browse

Results 151 - 165 of 165Sort Results By: Published Date | Title | Company Name
Published By: Ademero     Published Date: Oct 04, 2010
Managing accounts payable is a common practice in every commercial establishment. Whether you deal with goods or provide services, materials and supplies have to be purchased to conduct ordinary business.
Tags : 
document management, paper capture, paper scanning, workflow management, paperless office, document storage, automated workflow, retention policies, document versioning, content central, browser based, web based
    
Ademero
Published By: ETNA Software     Published Date: Feb 22, 2011
This whitepaper covers programming and design aspects of installation experience customization.
Tags : 
silverlight, finance software, investment software, financial tools, trading, technology, software, financial services
    
ETNA Software
Published By: Villamation     Published Date: Jun 07, 2011
A practical alternative to the traditional method of querying a database over the Internet.
Tags : 
search, search portals, xml, javascript, web developer, browser, optimized search, search engines
    
Villamation
Published By: Oracle     Published Date: Feb 28, 2012
hat makes the connected customer tick and what can you do to ensure your brands are top-of-mind when these customers start and finish their browse and buy agendas? Find out in this paper by Lauren Freedman of the e-tailing group.
Tags : 
    
Oracle
Published By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : 
data, identity, security, network, protection, mobile, security, documents, evolution, malware, sql, web, browser, hostile, e-mail, attack, password, lockdown, trusted, dlp
    
CDW Symantec
Published By: CDW     Published Date: Oct 10, 2013
The Georgia Dome deployed a Wi-Fi network that lets fans browse the web on smartphones, view replays and communicate via social media.
Tags : 
georgia dome, dome stadium, wireless crowd, wireless users, wifi support, update to wifi, wireless connectivity, peak usage, coverage considerations, large venue, venue coverage, happy fans, wireless support, wireless, network performance management, web services, customer experience management
    
CDW
Published By: Thawte     Published Date: Dec 29, 2015
Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
Tags : 
encryption, sgc certificates, browser, security management, web service security, business intelligence
    
Thawte
Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common browser vulnerabilities used to execute attacks, what attackers do next to take control of the system, and how to catch it before the attacker moves further into your network
Tags : 
end-user protection, cyberattacks, browser vulnerabilities, security management, modern threats, threat sharing, security products, firewall, anti-virus, network intrusion detection, vulnerability management, infrastructure, anti spyware, anti virus, application security, email security, firewalls, hacker detection, internet security, intrusion detection
    
AlienVault
Published By: Datastax     Published Date: Aug 27, 2018
" For any business that wants to successfully compete in todays digital economy, it is not a question of if but rather how much of their business will be done with cloud applications. A cloud application is one with many endpoints including browsers, mobile devices, and/or machines that are geographically distributed. The application is intensely transactional (high velocity reads and/or writes), always available, and instantaneously responsive no matter the number of users or machines using the application. Download this free white paper and explore how DataStax customers are delivering real-time value at epic scale with their cloud applications. Explore the core database requirements that make businesses successful with cloud applications, which include continuous availability, linear scale, and geographic distribution."
Tags : 
    
Datastax
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Chatter about the cloud is everywhere. You can't turn on your TV, look at your smartphone, open a magazine or browse websites without being inundated with messages about the cloud. Proponents tell you the cloud will save you time, give you a place to store data, create a way to manage hard drive space on your phone and much more. Detractors will scare you with stories of hackers gaining access to personal photos and bank account numbers.
Tags : 
    
Group M_IBM Q418
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
Choosing a modern enterprise browser that offers the right security capabilities keeps businesses data protected, while enabling employees to take advantage of the open web is a big decision for IT. Many IT administrators resort to experimentation in their decision-making. Take the guesswork out of your browser strategy with this guide. Find out what key security features you should be evaluating when selecting a modern enterprise browser.
Tags : 
    
Google Chrome Enterprise
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
As companies embrace cloud services and encourage employee mobility, digital interactions with company resources have become more distributed and virtualized, blurring the traditional concept of the endpoint. Forrester Research surveyed 1000+ IT professionals to better understand how endpoint security challenges are changing for enterprises. To protect company and customer data, it is increasingly necessary for enterprises to revisit how they approach endpoint security. Read the research brief to uncover key trends in enterprise security, and how IT can protect their enterprise through a more secure and managed web browser.
Tags : 
    
Google Chrome Enterprise
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
Securely improving employee productivity and mobility is a growing importance for businesses. The way employees do work is changing and IT Adminstrators are finding ways to support them. With a modern enterprise web browser, businesses are able to support a fast, secure and productive infrastructure . Find out how choosing a modern enterprise browser provides an important layer of security and keeps employees productive.
Tags : 
    
Google Chrome Enterprise
Published By: Dell EMC Storage     Published Date: Nov 28, 2018
Dell EMC CloudIQ powered by Intel Xeon processors is like a fitness tracker for your storage environment, providing a single, simple, display to monitor and predict the health of your storage environment. CloudIQ makes it easy to track storage health, plan for future growth, report on historical trends, and proactively discover and remediate issues from any browser or mobile device.
Tags : 
    
Dell EMC Storage
Published By: Alert Logic     Published Date: May 23, 2019
This security overview provides best practices to help organizations looking to harden their environment. Designed to help small- to mid-sized organizations stop an attack before one starts, this basic guidance will help reduce your attack surface and outlines practical steps to securing your enterprise. With this checklist, you will have a guide to help prevent initial compromise and stop attacks before they start. This checklist helps to explain how to: Address software vulnerabilities and misconfigurations Eliminate exposed ports & services Reduce the chance of attacks delivered via email Limit browser-based attacks Reduce the attack surface across Microsoft Office applications Lastly, we will share details on how Alert Logic helps organizations of all sizes get a comprehensive view of their enterprise assets, find misconfigurations and vulnerabilities, and delivers endpoint coverage with an automated quarantine response to stop malware in its tracks.
Tags : 
    
Alert Logic
Start   Previous    1 2 3 4 5 6 7     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.