RSS feed Get our RSS feed

News by Topic

mitigate

Results 251 - 262 of 262Sort Results By: Published Date | Title | Company Name
By: DataMotion     Published Date: Oct 02, 2008
This white paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and discusses the steps that an organization should take to mitigate the risks it faces from employee use of communication tools. Also included in this document are brief descriptions of the companies that have co-sponsored it.
Tags : certifiedmail, borderware, postini, symantec, workshare
     DataMotion
By: HP SAS     Published Date: Sep 24, 2008
Designed for CIOs, IT managers, data center managers and grid computing architects seeking to improve performance, SAS Grid Computing on the HP BladeSystem. C-Class helps accelerate growth and mitigate risks with a simplified, consolidated infrastructure that’s agile enough to efficiently handle change. SAS Grid Manager on HP BladeSystem can lower costs through automation, virtualization and improved IT efficiency.   Download  HP's "Quick Sizing Guide for SAS Grid running on HP BladeSystem and EVA Storage" to learn more about the equipment needs to deploy SAS Grid Manager on HP BladeSystem.
Tags : hewlett packard, bladesystems, grid manager, grid computing, polyserve matrix, eva storage
     HP SAS
By: CA ITAM     Published Date: Sep 09, 2008
This white paper discusses how to make the leap from basic asset tracking to a more robust asset management program that can improve decision-making and service levels, reduce costs and mitigate risks. The focus is the CA IT Asset Management solution's ability to accelerate your IT Asset Management program's maturity by providing asset ownership information (the complement to discovery information).
Tags : 
     CA ITAM
By: HP     Published Date: Jun 23, 2008
In this video, at a high-tech ballistics center managed by National Technical Systems in Camden, Arkansas, HP simulated a gas leak using real explosives to blow up a data center. Every system failed-over after the explosion in less than two minutes—including data on an HP StorageWorks XP12000 Disk Array which failed over flawlessly to an HP StorageWorks XP24000 Disk Array.
Tags : disaster, disaster proof, disaster-proof, hp disaster proof, xp24000, disk array, storage
     HP
By: Oce Business Services     Published Date: Mar 24, 2008
IDC has found a direct correlation between effective document management and improved business performance. Yet recent research reveals that half of organizations rate their document process management processes as ineffective. This best-practices paper gives you insight into how you can reduce costs, increase productivity, mitigate risk and enhance business performance through the strategic outsourcing of document lifecycle management.
Tags : document management outsourcing, document process management, document lifecycle management, outsourcing document management, document management best practices, document process, document, oce
     Oce Business Services
By: Oce Business Services     Published Date: Mar 24, 2008
Effective records management has never been more crucial to meeting corporate governance, risk management and operational mandates. Yet half of enterprises lack a fully implemented records management program. Download this white paper to learn how strategic outsourcing can help you mitigate risks, apply best practices, meet compliance mandates and improve overall records management ROI.
Tags : oce, records management
     Oce Business Services
By: GFI     Published Date: Jan 11, 2008
2008 brings with it new challenges and issues that network and systems administrators should be aware of, particularly vulnerabilities brought on by users. This white paper examines the top concerns which network security professionals should be prepared to face in 2008, and how they can be mitigated.
Tags : gfi, employees, employee vulnerability, vulnerability management, vulnerability, vulnerabilities, security concerns, internal threats
     GFI
By: Thinksoft     Published Date: Dec 03, 2007
This white paper acts as a tool, for CEO's and Business and IT heads, helps reduce application deployment risks and costs. This paper attempts to establish how outsourcing test services to an independent domain-focused specialist company can substantially mitigate deployment risks. Business users are assured of receiving reliably better quality application well within cost and time budgets.
Tags : outsourcing, outsourced software testing, software testing, testing vendor, stages in outsourced software testing, independent software testing, thinksoft
     Thinksoft
By: Inovis     Published Date: Aug 21, 2007
Business Community Management is a strategic vision that creates a comprehensive view of the supply chain by integrating the technology, business processes and communication of the entire business community to facilitate end-to-end supply chain visibility. This white paper will examine the current state of B2B communication; detail the steps needed to mitigate the challenges created by B2B; and more.
Tags : vendor management, supplier, suppliers, supplier relationship management, inovis, supply chain, supply chain management, scm
     Inovis
By: Perimeter     Published Date: Jul 17, 2007
What is the difference between a risk, a threat, a vulnerability and an exploit? Which product or solution can be employed to address my institution’s information security and compliance needs? This paper provides some clarity on the first question, and in the process, it should help to offer an answer to the second question, one of aligning concerns with solutions with vulnerability management.
Tags : risk management, vulnerability assessment, ips, intrusion prevention, ids, intrusion detection, firewall, exploit
     Perimeter
By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging
     Decru
By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
     Avalere
Start   Previous    1 2 3 4 5 6 7 8 9 10 11     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics