bsp

Results 201 - 225 of 412Sort Results By: Published Date | Title | Company Name
Published By: LockLizard     Published Date: Dec 08, 2008
This white paper describes the differences between information, IPR and trade secrets, and where these might apply. 
Tags : 
ipr/drm protection, locklizard, drm controls, digital rights management, security
    
LockLizard
Published By: LockLizard     Published Date: Dec 08, 2008
This paper covers the development of PDF security from simple password protection mechanisms to access controls and DRM.  It discusses lifecycle management, PKI and digital certificates, PDF password security, PDF encryption, PDF DRM, Adobe livecycle / policy server, PDF control, and third party systems and standards for protecting PDF files. Normal 0 false false false EN-US X-NONE X-NONE
Tags : 
pdf security, pdf passwords, pdf drm, adobe pdf security, security
    
LockLizard
Published By: LockLizard     Published Date: Dec 08, 2008
This paper explains what components make up a document security solution and which one is right for you.  It covers the use of encryption, copy protection, digital rights management and document collaboration as the methods available to protect information.
Tags : 
locklizard, document security, encryption, copy protection, digital rights management, document collaboration, security
    
LockLizard
Published By: Stratus Technologies     Published Date: Dec 03, 2008
"Virtualization can be like putting all your eggs in one basket.  Ensure you have a resilient basket…"
Tags : 
stratus technologies, virtualization, application server, enterprise applications
    
Stratus Technologies
Published By: YouSendIt     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality
    
YouSendIt, Inc.
Published By: Microsoft Office     Published Date: Nov 24, 2008
To address the needs of customers as well as emerging workplace trends,  Microsoft focused the design of Microsoft Office Professional Plus 2007 around four key goals. They are: working more efficiently with better results, collaborating with others across boundaries, making better use of information, and streamlining processes and controlling content. These goals correspond to long-term investment areas that Microsoft began with Microsoft Office 2003 and continues to focus on today.
Tags : 
microsoft office outlook® 2007, microsoft office infopath® 2007, microsoft office open xml formats, microsoft office excel® 2007, enterprise applications
    
Microsoft Office
Published By: Customer Chemistry     Published Date: Nov 21, 2008
Many businesses believe they only have two choices when it comes to marketing -- establish an internal department or contract specific services with a full-service marketing agency. There is a third option worth exploring.  Strategic outsource marketing provides the commitment of an internal resource and the capabilities of a full-service agency without the operating costs of either.
Tags : 
clarity quest marketing, strategic outsource marketing, outsource marketing, outsourcing services
    
Customer Chemistry
Published By: YouSendIt     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery
    
YouSendIt, Inc.
Published By: Oco, Inc.     Published Date: Nov 12, 2008
Many companies have business intelligence (BI) tools and infrastructure that serve their business’ needs; however, certain functional departments, business units, or key business initiatives often don’t yet have the BI tools that they need in place.  There is a new approach to BI to address those pressing business needs that leverages the existing BI infrastructure and can deliver value to the business in weeks rather than months and at a fraction of the cost of a traditional BI solution. Learn how Complementary BI leverages Software-as-a-Service (SaaS) BI solutions to address targeted business needs in a way that complements in-house BI systems, leading to a win-win situation for business users and IT analytical tools to business users.
Tags : 
oco, business intelligence, software-as-a-service, roi, enterprise applications
    
Oco, Inc.
Published By: FITIRI     Published Date: Nov 11, 2008
Traditionally data accusation in plants has been done using paper log sheets and manual spreadsheets, which focuses more on documentation.  As a result, the exercise of taking plant readings has become routine, to the point where the true benefit of the exercise is lost.  Technology and software now gives us the ability to automate data collection and manipulation for increased efficiency.
Tags : 
fitiri, wireless solutions, ammonia plants, improve safety, process plants operations, wireless
    
FITIRI
Published By: IBM     Published Date: Nov 07, 2008
As business conditions force companies to become more and more flexible, service oriented architecture (SOA) provides a scalable, reliable way to connect with, interact with, and deliver information. This brochure shows how you can be a superhero by making WebSphere MQ the messaging backbone for your SOA, creating a common connection for the free flow of information.
Tags : 
ibm, ebf, soa, websphere
    
IBM
Published By: Godfrey     Published Date: Oct 24, 2008
 Recently, however, the explosive growth of online media has changed the PR game, creating a deeper, richer two-way communication between a marketer and its target audiences. Now, marketers can use social media strategies and tactics to engage their audiences directly. Those tactics include press release optimization, online media monitoring and reporting, social media press releases, RSS feeds, blogs, podcasts, webcasts and a host of other emerging technologies.
Tags : 
godfrey, b-to-b search, search, search engine optimization, seo, search engine marketing, sem, keywords
    
Godfrey
Published By: HP - Enterprise     Published Date: Oct 23, 2008
Fortify's report summarizes electronic as well as traditional methods of voting including absentee ballots.  This voting guide will provide recommendations for voters who want to make sure their vote counts and for federal and state governments on how to devise efficient and accurate voting processes and systems.
Tags : 
fortify, application security, security risks, voting, fortify, fortify software, election process, local government
    
HP - Enterprise
Published By: Waymedia     Published Date: Oct 23, 2008
Millions of  handsets are sold around the world daily. Handsets are by far the preferred platform of communication there is.  People spend more time using their mobile phones than any other device or gadget, and they pay special attention to everything stored in those handsets. In a few words:  If brands want to have a presence in their consumers’ environment, and if they want their message to be heard and seen, then they imperatively need to put some value content on users mobile phones. Mobile marketing is typically understood as SMS Marketing, which is managed from a distant point and it impacts the user at random times.
Tags : 
waymedia, mobile marketing, sms
    
Waymedia
Published By: Sterling Commerce     Published Date: Oct 22, 2008
Rationalize, consolidate and integrate is the new mantra of today's financial services organizations. This playbook provides process and technology moves to help you transforms your data transmission. 
Tags : 
sterling commerce, soa, sla, data transmission, enterprise applications, data management
    
Sterling Commerce
Published By: Dell     Published Date: Oct 21, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4   This business-value discussion tool is designed to help quantify costs and benefits with Windows Vista.
Tags : 
dell, deployment, calculator, knowledge management, enterprise applications, data management
    
Dell
Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Oct 16, 2008
Is open source secure? How much business risk is introduced with it?  Fortify surveyed the open source community for an answer and revealed that open source projects lack the three essential elements of security:  people, process and technology.  Read this research to discover what actions can reduce these risks within your organization.
Tags : 
fortify, open source, business risk, security, application security, audit, risk, vulnerabilities
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Oct 16, 2008
The hacking community has shifted its effort toward a new frontier:  the application layer.  How are companies responding?  Business Software Assurance – the capability to address the problem of application risk within an enterprise.  This whitepaper provides an overview of the severity of the problem along with everything needed to develop Business Software Assurance in your organization. 
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise
Published By: MessageLabs     Published Date: Oct 15, 2008
Failure to strategically manage email can be costly for any businesses. Learn about the risks of poor email management, and how to implement a comprehensive, best practices-based email retention policy.  Enforce your policy by implementing MessageLabs Managed Email Archiving Service to minimize email risks and maximize compliance with organizational, legal, and regulatory rules.  
Tags : 
messagelabs, email retention, archiving, risk, compliance, knowledge management, data management
    
MessageLabs
Published By: SECNAP Network Security Corporation     Published Date: Oct 07, 2008
Politics, Religion and Economics exert enormous influence on decision-making and the integrity of IT programs—and often result in sub-par decisions that open the door to malicious intrusion or attack.  Michael Scheidell and his talented technical team know how difficult it can be to create positive change in an organization, even when obvious vulnerabilities exist.  When it comes to navigating the executive suite and undocumented layers of the OSI model, the staff at SECNAP® Network Security have the experience to assist IT management in developing effective strategies to successfully drive security improvements.   Download This Paper Now…
Tags : 
secnap, network security, data security, compliance, osi, malware, antispam, anti-spam
    
SECNAP Network Security Corporation
Published By: Orchid Technologies Engineering & Consulting     Published Date: Oct 07, 2008
As electronic product designs age, component parts become increasingly difficult to obtain.  Component buyers may experience difficulty in obtaining key parts within the design.  Component part prices may increase.  A point comes when component parts begin going end-of-life at an alarming rate.  Quick fixes are no longer sufficient.  Sometimes an OEM will procure a 'life-time' supply of problem parts – but this supply can be quickly wiped out should unforeseen demand develop.  Lack of component parts puts an end to production.There is an alternative.  Profitable, old products can be redesigned.  Either preserving the original form fit and function, or adding new features. Product redesign is a cost effective means by which to extend the life of a marketable product.
Tags : 
orchid technologies, texas instruments, original equipment manufacturers, (oem’s), software development, it management, storage
    
Orchid Technologies Engineering & Consulting
Published By: Gold Lasso     Published Date: Oct 02, 2008
Integrating Email Campaigns with New and Existing Mediums.  This white paper is a review of the "why's" and "how's" of email integration with other marketing mediums.
Tags : 
goldlasso, social network, myspace, facebook, linkedin, blogs, advertising
    
Gold Lasso
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.