ad management

Results 2876 - 2900 of 2925Sort Results By: Published Date | Title | Company Name
Published By: Guardian Digital     Published Date: Oct 02, 2007
Open source is just a method to reaching a goal, not a goal in itself. In this overview, "The Top 5 Open Source Security Myths," you will be introduced to some of the largest misconceptions regarding open source security.
Tags : 
open source, open source security, network security, adaptability, security management, email security, guardian digital, digital guardian
    
Guardian Digital
Published By: Guardian Digital     Published Date: Oct 02, 2007
Guardian Digital's EnGarde Secure Linux is the world's premier secure operating platform engineered from Open Source Technologies.  Written in an easy to read, plain-language format, you will get introduced to the full range of benefits that makes EnGarde "Secure By Design."
Tags : 
open source, open source security, network security, adaptability, security management, email security, guardian digital, digital guardian
    
Guardian Digital
Published By: BlueCat     Published Date: Sep 14, 2007
This paper introduces and describes the principal concepts and techniques involved with DNS best practices.
Tags : 
dns, dns server, dns servers, server, servers, ip network, ip networks, ip address, network architecture, network management, ipam, ip address management, caching server, bind views, best practices, bluecat, blue cat
    
BlueCat
Published By: Quocirca     Published Date: Sep 13, 2007
File servers continue to proliferate, and email has moved from a basic tool for exchanging documents to an inherent part of an organization’s communication and collaboration portfolio. With such ad-hoc information sources now being a mission critical function, the need for data management and archival is becoming critical.
Tags : 
information management, servers, storage, quocirca
    
Quocirca
Published By: Adlib Software     Published Date: Aug 21, 2007
Read this whitepaper to learn about PDF/A and how it must be implemented in conjunction with tools and applications to manage records according to the various business practices and recordkeeping processes today's information-dependant organizations employ.
Tags : 
data management, adlib, adlib software, document management, pdf, portable document format, adobe acrobat, pdfs, records management
    
Adlib Software
Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: Inovis     Published Date: Aug 06, 2007
When companies adopted Just-In-Time (JIT) tactics, they did so primarily to reduce inventory costs. For the most part, this strategy worked. Reducing stocks of raw materials, parts, assemblies and finished goods reduces carrying costs, allowing companies to invest the freed-up funds in more productive assets and projects.
Tags : 
supply chain, scm, supply chain management, inovis, spend management, cost control, inventory, inventories, supplier, application integraion, eai, plm, product lifecycle management, van, value add, value added, inventory management
    
Inovis
Published By: TRIRIGA     Published Date: Jul 27, 2007
In this white paper, we discuss industry standards, the range of disciplines IWMS spans, external systems (e.g., CAD, ERP, human resources) that interact with a solid IWMS, and the costs avoided when innovators enforce data templates and processes throughout the enterprise.
Tags : 
facilities management, iwms, real estate management, facilities, iwms, integrated workplace management, maintenance and operations, project management, workplace management, tririga, triraga, lease administration, retail, capital assets, corporate real estate, store openings, user moves, on-boarding, off-boarding
    
TRIRIGA
Published By: Microsoft Dynamics     Published Date: Jul 23, 2007
Businesses don’t garner insights or make decisions. Businesses don’t close deals, invent new products, or find new efficiencies. People do. Companies excel when they empower their people to drive the business forward. But to see results, you also have to give your people the right tools, information, and opportunities—because success ultimately comes down to your people.
Tags : 
microsoft, microsoft dynamics, productivity, people ready, people-ready, employee performance, business process automation, bpm, information management, information work, collaboration, corporate portal, dynamics ax, business integration
    
Microsoft Dynamics
Published By: Perimeter     Published Date: Jul 17, 2007
What is the difference between a risk, a threat, a vulnerability and an exploit? Which product or solution can be employed to address my institution’s information security and compliance needs? This paper provides some clarity on the first question, and in the process, it should help to offer an answer to the second question, one of aligning concerns with solutions with vulnerability management.
Tags : 
risk management, vulnerability assessment, ips, intrusion prevention, ids, intrusion detection, firewall, exploit, infrastructure, patch management, email defense, email security, perimeter, perimeter esecurity
    
Perimeter
Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
This white paper addresses business and technical decision-makers for ambitious companies in which product distribution and transportation play key roles in daily operations and profitability. It describes how the comprehensive, integrated management solution represented by Supply Chain Execution for Microsoft Dynamics AX can help build an integrated logistics solution.
Tags : 
scm, supply chain, radio frequency, rfid, inventory, transportation management, asset management, warehouse, distribution, labeling, microsoft, microsoft dynamics, productivity, manufacturing, operations
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Jul 09, 2007
Saddled with a home-grown business-management tool originally designed for its retail business, the Best Buy for Business sought a solution that would support its extensive outside sales force and would provide a commercial CRM solution it could sell to business customers. Best Buy for Business found both in Microsoft Dynamics CRM.
Tags : 
microsoft, microsoft dynamics, sales automation, salesforce automation, scm, supply chain management, crm, customer relationship management, small business, mid-sized business, crm software
    
Microsoft Dynamics
Published By: GFI     Published Date: Jul 09, 2007
This white paper identifies the problems encountered in addressing network security risks through vulnerability management. It describes how automated vulnerability management contributes to compliance with industry standards such as the Payment Card Industry Data Security Standard (PCI DSS) and assists you in proactively identifying security weaknesses before these are exploited.
Tags : 
security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability, vulnerability management, cardholder, data protection, database security, consumer data, consumer privacy, customer data, customer privacy, gfi
    
GFI
Published By: SWsoft     Published Date: Jun 27, 2007
Virtualization and workload management are essential technologies for maximizing scalability, availability and value on high-end computing systems, and Itanium(r) 2-based servers offer many options. One is SWsoft Virtuozzo, a proven, software-based virtualization solution for consolidating Linux and Windows applications. 
Tags : 
virtualize, server virtualization, virtualization, workload management, wlm, application management, application integration, virtuozzo, itanium, itanium 2, sw soft, swsoft
    
SWsoft
Published By: Distributive Management     Published Date: Jun 19, 2007
DataDrill EXPRESS is known for being the most capable web-based performance dashboard tool available for software and IT projects and organizations, automating every aspect of performance measurement.
Tags : 
datadrill, distributive management, brochure, performance management, data collection, it management, project management, analytical applications, business analytics
    
Distributive Management
Published By: GFI     Published Date: Jun 08, 2007
This white paper examines the requirements to adhere to the Payment Card Industry Data Security Standard (PCI DSS), the implications of non-compliance and how effective event log management and network vulnerability management can help achieve compliance.
Tags : 
pci, credit card, payment card, compliance, mastercard, database security, privacy, consumer, customer, gfi
    
GFI
Published By: Casewise Systems Inc.     Published Date: Jun 05, 2007
Read this guide, that was published in BusinessWeek, on how organizations are now beginning to tackle this problem by taking a more holistic approach to IT Portfolio Management, enabling rapid decision-making based on a company roadmap.
Tags : 
business management, architecture, alignment, align, strategy, it management, network management, casewise, case wise
    
Casewise Systems Inc.
Published By: AirDefense     Published Date: Apr 24, 2007
This white paper is designed to guide network administrators and security managers to design, implement, and enforce wireless LAN security policies that enable every organization to fully reap the benefits of wireless LANs without experiencing undue management pains and security holes.
Tags : 
sox, sarbox, sarbanes oxley, sarbanes-oxley, compliance, hipaa, wlan, wlans, wireless security, wireless lan, wireless lans, vulnerability management, security policy, security policies, airdefense
    
AirDefense
Published By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : 
storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging, role based administration, secure access controls, enterprise security, data security, network security, storage management, authentication, standards compliance, security & privacy, security appliances, decru
    
Decru
Published By: Infor     Published Date: Apr 19, 2007
This paper includes a comparison between using RFID and barcoding for asset management as well as real-life examples of how RFID technology is being used by enterprising organizations today to gain significant time savings and enable better asset and maintenance management.
Tags : 
wireless, wireless hardware, wireless infrastructure, rfid, radio frequency, mobile data systems, asset management, barcode, barcoding, infor, erp
    
Infor
Published By: PEAK Technologies, Inc.     Published Date: Apr 19, 2007
Download this paper now and read why many businesses now recognize that comprehensive management of their wireless device infrastructure is a crucial component of a total IT enterprise management solution.
Tags : 
wireless, infrastructure, wireless infrastructure, wireless device, wireless networking, wlan, mobile computing, it management, tco, total cost of ownership, peak, peak technologies
    
PEAK Technologies, Inc.
Start   Previous    103 104 105 106 107 108 109 110 111 112 113 114 115 116 117    Next    End
Search Resource Library