saas

Results 226 - 250 of 698Sort Results By: Published Date | Title | Company Name
Published By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: BMC Software     Published Date: Jul 01, 2011
All SaaS help-desks are not created equally. From basic ticket logging to full-featured, enterprise-grade service management solutions, there truly is something for everyone. Learn more about the key factors in deciding between a comprehensive or a slimmer selection for your organization.
Tags : 
saas, help desk software, bmc, it helpdesk, helpdesk system, cloud based help desk, simple, affordable, bmc software, drive profit, reduce risk
    
BMC Software
Published By: BMC Software     Published Date: Jul 01, 2011
Help Desk software as a service is attractive to many IT departments. It offers the same benefits of traditional IT help desk solutions, in addition to reducing capital expenses, accelerating implementation, and providing easier upgrades. This paper explores considerations for implementing IT service management in-house or as a service.
Tags : 
service management, bmc software, itil, saas, help desk software, delivery model, cloud based help desk, simple, affordable, bmc, drive profit, reduce risk, paul avenant
    
BMC Software
Published By: Epicor     Published Date: Aug 03, 2012
Distribution executives can no longer afford to view their IT department as merely a cost center. In today's competitive landscape, information technology represents a strategic, cost-saving, revenue-generating differentiator.
Tags : 
saas, software as a service, service-oriented architecture, soa, web 2.0, virtualization, report cards, balanced scorecards, native language, accurate information, up-to-date information, consistent information, around the world, epicor, it management, data management, business technology, data center
    
Epicor
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Google is phasing out SHA-1, a secure hash algorithm for SSL certificates that has proven susceptible to collision attacks. But upgrading is complex. Entrust navigates you through the rapid sun-setting of SHA-1 certificates for a seamless, secure experience for your end users.
Tags : 
entrust, sha-2, chrome, security, certificate, b2b, application, browser, applications, saas, hack, web, website, sha-2, migration, implementation, ssl, business technology
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities. That’s why Entrust offers nine simple tips to improve security for SMBs and end-customers alike. From basic techniques like updating software to more advanced authentication strategies, this guide ensure your business is establishing the proper security foundation in today’s hyper-connected world.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard
Published By: BMC Control M     Published Date: Jul 22, 2009
Companies running legacy job scheduling products suffer from higher costs, inefficient use of resources, and greater IT complexity, according to independent analyst firm Enterprise Management Associates. Read their findings, and see why consolidating on a single, comprehensive workload automation solution is an easy win for IT and the business.
Tags : 
smart, modular, cost-effective, ema, enterprise management associates, it complexity, workload automation, bmc, product suite, wla, end-to-end workflow, enterprise visibility, management, service-driven management, dynamic workflow resourcing, simple, measurable, achievable, realistic, timely
    
BMC Control M
Published By: Appian     Published Date: Jun 29, 2010
In this report, Datamonitor provides a comprehensive evaluation of the burgeoning SaaS BPM market.
Tags : 
appian, saas bpm, business process management
    
Appian
Published By: PC Mall     Published Date: Jun 22, 2011
In this IBM white paper, the term cloud computing is defined, along with the distinguishing advantages and disadvantages of different types of cloud deployments.
Tags : 
cloud services, saas, public cloud, private cloud, hybrid cloud, pc mall, ibm
    
PC Mall
Published By: Mimecast     Published Date: Nov 10, 2010
The right archiving solution can simplify and strengthen your overall email management systems and processes.
Tags : 
mimecast, software as a service, saas email archiving, email management system
    
Mimecast
Published By: Mimecast     Published Date: Nov 10, 2010
Practical cost saving benefits of cloud-based email management.
Tags : 
mimecast, software as a service, saas, email spend datasheet, cloud-based email management, archiving
    
Mimecast
Published By: Mimecast     Published Date: Nov 10, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : 
mimecast, software as a service, saas, data loss prevention, risk and compliance, email, security
    
Mimecast
Published By: Mimecast     Published Date: Nov 10, 2010
Continuity and archiving services may prove more cost effective for email than high availability clustering, especially when considered in the light of continued governance, risk mitigation and compliance.
Tags : 
mimecast, software as a service, saas, email, business continuity, risk mitigation, compliance, clustering, archiving services
    
Mimecast
Published By: Mimecast     Published Date: Nov 10, 2010
Cloud-based email services can offer full protection with the promise of availability and reliability too.
Tags : 
mimecast, software as a service, saas, security, threat mitigation, cloud-based email service
    
Mimecast
Published By: Innotas     Published Date: Jun 16, 2011
How Progressive IT Organizations Are Using Cloud Solutions to Deliver On Time, On Budget, On Quota and On Target with Key Business Initiatives
Tags : 
project portfolio management, it governance, it management, ppm, it efficiency, cloud, saas, it project management
    
Innotas
Published By: Verio     Published Date: Jul 06, 2011
This whitepaper will examine today's SaaS opportunities and challenges, and will show how a hosting company, such as Verio, can help ISVs capitalize on the rapidly evolving market opportunities.
Tags : 
verio, saas, software as service, managed services, website hosting, web site hosting, website hosting services, website hosting plans, domain name registration, register domain name, domain register, hosted exchange, hosted exchange server, microsoft hosted exchange, hosted microsoft exchange
    
Verio
Published By: Ultimate Software     Published Date: Sep 14, 2012
Read this complimentary paper to discover the truth about SaaS in the cloud.
Tags : 
cloud computing, cloud technology, human resources, human capital management, cloud software delivery, saas
    
Ultimate Software
Published By: Ultimate Software     Published Date: Sep 14, 2012
These are priority questions you should move to the top of your list. Use these must-ask questions as a checklist in your research. The answers wil guide you to pick the best HCM solution for the greatest value, effectiveness, and long-term use.
Tags : 
human resources, payroll, human capital management, saas, workforce management
    
Ultimate Software
Published By: LogMeIn     Published Date: Jul 18, 2014
A Nucleus Research guidebook to LogMeIn Rescue
Tags : 
logmein rescue, rescue guidebook, saas, management tools, remote control, business technology
    
LogMeIn
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.