pto

Results 276 - 300 of 436Sort Results By: Published Date | Title | Company Name
Published By: SafeNet     Published Date: Jan 14, 2014
WAN optimization is a widely used technology that improves the efficiency of network data transmission. SafeNet Ethernet encryptors are Layer 2 (data link) appliances that secure traffic at wire speeds across wide area Ethernet services to provide protected information transmission. This paper discusses the scenario where both encryption and optimization are used across a WAN and the design considerations required.
Tags : 
wan optimization, wan, encryption, network data security, wan acceleration, safenet, security, wireless
    
SafeNet
Published By: EMC Converged Platforms     Published Date: May 05, 2016
Hear directly from VCE customers around the globe who modernized their data centers and simplified IT with the portfolio of EMC converged and hyper-converged platforms. Companies such as Fox Sports, Kimpton Hotels, and Kent State University share the stories behind a compelling transformation of their IT environments. This interactive document enables you to drill down into 17 individual company logos to unveil each customer's unique journey.
Tags : 
    
EMC Converged Platforms
Published By: EMC Converged Platforms     Published Date: Aug 19, 2016
Kimpton's success as the #1 boutique hotel company in the United States started with the implementation of the most advanced and reliable converged infrastructure system - VCE Vblock. Modernizing the data center enabled this top hotel chain to spend less time focusing on managing and supporting infrastructure, and more time serving its ecosystem. Some of the benefits Kimpton achieved since the deployment of EMC Converged Infrastructure from VCE included a 25 percent reduction in operating expenses by moving to Vblock Systems, compared with an expected savings of only 10 percent. Kimpton can also stand up virtual machines (VMs) in minutes to capitalize on business opportunities, compared to days or weeks with the old infrastructure. Watch this video to learn more about the Kimpton Hotels story.
Tags : 
    
EMC Converged Platforms
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : 
endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, security, it management, wireless, knowledge management
    
CDW-Trend Micro
Published By: TheMarketingScope     Published Date: Nov 19, 2015
In this white paper, we will provide an overview of the present state of mobility in the enterprise and identify loopholes and key areas of concern for the Public Sector.
Tags : 
byod, mobile devices, mobile workers, smartphones, mobile computing, laptops, communications, ip networks, ip telephony, network security, smart phones, wireless communications, wireless infrastructure, wireless phones, wireless security, collaboration, secure content management
    
TheMarketingScope
Published By: Rapid7     Published Date: Jul 12, 2012
In this webcast, Bernd Leger, VP of Marketing, Products & Solutions at Rapid7 and Nate Crampton, Product Manager at Rapid7 discuss the current state of how organizations are prioritizing vulnerabilities in their environments and what security professionals can do to lower their security thresholds.
Tags : 
rapid7, technology, security, it management, business technology, security management, security policies, data protection, data quality, vulnerability management
    
Rapid7
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
Previously, wireless added a useful layer of mobility to your wired infrastructure. Now, you have users who may never connect with cables. Before, laptops and desktops were the primary tools of productivity in the office. These days, smartphones, tablets and apps are essential, whether users are on the move or at their desks.
Tags : 
device, iot, vlans, unified access, applications, analytics, healthcare
    
Alcatel Lucent Enterprise
Published By: Druva     Published Date: Jan 06, 2016
How to Include Macs in Your Laptop Backup and Data Protection Plans
Tags : 
druva, mac, mac backup, security, protection, enterprise applications
    
Druva
Published By: WebEx     Published Date: Apr 02, 2009
This white paper presents a simple two-step process to kicking the NetMeeting habit: 1. Admitting there is a problem by recognizing the symptoms. 2. Creating a recovery plan by finding new applications and implementing a new solution.
Tags : 
webex, web conferencing, netmeeting, firewalls, apis, asp, live meeting, itu-t t.120 data conferencing, mcu, network address translation devices, nats, public switched telephony network, pstn, crm, roi, it support costs, web communications, full-time employee, fte, enterprise print management solutions
    
WebEx
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak, laptop, environment, data loss, data protection, data management, data leak prevention, dlp, agent-based technology, remote computing, leakproof, monitoring, enforcement
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.
Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing, bpo, ciso, attack, threats, personally-identifiable information, pii, trojan, virus, proprietary security mechanisms, crypto libraries, security assertion markup language, saml
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Datacastle     Published Date: Jul 09, 2010
How to address business continuity, information security, policy enforcement, and regulatory compliance challenges for your laptop users.
Tags : 
datacastle, business resiliency planning, mobile workforce, business continuity, information security, policy enforcement, regulatory compliance, backup and data protection, regulatory compliance, backup and recovery, compliance, mobile workers
    
Datacastle
Published By: Datacastle     Published Date: Jul 09, 2010
Learn how to protect laptop data from loss or theft, and save on storage and IT resources with this best practices guide.
Tags : 
datacastle, encrypting laptop data, storage, mobile workforce, data protection, security, storage management, encryption, security management, mobile workers
    
Datacastle
Published By: Webroot     Published Date: Sep 18, 2013
Webroot conducted research on web security in the US and the UK. As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate network or other corporate online resource via their laptops, tablets or smartphones. 90% of companies agree that managing the security of remote users is extremely challenging Twice as many companies with remote users reported Web-borne attacks by criminals, which compromised the security of customer data 50% of firms with remote users say web-borne attacks impacted company financials
Tags : 
security, remote users, cybercrime, web attacks, malware, phishing, mobile browser security, mobile device
    
Webroot
Published By: Aria Systems     Published Date: Jan 27, 2015
This first-of-its-kind e-book on Recurring Revenue Innovators showcases 29 real-world examples of smart businesses that have boldly exploited recurring revenue business models to expand markets, boost sales, and reap greater profits. These daring recurring revenue innovators, many in the Fortune 1000, offer inspiring case studies on how to use recurring revenue models in new, innovative, and impactful ways. These cutting-edge companies are using recurring revenue to disrupt their markets or carve out new ones. You will find familiar names like Amazon, United Airlines and ESPN, under-the-radar surprises like Ingersoll Rands Nexia home automation service and Philips Community Without Walls, unexpected upstarts like BarkBox and Entitle, and market disruptors like Stitch Fix and Blue Apron.
Tags : 
recurring revenue innovation, smart businesses, revenue business models, expand markets, boost sales, profits, automation service, it management, enterprise applications
    
Aria Systems
Published By: nettime solutions     Published Date: Mar 04, 2014
This whitepaper covers the best practices, methods and standards for time off accruals that are affecting PTO policies and will explain how a customizable, automated time and attendance platform can provide workforce analytics and labor management solutions.
Tags : 
nettime solutions, accruals, improving time, time off accruals, enhance pto policies, pto policies, automated time, attendance platform, stratustime, workforce analytics, labor management, management solutions, pto banks, flexibility, privacy, traditional pto, bank-type pto, monitoring, business process automation, quality assurance
    
nettime solutions
Published By: nettime solutions     Published Date: Mar 04, 2014
This webinar covers the best practices, methods and standards for time off accruals that are enhancing PTO policies nationwide, while showing you how a customizable automated time and attendance platform can provide workforce analytics and labor management solutions all from your web-browser.
Tags : 
nettime solutions, accruals, improving time, time off accruals, enhance pto policies, pto policies, automated time, attendance platform, stratustime, workforce analytics, labor management, management solutions, pto banks, flexibility, privacy, traditional pto, bank-type pto, business intelligence, business process automation, productivity
    
nettime solutions
Published By: Dropbox for Business     Published Date: Jun 09, 2014
Not so long ago, the office was the only place you could work. But when smartphones and tablets came along, the only thing holding us back from getting work done anywhere, any time was having access to our data. That led to the creation of a whole new class of solutions designed to keep files current across our rapidly proliferating fleets of devices through a technology known as sync. All of a sudden, getting a file from your work laptop to your iPad became as simple as clicking Save. So its no surprise that 55% of information workers in North America and Europe who use a tablet at work are using file sync and share tools.
Tags : 
dropbox, file sync, data, technology, sync, data management, data center
    
Dropbox for Business
Published By: Box     Published Date: Nov 09, 2014
Box recommends this report for any growing business or company considering an investment in enterprise content collaboration and cloud file sharing. Both let users access important content simply and securely, on any device: desktop, laptop, phone or tablet.
Tags : 
box, file sharing, content sharing, mobile workers, collaboration, cloud file sharing, network architecture, remote access, mobile computing, smart phones, wireless communications, microsoft exchange, content delivery, secure content management, content management, cloud computing, infrastructure
    
Box
Published By: Box     Published Date: Nov 09, 2014
Box recommends this report for any growing business or company considering an investment in enterprise content collaboration and cloud file sharing. Both let users access important content simply and securely, on any device: desktop, laptop, phone or tablet.
Tags : 
box, file sharing, ecm, enterprise content management, cloud file sharing, collaboration, mobile workers, backup and recovery, email security, mobile data systems, smart phones, wireless security, it spending, total cost of ownership, microsoft exchange, windows, data protection, secure content management, cloud computing
    
Box
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of todays mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any devicemobile or laptopat any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.