change

Results 2851 - 2875 of 2915Sort Results By: Published Date | Title | Company Name
Published By: Microworld     Published Date: Dec 12, 2007
X-Spam for Exchange 2000-2003 (X-Spam) is a highly adaptive Anti-Spam Software that protects the Microsoft Exchange 2000-2003 servers from Spam. X-Spam uses advanced regular expressions and meta tests to positively identify Spam and block it. This white paper discusses Spam and provides information on X-Spam.
Tags : 
black list, rbl, dul, dial up user, spam, anti spam, anti-spam, x-spam
    
Microworld
Published By: Tideway Systems     Published Date: Dec 11, 2007
This report provided by Enterprise Management Associates (EMA) is developed around research that's focused on showing the many faces of the CMDB – as a central point for governance, asset, inventory, change and configuration control, and as a core system, in many cases for more effective service assurance. Designated for IT adopters and planners – read by executives, as well as, architects, and technical influencers.
Tags : 
cmdb, configuration management, change management, itil, service management, itsm, tideway systems, tideway
    
Tideway Systems
Published By: Tideway Systems     Published Date: Dec 11, 2007
IT service providers need to offer services that deliver new business opportunities whilst increasing levels of availability, controlling risks and reducing costs. This paper provides you with practical guidance based on the practices in ITIL® V3 that will help you manage application and infrastructure changes and configurations.
Tags : 
service management, itil, change management, configuration management, knowledge management, service strategy, service design, tideway
    
Tideway Systems
Published By: Computhink     Published Date: Dec 10, 2007
The job of a Records Management Office is to take all paper documents that need to be preserved, from all county offices, and implement a strategy to preserve them. When the law changed on January 1, 2001 to allow digitally scanned copies to be legal documents (The Illinois Electronic Records Act), the challenge to find a preservation system that would be both efficient and cost effective increased dramatically.
Tags : 
document management, records management, information, electronic document management, computhink, viewwise, viewise, government
    
Computhink
Published By: ElcomSoft     Published Date: Dec 06, 2007
Rapid development of digital technologies and electronic communication, availability of mobile PCs and smart phones, abundance of tools for creating documents or high-quality presentations coupled with constantly growing volumes of information and yearning for doing business more effectively leads to switching to electronic exchange of information.
Tags : 
pdf, acrobat, adobe acrobat, document security, secure content, secure pdf, password recovery, pdf password
    
ElcomSoft
Published By: NetIQ Corporation     Published Date: Nov 27, 2007
Learn how to successfully extend your deployment of Group Policy to your servers by implementing end-to-end management of this pervasive technology, including advanced offline management and real-time monitoring of authorized and unauthorized changes.
Tags : 
group policy, policy management, security management, servers, server management, netiq, net iq
    
NetIQ Corporation
Published By: NetIQ Corporation     Published Date: Nov 27, 2007
Learn how delegating administrative privileges can aid in improving administrative productivity, system availability and security, while satisfying the demands of auditors.  Read this new white paper from NetIQ today.
Tags : 
access control, security, audit, auditor, auditing, change management, net iq, netiq
    
NetIQ Corporation
Published By: SPAMfighter     Published Date: Nov 27, 2007
This paper will discuss the shortcomings of some established filtering methods and outline how SPAMfighter's community-based approach to filtering can result in it performing much better than competing products and delivering a far superior return on investment.
Tags : 
spam, anti spam, anti-spam, spamfighter, spam fighter, exchange, productivity, costs
    
SPAMfighter
Published By: eGain     Published Date: Oct 12, 2007
Business relationships have always been based on interactions. Until now most of these interactions have been through conventional means, such as the telephone. But now more and more of your business interactions are over the Internet, and this trend will continue for the foreseeable future. Are you ready to handle this change?
Tags : 
customer interactions, customer service, customer support, support, helpdesk, online support, help desk, client service
    
eGain
Published By: 6th Sense Analytics     Published Date: Sep 19, 2007
Offshore development has been embraced by the vast majority of commercial software vendors and enterprise application development groups. Why? Because a world flattened by globalization makes it possible to improve competitiveness by taking advantage of the easy exchange of low-cost, high-quality technical skills.
Tags : 
offshore, offshoring, outsource, outsourcing, software, productivity, workforce, workforce management
    
6th Sense Analytics
Published By: Imprivata     Published Date: Sep 17, 2007
Single Sign-On technology has been around for many years. Although skepticism and risk worries were associated with the service, SSO has gone through technological changes. Through these changes it has become an ROI Solution for many corporations. Learn and explore first hand through five different companies how SSO has helped achieve their goals.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, authentication
    
Imprivata
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how Secure Configuration Manager can help with compliance requirements in the IT controls areas of entitlement reporting & segregation of duties. Discover how to make your compliance program more sustainable & repeatable, while gaining visibility into sources of vulnerability & risk exposure.
Tags : 
compliance, netiq, net iq, policy management, configuration management, unix, risk management, change management
    
NetIQ Corporation
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how to meet regulatory requirements for system change and user activity monitoring with NetIQ Change Guardian for Windows, without the need for performance-hindering native auditing.
Tags : 
pci, pci dss, data protection, compliance, netiq, net iq, change management, monitoring
    
NetIQ Corporation
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
The nature of corporate accounting and financial controls has forever been changed by Sarbanes-Oxley legislation. This white paper discusses the ripple effect of the Act on the IT outsourcing community and the new responsibilities and ethics that rest on companies, both public and private, that entrust all or part of their IT environment to an external third party.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, j.d. edwards, oracle, baan
    
OneNeck IT Services
Published By: Solidcore     Published Date: Aug 21, 2007
Learn how change control technology helps organizations comply with PCI DSS by tracking changes to critical files, determining if changes are authorized, and selectively preventing unauthorized change.  Read this white paper on how you can relieve the burden of out-of-process and other unauthorized changes by using real-time monitoring and selective enforcement software. 
Tags : 
pci data, credit card, payment card, pci, compliance, privacy, customer information, data security
    
Solidcore
Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 16, 2007
This paper offers the industry's only solution for automating detailed reporting that ensures Enterprise Configuration Visibility™ – reducing the time and cost associated with IT control, compliance, and security, and ensuring the highest levels of availability and performance for your organization.
Tags : 
configuration management, compliance, security management, audit, auditing, regulatory compliance, monitoring, itil
    
Ecora Software
Published By: Ultimus     Published Date: Aug 16, 2007
By enabling Adaptive SOA, Ultimus Adaptive Discovery takes SOA to the highest level of rapid deployment and agility. It accomplishes this by enabling business processes to be developed rapidly, and to embrace change in real-time. More importantly, it empowers business professionals and analysts who own processes to discover and change processes with IT playing the supporting role to manage the infrastructure.
Tags : 
ultimus, bpm, business process management, automation, process discovery, discovery, adaptive discovery, bpa
    
Ultimus
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Understand why FISMA is heating up, what's the impact on Agency IT departments, what role configuration reporting plays, how the right documentation can build a strong audit trail, and how automation fast tracks your compliance plan.
Tags : 
change management, configuration management, it management, fisma, fisma compliant, fisma compliance, project management, compliance
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn about the Sarbanes-Oxley regulatory background and its impact on IT departments. This document provides information pertaining to access issues, change documentation, disaster recovery planning and illustrations of key audit-ready reports.
Tags : 
sox, sarbox, sox compliance, sarbanes oxley, sarbanes-oxley, enron, compliance, information management
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn the importance of change management in today's complex IT infrastructures.
Tags : 
change management, configuration management, it management, project management, compliance, compliant, audit, auditing
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Sunbelt Software     Published Date: Aug 10, 2007
Sunbelt Software engaged Osterman Research to survey organizations that are using five different email management systems including Barracuda Spam Firewall, GFI MailEssentials, McAfee GroupShield for Microsoft Exchange, and Symantec Brightmail and Sunbelt Ninja Email Security.
Tags : 
email management, email, email security, messaging, spam, anti spam, spyware, anti spyware
    
Sunbelt Software
Start   Previous    103 104 105 106 107 108 109 110 111 112 113 114 115 116 117    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.