policies

Results 226 - 250 of 397Sort Results By: Published Date | Title | Company Name
Published By: Great Bay Software     Published Date: Feb 04, 2015
The majority of companies have a difficult time deploying NAC across the enterprise. No existing NAC solution provides access control for all endpoints and operating systems – leaving vulnerable blind spots on the network. Some company leaders spend hundreds of thousands – even millions – of dollars on a NAC solution only to spend years trying to implement the technology. As a result, this can turn into a very frustrating process. However, the solution intended to help you better secure and manage your network shouldn’t wind up creating greater risk and chaos. There are ways to set your network and your team up for success. Here are some tips to help you when considering deploying a NAC solution.
Tags : 
great bay, software, network, access, control, implementation, nac, enterprise
    
Great Bay Software
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : 
endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, security
    
CDW-Trend Micro
Published By: AWS     Published Date: Oct 30, 2018
Centrify – a leading cybersecurity company – needed to establish and maintain active security over its applications running on AWS, as it rapidly scaled up. The Centrify DevOps team implemented Dome9 Arc to visualize and assess its security posture, actively enforce security and compliance policies, and automatically remediate misconfigurations on AWS.
Tags : 
centrify, compliance, security, aws, dome9
    
AWS
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : 
ibm integrated data management, siebel crm, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth
    
IBM
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : 
ibm integrated data management, oracle e-business suite, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution
    
IBM
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : 
ibm integrated data management, jd edwards, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution
    
IBM
Published By: Dell Software     Published Date: Jul 18, 2012
Paper: Make Group Policies Do Mor
Tags : 
group policy, white paper, technology, customer, desktop, configuration, gpos, wmi
    
Dell Software
Published By: Mimecast     Published Date: Aug 19, 2009
Businesses over the past ten years have used email archiving solutions in order to meet record retention compliance, facilitate electronic discovery, and control message-related storage costs. Despite these benefits, many organizations still have not adopted an archiving solution and still simply enforce mailbox quotas or message deletion policies as the best way to manage messaging environments.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage
    
Mimecast
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak
    
Trend Micro, Inc.
Published By: IBM ILOG.     Published Date: Jul 14, 2009
Financial services managers must revisit the quality of their risk management capabilities while reducing cost through more efficient operations. Often, unique leverage can be found with improved business process management, policies and exception-based decisions.  Hear three industry experts discuss how banks are using BRMS to meet the demand for speed, control, and profits.
Tags : 
ibm, financial, quality, risk, management, cost, reduce costs, effiency
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Jul 14, 2009
Financial services managers must revisit the quality of their risk management capabilities while reducing cost through more efficient operations. Often, unique leverage can be found with improved business process management, policies and exception-based decisions.  Hear three industry experts discuss how banks are using BRMS to meet the demand for speed, control, and profits.
Tags : 
ibm, health, healthcare, customer, service, private, epxperience, insurance
    
IBM ILOG.
Published By: Bazaarvoice     Published Date: Nov 05, 2014
This paper explores what authenticity really means to consumers, and how brands can deliver it, every time. Includes best practices for companies that collect and display reviews, handling employee reviews, and how dubious practices can harm your business.
Tags : 
bazaarvoice, customer loyalty, authemticity, customer relationships, authentic users, generated content, best practices, inauthentic practices
    
Bazaarvoice
Published By: Kaseya     Published Date: Feb 11, 2014
Embrace a new concept and adopt these 4 steps to create IT efficiencies without having to cut service levels. This might just be the change you need.
Tags : 
kaseya, systems management, technology savvy, it efficiencies, systems management strategy, discovery process, mobile workers, it policies
    
Kaseya
Published By: nettime solutions     Published Date: Mar 04, 2014
This whitepaper covers the best practices, methods and standards for time off accruals that are affecting PTO policies and will explain how a customizable, automated time and attendance platform can provide workforce analytics and labor management solutions.
Tags : 
nettime solutions, accruals, improving time, time off accruals, enhance pto policies, pto policies, automated time, attendance platform
    
nettime solutions
Published By: nettime solutions     Published Date: Mar 04, 2014
This webinar covers the best practices, methods and standards for time off accruals that are enhancing PTO policies nationwide, while showing you how a customizable automated time and attendance platform can provide workforce analytics and labor management solutions — all from your web-browser.
Tags : 
nettime solutions, accruals, improving time, time off accruals, enhance pto policies, pto policies, automated time, attendance platform
    
nettime solutions
Published By: Lumension     Published Date: Jun 03, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch, anti virus, application security, patch management
    
Lumension
Published By: Lumension     Published Date: Jun 03, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : 
report, servers, cloud, applications, it network, cloud computing
    
Lumension
Published By: Globalscape     Published Date: Aug 13, 2014
Mobile devices have offered organizations unparalleled access to information and a new level of flexibility in doing business. However, with this newfound freedom comes inherent risks and the danger of security breaches. This whitepaper discusses the growth of mobile devices in the workplace, inherent security issues in common file sharing services, and what organizations can do to enforce BYOD security policies without limiting the productivity of its employees.
Tags : 
globalscape, mobile, business, byod, security
    
Globalscape
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, rackspace, pci, dss, data breaches, log management, it compliance, automation solutions
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, sungard, pci, dss, data breaches, log management, it compliance, automation solutions
    
Alert Logic and Sungard Availability Services
Published By: Success Factors     Published Date: Aug 19, 2014
With news of economic recovery reaching employees’ ears, compensation managers will have to face the challenge of creating compelling compensation solutions through proactively benchmarking, updating policies with the current state of the business, avoiding inefficient data analysis methods, visualizing reports and trends, and responding to the business
Tags : 
success factors, engage candidates, hiring process, candidate advocates, recruiting strategies, talent, hiring managers
    
Success Factors
Published By: BubblewrApp     Published Date: Jan 20, 2015
"Agile companies push new application versions to production every few weeks, sometimes even faster. With super-fast Beta cycles being the norm, getting various user groups, such as remote QA teams, access to staging environments can slow down your delivery timelines. What if you could enable secure access for any number of users in 15 minutes? BubblewrApp’s Service Access Service (SAS) is a turnkey, cloud-based service that acts as the first line of defense for your applications. BubblewrApp’s SAS enables its customers to grant easy access to applications deployed ""behind the firewall"" (on premise) or ""inside the Virtual Private Cloud"" (in a public cloud) from any remote location. Customers can begin leveraging SAS within minutes without requiring any changes to pre-existing network and security policies. The result is a vastly superior secure application access model that enables a zero CapEx, low OpEx model for secure application access, both on premise and in the public cloud."
Tags : 
secure access, security policies, new applications, delivery timeline, cloud-based service, sas, application access model
    
BubblewrApp
Published By: Lumension     Published Date: Jun 05, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : 
report, servers, cloud, applications, it network, business intelligence, productivity, cloud computing
    
Lumension
Published By: Lumension     Published Date: Jun 05, 2015
Lumension’s fourth-annual survey on data protection maturity highlights the threats, responses, policies, and technologies of a shifting data security landscape. It also reveals how organizations have made progress—and where they may still be at risk.
Tags : 
data protection, threats, security landscape, shifting data, data maturity
    
Lumension
Published By: Lumension     Published Date: Jun 05, 2015
The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.
Tags : 
anti-virus, security, application, management, patch, anti virus, application security, patch management
    
Lumension
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.