rights

Results 1 - 25 of 94Sort Results By: Published Date | Title | Company Name
By: Juniper Networks     Published Date: Mar 27, 2018
These guidelines explain how participating companies may use Forrester Wave™ research in their sales, marketing, and/or promotional materials. Please note that, in accordance with Forrester’s Citation Policy, a company must either be a current Forrester subscriber or have purchased reprint rights to the evaluation in order to cite from the evaluation or use the Forrester Wave findings in any of its material.
Tags : 
     Juniper Networks
By: Carbonite     Published Date: Jul 18, 2018
© 2018 Carbonite, Inc. All rights reserved. Case study Diamond Foods’ Diamond of California® nuts are household staples for shoppers across the U.S. But constantly filling grocery store shelves with snacks requires intricate supply chain management that relies on critical business data, including complex spreadsheets and enterprise resource planning files, to keep production and deliveries on schedule. “If our critical servers go down or we lose important data on employee laptops, it has a direct impact on our bottom line,” says Kentrell Davis, Senior Client Support Services Analyst at Diamond Foods.
Tags : 
     Carbonite
By: Infosys     Published Date: May 30, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : internal, applications, data, hacks, privacy, enterprises
     Infosys
By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
     Limelight Networks
By: SAP Ariba     Published Date: Oct 11, 2018
Last week, SAP Ariba held a human trafficking roundtable event at its SAP Hudson Yards New York City offices. The roundtable focused on the United Nations Global Compact that adopted 17 sustainable development goals for its 2030 agenda two years ago. While most individuals and businesses believe slavery was abolished years ago, there are currently over 40 million forced laborers worldwide. The United Nations Global Compact initiative is assisting in highlighting the problem of modern slavery, forced labor, and noncompliance with human rights. And this initiative lines up quite well with procurement and global supply chains.
Tags : 
     SAP Ariba
By: Netsuite DWASF Leads Display Q1 2015     Published Date: Jun 10, 2015
The majority of enterprise software is now consumed via SaaS or cloud deployments. Despite a perception of simplicity in software acquisition, many cloud contracts require all the rigor and due diligence of contracts for on-premises licensed software. The Enterprise Cloud Buyer's Bill of Rights provides a tool for clients and vendors to change the tenor of contract negotiations from user subservience to an equal and collaborative long-term partnership.
Tags : business management software, cloud erp, erp, business software, accounting software, business accounting software, cloud financials, small business software, enterprise software, saas, cloud, integrated software solutions, cloud computing, business software solutions, integration platform, business growth, international expansion, integrated platform, business management suite
     Netsuite DWASF Leads Display Q1 2015
By: CloudHealth by VMware     Published Date: Apr 15, 2019
While cost is often cited as the reason why people move to the cloud, it's not always that simple. Many organisations have noticed cloud bills 2-3x higher than expectations, when not managed properly. Have you achieved the savings you expected? Learn 10 ways you can reduce your spend in AWS, including: Terminate Zombie Assets Rightsize EC2 Instances & EBS Volumes Upgrade instances to the latest generation Delete Disassociated Elastic IP Addresses Check out this eBook to find out how you can better manage your costs through pro-tips from cloud experts.
Tags : 
     CloudHealth by VMware
By: CloudHealth by VMware     Published Date: Apr 15, 2019
Choosing Azure revolutionises your environment's agility, simplicity, and innovation, but have you achieved the cost savings you expected? Discover 10 ways you can reduce your spend in Azure, including: Terminate Zombie Assets Delete Aged Snapshots Rightsize Virtual Machines Rightsize SQL Databases Read 10 Best practices for Reducing Spend in Azure, to learn key strategies for optimising cloud spend and saving 10-20?% on your monthly Azure costs.
Tags : 
     CloudHealth by VMware
By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
     Limelight
By: Limelight     Published Date: Feb 16, 2018
DDoS attacks have long been known as the main form of cyber attack risk. “The Financial Inspection Manual” revised by the Japanese government’s Financial Services Agency in April 2015, identifies the risk of "DDoS attacks", and the need to take countermeasures is strongly emphasized. Other government agencies also acknowledge the frequency and severity of DDoS attacks. However, a clear method to completely prevent DDoS attacks has not been established yet. Why is that? What are the best measures that companies can take at the present time?
Tags : content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
     Limelight
By: Limelight     Published Date: Feb 16, 2018
People today expect to have a compelling, interactive, and engaging digital experience. Few companies can exist without a website. In a lot of cases, the Internet is the main stream for their customers to gather information, and the performance of their website directly affects their business. So, what measures can companies take to prevent site delays and improve performance? This white paper will explain the mechanism of a CDN and points to consider when selecting a CDN service.
Tags : content delivery network, cdn, digital content delivery, mobile delivery, global content delivery, live streaming, video on demand, video delivery, website performance, website acceleration, digital rights management, drm
     Limelight
By: Rackspace     Published Date: Feb 01, 2019
Nearly nine in 10 enterprises have adopted a multi-cloud strategy, according to the latest RightScale State of the Cloud Report, and these enterprises use eight different clouds, on average. Increasingly, their cloud of choice is a public cloud. Every public cloud, however, is different. GCP is rapidly gaining users among companies of all sizes. Today, GCP’s customers include large global brands like Disney, eBay, HSBC, The Home Depot, Schlumberger and Verizon, and smaller ones like gaming platform Smash.gg and the Rhode Island School of Design, one of the nation’s leading arts and design institutions. Whether GCP is a good fit for your company depends on a multitude of factors. To find out what these are and how Rackspace can help your business, download this whitepaper today.
Tags : 
     Rackspace
By: TriNet     Published Date: Jul 28, 2015
6 considerations from a serial entrepreneur and investor.
Tags : startup management, infrastructure, employee performance management, hr infrastructure, compliance, hr functions, safe harbors, tax benefits, property rights
     TriNet
By: Saba Software     Published Date: Jun 19, 2012
Used by many of the world's biggest organizations, HumanConcepts solutions enable enterprises 1000+ or greater in size to better manage organizational change of all types, including growth, rightsizing and reorganization.
Tags : 
     Saba Software
By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : network protection, it security, firewall, hacker detection, security management
     McAfee
By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
     Intralinks
By: Intralinks     Published Date: Nov 23, 2015
Download this detailed, insightful article and follow Volterra Fietta’s journey to their “just right” solution.
Tags : intralinks, mwd, volterra fietta, goldilocks zone, security, file sharing, information rights, analytics
     Intralinks
By: Intralinks     Published Date: Nov 23, 2015
This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns.
Tags : intralinks, content, security, data, regulatory, information, management
     Intralinks
By: Intralinks     Published Date: Oct 14, 2015
Download this detailed, insightful article and follow Volterra Fietta’s journey to their “just right” solution.
Tags : intralinks, mwd, volterra fietta, goldilocks zone, security, file sharing, information rights, analytics
     Intralinks
By: Intralinks     Published Date: Nov 23, 2015
This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns.
Tags : intralinks, content, security, data, regulatory, information, management
     Intralinks
By: Rackspace     Published Date: Mar 28, 2018
We live in a multi-cloud world. Nearly nine in 10 enterprises have adopted a multi-cloud strategy, according to the latest RightScale State of the Cloud Report, and these enterprises use eight different clouds, on average. Increasingly, their cloud of choice is a public cloud.
Tags : 
     Rackspace
By: Rackspace     Published Date: Apr 05, 2018
Nearly nine in 10 enterprises have adopted a multi-cloud strategy, according to the latest RightScale State of the Cloud Report, and these enterprises use eight different clouds, on average. Increasingly, their cloud of choice is a public cloud.
Tags : 
     Rackspace
By: Genesys     Published Date: May 10, 2016
In this eBook, Genesys highlights 10 key Customer Bill of Rights that focus on best practices that every caller expects from a self-service experience and that every business should strive to fulfill when designing IVR applications.
Tags : genesys, customer, bill of rights, customer experience, ivr, self service, communication, channel
     Genesys
By: Amazon Web Services EMEA     Published Date: Sep 24, 2018
Under GDPR, we all have new obligations to improve the security and privacy of personal data at our organisations. With the new Amazon Web Services eBook, GDPR: The Basics, you’ll gain a fundamental understanding of this new EU regulation. In this eBook, you will learn about: • How to view GDPR as an opportunity, and how you can build on it • Article 32 – a core part of the security principle • Data subject rights • Key players and responsibilities • And much more
Tags : cloud computing, public sector, aws, healthcare, amazon web services
     Amazon Web Services EMEA
By: Drillinginfo     Published Date: Nov 18, 2015
This second edition of the DI Expert eBook provides a collection of articles written by staff analysts from Drillinginfo, the premier provider of data and insights for oil and gas exploration decisions. These articles focus on the Eagle Ford Shale play in south central Texas. The Eagle Ford Shale boom began in 2008 and has transformed the lives of mineral rights owners, communities and E&P operators throughout Texas and the United States. The Eagle Ford Shale is a cretaceous formation with a favorable brittleness index, which makes the formation ideal for hydraulic fracturing and economical unconventional production.
Tags : exploration, best practices, hydraulic fracturing, geologists, downspacing, innovations, oil, gas exploration, drilling
     Drillinginfo
Start   Previous   1 2 3 4    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com