ctr

Results 651 - 675 of 1013Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Sep 30, 2008
Today, email management is not only a filing and storage challenge. Because law firms and attorneys must be equipped to take control of litigation, email authenticity must be unquestionable with strong chains of custody, constant availability, and tamper-proof security. This white paper summarizes the author's experiences of litigating in fractured environments, particularly as they pertain to email. Learn the 12 steps that will help you gain control of your electronically stored data.
Tags : 
mimecast, saas, email solutions, evidence, security, email managemeng, archiving, ediscovery, mailbox, compliance
    
Mimecast
Published By: Mimecast     Published Date: Aug 19, 2009
Businesses over the past ten years have used email archiving solutions in order to meet record retention compliance, facilitate electronic discovery, and control message-related storage costs. Despite these benefits, many organizations still have not adopted an archiving solution and still simply enforce mailbox quotas or message deletion policies as the best way to manage messaging environments.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage
    
Mimecast
Published By: Concentric     Published Date: Mar 27, 2009
Email has become something of a critical utility, much like the electricity that powers our offices: it must be available 24 hours a day, it must provide reliable performance, and its cost must be reasonable. However, unlike electrical systems (at least from the user’s perspective), email systems require significant amounts of labor to manage well. Email systems must periodically be upgraded. New hardware must be introduced as organizations migrate to new systems. Security must be maintained and upgraded to protect the system from intrusions. Additional hardware must be deployed to protect against outages that could seriously harm user productivity. Plus, unexpected events, such as spam storms or natural disasters can drive up costs substantially in ways that were not anticipated.
Tags : 
concentric, email options, critical utility, killer app, small and mid-sized businesses, smbs, on-premise email solution, on-premise email costs, hardware costs, software costs, labor costs, resiliency, failover capability, concentric hosted exchange, microsoft® exchange 2007, outlook web access, owa, blackberry, activesync, pop3
    
Concentric
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : 
trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp, hackers, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection, encryption, ip loss, intellectual property, loss of intellectual property, loss of reputation
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Nov 25, 2009
The increasing adoption of electronic health records greatly complicates the tasks of security and privacy requirements. In this webcast, *Trend Micro* and *Beth Israel Deaconess Medical Center* discuss how to successfully navigate through the challenges associated with securing Web-based applications.
Tags : 
trend, trend micro, webcast, security, hitrust, web, privacy, ehrs, health records
    
Trend Micro, Inc.
Published By: NetApp     Published Date: Mar 12, 2010
Find out how NetApp and VMware enable customers to improve disaster preparedness while saving money. Today, at Tucson Electric Power, almost 90 percent of servers are virtual, 100 percent of daily backups can now be performed within a 24-hour window, disaster preparedness is greatly improved, regulatory requirements are met, and the IT infrastructure is ready for the future. Download this report to learn more.
Tags : 
netapp, data management, disaster recovery, back up, storage, server virtualization
    
NetApp
Published By: EchoSign     Published Date: Apr 19, 2011
This Buyer's Guide covers the basics and benefits of eSignatures as well as what to look for in an eSignature solutions vendor.
Tags : 
echosign, esignature solutions, sales buyer's guide, smart selling tools, web-based scheduling, electronic signature, esignature solutions vendor
    
EchoSign
Published By: SearchIgnite     Published Date: Oct 26, 2010
This report tracked more than 55 billion impressions and more than 1 billion clicks on Google, Yahoo! and MSN/Bing from January 1, 2006 through September 30, 2010.
Tags : 
searchignite, google, bing-yahoo, search alliance, ppc, click-through rates, ctr
    
SearchIgnite
Published By: Schneider Electric     Published Date: Dec 29, 2011
The rapid growth of consumer smartphones and tablets is having a dramatic impact on the enterprise. For employees, it's all about choice and convenience, but for organizations, it introduces new challenges and risks. Companies of all sizes are struggling with an ever-growing array of IT management and security concerns, as more and more business data moves to mobile devices. In this program, we address these concerns and reveal the secrets to unlock the power of mobility with two of the leading experts in the industry.
Tags : 
    
Schneider Electric
Published By: IBM     Published Date: Oct 01, 2012
IBM Lotus Forms offers a proven solution that provides real value, quickly and easily, to help organizations better position themselves for success in these uncertain times and into the future.
Tags : 
e-forms, electronic forms, reduce paper, lotus forms
    
IBM
Published By: IBM     Published Date: Oct 01, 2012
Despite advances in technology, paper forms abound. But paper-based forms are time intensive and error prone. As a result, customers become frustrated with the increased cycle times and drained administrative resources.
Tags : 
e-forms, electronic forms, process automation, content management, data collection
    
IBM
Published By: IBM     Published Date: Dec 11, 2012
Enterprise Ready Intelligent Capture (ERIC) — a coordinated approach to document input and processing that combines distributed and centralized scanning with fax and electronic conversion across numerous departments. Read on to learn more.
Tags : 
government agencies, critical improvements, paper bound functions, ibm, enterprise ready intelligent capture, efficiency
    
IBM
Published By: DocuSign     Published Date: May 29, 2014
Electronic signatures can accelerate the contract execution process while improving consistency and quality. DocuSign enables companies to adopt electronic signatures to streamline contracting while reducing costs. Deployed properly, DocuSign can deliver payback in fewer than six months.
Tags : 
docusign, electronic signatures, reduce costs, esignatures, contract execution, cloud
    
DocuSign
Published By: DocuSign     Published Date: May 29, 2014
Few business processes are as security sensitive as those involving electronic signatures. eSignature transactions routinely contain information that is critical to you, your business, and your customers. This information may include personally identifiable Information (PII), pricing details, proprietary business terms, intellectual property, and more. That is why DocuSign’s number one priority is customer security. DocuSign leads the industry in designing and delivering the most secure digital transaction solution available.
Tags : 
docusign, security, esignatures, personally identifiable information, pii, customer security, digital transactions
    
DocuSign
Published By: Salesforce.com     Published Date: Apr 16, 2013
Smartphones and tablets are game changers for engagement because people carry them everywhere they go. Your customers and partners and employees have perpetual access to the vast resources of the Internet — and hopefully your mobile app as well — in the key moments of their day. In interviews with more than 100 mobile innovators, we have found four places where mobile engagement transforms services and processes: customer engagement, process acceleration, employee productivity, and new business services. Even at this early stage of development, you can see positive impacts of mobile engagement in apps from General Electric, Trane, and Uber Technologies. We close with a simple framework for prioritizing which apps and features people will actually use based how useful and convenient they are.
Tags : 
mobile, engagement, business, smartphones, tablets
    
Salesforce.com
Published By: E-SignLive by Silanis     Published Date: Oct 23, 2013
What is the best or ideal type of electronic signature? There is no one-size-fits-all answer. It all depends on the process being automated. In this 7-page article, we start out by defining the steps in a typical e-signature process and identify what options there are for each step. Download your complimentary copy now.
Tags : 
    
E-SignLive by Silanis
Published By: Globalscape     Published Date: Mar 21, 2014
Healthcare providers face an urgent, internal battle every day: security and compliance versus productivity and service. For most healthcare organizations, the fight is an easy one: Providing quick, high-quality care wins every single time.
Tags : 
globalscape, healthcare, digitalized assets, healthcare technology, ehr, file sharing solutions, electronic health records, healthcare it, patient data, medical data, hipaa, mft, managed file transfer
    
Globalscape
Published By: Globalscape     Published Date: Jun 27, 2014
The PCI Security Standards Council issued version 3 of their PCI DSS guidelines for processing electronic payments. Our whitepaper details the newest additions to the guidelines as well as tools and resources to help organizations comply with the standards.
Tags : 
globalscape, file transfer, security, compliance, payment information, electronic payments, ecommerce, security, information management, electronic processing
    
Globalscape
Published By: Adobe     Published Date: Apr 13, 2015
In this white paper learn how e-signatures are making workflows easier and more productive than ever before. Learn how e-signatures remove the last barrier between a hybrid paper-to-digital workflow to an all-electronic process, dramatically accelerating closure in any type of transaction that requires a contract—sales, employment and hiring, purchase orders, legal agreements, and more. Download this white paper to learn more.
Tags : 
adobe, electronic signatures, digital transactions, paper-to-digital
    
Adobe
Published By: Adobe     Published Date: Mar 16, 2016
Competition is the number one pressure faced by today’s HCM teams – by a 69% margin! Of all the pressures that contemporary HR teams face, finding and keeping quality talent ranks above everything else. As a part of that, Best-in-Class organizations need to focus on optimizing the employment experience, from hiring and onboarding, to ongoing management and transition. This report from Aberdeen explores how electronic signature solutions, as well as other digital HR technologies, can improve the employment experience throughout the journey. Read this report to learn: • Why Best-in-Class HR departments are investing in employee-friendly technologies • How digital solutions can impact employee experience, and why that matters for HR • How electronic signatures complement HRIS applications and streamline many HR processes
Tags : 
hr organizations, hris, esignature, customer management, sales effectiveness, human capital management
    
Adobe
Published By: Adobe     Published Date: Mar 16, 2016
While most business is digital, and business-to-business and business-to-consumer transactions – and the work that supports them -- are almost entirely digitized, most organizations still rely on paper for the “last foot” of the process – the sign-off. Continued reliance on paper-based signature is fraught with risks, including impeding productivity, reducing visibility, hampering compliance, and diminishing the customer experience. Electronic signatures (e-signatures), which are easily implemented from the cloud, help speed up the sales process by reducing errors and bottlenecks, while also ensuring greater security and mobility. Read this Forbes Insights piece to learn: • How an easy implementation of e-signatures can improve productivity and reduce busywork for your sales team • How improve customer experiences and ease of business with e-signatures increases the likelihood of renewal and retention • How e-signatures easily integrate into your existing sales tools, for seamless pr
Tags : 
sales performance, e-signatures, b2b, b2c
    
Adobe
Published By: Adobe     Published Date: Mar 16, 2016
In this white paper learn how e-signatures are making workflows easier and more productive than ever before. Learn how e-signatures remove the last barrier between a hybrid paper-to-digital workflow to an all-electronic process, dramatically accelerating closure in any type of transaction that requires a contract—sales, employment and hiring, purchase orders, legal agreements, and more.
Tags : 
digital, digital systems, mobile, broadband, wireless, web applications
    
Adobe
Start   Previous    20 21 22 23 24 25 26 27 28 29 30 31 32 33 34    Next    End
Search Resource Library