information assets

Results 26 - 50 of 54Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Mar 08, 2013
Databases store companies’ most valuable information assets, but in most cases they’re poorly protected. It’s important to secure databases as well as or better than other systems in the enterprise. But it’s not that simple.
Tags : 
real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention, authentication and access control, database security, anti spam
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets.
Tags : 
big data analytics, gartner, big data, big security data, advanced targeted attacks, advanced persistent threats, atas, context aware security intelligence
    
McAfee
Published By: McAfee     Published Date: Nov 14, 2012
Real-Time Database Monitoring, Auditing, and Intrusion Prevention Databases store an enterprise's most valuable information assets, but in most organizations they are poorly protected. It's common sense to secure databases, but it's not that simple.
Tags : 
database monitoring, auditing, intrusion prevention, database, mcafee, hacker detection, intrusion detection, business activity monitoring
    
McAfee
Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data
    
ForeScout
Published By: IBM     Published Date: Jul 11, 2012
Software Asset Management associated costs have once again risen as a high priority for IT, and rightfully so. This paper offers information on technology that manages software assets cost efficiently, cost effectively in a low risk environment.
Tags : 
software asset management, sam, software asset cost, cost effective, cost efficient, risk avoidance, managing software assets, substantial expense reduction
    
IBM
Published By: IBM US Smarter Buildings     Published Date: Dec 20, 2011
IBM Maximo Asset Management helps healthcare providers track, monitor and manage the increasing variety of assets on which clinical outcomes and patient care depend. It provides a fully integrated software technology platform, allowing a clear view of information on all assets.
Tags : 
ibm, asset management, hospital, health care, technology, assets, application integration, analytical applications
    
IBM US Smarter Buildings
Published By: iKnowtion     Published Date: Nov 17, 2011
This highly successful dot-com brand leveraged its customer information assets to understand the broad range of customers attracted to its product offering, as well as how to evaluate each customer's future value potential.
Tags : 
customer intelligence, crm solutions, customer analytics, value estimation, customer potential, data modeling, marketing analytics, iknowtion
    
iKnowtion
Published By: HP and Intel® Xeon® processors     Published Date: Sep 06, 2011
Read this report to better understand the unique file-based storage challenges these organizations face and possible solutions for overcoming them to achieve maximum ROI.
Tags : 
hp + intel, information assets, content driven enterprise, archiving, storage solutions, large content environments, storage management, business intelligence
    
HP and Intel® Xeon® processors
Published By: Nuance     Published Date: Jul 11, 2011
Knowledge that exists on paper tends to stay on paper, but in today's Internet-driven, knowledge-based economy, quick access to important information is critical.
Tags : 
nuance, integrating paper, paper documents, content management, information assets, paper, analytical applications, data integration
    
Nuance
Published By: IBM Software     Published Date: Feb 16, 2011
IBM Cognos Business Insight changes information delivery for all business users. Watch this recorded event which originally aired on February 15, 2011 to see how this unlimited BI workspace enables business users to create, personalize and interact with all of their information assets. Through demos and discussion, you'll learn how this revolutionary interface lets users: . Satisfy all their information needs in a single, highly intuitive workspace . Blur the lines between business authoring and analysis . Easily create net-new analysis . Enhance existing reports with information from a personal data source Discover how IBM Cognos Business Insight enables self-service BI for business users, while giving IT complete confidence that data will remain secure.
Tags : 
ibm, cognos, business intelligence, query, analysis, business activity monitoring, business integration
    
IBM Software
Published By: SAP     Published Date: Feb 11, 2011
Read this Aberdeen Group research report, "Access Management: Efficiency, Confidence and Control" and learn how top performers protect access to information assets at lower cost while staying on top of compliance.
Tags : 
sap, access management, efficiency, confidence, control, auditors, access control, information management
    
SAP
Published By: SAP     Published Date: Jan 19, 2010
Your information can be one of your greatest assets - helping you stay on top of regulatory requirements, close to customers, and ahead of the competition. Organizations that pay attention to their data will be the ones to survive and thrive. So how do you obtain a complete view of your information when it is scattered across silos? Or integrate data from structured and unstructured data sources? Or help reduce the risk of inaccurate reporting? And how do you manage your information more effectively to help keep costs from spiraling out of control?
Tags : 
sap, eim, enterprise information management, erp, crm, etl, customer relationship management, enterprise resource planning
    
SAP
Published By: webMethods     Published Date: Aug 21, 2009
The goal of Business Process Productivity is to enable enterprises to become both highly agile and highly efficient, allowing them to more easily leverage their existing information technology (IT) assets to address market opportunities and pressures, and to create competitive differentiation through their business processes. This white paper describes how webMethods Fabric helps companies increase Business Process Productivity.
Tags : 
business process, bpm, bpa, productivity, competitive, business management, efficiency, web methods
    
webMethods
Published By: HP     Published Date: Jul 08, 2009
This guide provides a comprehensive look at a complete data protection and recovery solution, with valuable information to help you choose the solution that best fits your business requirements and budget, and get the assurance you need - knowing your assets are protected. Learn more today!
Tags : 
storageworks, disk to disk, d2d, data protection, recovery, server, rack, storage
    
HP
Published By: Oce Business Services     Published Date: Jun 24, 2009
Download this free report to explore the potential of applying business performance management principles to advance document performance management to reduce costs; better manage documents as vital strategic, financial and information assets; and secure positive returns on investments from outsourcing. Learn more today!
Tags : 
oce, kpi, ekg, document processes, mail center, print/copy operations, records, operations
    
Oce Business Services
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
    
Trend Micro, Inc.
Published By: ASG Software Solutions     Published Date: Apr 07, 2009
Application Portfolio Optimization (APO) provides executives with tools and information to assess the quality and condition of application assets as well as a means for understanding the impact of proposed application changes.
Tags : 
asg, cmdb, bsm, itil, bsm, portfolio optimization, apo, mining tools
    
ASG Software Solutions
Published By: Citrix     Published Date: Jan 20, 2009
With server virtualization now well established in the world's datacenters, IT leaders are turning their attention to virtualizing and centralizing desktop PCs to address some of their toughest computing challenges: . Managing complex end-user hardware and software infrastructure . Securing networks and information assets . Supporting a global workforce in an environment of constant change
Tags : 
citrix, virtualization, desktop virtualization, blade pc, on demand, hdx, xendesktop, sla
    
Citrix
Published By: LogRhythm     Published Date: Sep 26, 2008
Find out more about how LogRhythm can help organizations fulfill The Federal Information Security Management Act (FISMA) requirements in documentation and implementation of controls for IT systems that support operations and assets.
Tags : 
fisma, nist compliance, comply, security, information technology, information security management, log management, log analysis
    
LogRhythm
Published By: 123Together     Published Date: Sep 19, 2008
Today's economy is especially hard on small businesses. How does your small business keep revenue coming in when your customers are spending less? How do you attract new customers in a cost efficient manner? How do you protect your businesses' valuable information assets without making a huge technology investment?
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it
    
123Together
Published By: HP     Published Date: Jul 29, 2008
Join Forrester Research and HP in this webinar which explores common myths about IT disasters and analyzes different strategies to protect a company's information assets based on risk and cost. Stephanie Balaouras of Forrester analyzes 5 common myths around IT disasters e.g. disasters and loss of a data centers are rare.
Tags : 
disaster, disaster recovery, d/r, high availability, mission critical, forrester, webcast, webinar
    
HP
Published By: Quocirca     Published Date: Jul 03, 2008
Small and medium sized organizations have similar issues to large companies when it comes to the processing and storage of information and data, yet often have little capability to attract, retain and maintain the skills for managing their data assets compared to large organizations.  Blade systems offer an effective way to address the specific challenges faced by smaller organizations in managing their IT assets, and allows then to gain greater value from them.
Tags : 
storage, blade, blade systems, small business, smb, smbs, mid-sized business, quocirca
    
Quocirca
Published By: IBM     Published Date: Feb 08, 2008
Technology has helped financial institutions work harder and faster than ever before. The downside: Sensitive data is more vulnerable than ever before. Financial Insights offers ideas and solutions to improve Information Security (IS). Click to learn more on protecting your most important assets, your data.
Tags : 
bank, banks, financial, financial institutions, fisma, compliance, data security, information management
    
IBM
Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance
    
Aveksa
Start   Previous    1 2 3    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.