
     ProofSpace
By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
     Asentria Corporation
By: ACTEK, Inc.     Published Date: Aug 30, 2007
Download this very brief guide now and reflect on the 9 Indicators. If you answer "no" to two or more of the questions listed within, there is undoubtedly sufficient ROI to strongly consider replacing your current incentive compensation system.
Tags : incentive compensation, incentive, sales, salesforce, salesforce management, sales manager, sales management, bonus
     ACTEK, Inc.
By: Motorola     Published Date: Aug 09, 2007
In this paper, two case studies illustrate different approaches to unlocking the value of existing investments through mobilization. Each case study provides an overview of an application we mobilized, identifies the characteristics that made the application a good candidate and explains the value realized by enabling access to these applications from mobile devices.
Tags : applications, mobile applications, mobility, mobilization, pda application, optimizing applications, mobile computing, mobile workers
     Motorola
By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
     ProofSpace
By: Infor     Published Date: Jul 23, 2007
Make EAM part of your Green Strategy; This white paper includes recommendations for a Green-centric Organization. Find out how a comprehensive, green-oriented asset performance management solution will enable you to achieve compliance, efficiency, and consumer appeal.
Tags : environment, environmental, social responsibility, greenhouse, greenhouse effect, green, gas emissions, environmentalism
     Infor
By: GFI     Published Date: Jun 14, 2007
This white paper details how integrated network faxing remains a relevant technology that can give you a business edge in an ever competitive marketplace, providing higher productivity and helping you save thousands of dollars in labor costs alone.
Tags : ip networks, ip network, ip fax, ip faxing, faxing, fax, fax server, fax security
     GFI
By: Synchronicity Marketing     Published Date: Mar 26, 2007
Since most marketers know a lot more about their customers than their non-customers, there are many unanswered questions when it comes to prospecting with email. Download this white paper to learn the five most important steps to successful prospecting with permission email.
Tags : email marketing, database and list managers, landing pages, list rentals, database marketing, synchronicity marketing, permission email
     Synchronicity Marketing
By: Xactis     Published Date: Feb 05, 2007
Learn the ‘bottom-up’ approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.
Tags : soa, service oriented architecture, service-oriented architecture, business rules extracting, software development, c++, quality assurance, legacy system
     Xactis
By: Xactis     Published Date: Feb 02, 2007
Learn the 'bottom-up' approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.  This is a "how-to" presentation addressing how to get started and eventually establish an internal L2S Center of Excellence.
Tags : soa, service oriented architecture, service-oriented architecture, business rules extracting, legacy system, erp, enterprise resource planning, mainframe
     Xactis
By: Medium Blue     Published Date: Jan 29, 2007
Two of the most popular methods a company can use for online marketing are organic search engine optimization and pay-per-click advertising - and these are often used in tandem. Learn more about the pros and cons of each of these methods.
Tags : search marketing, search engine optimization, pay per click marketing, search engine / directory submission, medium blue, search marketing agencies, search engine optimization (seo)
     Medium Blue
By: AcquireWeb     Published Date: Jan 22, 2007
This article addresses one of the biggest challenges associated with e-mail marketing programs – establishing meaningful contact with customer targets in order to increase sales, while protecting and enhancing your brand. It illustrates that successful e-mail marketing designed to drive sales and build brands requires adopting a methodology that includes more precise prospect targeting, better permission-based models, a better overall consumer experience and better quality lists.
Tags : email marketing, best practices, permission marketing, brand management, direct marketing, newsletter design, acquireweb, integrated marketing
     AcquireWeb
Start   Previous    27 28 29 30 31 32 33 34 35 36 37 38 39 40 41    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics