considerations

Results 501 - 525 of 571Sort Results By: Published Date | Title | Company Name
Published By: Smarsh     Published Date: Dec 07, 2016
To meet the requirements of FINRA & SEC, you must first understand what they require of investment firms and organizations. Better yet, you must understand what is classified as a violation of those rules, then put practices in play that mitigate the risk and position you as an active advocate for compliance— not a violator or passive enabler for non-compliant activity.
Tags : 
    
Smarsh
Published By: Solgenia     Published Date: Jun 07, 2013
This White Paper outlines best practices and practical considerations that help ensure successful selection and implementation of document management solutions.
Tags : 
document management, best practices, implementation, deployments, automation, collaboration, cloud
    
Solgenia
Published By: Soonr     Published Date: Jul 30, 2014
Soonr takes a holistic approach towards security, incorporating a variety of structures and mechanisms at various layers within the Soonr service architecture. The following descriptions convey the breadth and depth of security considerations that have become a cornerstone of the Soonr Workplace service.
Tags : 
soonr, security architecture guide, security, workplace service
    
Soonr
Published By: Splunk     Published Date: Aug 21, 2018
On May 25, 2018, per the General Data Protection Regulation (GDPR), organizations with business ties to the European Union will need to comply to GDPR standards. The cost of non-compliance are stiff fines. The GDPR contains nearly 100 separate and nuanced articles that can be difficult to understand even if you are a data privacy expert. This short primer is a cheat sheet to help both the data privacy expert and non-expert approach the GDPR with key takeaways. Download your free copy of “A Short Primer of GDPR Essentials” to learn: *Financial Implications: The potential impact of a GDPR breach condition. *Key Focus Areas: A "new considerations checklist" for data privacy experts. It can also be used as a basic "bootstrapping checklist" for those less versed in data privacy. *People, Process, Tools: Tips to help reduce anxiety and uncertainty about how to operationalize GDPR.
Tags : 
    
Splunk
Published By: Sponsored by Adobe and Salesforce     Published Date: Jan 06, 2016
This report examines the current market for B2B marketing automation platforms and the considerations involved in implementing marketing automation software.
Tags : 
b2b marketing, marketing automation, marketing automation software, marketing automation platform, adobe, salesforce, crm, social media, marketing software, customer experience/engagement, market research, mobile marketing, lead generation & automation
    
Sponsored by Adobe and Salesforce
Published By: Sponsored by Brandify and YP and SIM Partners     Published Date: Oct 19, 2015
This report examines the current market for enterprise local marketing automation (LMA) tools and the considerations involved in implementing LMA software.
Tags : 
local marketing automation, lma, marketing tools, seo, landing pages, mobile marketing, consumers, social media, web analytics, market research, online video marketing, social media marketing, direct mail/marketing
    
Sponsored by Brandify and YP and SIM Partners
Published By: Sponsored by HP and Intel®     Published Date: Feb 02, 2012
This white paper sponsored by HP and Intel (circle R) separates fact from fiction, reality from myth, and, in doing so, will aide senior IT executives as they make decisions around cloud computing. While dispelling cloud computing myths, we will answer tough questions: How hard is it to adopt a private or hybrid cloud? How difficult is it to maintain and secure a cloud? How will the cloud transform my business? Do I have the right skill sets in place? What are some of my cost considerations? HP and Intel are committing extensive resources to helping customers with all of their questions and concerns around cloud computing.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends
    
Sponsored by HP and Intel®
Published By: Sponsored by Spredfast     Published Date: May 11, 2015
This report examines the market for enterprise social media management software (ESMMS) and the considerations involved in implementing ESMMS platforms.
Tags : 
social media management, social media, facebook, twitter, instagram, esmms, content management systems, interactive marketing, customer experience/engagement, usability, mobile marketing, social media marketing
    
Sponsored by Spredfast
Published By: Spredfast, Inc.     Published Date: Aug 06, 2013
This guide walks through each of the “Big Six” objectives and provides a tactical overview of the business case, team considerations and actual content examples and templates to use for your social media initiatives.
Tags : 
spredfast, social media, advertising solutions, blog comments, blog monitoring, brand loyalty, brand management, brand positioning, content management, content marketing, corporate blogging, customer acquisition, customer behavior, marketing analytics
    
Spredfast, Inc.
Published By: Sprint     Published Date: Oct 18, 2010
This white paper outlines the many network considerations one must take into account when choosing to deploy an M2M solution.
Tags : 
sprint wholesale, cellular, hybrid networks, m2m deployment, wide-area wireless networks, local-area wireless networks
    
Sprint
Published By: Sudden Impact Marketing     Published Date: Sep 05, 2014
Video solutions eliminate geographic boundaries and allow you to sit across a conference table from fellow participants, regardless of where they are in the world. By using unified video collaboration solutions for a virtually unlimited number of applications, you can boost productivity and communication throughout your organization, even across the largest of enterprises—allowing you to become more agile and responsive to changing needs.
Tags : 
cisco, cisco solutions, video communication
    
Sudden Impact Marketing
Published By: SunGard     Published Date: Aug 13, 2012
Today's IT organizations are faced with the daunting task of optimizing all aspects of their departments, including people, processes and technology. Optimizing and streamlining server utilization through virtualization represents one particularly exciting example. We found that one of the most popular usage models for virtualization is to drive down server procurements in development, test and production environments. When this model is followed, future server purchases are avoided; instead, new workloads are established on existing systems.
Tags : 
leveraging, visualization, optimizing, processes, technology, optimizing, server utlization
    
SunGard
Published By: SWsoft     Published Date: Dec 12, 2006
When Katrina hit in 2005, Murphy Exploration and Production Company, USA was among the many companies impacted by the devastation. Challenged to implement a new infrastructure quickly with more business continuity considerations, Murphy deployed Virtuozzo across its server infrastructure.
Tags : 
disaster recovery, business continuity, swsoft, infrastructure, servers, backup and recovery, case study, virtuozzo
    
SWsoft
Published By: Symantec     Published Date: Jul 15, 2014
Many mid-market companies have invested significant time and resources to secure and back up their servers, client computers, data, and overall network infrastructure in what was the traditional client-server setup. Now, what were considered emerging technologies just a few years ago, cloud computing and virtualization have arrived on the scene, bringing both significant benefits and new challenges. Find out more about this transition to get the most out of your virtual environment.
Tags : 
secure back up, servers, data, network infrastructure, cloud computing, virtualization
    
Symantec
Published By: Symantec     Published Date: Jul 09, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : 
cloud, cloud applications, swgs, secure web gateway's, saas
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
Responsible cloud migration can be achieved by a diligent approach to a few core security considerations. By choosing a secure web gateway with the ability to deliver these advanced capabilities, organizations will find themselves in a great position to proactively address these issues and ensure a safe and compliant move to the cloud.
Tags : 
cloud migration, cloud computing, cloud security, cloud-access security, threat prevention
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : 
cloud, cloud application, cloud security, enterprise cloud
    
Symantec
Published By: Symantec.cloud     Published Date: Apr 28, 2011
This whitepaper discusses key considerations for conducting effective eDiscovery.
Tags : 
symantec.cloud, ediscovery, frcp, fre, edrm, imrm, data management, information management, content preservation, business content, electronic data content, litigation, esi
    
Symantec.cloud
Published By: Tekscan     Published Date: Dec 07, 2017
This white paper provides a look at the underlying sensor technology and discusses important considerations in designing sensors into a robotic application.
Tags : 
tekscan, robotic sensors, robotic manufacturing, manufacturing, design technology
    
Tekscan
Published By: Tenable     Published Date: Feb 05, 2018
12 Steps for Addressing Container Security Containers are an integral tool for most DevOps. While containers themselves do not have inherent security issues, they are often deployed unsecurely, causing security issues around vulnerabilities, visibility, compromise and compliance. How can the DevOps team looking for increased agility work with more closely with the security team looking for reduced risk? Download this Gartner report to: - Understand the unique security challenges posed by containers - Learn how security and risk management leaders concerned with cloud and emerging technologies can engage with and enable secure DevOps - Take 12 steps that will help you adopt containers with a level of acceptable, manageable risk that approaches the use of virtual or physical machines
Tags : 
secure devops, gartner, analyst report, container security
    
Tenable
Published By: Tenable     Published Date: Feb 07, 2018
While multinational companies can likely meet some of the GDPR requirements right now, most will find the path to full compliance requires many changes to business-as-usual security practices. Read this paper to learn how you should be preparing your information security program for compliance with the GDPR. Written for InfoSec leaders, the paper includes: - A glossary outlining key concepts of the Regulation - 13 essential steps you should take to help ensure GDPR compliance - A summary of infosec considerations posed by the EU Data Protection Directive 95/46/EC and GDPRD
Tags : 
security frameworks, compliance, iso 27000, cis controls, nist, pci, security regulation
    
Tenable
Published By: Tenable     Published Date: Sep 14, 2018
"Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report. According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program. Topics covered: The scope of the market for vulnerability assessment solutions, common use cases and challenges Recommendations for identifying requirements and vendor selection criteria Changing device demographics and other trends impacting the market and effective v
Tags : 
    
Tenable
Published By: Tenable     Published Date: Nov 06, 2018
"Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report. According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program. Topics covered: The scope of the market for vulnerability assessment solutions, common use cases and challenges Recommendations for identifying requirements and vendor selection criteria Changing device demographics and other trends impacting the market and effective v
Tags : 
    
Tenable
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.