third party

Results 226 - 250 of 288Sort Results By: Published Date | Title | Company Name
By: Trend Micro     Published Date: Oct 12, 2012
This white paper evaluates that "free" claim by examining the additional costs associated with deploying ForeFront and abandoning third party anti-malware solutions.
Tags : information security, licensing, software costs, trend micro, security
     Trend Micro
By: SpectorSoft     Published Date: Apr 01, 2015
Corporate computers and information and communications systems (collectively, “electronic resources”) remain the workhorse for most businesses, even as alternatives, such as third-party text messaging services, external social media, and cloud computing, flourish. Employees rely on corporate electronic resources for e-mail, calendaring, business contacts, Internet access, document creation and storage, and a multitude of other business applications. Consequently, for employers, it is critical to establish and maintain their right to inspect all information stored on, and to monitor all communications transmitted by, corporate electronic resources. The corporate acceptable use policy is the linchpin of that effort. The ten tips below are intended to aid employers who either want to implement an acceptable use policy for the first time, or who need to update their policy.
Tags : acceptable use, communications systems, text messaging, acceptable use policy, confidentiality, security
     SpectorSoft
By: Quest Software     Published Date: Apr 19, 2012
In this Quest white paper, get best practices for leveraging native Active Directory (AD) auditing from Microsoft MVP Darren Mar-Elia - and see what auditors are looking for! He also explores third-party solutions that can enhance native AD auditing.
Tags : scriptlogic, software asset management, software license, tracking, automation, system center configuration manager, sccm, virtual application
     Quest Software
By: Asure Software     Published Date: Nov 06, 2013
Based on third party research and our own experience, we know that organizations that have successfully implemented automated technology and reporting tools to support their HR activities have seen real workforce productivity benefits. This white paper will provide you with an in-depth analysis of the top 8 ways you can improve your workforce productivity using the latest advances in HR technology.
Tags : workforce management, workforce management solutions, workforce software solutions, workforce software, workforce productivity
     Asure Software
By: Viavi Solutions     Published Date: Mar 21, 2016
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users—from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : viavi solutions, hybrid clouds
     Viavi Solutions
By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager
     Bitium
By: Smarsh     Published Date: Feb 27, 2014
Recent Microsoft® Exchange editions have basic archiving functionality, but highly regulated and publicly-held companies are likely to require more sophisticated third-party archiving solutions with advanced compliance, e-discovery and legal hold capabilities. Read this report to learn why content should be archived, what native archiving functionality in Exchange can (and cannot) do and recommendations for defining your archiving practices.
Tags : compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
     Smarsh
By: HP     Published Date: Jun 03, 2014
In this competitive whitepaper, Edison Group provides an independent, third-party perspective and evaluation of HP’s StoreOnce Backup System versus EMC Data Domain. Criteria considered included scalability (including capacity and performance), high availability, architectural approach, pricing, and licensing.
Tags : hewlett packard, data, backup, . data protections, recovery, deduplication
     HP
By: UnsubCentral     Published Date: Oct 17, 2014
Every smart marketer knows the value of affiliate marketing. But within the vertical, there are so many types of affiliates to choose from! Content, PPC, display, email – how do you choose who to work with?! In this e-book we will discuss the benefits of email marketing as an affiliate channel.
Tags : email acquisition marketing, affiliate email marketing, email publishers, email affiliate marketing, email marketing affiliate program, affiliate email list, third party email, affiliate marketing
     UnsubCentral
By: IBM     Published Date: Feb 27, 2014
Learn how to select the proper partner for enterprise cloud production workloads and see how the right partner will increase productivity and help your organization save money.
Tags : enterprise cloud, production workloads, ibm, smartcloud, third-party cloud, cloud solutions
     IBM
By: IBM     Published Date: Nov 19, 2014
IBM's new Platform-as-a-Service (PaaS) offering, IBM Bluemix, delivers the speed and flexibility of the cloud to allow developers to more quickly compose and build enterprise-grade applications for by providing access to IBM's vast software portfolio as composable services. This powerful PaaS/services combination, built on open standards and taking advantage of Cloud Foundry, enables developers to avoid vendor lock-in while leveraging their existing application development assets and skills, which is essential for building hybrid clouds. IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment.This session provides an overview of IBM Bluemix capabilities.
Tags : ibm, bluemix, cloud-computing, middleware, security
     IBM
By: IBM     Published Date: Jan 30, 2015
IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment. This session provides an overview of IBM Bluemix capabilities.
Tags : paas, ibm, infrastructure solutions, middleware challenges
     IBM
By: TRUSTe     Published Date: Sep 16, 2009
Put yourself in the customer's shoes: when shopping online, what are the things that worry you most? Before you enter your name and email address do you think about spam clogging your inbox? If you are like most consumers, you check to see if the site bears the seal of a third-party verification program and if the site has a privacy policy.
Tags : truste, cheapflights, customer confidence, privacy policy, adsense, email privacy, opt-in, newsletter
     TRUSTe
By: GeoTrust     Published Date: Oct 06, 2014
Choosing the right security solution is critical to the success of an online business. Look for trust-based security solutions that deliver protection and consumer peace-of-mind through cutting edge technology and integration with complementary third-party solutions.
Tags : security solution, online business, trust-based security solutions, protection, cutting edge technology, integration, third-party solutions, security
     GeoTrust
By: Semcasting     Published Date: Feb 19, 2014
This white paper will guide you through a series of third party studies that have been completed recently on the diminishing reach and effectiveness of audience targeting with cookies. The numbers are challenging and it appears it may be time for an alternative to the cookie.
Tags : digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, online marketing, online marketing strategies
     Semcasting
By: Semcasting     Published Date: Feb 19, 2014
Despite the fact that digital advertising is experiencing explosive growth, the industry still faces two significant challenges that can impede campaign performance: reach to unique users and data verification. In order to attract brand advertisers that are still spending a large portion of their budget on traditional media, the industry must find a better targeting solution. In this white paper from Semcasting, you will learn more about the limitations of cookie-based behavioral targeting and how a new solution called IP Zones can dramatically increase both the scale and accuracy of online display campaigns.
Tags : digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, online marketing, online marketing strategies
     Semcasting
By: Symantec Corporation     Published Date: Jul 11, 2014
View the SSL 101 video and discover how Symantec SSL Certificates help you protect your business and your customer’s confidential information from attack.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
     Symantec Corporation
By: Symantec Corporation     Published Date: Jul 11, 2014
Always On SSL is a fundamental, cost-effective security measure that provides end-to-end protection for website visitors by enforcing the use of encryption with SSL certificates from a trusted Certificate Authority on every single page.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
     Symantec Corporation
By: Symantec Corporation     Published Date: Jul 11, 2014
Learn why the world’s largest financial institutions and most heavily trafficked websites trust Symantec Website Security Solutions for their SSL and more.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
     Symantec Corporation
By: Symantec Corporation     Published Date: Jul 11, 2014
Symantec extends SSL solutions with comprehensive website security solutions that enables companies to protect and grow their businesses by showing their customers that their trusted website is safe to search, surf and buy.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
     Symantec Corporation
By: Symantec Corporation     Published Date: Jul 11, 2014
Symantec Certificate Intelligence Center discovers and monitors SSL certificates from any Certificate Authority as well as automates SSL certificate lifecycle management for operational efficiency and business continuity.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
     Symantec Corporation
By: Symantec Corporation     Published Date: Jul 11, 2014
Increase your website security with Extended Validation SSL certificates and find out how that translates to increased revenue for your business.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
     Symantec Corporation
By: Symantec Corporation     Published Date: Jul 11, 2014
Online shopping shouldn’t have to feel risky! There are inherent security threats when completing online transactions but if you follow these three simple tricks you’ll be on your way to browsing and buying in safety.
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
     Symantec Corporation
By: NAVEX Global     Published Date: Dec 22, 2017
Knowing which steps to take to ensure your organisation remains vigilant against bribery and corruption is an important move. When your organisation is aligned on anti-bribery and corruption policy, training and third party risk, your employees can identify, report and ultimately stamp out—bribery and corruption. Our Solutions Experts can help you strengthen your most challenging ABC issues and better protect your organisation. Contact us to set up a consultation today at info@navexglobal.com.
Tags : anti-bribery programme, anti-bribery and corruption, corruption risk assessment, anti-bribery checklist, preventing anti-bribery, corruption assessment
     NAVEX Global
By: NAVEX Global     Published Date: Dec 22, 2017
An effective third-party risk management programme is in your best interest. Not only can you more confidently engage with a growing network of vendors, suppliers, resellers and distributors; but when done effectively, you can have a positive impact on the effectiveness and efficiency of your broad ethics and compliance programme. NAVEX Global research has shown that organisations pursue strong ethics and compliance programmes for myriad reasons, but at the top is a desire to cultivate and maintain a culture of ethics and respect. A strong third-party risk management solution helps organisations realise that objective through engaging with third parties that abide by codes of conduct, that are transparent and communicative and that you can be proud to do business with.
Tags : third party risk management, third party risk, managing third parties, risk management, anti-bribery programme, compliance programme
     NAVEX Global
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com