whitepaper

Results 1776 - 1800 of 1994Sort Results By: Published Date | Title | Company Name
Published By: Concur     Published Date: Jan 07, 2013
Download this whitepaper and you will get an overview of how automated solutions simplify the process of logging and tracking T&E, virtually eliminating mistakes, and ensuring compliance.
Tags : 
expenses, automated solutions, eliminating mistakes, compliance, management, travel and entertainment
    
Concur
Published By: Ecora Software     Published Date: Aug 15, 2007
This whitepaper will teach you the necessary steps any organization must take to comply with the Gramm-Leach-Bliley Act (GLBA). Based on the experienced insight of Alex Bakman, Founder, Chairman & Chief Technology Officer at Ecora Software and Khalid Kark, Senior Research Analyst at Forrester Research, this paper discusses how any organization can reduce compliance costs by automating the process of attaining and maintaining proper financial privacy and consumer data safeguard procedures.
Tags : 
gbla, glba, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Verint     Published Date: Jan 16, 2013
Download this whitepaper for an in-depth look into establishing clarity about the customer need, improving customer service and the emergence of the Chief Customer Officer, a 21st century role.
Tags : 
customer experience, customer experience management, customer engagement, verint, vovici, customer service, customer experience/engagement
    
Verint
Published By: MessageLabs     Published Date: Jan 13, 2009
New spamming techniques are upon us -  419 spam, botnets, CAPTCHA cracking – what’s next from the 'bad guys'? Spam remains the biggest email-born threat to businesses. Learn how to protect your business.  FREE Whitepaper (PDF/40KB)
Tags : 
messagelabs, secure network, block spam, spamming techniques, spam, business threat
    
MessageLabs
Published By: MessageLabs     Published Date: Jan 13, 2009
Drawing the line between employee web usage and company policy is challenging for IT Managers. Download this whitepaper to help make informed decisions about your own web monitoring requirements FREE Whitepaper (PDF/40KB)
Tags : 
messagelabs, employee web use, employee web misuse, employee web surfing, employee internet usage, web use monitoring, web use blocking
    
MessageLabs
Published By: Atlas Business Solutions     Published Date: Feb 27, 2008
Whether you are a seasoned Human Resource professional, or the owner or manager of a small business, understanding the intricacies involved in organizing the Human Resource functions is absolutely essential to running an efficient and legally compliant company. In this whitepaper, you’ll learn about the four main types of HR documents every manager can’t live without.
Tags : 
personnel, workforce, human resources, workforce management, document management, atlas business solutions, atlas, abs
    
Atlas Business Solutions
Published By: Find White Papers     Published Date: May 07, 2008
Learn how leading vendors in the technology space are reaching IT professionals through dedicated email blasts, contextual email placements, co-branded directories, and contextual placements. Reach millions of IT buyers on a cost per lead basis, paying for only the leads that download your research and that fall within your specified target audience.
Tags : 
fwp, find white papers, directories, white papers, whitepapers, libraries, research, research library, emarketing papers, investbrite, directories inc., lead generation & automation
    
Find White Papers
Published By: Arcot     Published Date: Jun 04, 2008
In the past, authentication solutions were either easy to use and inexpensive, but insecure (such as username/password) or very secure but expensive or difficult to implement (such as OTP tokens and smart cards). Arcot offers a third option: WebFort, a software-only, two-factor authentication solution. It delivers the right balance of cost, convenience, and strength.
Tags : 
arcotid, pki, multi-factor authentication, strong authentication, cryptographic camouflage, webfort x.509 certificate, public key infrastructure, authentication, arcot
    
Arcot
Published By: BlueHornet     Published Date: Apr 12, 2010
Over the next few years, more and more people are expected to check their email on their smartphones, rather than their PCs. In this free whitepaper, you'll learn how the most common mobile operating systems render your HTML emails, and more importantly, what you can do now to optimize your email creative to keep your messages looking great, no matter where they're opened.
Tags : 
bluehornet, email marketing, mobile rendering, smartphones, html email, email marketing services/software
    
BlueHornet
Published By: BlueHornet     Published Date: Apr 12, 2010
Every popular email client will display HTML content sent in email. However, not every email client has a "web standards" compliant HTML rendering engine. Therefore, the same email may render differently across different email clients. This whitepaper offers practical solutions to help designers, coders, and non-designers alike build a successful email that will render well across all email platforms.
Tags : 
bluehornet, html email rendering, email platforms, best practices, css, coding, email marketing services/software
    
BlueHornet
Published By: IFS     Published Date: Aug 15, 2011
In this whitepaper, we'll examine the different enterprise agility barriers reported by study respondents and discuss how energy industry executives can select software for enhanced enterprise agility and change readiness.
Tags : 
ifs, erp, electric power, enterprise resource planning, energy industry, enterprise software, enterprise agility
    
IFS
Published By: IFS     Published Date: Dec 27, 2012
The seven tips included in this whitepaper are from some of the top EAM minds in IFS North America and IFS AB, and are designed to help ensure that you get the most out of EAM software so that you can get the most out of your assets.
Tags : 
erp, enterprise resource planning, enterprise, integration, process management, project management, aem, enterprise, asset management
    
IFS
Published By: Bronto     Published Date: Sep 26, 2011
Whether you have all of your plans finalized or you haven't even started, there are several things that you should do to make sure this holiday season is stellar.
Tags : 
whitepaper, bronto marketing platform, bronto, white paper, email marketing, holiday, holidays, holiday season, e-commerce, online, holiday marketing tips, social holiday, mobile holiday, bronto software, customer experience/engagement, e-commerce solutions, email marketing services/software, mobile marketing, social media marketing
    
Bronto
Published By: Marketo     Published Date: Nov 04, 2011
Did you learn everything you needed to during your marketing automation demo? Use this checklist to feel confident about the six critical areas of marketing automation. This checklist covers topics including functionality, branding and design control, and marketing campaign creation.
Tags : 
marketo, marketing automation, demo, whitepaper, checklist, branding, design control, crm solutions/software, customer experience/engagement, business intelligence, market research
    
Marketo
Published By: Marketo     Published Date: Nov 04, 2011
Marketo has created a sample RFP consisting entirely of actual questions from real RFPs submitted to Marketo. Learn the 12 key areas for marketing automation success and ensure you make the right choice today!
Tags : 
marketo, marketing, marketing automation, proposal, rfp, request for proposal, whitepaper, traditional agencies, crm solutions/software, business intelligence, market research, usability
    
Marketo
Published By: Marketo     Published Date: Jul 30, 2013
Today's fastest growing companies are using repeatable marketing and sales 2.0 techniques to grow revenue predictably and reliably. Download this white paper and learn why companies that implement a marketing automation system to support their marketing and sales efforts are better equippedto manage lead flow and process leads more efficiently.
Tags : 
marketo, marketing, marketing automation, roi, lead flow, sales techniques, whitepaper, crm solutions/software, business intelligence, market research, lead generation & automation
    
Marketo
Published By: Tail-f Systems     Published Date: Sep 16, 2008
This whitepaper describes how NETCONF and YANG can help drastically simplify network configuration management. The IETF has recently standardized the NETCONF configuration management protocol and is currently in the process of standardizing a NETCONF-oriented data modeling language called YANG. These two new technologies promise to drastically simplify network configuration management.
Tags : 
configuration management, netconf, yang, next-generation network management, next-generation networks, netconf protocol, tail-f, tailf
    
Tail-f Systems
Published By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper illustrates how, by using YouSendit and replacing FTP, Cisco has dramatically cut video administration costs by 90%. The Flip video file delivery process for Cisco Networking Academy's global operations is now much simpler, less costly and more efficient.
Tags : 
cisco networking academy, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing
    
YouSendIt
Published By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper highlights how organizations can solve their attachment management problems while imposing little or no change on the way that users work and increasing IT's visibility into the process for compliance purposes -- inexpensively and at reduced corporate risk.
Tags : 
email attachments, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing
    
YouSendIt
Published By: LogRhythm     Published Date: Sep 26, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The Gramm-Leach-Biley Act (GLBA) was enacted to ensure protection over customer’s records and information. LogRhythm can help financial institutions implement and perform procedures to indentify risks, eliminate or reduce these risks, and to monitor and maintain the implemented processes and procedures to ensure that the identified risks are effectively managed. Please read this whitepaper for more details…
Tags : 
glba, glba compliance, gramm-leach-biley act, compliance, financial technology, finance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
This whitepaper highlights some of the key areas in which LogRhythm, the leader in Log and Security Event Management Solutions, can help companies adequately meet the PCI Data Security Standards. The whitepaper also details the compliance requirements along with ways in which LogRhythm meets and exceeds those regulations.
Tags : 
pci, pci compliance, pci-dss compliance, payment card industry, payment card, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Do you need to simplify your financial reporting process to ensure that you are meeting the Sarbanes Oxley requirements? Read this whitepaper to learn more…
Tags : 
sox, sarbanes oxley, sox compliance, sarbanes oxley compliance, compliance, comply, information technology, security, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : 
nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Get the facts you need to know about how the collection, management and analysis of log data are integral to meeting many GCSx requirements. Read this whitepaper to learn more…
Tags : 
uk gcsx, uk compliance, gcsx, government connect secure extranet, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Many organizations are now moving parts of their IT infrastructure to the Cloud. However, managing these resources within a comprehensive management framework is still essential. And the management approach for these hybrid environments needs to take a step forward and start to focus on service level management, not the care and feeding of discrete components. This whitepaper provides the information needed on implementing Business Service Management (BSM) in hybrid environments.
Tags : 
it infrastructure, cloud, business service management, hybrid environments
    
HP - Enterprise
Start   Previous    61 62 63 64 65 66 67 68 69 70 71 72 73 74 75    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.