assets

Results 226 - 250 of 543Sort Results By: Published Date | Title | Company Name
Published By: ArcSight     Published Date: Mar 03, 2009
This document provides an overview of the drivers for Log Management scalability and outlines the key requirements to consider as part of the evaluation process.
Tags : 
log management, security, fraud, insider threat, suspicious network activity, pci dss, hipaa, sox, application security, arcsight, mission critical assets, networking, network security, intrusion detection, intrusion prevention, hipaa compliance
    
ArcSight
Published By: ArcSight     Published Date: Mar 04, 2009
This document will outline the requirements for an effective fraud mitigation solution. It will detail a solution that considers the entirety of an organization’s fraud mitigation strategy.
Tags : 
fraud, siem, arcsight, mitigating fraud, intrusion prevention systems, fraudsters, fraud policy, insider threats, mission critical assets, security, infrastructure, encryption, identity management, security management
    
ArcSight
Published By: HP Data Center     Published Date: Mar 25, 2009
When considering server virtualization, planning and design are critical.  How do you optimize your environment through virtualization?  How do you keep your server sprawl from becoming virtual server sprawl?  How will a virtualized environment help your business?  Will your existing data center meet current, and future, business requirements? Answer your Questions today!
Tags : 
hp data center, virtualization, server planning, server design, server sprawl, tco, roi, server consolidation, decentralized environments, centralized environments, it assets, data center design, eos, return on investment, server virtualization, total cost of ownership, data center design and management
    
HP Data Center
Published By: Symantec.cloud     Published Date: Sep 12, 2012
In this e-book, you'll learn how to protect your valuable assets without the expense or time commitment of building a full IT infrastructure.
Tags : 
database security, data management, data and security, smb, cloud based security, security, data center
    
Symantec.cloud
Published By: PC Mall     Published Date: Mar 02, 2011
Download this HP White Paper to learn how to protect your high value virtual assets with a combination of purpose-built IPS platforms and enterprise-class management solutions.
Tags : 
pc mall, virtualization, server virtualization, data centers, data center security, security, disaster recovery, data protection, database security, data center design and management
    
PC Mall
Published By: PC Mall     Published Date: Mar 21, 2011
Companies realize the benefits of moving to virtualization, however, most virtualized environments today are being deployed in an insecure manner. Download this HP White Paper to learn how to protect your high value virtual assets with a combination of purpose-built IPS platforms and enterprise-class management solutions.
Tags : 
keywords: virtualization, server virtualization, data centers, data center security, security, storage virtualization, access control, intrusion prevention, cloud computing, data center design and management, virtualization, design and facilities
    
PC Mall
Published By: Quest Software     Published Date: Jul 28, 2011
In this white paper Quest's data protection experts offer five tips for effective backup and recovery to help you avoid the challenges that might keep you from fully protecting your virtual assets and infrastructure.
Tags : 
quest, storage virtualization, it management, systems management solutions, virtualization managemen, windows, database, application, oem, innovation accelerator, smb, recovery, data protection, identity management, development, optimization, access management, migration, consolidation, performance
    
Quest Software
Published By: IBM US Smarter Buildings     Published Date: Dec 20, 2011
Read how IBM Maximo provides a single work and asset management platform that enables operations to quickly see recurring issues, automate escalation and communication, and maintain comprehensive asset histories for governance requirements.
Tags : 
ibm, calgary catholic school, asset management, operations, assets, finance
    
IBM US Smarter Buildings
Published By: IBM US Smarter Buildings     Published Date: Dec 20, 2011
IBM Maximo Asset Management helps healthcare providers track, monitor and manage the increasing variety of assets on which clinical outcomes and patient care depend. It provides a fully integrated software technology platform, allowing a clear view of information on all assets.
Tags : 
ibm, asset management, hospital, health care, technology, assets, application integration, analytical applications, business intelligence, data protection, data quality
    
IBM US Smarter Buildings
Published By: IBM US Smarter Buildings     Published Date: Jan 10, 2012
For many companies, facilities operations and management represent a significant business cost. Thinking of fixed assets as a source of economic advantage allows companies to optimize their processes and resource use to simultaneously reduce environmental impacts and lower cost.
Tags : 
ibm, smarter buildings, fixed assets, go green, environment, asset management, technology, finance
    
IBM US Smarter Buildings
Published By: IBM     Published Date: Apr 18, 2012
In their efforts to keep up with these varied needs, healthcareorganizations are experiencing a proliferation of assets and assettypes. But assets themselves are experiencing a convergence.Clinical devices for patient monitoring and care, building systems for cooling and lighting, and technology devices forcommunications and recordkeeping share a common foundation.
Tags : 
healthcare, management, healthcare assets, convergence, ibm
    
IBM
Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data, access, it organization, security, protection, network, access, control, nac, interoperability, 802.1x standards, control, options
    
ForeScout
Published By: CDW     Published Date: Nov 12, 2012
Whether assigned or brought in ad hoc by staff, mobile-computing devices require MDM to protect enterprise IT assets.
Tags : 
cdw, mdm, mobile device management, cross-platform, apple, ios
    
CDW
Published By: CDW     Published Date: Jul 18, 2013
Managing Software Resources Saving money, boosting productivity and reducing management headaches.
Tags : 
cdw, software management, software lifecycle, software assets, security, software development
    
CDW
Published By: CDW     Published Date: Nov 05, 2013
As IT infrastructures evolve, the complexity of software assets is constantly increasing, creating headaches for IT pros whose responsibility it is to keep track of it all. In response, many are turning to software asset management (SAM) software. Chances are your organization may already have an asset management product in place that you think is adequate.
Tags : 
cdw solutions, sam provider, software asset management, sam software, it process, software tco improvement, cio pushback, telecommunications, digital assets, delivering business value, hybrid approach, software management, sam program, it management, business management, change management, ebusiness
    
CDW
Published By: McAfee     Published Date: Jan 23, 2013
Vulnerabilities lead to risk exposure and downtime. Protect your critical assets with virtual patching.
Tags : 
virtual patching, network breaches, critical patches, software patches, change management, anti spam, anti spyware, network security appliance, patch management
    
McAfee
Published By: McAfee     Published Date: Jan 23, 2013
As long as there is software, there will be software vulnerabilities and you will find malware and cybercriminals. This paper will examine that risk and provide a step by step process to protect your companies critical assets.
Tags : 
virtual patching, change management, mcafee network security platform, mcafee vulnerability manager, mcafee global threat intelligence, mcafee risk advisor, mcafee epo, security, it management, data management, data center
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets.
Tags : 
big data analytics, gartner, big data, big security data, advanced targeted attacks, advanced persistent threats, atas, context aware security intelligence, threat intelligence, siem, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, compliance, disaster recovery, encryption
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Take the stealth, creativity and patience of Stuxnet, the commercialism, wide distribution and easy-to-use toolkits of Zeus, and you understand the potency of todayís malware. Start planning now to protect your intellectual property and other assets.
Tags : 
zues, stuxnet, stealthy threats, rootkits, malware, rootkit binaries, zero-day vulnerabilities, botnet, ddos attacks, keylogging, phishing, trojans, embedded security, endpoint security, anti spam, anti spyware, anti virus, encryption, hacker detection, internet security
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Databases store companiesí most valuable information assets, but in most cases theyíre poorly protected. Itís important to secure databases as well as or better than other systems in the enterprise. But itís not that simple.
Tags : 
real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention, authentication and access control, database security, anti spam, anti spyware, anti virus, ddos, encryption, internet security, intrusion detection, intrusion prevention, network security appliance, security management, security policies, vulnerability management
    
McAfee
Published By: QTS Data Centers     Published Date: Mar 31, 2015
One of ITís biggest balancing acts is to make data transactions easily available to authorized users while preventing all others from accessing its data assets. With high-profile data security breaches splashed across headlines nearly every day, CIOs are understandably worried about protecting their data. And for IT leaders who are considering moving their business to the cloud it is critical to ensure the provider they select has undertaken full and robust measures for physical and logical security.
Tags : 
qts, cloud, security, data transactions, cio report, cyber threats, security breaches, it leaders, it management, cloud computing
    
QTS Data Centers
Published By: Teradata     Published Date: Mar 10, 2014
We evaluate vendors providing applications that support the management of marketing resources, such as plans, people, budgets, projects, tasks, assets and cycle times. This Magic Quadrant will help marketing leaders and CIOs find an MRM solution to better manage their marketing resources.
Tags : 
teradata, marketing resource management, magic quadrant, brandmaker, brandsystems, brandwizard, capital id, direxxis, elateral, ibm, infor, microsoft, north plains, pti marketing technologies, saepio, sap, sas, wedia, marketing resources, mrm solution
    
Teradata
Published By: Adobe     Published Date: Jul 28, 2015
Download the new Adobe whitepaper to discover the seven trends impacting how digital marketers create, manage, deliver, and optimize their digital assets.
Tags : 
customer experience, adobe creative cloud, mobile apps, personalization, optimization, digital assets, digital marketing
    
Adobe
Published By: Adobe     Published Date: Dec 21, 2015
The Adobe white paper, 7 Trends Impacting How We Use Digital Assets, identifies the trends that help you deliver more meaningful customer experiences with the right assets, through the right channels, at the right time.
Tags : 
adobe, digital asset, media, customer experience, channel, software development, knowledge management, enterprise applications
    
Adobe
Published By: Adobe     Published Date: Dec 21, 2015
Download the Adobe-sponsored IDC InfoBrief Proving the Value of Digital Asset Management and the Adobe white paper 7 Trends Impacting How We Use Digital Assets to see how to use DAM to keep up with the constantly accelerating pace of digital business.
Tags : 
adobe, asset management, digital, idc, knowledge management, enterprise applications
    
Adobe
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.