share solutions

Results 1 - 25 of 60Sort Results By: Published Date | Title | Company Name
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
risk reduction, flexibility, mobility, data security, agility
    
Citrix ShareFile
Published By: Akamai Technologies     Published Date: May 05, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing website infrastructure or within a data center with security measures in the cloud for a more robust security posture. We share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, data, akamai
    
Akamai Technologies
Published By: Delphix     Published Date: May 03, 2016
Today's test data management (TDM) solutions force teams to work with compromised data sets, and push testing to too late in the software development lifecycle. The end result is rework, delayed releases, and costly bugs that cripple production systems. Furthermore, prevailing approaches to test data management - including subsetting, synthetic data, shared environments, and standalone masking--represent flawed solutions that fail across one or more key dimensions.
Tags : 
    
Delphix
Published By: Akamai Technologies     Published Date: Aug 17, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing infrastructure within the data center with security measures in the cloud for a more robust web security posture. We also share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, buyer's guide, data safety, cybersecurity
    
Akamai Technologies
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL – such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps – are commonplace. Even email applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps. It’s clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need the ability to preserve complete network and web histories from encrypted network and web traffic for compliance, regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
Tags : 
blue coat, ssl, ssl visibility
    
Blue Coat Systems
Published By: MobileIron     Published Date: Aug 04, 2016
Office 365 est la suite de productivité cloud de Microsoft. Elle comprend une version en ligne des solutions les plus connues de Microsoft, comme Exchange et SharePoint, un espace de stockage avec OneDrive et plusieurs applications mobiles, dont Word, Excel, PowerPoint, OneNote, Outlook, Publisher, Skype for Business et Yammer. Office 365 est au coeur de la stratégie d'évolution de Microsoft qui tend à devenir un fournisseur de solutions et de logiciels axés sur le mobile et le cloud. De nombreux clients MobileIron organisent également leur stratégie de productivité autour de cette suite en raison de l'utilisation croissante d'Office sur les appareils mobiles plutôt que sur les ordinateurs traditionnels. Dans ce contexte, ils exigent de pouvoir sécuriser et déployer Office 365 sur les appareils mobiles avec nos solutions.
Tags : 
mobile apps, best practices, mobileiron, phones
    
MobileIron
Published By: JBoss Developer     Published Date: Jan 25, 2016
The ability to integrate systems and share data across the enterprise is a common datacenter need. The needs of an integration bus, the technology used for middleware-based integration, can varyin complexity, data volume, and required performance. Both Red Hat and MuleSoft offer multiple products that can help customers develop and deploy middleware integration solutions. This competitive overview compares Red Hat® JBoss® Fuse to Mule ESB Enterprise.
Tags : 
red hat jboss fuse, middleware-based integrations, data volume, integration performance, soa, integration solutions, open source licensing, it management
    
JBoss Developer
Published By: CA Technologies     Published Date: Aug 22, 2017
APIs are an emerging technology for integrating applications using web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. While it is true that APIs share many of the same threats that plague the web, they are fundamentally differently and have an entirely unique risk profile that you need to manage. This eBooklet provides an overview of these new risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
    
CA Technologies
Published By: HP - Enterprise     Published Date: Jun 04, 2013
HP Business Services Management (BSM), which includes HP Network Management Center, HP Systems Management, and HP Application Performance Management, is a comprehensive performance management solution designed to enable IT organizations to manage a diversity of in-house and cloud based services at a lower cost to the business. HP commissioned Dimensional Research to interview customers who have deployed HP BSM solutions to obtain detailed feedback on the real world benefits provided by these solutions. Dimensional Research conducted 26 in-depth interviews with HP customers as well as researched documented case studies. This report summarizes those findings.
Tags : 
business service, management solutions, bsm, business services management, network management, systems management, business technology
    
HP - Enterprise
Published By: NetApp     Published Date: Sep 24, 2013
"The performance, availability, and data protection associated with tier-1 applications were easy to meet when one application mapped to one server and a dedicated storage system. But to carry these features into a virtual world with pooled, shared storage systems and unpredictable workloads creates new demands. In order to reach an agile state in your business, access this white paper now to gain insight into innovative solutions catered to these new challenging demands."
Tags : 
performance, availability, data protection, storage systems, virtualization, innovative solutions, technology, netapp
    
NetApp
Published By: Intralinks     Published Date: Nov 23, 2015
This report focuses on the use of CFSS tools in the workplace, the problems that their use causes, and it offers several recommendations as well as data from an in-depth survey on file-sharing practices conducted by Osterman Research during July 2015.
Tags : 
osterman, enterprise, file sync, share solutions, file-share, cfss, efss, networking
    
Intralinks
Published By: Intralinks     Published Date: Oct 14, 2015
This report focuses on the use of CFSS tools in the workplace, the problems that their use causes, and it offers several recommendations as well as data from an in-depth survey on file-sharing practices conducted by Osterman Research during July 2015.
Tags : 
osterman, enterprise, file sync, share solutions, file-share, cfss, efss, networking
    
Intralinks
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
mobile device, flexibility, risk reduction, data security, agility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jun 12, 2017
Some of the biggest challenges IT teams face today stem from data loss and security risks arising from the unauthorized use of personal file sharing services by employees for business purposes. Personal file sharing services invite data leakage and compliance violations by allowing files being shared to escape beyond the visibility and control of IT. At the same time, these services meet the essential need of today’s mobile workforce to be able to access and share data wherever people work. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Tags : 
data loss, security, file sharing, mobile workforce
    
Citrix ShareFile
Published By: Dassault Systemes     Published Date: Jul 21, 2017
Product Lifecycle Management (PLM) software can help your company keep up with the increasing complexity of developing today’s high-tech products. While smaller companies may use relatively simple Product Data Management (PDM) tools, larger companies rely on full-featured PLM systems that help automate processes and share data across global supply chains. Mid-size companies can feel stuck because PDM is too basic, but PLM feels out of reach. This resource will help you: • Recognize why “simple” solutions fall short and do not support your capabilities • Better connect to customers and the supply chain • Drive higher product development speed • Get started with the right PLM solution Midsize manufacturers need a system that quickly delivers the core capabilities they need to streamline product development but also gives them room to grow value over time. So, what’s the right size PLM to fit a midsized high-tech company? Download this resource and take a look.
Tags : 
product solutions, lifecycle management, tech products, data management tools, pdm, plm, process automation, product development speed
    
Dassault Systemes
Published By: NAVEX Global     Published Date: Jul 02, 2015
In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions now business can afford to overlook when evaluating and selecting vendor risk management solutions.
Tags : 
diligence systems, risk management solutions, integrated due diligence, compliance
    
NAVEX Global
Published By: K2     Published Date: Aug 24, 2015
Microsoft SharePoint 2013 workflows are a powerful way to share information, collaborate on projects and automate business processes. However, in addition to the basic workflow capabilities that come with SharePoint, organizations also need sophisticated, reliable SharePoint workflow apps with advanced capabilities. Since custom code can be expensive and time-consuming, and customization options are limited in cloud-hosted SharePoint environments, third-party applications make it possible to build advanced SharePoint workflow applications without dealing with the challenges of custom code. To help you evaluate third-party workflow solutions, here are 10 tips to consider.
Tags : 
    
K2
Published By: K2     Published Date: Oct 08, 2015
Read more to learn why the K2 AppIt for SharePoint outperforms other solutions.
Tags : 
    
K2
Published By: K2     Published Date: Oct 08, 2015
Why read this paper? If you have been involved in or are looking to start building workflow-based apps in SharePoint and want to be aware of the challenges and find solutions, this paper will help you.
Tags : 
    
K2
Published By: K2     Published Date: Oct 08, 2015
The tips provided here can help you determine what is most important for your SharePoint environment so that you can select the best third-party solution to suit your needs.
Tags : 
    
K2
Published By: IBM     Published Date: Nov 10, 2016
Today’s Digital Business needs a strategy for business content – one that spans the creation, capture, activation and analysis of it – which assures security, compliance with regulations, and minimizes risk. This session will confront content chaos and its impact on business agility. We will share stories from IBM customers who are using business content solutions to deliver on the promise of the Digital Business today. Many are using ECM Centers of Competency to bring together all stakeholders in the business to create a unified vision for information management across all departments and all forms of data and content, whether on-premises, mobile, or in the cloud.
Tags : 
ibm, analytics, ecm, digital business, enterprise applications, business technology
    
IBM
Published By: K2     Published Date: Apr 01, 2016
Microsoft SharePoint 2013 workflows are a powerful way to share information, collaborate on projects and automate business processes. However, in addition to the basic workflow capabilities that come with SharePoint, organizations also need sophisticated, reliable SharePoint workflow apps with advanced capabilities. Since custom code can be expensive and time-consuming, and customization options are limited in cloud hosted SharePoint environments, third-party applications make it possible to build advanced SharePoint workflow applications without dealing with the challenges of custom code. To help you evaluate third-party workflow solutions, here are 10 tips to consider.
Tags : 
sharepoint, microsoft, workflow, it management
    
K2
Published By: NAVEX Global     Published Date: Mar 18, 2015
In this whitepaper, industry expert Michael Volkov, CEO of The Volkov Law Group, LLC, shares key questions no business can afford to overlook when evaluating and selecting vendor risk management solutions.
Tags : 
    
NAVEX Global
Published By: Lenovo     Published Date: Sep 16, 2014
Virtual Desktop Infrastructure (VDI) works best for smaller centrally located user bases that share a core set of applications and file needs. As the world moves to the web and to the cloud, agencies are asking whether VDI is still a good fit for emerging mobility and BYOD needs. See this important infographic to learn more about the tradeoffs between VDI and emerging cloud technologies, and what you can do to take advantage of new solutions to drive improved mobile productivity across your entire organization.
Tags : 
vid, cloud alternatives, emerging mobility, mobile productivity, it management
    
Lenovo
Published By: Actiance, Inc.     Published Date: Jan 15, 2015
But what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA for use of these networks. Adopting new technologies that allow employees to share information and exchange ideas with each other and with your customers is often the best way to achieve better business results, but doing so can involve considerable risk. That’s because the content people create using these technologies is subject to the scrutiny of regulators, legislators, and litigators. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Pharmaceuticals companies must be knowledgeable of, and abide by, specific information retention regulations in every country where they do business, including those countries that prohibit data from leaving the countries’ borders. Not having technology in place to help manage these requirements and increasing risks, or
Tags : 
collaboration, social media risk and reward, retention regulations, data, business requirements, it management, enterprise applications
    
Actiance, Inc.
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.