info systems

Results 251 - 275 of 311Sort Results By: Published Date | Title | Company Name
Published By: AlienVault     Published Date: Mar 30, 2016
An Intrusion Detection System (IDS) is an essential tool in every security practitioner’s arsenal. Intrusion Detection Systems are designed to gather and analyze information from networks and hosts to detect malicious activity both before and after a security breach. In this guide, you will learn about the critical components of host and network IDS, requirements to evaluate IDS solutions, as well as how AlienVault Unified Security Management (USM) meets those requirements. Topics covered to help you evaluate IDS solutions include: • An overview of network and host-based IDS • Signature-based vs. anomaly-based systems • Throughput of IDS solutions • Protocol analysis • Aggregation capabilities • Integration capabilities • Contextual enhancement Download your version now to learn what capabilities you should consider when evaluating IDS solutions.
Tags : 
    
AlienVault
Published By: CompareBusinessProducts     Published Date: Feb 27, 2015
Our new infographic, Step-by-Step Phone System Implementation, gives you an honest look into the successes and challenges at every stage of the phone systems implementation process
Tags : 
system implementation, communication structure, infographic, phone system, implementation process
    
CompareBusinessProducts
Published By: Schneider Electric     Published Date: Jun 07, 2019
Because electricity is a key commodity for business it represents significant financial risk. Yet many power management systems remain isolated and separate from the rest of the business enterprise. The result is poor access to incomplete information, with only limited knowledge of risk exposure. An integrated, comprehensive power management system that includes metering, software, and power quality mitigation equipment offers the most holistic, systems-based approach to managing this risk exposure.
Tags : 
financial risk, power management system, quality migration, schneider electric, pms
    
Schneider Electric
Published By: Creekpath     Published Date: Aug 21, 2009
Imagine a world where storage management is simplified; everything works together; there are no configuration issues when upgrading, and vendors all cooperate to allow information to be easily stored and retrieved seamlessly. This was a reality in the mainframe world, but the deployment of open systems shattered these concepts.
Tags : 
virtualization, storage virtualization, storage management, storage array, storage arrays, creekpath
    
Creekpath
Published By: IBM     Published Date: May 30, 2008
Organizations with data-sharing environments, complex information and systems hinder business responsiveness and decision makers’ ability to make informed decisions. This white paper will describe how engaging in a master data management (MDM) project enables effective governance of data - specifically master data - and achieves maturity in key categories of the IBM Data Governance Maturity Model.
Tags : 
ibm, mdm, master data management, data management, data governance
    
IBM
Published By: IBM     Published Date: Jun 19, 2008
Storage infrastructure simplification is an important step a telecommunications business can take toward meeting the needs of an on-demand business environment. The IBM System Storage DS Family can support business continuity and improve information lifecycle management with competitively priced storage options. Learn how the IBM Systems Storage DS Family is an ideal partner for businesses in the telecom industry looking for secure and resilient data storage
Tags : 
ibm, storage, telecom, storage management, system storage, ds family, express seller
    
IBM
Published By: IBM     Published Date: Jun 19, 2008
Storage infrastructure simplification is an important step an electronics business can take toward meeting the needs of an on-demand business environment. The IBM System Storage DS Family can support business continuity and improve information lifecycle management with competitively priced storage options. Learn how the IBM Systems Storage DS Family is an ideal partner for businesses in the electronics industry looking for secure and resilient data storage.
Tags : 
ibm, express seller, storage management, storage, infrastructure
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
Many enterprises depend heavily on business services to generate revenue. But they often have trouble correlating availability and performance information from individual systems with the business as a whole. To do this, you need a clear view of your service infrastructure. Integrated availability and performance solutions can provide the visibility, control, and automation that your IT environment needs.
Tags : 
ibm, ibm mi, ibm grm, service management, it management
    
IBM
Published By: IBM     Published Date: Sep 18, 2008
When bound to regulation and compliance, process manufacturers find opportunities to grow through enterprise resource planning (ERP). However, 50% of process manufacturers execute non-integrated ERP strategies. This Aberdeen Group research study reveals best practices to help you adapt or select an ERP vendor that improves your business performance.
Tags : 
erp, enterprise resource planning, cindy jutras, process, process industry, chemical, food and beverage, food, beverage, pharmaceutical, pharma, best-in-class, material requirements planning, mrp, global competition, manufacturing process, microsoft dynamics, acsis, fullscope, traceability
    
IBM
Published By: IBM     Published Date: Sep 18, 2008
IBM conducted an in-depth assessment to identify vulnerabilities in New Hanover Health Network's information security practices, with emphasis on their auditing activity and capabilities. This white paper will explain how IBM helped them implement a series of best practices, thereby improving the confidentiality, integrity, and availability of their information systems.
Tags : 
ibm, ibm mmdg, hipaa, hippa, healthcare, health care, compliance, privacy, patient, patient privacy
    
IBM
Published By: IBM     Published Date: Mar 17, 2009
For most high tech companies, the Bill of Materials (BOM) is the central hub of product definition activities. It conveys the information needed by various departments to get the product to market.During this one-hour web cast, the AberdeenGroup will discuss how Best-in-Class companies are not only addressing these challenges but are excelling in their product development processes. In addition, PTC and IBM Rational will show how high tech manufacturers' can synchronize system requirements, multiple design disciplines and internal systems to provide a single definition of a product - 'a single source of truth' - throughout the product development process.
Tags : 
global bom development, bill of materials, ibm, telelogic, best in class, business continuity, ptc, ibm rational, aberdeen group
    
IBM
Published By: Imprivata     Published Date: Aug 21, 2009
When the U.S. Congress passed the Health Insurance Portability and Accountability Act (HIPAA) of 1996, among the law's many provisions was the establishment of formal regulations designed to protect the confidentiality and security of patient information. In addition to mandating new policies and procedures, the HIPAA security regulations require mechanisms for controlling access to patient data on healthcare providers' information technology (IT) systems.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, hipaa, hipaa compliance, regulatory compliance, authentication, imprivata
    
Imprivata
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Spyware is but the latest in a long list of Internet threats facing individuals and organizations alike. While it may sound relatively innocuous, spyware is the culmination of years of hacking development by cyber criminals. Spyware does more than just spy; it records and reports back specific information about the computer it infects.
Tags : 
spyware, information management, information theft, identity theft, data protection, anti spyware, anti-spyware, cybercrime, cyber crime, hacker, web security, internet security, internet security systems
    
Internet Security Systems
Published By: Safe Software     Published Date: Aug 21, 2009
This paper by S. Raghavendran of Pixel Infotek Pvt Ltd on GIS Interoperability and Spatial ETL solutions was presented at the GSDI conference in India and provides an excellent description of the interoperability challenges that Safe's products address.
Tags : 
spatial, geographic information system, geographic information systems, geological, information management, data processing, database, data transfer, safe, safe software
    
Safe Software
Published By: Safe Software     Published Date: Aug 21, 2009
This paper defines the function of spatial ETL and expands the role and impact it has with spatial data processes and GIS systems.
Tags : 
spatial, geographic information system, geographic information systems, geological, information management, data processing, database, data transfer, safe, safe software
    
Safe Software
Published By: Safe Software     Published Date: Aug 21, 2009
One of the most powerful aspects of GML is the freedom it gives users to define their own custom application schemas. While this capability provides extraordinary flexibility to data modellers, it also creates significant challenges, particularly when the data is interpreted.
Tags : 
spatial, geographic information system, geographic information systems, geological, geography, information management, data processing, database, data transfer, safe, safe software
    
Safe Software
Published By: Baystate Health / Baystate Medical Center     Published Date: Jul 16, 2007
Get this free white paper to read why mass casualty and other public health emergencies create a demand for information within hospitals, between hospitals, between hospitals and local incident command centers, and between local, statewide and multi-state incident command centers and agencies.
Tags : 
hospital, healthcare, health care, medical records, fema, disaster, natural disaster, business continuity, hurricane, preparedness, disaster recovery, emergency, hipaa, gis, geographic information systems, baystate, bay state
    
Baystate Health / Baystate Medical Center
Published By: Quocirca     Published Date: Jul 03, 2008
Small and medium sized organizations have similar issues to large companies when it comes to the processing and storage of information and data, yet often have little capability to attract, retain and maintain the skills for managing their data assets compared to large organizations.  Blade systems offer an effective way to address the specific challenges faced by smaller organizations in managing their IT assets, and allows then to gain greater value from them.
Tags : 
storage, blade, blade systems, small business, smb, smbs, mid-sized business, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Feb 23, 2009
Network Centric Operations (NCO) recognises the demand for pervasive decision-making in the modern battlespace. NCO provides the ability to leverage information networks to generate a more dynamic and agile decision-making space. An important dimension of this approach is the technological flexibility to quickly move the decision-making authority hierarchically or geographically as the situation demands. A fundamental enabler to this approach is the concept of a services orientated architecture (SOA). The use of industry-standard IT architectures provides the means of ensuring that systems can be provisioned rapidly, can be shared as appropriate, and can give the flexibility and response times required within such challenging environments.
Tags : 
quocirca, network centric operations, agile decision-making, services orientated architecture, soa, enterprise service bus, esb, non-governmental organizations, ngos, network centric warfare, ncw, standardized battlespace, common operating picture, cop, access points, networking
    
Quocirca
Published By: RiskWatch     Published Date: Jan 23, 2007
The single most important trend in security in the next ten years will be the integration of various security elements such as information security, physical security and integrated systems security into a single security function.
Tags : 
physical security, network security, security management, cso, chief security officer, security integration, riskwatch
    
RiskWatch
Published By: Infor     Published Date: Feb 27, 2007
SupplyWEB® is an advanced, web-enabled Supply Chain Management and Execution solution from Infor. It is designed to reduce supply chain costs, reduce inventory and increase operational efficiencies. It delivers significant ROI by increasing supplier visibility, enabling inter-enterprise communication,and providing a high level of systems integration.
Tags : 
supply chain management, scm, operations, manufacturing, edi, erp, enterprise resource planning, roi, return on investment, kanban, supplier managed inventory, supplier relationship, procurement, infor
    
Infor
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
Russell Stover Candies outsourced its legacy information systems. However, two years later, they were unhappy with their chosen outsourcing provider and faced multiple ERP challenges. To help navigate these challenges, the company hired a seasoned IT executive. Find out why, after an exhaustive evaluation process, he selected OneNeck IT Services.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, russell stover, rsc, whitman's, whitman, candies, candy, mid-market, mid market, erp, enterprise resource planning, outsourcing, governance, outsource
    
OneNeck IT Services
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
As more states pass regulations governing the security, confidentiality, and integrity of customer data, a leading national bank has recognized its need to ensure the safety and security of personal data for its thousands of customers. To ensure compliance and maintain the security of this information, the bank has deployed NeoScale’s CryptoStor Tape appliances to help accomplish its objectives.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: VMware Dell     Published Date: Sep 29, 2008
Business operations that are heavily dependent on information systems may be significantly impacted even by a brief application outage. Impact of a data loss is even more drastic. IDC estimates that in a disaster situation, the average loss is $3 million per incident and $81,000 per hour.
Tags : 
vmware, dell, disaster recovery, storage area network
    
VMware Dell
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.