overview

Results 226 - 250 of 669Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Apr 18, 2017
451 Research independent analysts review Mimecast’s Targeted Threat Protection suite of email security services. This report provides detailed descriptions of the various email threat vectors: attachments, links and phishing and how Mimecast email security services work to thwart these attacks. The report covers an overview of the market and specifics on Mimecast services: Impersonation Protect, Attachment Protect, and URL Protect.
Tags : 
email fraud, threat protection, mimecast, cyber security, email security
    
Mimecast
Published By: VMware AirWatch     Published Date: Nov 12, 2015
This IDC study provides a competitive analysis of the enterprise mobility management (EMM) software market for 2014. In addition to a ranking of the top 15 vendors by revenue, it provides an overview of key market trends and vendors that helped shape the market landscape in 2014.
Tags : 
vmware, emm, enterprise mobility management, market landscape
    
VMware AirWatch
Published By: Brightcove     Published Date: Sep 26, 2016
Here are the pros and cons of social players and the benefits of OVPs, followed by an overview of the type of content that works best for each in a blended strategy.
Tags : 
    
Brightcove
Published By: Microsoft     Published Date: May 04, 2017
If you’re looking for a simpler, less costly approach to phone and business communications, E5’s voice capabilities can help you reduce office space, host larger meetings and collaborate more effectively. Here’s an overview of the benefits.
Tags : 
microsoft office, 365, enterprise, business communications, collaboration
    
Microsoft
Published By: Hippo     Published Date: Jun 24, 2014
A Forrester report on the market overview of web content management systems.
Tags : 
hippo, web content management systems, forrester, market overview, wcm market
    
Hippo
Published By: VMware     Published Date: Jul 24, 2018
This IDC White Paper offers an overview of the new datacenter infrastructure trends that are being driven by a need to solve traditional datacenter challenges that still exist today. This paper also offers insight into a recent IDC survey of different customers running VMware vSAN, a software-defined, hyperconverged solution. The survey was conducted during the second half of 2017 to understand the real-world value VMware vSAN provides when deployed within production environments. 
Tags : 
    
VMware
Published By: VMware     Published Date: Jul 24, 2018
This IDC White Paper offers an overview of the new datacenter infrastructure trends that are being driven by a need to solve traditional datacenter challenges that still exist today. This paper also offers insight into a recent IDC survey of different customers running VMware vSAN, a software-defined, hyperconverged solution. The survey was conducted during the second half of 2017 to understand the real-world value VMware vSAN provides when deployed within production environments. 
Tags : 
    
VMware
Published By: Websense     Published Date: Oct 18, 2010
Data Loss Prevention (DLP) solutions are moving targets. They keep changing to meet evolving regulatory requirements and business needs. It's tough to select the best DLP solution. This white paper from leading information security research firm Securosis gives you an overview of the DLP industry, technologies, and architectures.
Tags : 
websense, dlp, data loss prevention, securosis, security, data management, testing
    
Websense
Published By: Symantec     Published Date: Jan 31, 2013
Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.
Tags : 
endpoint protection, security, overview
    
Symantec
Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Oct 16, 2008
The hacking community has shifted its effort toward a new frontier:  the application layer.  How are companies responding?  Business Software Assurance – the capability to address the problem of application risk within an enterprise.  This whitepaper provides an overview of the severity of the problem along with everything needed to develop Business Software Assurance in your organization. 
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise
Published By: Okta     Published Date: Jan 06, 2012
These days securing access to cloud applications is critical, yet the current approach relying on single passwords leaves businesses susceptible to compromise. Read this whitepaper to find out more how to secure your cloud based applications using Okta's MFA solution.
Tags : 
okta, authentication, single sign on, sign-on, sign on, cloud, cloud application, cloud
    
Okta
Published By: Okta     Published Date: Jan 30, 2013
Read this whitepaper to learn about moving beyond user names and passwords, and how Okta's MFA solution for on premises and cloud apps provides both the highest security and simplest administration possible.
Tags : 
okta, multifactor, authentication, user names, passwords, beyond users, okta multifactor authentication
    
Okta
Published By: Okta     Published Date: Jan 31, 2013
This technical whitepaper will provide an overview of the software and operational architecture that enables Okta to run a scalable, highly available, on demand identity and access management service.
Tags : 
cloud services, okta high availability, architecture, cloud service, high availability architecture
    
Okta
Published By: Okta     Published Date: Jan 31, 2013
Okta’s cloud-based identity and access management service solves the issue of user identities on multiple networks with a highly available solution for all cloud based and web based application AD integrations. Learn how Okta can help you.
Tags : 
okta, active directory, integration, architecture, okta
    
Okta
Published By: Okta     Published Date: Feb 05, 2013
Okta is an enterprise grade identity management service, built from the ground up in the cloud and delivered with an unwavering focus on customer success.
Tags : 
okta, customer service, architectural overview, online portals, 3rd party portal integration
    
Okta
Published By: Pentaho     Published Date: Mar 08, 2016
If you’re evaluating big data integration platforms, you know that with the increasing number of tools and technologies out there, it can be difficult to separate meaningful information from the hype, and identify the right technology to solve your unique big data problem. This analyst research provides a concise overview of big data integration technologies, and reviews key things to consider when creating an integrated big data environment that blends new technologies with existing BI systems to meet your business goals. Read the Buyer’s Guide to Big Data Integration by CITO Research to learn: • What tools are most useful for working with Big Data, Hadoop, and existing transactional databases • How to create an effective “data supply chain” • How to succeed with complex data on-boarding using automation for more reliable data ingestion • The best ways to connect, transport, and transform data for data exploration, analytics and compliance
Tags : 
data, buyer guide, integration, technology, platform, research
    
Pentaho
Published By: BMC     Published Date: Jan 05, 2012
This reference guide provides an overview on the public and private cloud implementation (e.g. HMS Public/Private Cloud Choice).
Tags : 
bmc, cloud, cio, cto, hardware, operations, business operations, productivity
    
BMC
Published By: Oracle     Published Date: Apr 03, 2012
Oracle Exalogic Elastic Cloud, the world's first and only integrated middleware machine, dramatically surpasses alternatives and provides enterprises the best possible foundation for running applications.
Tags : 
oracle exalogic elastic cloud, oracle, elastic capacity, infrastructure
    
Oracle
Published By: Oracle     Published Date: Apr 04, 2012
This white paper examines how the versatile design of the Oracle SPARC SuperCluster T4-4 along with powerful, bundled virtualization capabilities makes it an ideal platform for consolidating enterprise servers and workloads and deploying apps.
Tags : 
supercluster, sparc, t4-4, workloads, oracle exalogic elastic cloud, oracle, elastic capacity, infrastructure
    
Oracle
Published By: Intel Corp.     Published Date: Jul 09, 2012
Enterprise performance and embedded security technology benefits are covered in the 3rd gen Intel® CoreT vProT processor overview.
Tags : 
intel, 3rd generation, core vpro
    
Intel Corp.
Published By: CodeBaby     Published Date: Nov 27, 2012
Healthcare organizations are integrating intelligent virtual assistants to enhance online experience and reduce costs. This guide overviews the capabilities and benefits of using virtual assistants to engage, optimize, and complement existing service channels.
Tags : 
online self-service, customer experience, customer service, intelligent virtual assistants, conversion optimization, tech support, crm, web self-service
    
CodeBaby
Published By: CodeBaby     Published Date: Nov 27, 2012
This guide reviews market drivers which are spurring innovation in benefits self-service and enrollment as well as wellness engagement. In addition, it overviews the main capabilities of the leading virtual assistant solution, CIVA benefits advisor.
Tags : 
online self-service, self-service, patient engagement, patient experience, healthcare consumerism, ehealth, customer service, intelligent virtual assistants
    
CodeBaby
Published By: CodeBaby     Published Date: Nov 27, 2012
This guide reviews some market drivers which are spurring innovation in patient engagement and wellness participation. In addition, it overviews the main capabilities of the leading virtual assistant solution, CIVA health adviser.
Tags : 
online self-service, self-service, patient engagement, patient experience, healthcare consumerism, ehealth, customer service, intelligent virtual assistants
    
CodeBaby
Published By: ServiceSource     Published Date: Nov 01, 2013
How strong is your renewal program? Are you able to predict and analyze your performance correctly? ServiceSource® believes that the real yardstick of renewal performance lies in a comprehensive set of key performance indicators (KPIs) that can tell a much broader story. Over the last 13 years and over 145 engagements, we’ve identified these twelve critical factors for successfully measuring and growing your renewal revenue. This whitepaper provides a detailed overview of those KPIs.
Tags : 
reducing customer churn, servicesource, maximize revenue, essential kpis, renewal opportunity, renewal results, sales process, performance drivers
    
ServiceSource
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.