white list

Results 1 - 25 of 117Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Aug 14, 2014
URL filtering is a must for enterprise policy management. While the process is not difficult to implement, you can make it even easier and more effective by adhering to 10 best practices for URL filtering.
Tags : 
url filter, firewall url, web filtering, website blocking, white listing, next generation firewall, ngfw, ngfw features
    
McAfee
Published By: GrapeCity, Inc.     Published Date: Feb 25, 2013
Encouraging self-service BI adoption is both a technical and a human resource effort. This white paper offers a 10-point checklist for improving this process, and includes these questions and more in this easy-to-read white paper.
Tags : 
ad hoc reporting, ad hoc report designer, self-service bi, business intelligence, reporting, activereports, web-based reporting, mobile bi, end user reporting, dashboards, data visualization, charts, reports, analytics, multi-tenant, self-service reporting, crystal
    
GrapeCity, Inc.
Published By: McAfee     Published Date: Feb 06, 2013
Protect systems from unknown, advanced persistent threats with centrally managed whitelisting
Tags : 
application control, whitelisting, zero day protection, endpoint security, dynamic whitelisting, memory protection
    
McAfee
Published By: Net Atlantic     Published Date: Nov 30, 2009
Net Atlantic's whitepaper, "11 Proven Ways to Grow Your Email Marketing List" helps email marketing and communications managers increase the number of list members who are actively engaged. A larger list of interested, opt-in leads is by far the best population for creating opportunities. Sending responsibly frequent email campaigns to your mailing list will improve your overall marketing ROI better than just about any other tactic.
Tags : 
net atlantic, email compliance, email marketing, unsubscribers, bounces, roi spam, can-spam, healthcare, members, hmtl messages, email marketing, email marketing services/software
    
Net Atlantic
Published By: Viavi Solutions     Published Date: Mar 21, 2016
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users—from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
viavi solutions, hybrid clouds
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 14, 2017
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
cloud privacy, cloud security, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Viavi Solutions
Published By: Sigaba     Published Date: Aug 21, 2009
This white paper reviews the five most common current approaches to messaging security. While the five approaches discussed here are not the comprehensive list of available solutions, they are the basis for most variations of messaging security solutions available today.
Tags : 
email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba
    
Sigaba
Published By: Sprinklr     Published Date: Nov 22, 2016
In this social listening whitepaper, you'll learn that listening technology provides brands with the power to reach consumers via the digital platforms where they research, make, and discuss their purchasing decisions.
Tags : 
social listening, value, consumers, purchasing decisions, listening technology, listening, tools, whitepaper
    
Sprinklr
Published By: QTS Data Centers     Published Date: Feb 17, 2017
This white paper provides an in-depth look at key considerations to keep in mind when selecting a data center provider in Chicago. From connectivity to compliance to customer service, these 7 key considerations offer a checklist for evaluating potential data center providers.
Tags : 
    
QTS Data Centers
Published By: Bronto     Published Date: Sep 26, 2011
Regardless of what the email metrics say, there is always room for improvement. In any competitive environment, you never want to settle for good enough. Here we cover seven areas most commonly in need of a refresh.
Tags : 
whitepaper, seven, white paper, email marketing, list growth, basics, opt-in, social, automation, bronto software, bronto, bronto marketing platform, customer experience/engagement, business intelligence, market research, email marketing services/software
    
Bronto
Published By: Trustpilot     Published Date: Nov 13, 2014
Concerns about online reviews are invariably based on misconceptions that don't hold up when faced with reason. This whitepaper lists some of the most common myths holding businesses back from embracing the true power of online reviews.
Tags : 
trustpilot, online reviews, customer feedback, customer service, reviews, sales, social media, customer experience/engagement, reputation monitoring, market research, trust and security
    
Trustpilot
Published By: Esker     Published Date: Jun 29, 2017
Getting paid is a top priority for every business. However‚ with the wide variety of invoice formats used along with disputes about pricing or items delivered‚ the process of billing and collections can be a complicated affair. Learn how you can leverage Accounts Receivable (AR) Automation tools to achieve more on-time payments by reading the Institute of Finance & Management’s (IOFM) white paper‚ 8 Steps to a Customer-Centric Approach in Collections. A happy customer today is a customer that will pay! Download the IOFM white paper and discover how to move your business to the top of your customers’ payment lists.
Tags : 
accounts receivable management, invoice management, collections management, ar best practices, invoice portal, invoice delivery
    
Esker
Published By: IBM     Published Date: May 12, 2008
You face key challenges–technological and organizational–in enterprise asset management. Every last vehicle and material is under your control, often in different software formats that only provide you with a partial view of your enterprise. We would like to share a white paper with you that explains how you can see your assets holistically and optimize their performance.
Tags : 
ibm, ibm g&rm, ibm grm, asset management, it management, tivoli
    
IBM
Published By: Adobe     Published Date: Apr 30, 2015
Connect the left and right brains of marketing to deliver the most compelling content to the right person at the right time. This white paper will help you reimagine personalization and get a holistic, 360-degree view of your customers.
Tags : 
touchpoint marketing, personalization, contextual intereactions, customer lifecycle, mobility, customer interactions, emerging marketing, interactive marketing, customer experience/engagement, email marketing services/software, direct mail/marketing
    
Adobe
Published By: SAP     Published Date: Jul 18, 2016
To determine the status of Analytics and Business Intelligence in the Cloud, Enterprise Management Associates (EMA) embarked on an end-user research study to look at the current state of cloud-based analytics. Read the white paper to discover panelists’ insights on cloud-based analytics, business intelligence strategies, and implementation practices.
Tags : 
    
SAP
Published By: VMTurbo     Published Date: Apr 11, 2013
This whitepaper describes VMTurbo’s supply chain economy approach, which uniquely addresses these requirements. VMTurbo combines monitoring, analytics and actions to enable proactive virtualization management. VMTurbo’s Observe Advise Automate model delivers intelligent and holistic visibility, analytics and automation.
Tags : 
economic, management, operations, virtualization, vmturbo, analytics
    
VMTurbo
Published By: Cognizant     Published Date: Oct 23, 2018
As financial services firms embrace digital, they need business assurance strategies that extend conventional quality assurance methods to address the nuances of emerging technologies such as blockchain and advanced artificial intelligence (AI). At the same time, they also need assurance that their strategies can accommodate changes in the ever-shifting regulatory landscape wrought by the acceleration of digital within the core of their businesses. This white paper explores how financial firms can excel in digital by holistically addressing the quality of business processes built on disruptive technologies while assuring compliance to regulations.
Tags : 
cognizant, finance, digital
    
Cognizant
Published By: NAVEX Global     Published Date: Oct 15, 2014
In this whitepaper, Michael Volkov, CEO and owner of the Volkov Law Group shares best practices for building an effective anti-corruption compliance programme with a holistic approach.
Tags : 
anti-bribery programmes, holistic anti-corruption policies, global anti-corruption policy
    
NAVEX Global
Published By: Integration New Media     Published Date: Apr 01, 2008
Librarians looking to build electronic libraries face numerous challenges. This new white paper by Integration New Media provides a summary of best practices for building an eLibrary. From defining your audience and content requirements, through to choosing a technology solution that makes sense for your use cases, this paper will provide a strong checklist of items to consider. The paper also looks at the three types of users and the key elements of designing the user experience for your eLibrary.
Tags : 
inm, integration new media, online library, elibrary
    
Integration New Media
Published By: GoToMeeting     Published Date: Oct 11, 2011
Video conferencing use is growing. In fact, users recently surveyed by 1080 Group expect it to grow by 211% in the next year. Better make sure you're putting your best virtual face forward. Video conferencing no longer has to mean 'go to a room with expensive, hard-to-use equipment installed.' This new 1080 Group white paper explores best practices for video conferencing and provides a handy checklist for preparing and conducting a successful video conferencing session.
Tags : 
citrix, video conference, webinar, marketing, 1080 group, internet
    
GoToMeeting
Published By: IBM     Published Date: Feb 25, 2008
Why is it that business and IT teams always seem to be at odds with one another? In this IBM white paper, Macehiter Ward-Dutton, specialists in IT business alignment, give a step-by-step explanation of how to make long-term improvements in the relationship between business and IT.
Tags : 
application development, infrastructure management, slm, sla, service level, service management, ibm
    
IBM
Published By: Esker     Published Date: Jun 29, 2015
Read the white paper‚ Building a Business Case for AP Automation: How to Propel Your Project to the Top of the List‚ to discover how AP automation creates benefits for the entire business such as: • Cost savings due to fewer manual processing tasks and less IT requirements • Complete visibility and control thanks to customizable dashboards and metrics • Faster payment cycles with the ability to capture more early payment discounts • Improved employee productivity and supplier satisfaction
Tags : 
accounts payable, finance management, ap automation, infrastructure, employee productivity, supplier satisfaction, payment cycles, payment discounts
    
Esker
Published By: ESET     Published Date: Feb 01, 2008
It is important for businesses to have a plan in place that addresses the changing threat landscape.  This podcast discusses various items for businesses to consider when developing an IT threat model.
Tags : 
threat planning, testing, penetration testing, defense in depth, multilayered, firewall, filtering, white listing, it strategy, eset, nod32, antivirus, malware, internet threats, web based threats, web 2.0, smb, small business, medium business, eset
    
ESET
Published By: IBM     Published Date: Oct 10, 2013
Mobility is now a business fact of life. Will your organization be one with mobile capabilities or a truly mobile enterprise? The new IBM white paper “Building the mobile enterprise: integrated, secure and productive” explains the difference and offers a checklist of eight key items to consider when planning your mobility initiatives.
Tags : 
mobile enterprise, secure and productive, mobile checklist, securing mobiles, build mobile enterprise, planning mobilities, mobility initiatives, mobile capabilities, wireless, technology, mobile advancement
    
IBM
Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, whitelisting solutions, application control, encryption, business scanning
    
Lumension
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.