ibe

Results 501 - 525 of 1109Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Oct 22, 2008
HP is pleased to introduce disk encryption for the HP StorageWorks XP24000 and HP StorageWorks XP20000 Disk Arrays. This white paper describes the encryption feature including the background of what the challenge is that the product addresses, what the feature consists of and how it is ordered.
Tags : 
disaster proof, 4aa2-2629enw, xp24000, xp20000, disk arrays, encryption, storageworks
    
HP
Published By: Motorola     Published Date: Feb 06, 2008
This paper describes the key issues a multi-national enterprise needs to consider when determining the requirements for deploying a global wireless messaging project. It then outlines how the Good™ Mobile Messaging solution addresses those key issues. Also included are includes two case studies of recent Good Technology customer deployments.
Tags : 
motorola, motorola good, mobile messaging, wireless messaging, mobile applications, wireless applications, productivity, wireless
    
Motorola
Published By: Computhink     Published Date: Nov 30, 2007
The Auburn-Washburn School District provides public education to approximately 5,300 Kindergarten through 12th graders in Topeka, KS. It consists of 128 square miles of rural and suburban areas. Descriptive terms like academically challenging, progressive, small classes, high-achievement, modern and excellent are all used to describe the district.
Tags : 
frcp, search and retrieval, email management, email archiving, email archive, viewwise, computhink, school
    
Computhink
Published By: Computhink     Published Date: Dec 10, 2007
Like most law firms, Salter Feiber deals with vast amounts of documents, a significant portion of which needs to be kept for long periods of time. "We tried to keep the files closed during the last 12 months onsite," says Kim Chewning, Firm Administrator. "Everything else was sent to a third party for storage in a secure facility." However, as the archive grew, so did the storage cost.
Tags : 
documents, document, document management, storage, law firm, lawyer, secure content management, customer service
    
Computhink
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Email encryption is fast becoming the must-have technology to achieve regulatory compliance, secure corporate assets, and protect privacy. Effective, affordable, and easy-to-use encryption was once unheard of. Now businesses can have it all.
Tags : 
watchguard xcs, securemail encryption, email encryption, ibe, data loss over e-mail, compliance, identity-based encryption
    
WatchGuard Technologies
Published By: Supply Chain Connect     Published Date: Jan 24, 2008
General Cable operates 28 manufacturing locations in 8 countries and is a leader in the development, design, manufacture, marketing and distribution of copper, aluminum and fiber optic wire and cable products. Their products are widely used in communications, energy, industrial and speciality markets. General Cable has nearly 300 suppliers of raw material for their US operations.
Tags : 
supply chain, scm, supply chain connect, business management, erp, manufacturing, manufacture, edi
    
Supply Chain Connect
Published By: Elementool Inc.     Published Date: Jan 28, 2008
Elementool, a leading provider of web-based project management tools for developers, including bug, defect, time-tracking and help desk tools, has announced the release of a bug tracking add-in tool for developers using the Visual Studio.NET 2005 platform. It is available free to Elementool’s community of project management solution subscribers.
Tags : 
bug tracking, project management, software development, effective management process, defect tracking, dot net, .net, software testing
    
Elementool Inc.
Published By: Hewlett-Packard     Published Date: May 13, 2008
Describes the growing need for data backup and recovery solutions, the advantages of disk-based systems, and the software required to manage these systems. The paper also looks at the role of Hewlett Packard's Data Protector software in this strategically important market.
Tags : 
hp data protection, data protection, idc, analyst, backup, storage, recovery, storage virtualization
    
Hewlett-Packard
Published By: Marketo     Published Date: Jun 08, 2017
Unfortunately, we’ve all been there. Every now and then, we make cringe-worthy mistakes. But the mistakes that haunt us in our personal lives often aren’t as public as email marketing mistakes, which go out to hundreds and thousands of subscribers. Download this ebook to learn about the eight most common email marketing pitfalls and how you can avoid or fix them: Mistake 1: Unclear subject lines Mistake 2: Poor email list hygiene Mistake 3: Failure to measure email inboxing Mistake 4: No engagement segmentation Mistake 5: No re-engagement strategy Mistake 6: Using image-based CTA buttons Mistake 7: No mobile optimization Mistake 8: Bad testing decisions
Tags : 
continuously opened emails, engagement, unique clicks, multiple clicks, cleaning campaign, sender reputation, marketo, marketing
    
Marketo
Published By: Dell Windows Server     Published Date: Jan 16, 2009
This Dell Virtualization Reference Architecture (RA) white paper describes Dell validated architectures for Windows Server 2008® Hyper‐V. The Virtualization RA is intended to provide customers with example virtualization solution configurations that can be used to consider, evaluate, and select the Dell virtualization solution components that best fit their requirements.
Tags : 
dell, microsoft windows server 2008, hyper-v, reference architecture, virtualization ra
    
Dell Windows Server
Published By: Genesys     Published Date: May 14, 2009
Customer loyalty is a two-way street. Businesses around the world are finding greater success at winning, serving and retaining customers when they are able to respond quickly and effectively whenever they call. Intelligent Customer Front Door (iCFD) is a metaphor that describes a set of applications and technological resources that enable businesses to identify callers and quickly aggregate information about them to assist in successfully resolving their needs. Learn more today!
Tags : 
genesys, opus, customer loyalty, customer, crm, customer relationship management, retention, intelligent customer front door
    
Genesys
Published By: Symantec.cloud     Published Date: Sep 01, 2010
This is the third part of a three-part white paper series. Part 3 describes how to move on from the basic controls and how each organization should decide which, of all the extra security controls available, are right to be brought in next.
Tags : 
messagelabs us, it security, smb, activity logging, vulnerability check
    
Symantec.cloud
Published By: Okta     Published Date: Feb 24, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. We’re seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in it’s complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : 
identity and mobility management, office 365, cloud, maximum user adoption
    
Okta
Published By: NetIQ     Published Date: Dec 23, 2010
This white paper provides the steps to successfully implement the critical security controls listed in the CAG in order to avoid "adding another checklist" to an already overburdened and underfunded organization that is struggling to meet growing security and compliance demands. It also describes how NetIQ can help federal agencies implement and automate these controls.
Tags : 
netiq, consensus audit guideline, cag, security control, federal agencies, cyber security, information security management
    
NetIQ
Published By: NetIQ     Published Date: Dec 23, 2010
This white paper describes three significant issues with Group Policy change management using native tools and describes a solution for applying best practices for change management.
Tags : 
netiq, change management, microsoft group policy, compliance auditing, recovery
    
NetIQ
Published By: DataFlux     Published Date: Jan 07, 2011
This white paper describes a general approach for planning your organization's efforts to improve data quality, providing a data-example-driven perspective of some of the unique challenges of product data quality, as well as discuss and demonstrate three critical steps to improving product data quality.
Tags : 
dataflux, product data quality, standardization, matching
    
DataFlux
Published By: Oracle Corporation     Published Date: May 11, 2012
This white paper describes how to build a better business case for BI, by understanding the level of ambition organizations can have and the layers in the business case that should contribute to that level of ambition.
Tags : 
oracle, busines intelligence, business intelligence applications, bi applications, bi apps, 11g, cross-value, decision
    
Oracle Corporation
Published By: Scribe Software     Published Date: Apr 16, 2012
The What, Why & How of CRM Integration This report contains insights from C-level executives, business analysts and IT engineers, and systems integrators and consultants who design and implement data integration for their enterprise clients.
Tags : 
scribe, crm, integration, data integration, public cloud, private cloud, cloud, integration
    
Scribe Software
Published By: Attachmate     Published Date: Dec 05, 2013
From email to Dropbox and FTP, the file transfer process in most organizations is fraught with risk and simply does not meet most organizations’ corporate governance requirements. The result is that the status quo of file transfer in most organizations can be considered UFT—or Unmanaged File Transfer. What is needed to overcome the problem, therefore, is Managed File Transfer (MFT)—a solution that will enable complete control over content, its lifecycle, access rights to that information, the maintenance of an audit trail, and disposition of data according to corporate governance requirements. This white paper, sponsored by Attachmate and based on a survey conducted by Osterman Research, describes current file transfer practices and the extent of risk that organizations face by not managing file transfer properly. It also explains the benefits of MFT, provides guidelines for evaluating file transfer vendors, and describes FileXpress®, Attachmate’s MFT solution.
Tags : 
filexpress managed file transfer, download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management
    
Attachmate
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read the results of Symantec's research on the psychology behind intellectual property theft by corporate insiders. This report addresses the organizational anxiety surrounding potential theft of critical data by employees and describes what is known about the people and conditions that contribute.
Tags : 
indicators, intellectual, property, theft, symantec, psychology, research, corporate
    
CDW Symantec
Published By: Twilio     Published Date: Aug 21, 2012
This whitepaper features industry innovators who describe what works in the new world of pay-per-call, performance-based and mobile advertising.
Tags : 
twilio, ppc, call tracking, mobile advertising
    
Twilio
Published By: Kaseya     Published Date: Mar 12, 2015
This white paper describes the key characteristics of the changing environment and it identifies a new choice that IT managers have for meeting the growing set of management challenges.
Tags : 
it environments, cloud computing, mobility, big data, saas, iaas, service management, virtualization
    
Kaseya
Published By: Scribe     Published Date: Oct 09, 2013
Today’s customers are empowered with information – if they want to know something, they can look it up in an instant. Having information they need at their fingertips is expected. Having information at the ready – whether your sales or service personnel are in the field or in the office – is no longer a competitive advantage, it’s expected and required. In this whitepaper, you will learn how Scribe’s customer data integration solutions and connectors let you put customer information where it needs to go quickly and easily. Don’t be that business who makes their customers wait for answers!
Tags : 
scribe, scribe software, data, data integration, business systems integration, applications, integration platforms, cloud
    
Scribe
Published By: Scribe     Published Date: Oct 09, 2013
The State of Customer Data Integration 2013 survey report is based on over 900 responses ranging from independent business and IT leaders to Scribe's data integration channel partners. Overall results reveal that today's businesses are still on the journey to connect their core business systems and deliver customer data to their users across the business. Customer data should be free-flowing across all business touch points to enable companies to run faster, do more, and at lower cost.
Tags : 
scribe, scribe software, data, data integration, business systems integration, crm, crm systems integration, cloud
    
Scribe
Published By: Marketo     Published Date: May 18, 2017
Marketing automation is a technology solution that helps enable the seeding, creation, nurturing and acceleration of demand among prospects and customers (see the brief “Marketing Automation Platforms Defined”). Given that marketing automation platforms (MAPs) are an essential component of every b-to-b organization’s marketing infrastructure, organizations understand the need for these platforms, as well as their internal need for optimized processes and skills to leverage them. However, while most b-to-b marketers understand the value of lead nurturing, lead scoring/prioritization, program and tactic level reporting, and the SiriusDecisions Demand Waterfall®, they often struggle to operationalize these processes with MAPs, which is why selecting the right MAP is imperative. In this SiriusView, we describe MAP providers’ differences to help organizations identify which MAPs best meet their needs.
Tags : 
program automation, multi channel, sales and enablement, predictive lead scoring, visual personalization, design, live event management
    
Marketo
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.