enterprise solutions

Results 626 - 650 of 707Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Mar 18, 2014
Customer relationship management (CRM) deployments are most effective when they legitimately support all three words that make up the acronym itself. Customers of the modern business-to-business (B2B) enterprise benefit when they purchase goods and services from companies who are focused on the buyer’s experience. Internal relationships within the selling organization are more effectively maintained when all customer-facing stakeholders have access to the rich data contained in a well-maintained CRM. And the management of the enterprise providing solutions can run their business like a finely-tuned machine when the maximum levels of visibility into customers and accounts are clear and accurate. This Research Brief combines research from a number of Aberdeen Sales Effectiveness research data sets, to create a holistic view of the most effectively deployed CRM systems.
Tags : 
oracle, customer relationship management, crm, b2b, internal relationships, sales effectiveness, sales teams, sales strategy
    
Oracle
Published By: Blue Jeans Network     Published Date: Jul 21, 2014
Over the past two decades, the conferencing and collaboration industry has introduced a series of enterprise communications offerings that address these challenges by enabling voice, video, and data collaboration at a distance – saving customers time and money, fostering team collaboration, and improving employee work-life balance. More recently, video conferencing and collaboration solutions have moved to the "cloud," giving customers cost effective, scalable, and more flexible purchasing options to meet their expanding communications needs. Download to learn more!
Tags : 
video collaboration, conferencing, data collaboration, video conferencing, flexible purchasing options, cloud, enterprise applications, data center
    
Blue Jeans Network
Published By: GeoTrust     Published Date: Aug 09, 2013
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : 
web security, web threats, ssl, secure sockets layer, technology, solution, security, business technology
    
GeoTrust
Published By: GeoTrust     Published Date: Oct 06, 2014
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : 
cloud provider, cloud computing, economic benefits, safeguard information assets, ssl, confidence
    
GeoTrust
Published By: Symantec     Published Date: Oct 12, 2012
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions.
Tags : 
ssl certificates, cloud hosting, cloud services, encryption, authentication, certificate validation, secure sockets layer, it security
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Advances in attacks on network security over the last few years have led to many high-profile compromises of enterprise networks and breaches of data security. A new attack is threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. Solutions are available, and they will require action by company officers and administrators. “SSLStrip” and related attacks were among the highlights of the July 2009 Black Hat show in Las Vegas. Researcher Moxie Marlinspike combined a number of discrete problems, not all related to SSL, to create a credible scenario in which users attempting to work with secure websites were instead sent to malicious fake sites.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: AlienVault     Published Date: Mar 30, 2016
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than their larger enterprise counterparts, yet they face the same threats from attackers. Fortunately, there are solutions. This whitepaper by SANS instructor Jake Williams walks through an example of a typical breach in an education organization, highlighting common ways attackers gain access to a network and practical steps to reduce risk. Download this whitepaper to learn: • Common security gaps that make educational institutions vulnerable to attack • Practical security controls that won't break the bank • Key questions to evaluate security vendors • A checklist summarizing steps you should take now to improve security
Tags : 
    
AlienVault
Published By: Pega     Published Date: Mar 25, 2016
The digital service revolution is well underway. For communications service providers (CSPs), it means going beyond traditional voice and data and upgrading their entire digital communications infrastructure. Research shows enterprise-class organizations are allocating heavy dollars towards communications solutions and prefer a single provider for digital services. This is a massive opportunity for CSPs to expand their services, generate more revenue, grow profit and increase market share. However, the majority of enterprises reported not receiving a consistently excellent experience with their most recent service contract. As a result, many switch to new providers. CSPs are losing credibility and the loyalty of their customers because of legacy and traditional systems that constrain their ability to act quickly. Enterprises are looking for CSPs who understand their complex business and can offer a full portfolio of digital services with quality and creativity to meet their needs. Dow
Tags : 
    
Pega
Published By: Aventail     Published Date: Aug 21, 2009
NAC is a multifaceted framework to thoroughly control who and what gets access to network resources, and help keep malware from entering the enterprise. Today, there are huge challenges to implementing as-yet immature NAC solutions on an enterprise-wide basis, including convoluted integration requirements, inadequate inspection capabilities, and weak policy management.
Tags : 
vpn, access control, security management, ssl, network access control, nac, policy management, security policies
    
Aventail
Published By: IBM     Published Date: Mar 11, 2008
This document introduces the reader to the concept of Enterprise Portals as a means of conducting business on the Internet. We continue on to a discussion of the value of using Enterprise Portals, combined with Service Oriented Architecture (SOA) methods, to tie existing processes and applications together to support the Enterprise.
Tags : 
ibm, corporate portal, portal, portals, soa, ebusiness, ep campaign
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
Today’s increasingly complex environments are a challenge to manage. This white paper will show you how IBM Service Management solutions from Tivoli can help you better understand your IT and operation environments and manage your business more efficiently—all while controlling costs and mitigating compliance risks. You’ll also discover how IBM Maximo Enterprise Asset Management solutions provide a single software platform for managing all IT and operations assets across your enterprise.
Tags : 
ibm, ibm mi, ibm grm, service management, tivoli, business management, maximo, it management
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
The goal of having one enterprise resource planning (ERP) solution for all business processes remains popular. However, there are still many misconceptions associated with using enterprise resource planning solutions in asset-intensive industries. This white paper discusses and demystifies the myths for decision makers in asset-intensive industries. You’ll also see how IBM Maximo Asset Management can enhance the quality of asset data, contribute to the safety of the workforce, and help facilitate best practices that significantly impact the long-term success of your business.
Tags : 
erp, asset management, best practices, bpm, business process, ibm mi, ibm, ibm grm
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
Many enterprises depend heavily on business services to generate revenue. But they often have trouble correlating availability and performance information from individual systems with the business as a whole. To do this, you need a clear view of your service infrastructure. Integrated availability and performance solutions can provide the visibility, control, and automation that your IT environment needs.
Tags : 
ibm, ibm mi, ibm grm, service management, it management
    
IBM
Published By: IBM     Published Date: Dec 03, 2008
Small and mid-sized businesses are dealing with larger volumes of data than ever before, but without the big enterprise budgets. What they need are budget-stretching solutions that reduce the complexities of data storage while being easy to use.
Tags : 
ibm, express seller, storage solutions, modular systems, ibm express advantage, ibm system storage, storage
    
IBM
Published By: IDFocus     Published Date: Aug 21, 2009
This whitepaper describes our unique approach and methodology for delivering an enterprise-wide Identity and Access Management solution. Our methodology, IDMology, offers pre-defined solutions to repeatable problems occurring during the lifecycle of an Identity Management project.
Tags : 
identity management, access management, iam, identity and access maangement, idmology, idfocus, project management, project lifecycle management
    
IDFocus
Published By: Meru Networks     Published Date: Aug 21, 2009
Pervasive wireless LAN deployments require much larger, broader deployment of Wi-Fi access points than hot spots, cafes or isolated guest access in the enterprise. Clearly new solutions and deployment methodologies should be considered to make pervasive wireless LAN deployments feasible and economical.
Tags : 
wlan, wireless lan, wifi, wi-fi, wlan deployment, pervasive wlan, ubiquitous wlan, microcells
    
Meru Networks
Published By: PKWARE     Published Date: Aug 21, 2009
The Butler Group provides a technology audit on PKWARE's SecureZIP cross-platform data file security software.
Tags : 
data security, security audit, auditing, compression, data compression, zip file, zip, compress
    
PKWARE
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn about the key challenges of PCI DSS v1.1 and how NetIQ Security Management, Configuration Control and Enterprise Administration solutions can help you demonstrate PCI compliance.
Tags : 
pci, pci dss, compliance, credit card, payment card, pci compliance, customer privacy, privacy
    
NetIQ Corporation
Published By: Neterion     Published Date: Dec 05, 2006
The relentless growth of data and network-intensive applications such as digital imaging, multimedia content, and broadcast/video continues to drive volumes of enterprise data and network traffic. As growth continues, IT managers are challenged with implementing solutions without interrupting critical business processes.
Tags : 
network infrastructure, traffic management, bandwidth management, bandwidth, network management, neterion, networking
    
Neterion
Published By: XLink Technology Inc.     Published Date: Jan 15, 2007
XLink ClusterReplica Enterprise software, based on CDP technology, combines conventional High Availability solutions and Microsoft DPM-like functions to create the next generation of business continuity software. ClusterReplica ENT offers real-time data replication and auto failover for MSSQL, IIS Web Server and File Servers.
Tags : 
servers, data protection, windows server, high availability, data replication, disaster recovery, business continuity, xlink
    
XLink Technology Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
CCU sought to encrypt its backup tapes for keeping customer data secure in transit and in storage at the offsite tape-vault vendor’s facility. As a financial institution, CCU was subject to stringent government regulations. With nearly 60 gigabytes of data to encrypt each night, CCU knew that a software solution was out of the question.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Given Payformance’s longstanding commitment to protecting the privacy of its clients’ information, the company has decided to investigate data encryption solutions for its primary hard drive storage and secondary backup tape storage. With its multi-vendor interoperability, NeoScale’s CryptoStor storage security appliances emerge as the obvious choice.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Qsent needed to shore up its disaster recovery strategy. This meant sending backup tapes – each with more than 2.5 terabytes of data – between data centers and storing them offsite. To keep all its data safe and secure, Qsent chose NeoScale’s CryptoStor wire-speed tape security appliance to encrypt and decrypt data.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.