RecruitingBlogscom

Follow Us:

 

audi

Results 251 - 275 of 1064Sort Results By: Published Date | Title | Company Name
Published By: CEB     Published Date: Nov 08, 2013
How is your company managing risk? Download the whitepaper to learn how cross-functional groups can work together to uncover broader enterprise-wide risks that might go unforeseen.
Tags : 
risk, compliance, audit, risk management, cyber security, fraud
    
CEB
Published By: CEB     Published Date: Oct 21, 2014
The impact of information is changing and while this change provides great opportunities, it also presents greater risks. Traditional monitoring processes and technology advancements alone no longer deliver effective identification, management, and prevention of business risks, instead the changing impact of information demands early detection and root cause analysis. Learn how leading companies are magnifying exploitation of information security risks, along with advancing identification and protection of compliance risks.
Tags : 
corporate executive board, ceb, legal, risk, compliance, assurance teams, audit
    
CEB
Published By: Centercode     Published Date: Oct 16, 2019
Today's technology is getting more and more complex, and it's moving from the lab to homes and offices faster than ever. Increasing competition, expanding markets, and a growing expectation for seamlessness mean IoT and SaaS companies alike are looking for a thorough but fast-paced means to validate the quality of their products and releases. This e-book gives a straight-forward introduction to Customer Validation -- the modern framework for beta testing. It anchors the four key components of traditional beta (people, products, environment, and time frame) around the needs of present-day product development. This includes: establishing the building blocks for thoroughly testing interoperability, creating accurate user scenarios, carving out channels for direct customer interaction, and identifying solutions that will delight your audience.
Tags : 
    
Centercode
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, describes how Centrify's integrated architecture enables you to extend Active Directory to your non-Microsoft platforms, and describes the Centrify Suite's unique benefits.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, sox, sarbanes-oxley, hipaa, glba, pci, cross-platform, auditing, logging, security, rbac, entitlements, privilege management
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, pci, pci dss, payment card industry, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, cross-platform, auditing, logging, security, rbac, entitlements, privilege management, least access, unix, linux, mac, nis
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 13, 2018
This ebook helps you determine whether your company has an access issue and outlines ways to lower your risk of getting breached by increasing your identity and access (IAM) maturity through adopting a Zero Trust approach with the right IDaaS solution. You’ll learn the best practices to establish identity assurance, limit lateral movement, enforce least privilege and audit everything. Discover how to avoid a Password Crisis.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in today’s business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of today’s demanding IT environment.
Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment, it management, enterprise applications
    
Centrify Corporation
Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : 
application security, auditing, authentication, financial, compliance, vulnerability management, software compliance, regulatory compliance, cenzic, security, it management
    
Cenzic
Published By: Cenzic     Published Date: Nov 29, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  The solution is automated security assessment products that leverage stateful processing to comprehensively examine web applications and reveal vulnerabilities in hours rather than weeks.  Find out how Cenzic's ClickToSecure solution can help you secure your applications.
Tags : 
compiance, internet application security, it spending, application security, vulnerability management, identity management, security assessment, security audit, web security, cenzic, security, it management
    
Cenzic
Published By: Ceros     Published Date: May 15, 2015
The most engaging brands are telling great stories, using interactive content to deliver their message in a new way. Discover how to engage your brand’s audience using interactive storytelling techniques in this eBook.
Tags : 
interactive storytelling, interactive content, content marketing, content creation, brand storytelling, digital engagement, digital marketing, emerging marketing, social media, advertising agencies, internet marketing, crm & customer care, traditional marketing
    
Ceros
Published By: Cisco     Published Date: Jan 05, 2015
This study includes an analysis of 11 worldwide enterprise videoconferencing equipment vendors. To qualify for inclusion in this IDC MarketScape study, vendors must offer a portfolio of enterprise-class videoconferencing products, solutions, and services either directly and/or through channel partners.Basic capabilities of the vendor offerings should include support for high-definition (HD) video and audio technology, availability of data collaboration tools and applications for use within a video session, and the ability to integrate with UC portfolios and business applications, among other criteria.
Tags : 
mobile, video collaboration, portfolios, investments, unified communications, wireless, data management
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2016
With a global monthly reach consisting of more than 500 million mobile users and billions of requests, Tapjoy historically relied heavily on their IT footprint. They needed an environment that would allow them to accelerate the development and improve the performance of their big data algorithms, which help drive real time decision-making that delivers the best content to their global audience. Read more to learn how Tapjoy engineers opted for a cloud-based model to run their big data platform instead of bare metal, prioritizing agility and the ability to scale over bare metal performance.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 20, 2016
Go ahead. Create and join meetings easily from your computer or mobile device. Invite participants to share content in real time. See who you’re talking to. All in a highly secure environment. This is now reality for government agencies, thanks to Cisco WebEx® Web Conferencing, a FedRAMP-compliant service. As a FedRAMP-compliant solution provided by the market leader in web and video conferencing, Cisco WebEx Web Conferencing lets you: • Easily meet face to face with meeting participants from other locations • See and hear the same information at the same time with attendees • Collaborate and increase productivity without the need for travel • Make meetings more engaging with high-definition (HD) video, audio, and content sharing
Tags : 
cisco webex, web conferencing, productivity, connectivity, government agencies, fedramp, video conferencing, networking, security, wireless, business technology
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Though IP telephony has been available commercially since the mid ‘90s, it remains an emerging technology for many organizations. Only about 28% of companies have moved all endpoints (handsets, softphones, audio bridges) to IP, according to Nemertes’ research data. The rest of organizations are either in the process of migrating fully to IP, stuck in a hybrid rollout requiring them to manage typically multiple TDM and IP providers, or firmly planted in TDM. This report reviews the issues and benefits associated with moving to an all-IP environment, based on interviews with IT professionals who have moved to all IP or are in the process of doing so.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
With a global monthly reach consisting of more than 500 million mobile users and billions of requests, Tapjoy historically relied heavily on their IT footprint. They needed an environment that would allow them to accelerate the development and improve the performance of their big data algorithms, which help drive real time decision-making that delivers the best content to their global audience. Tapjoy engineers opted for a cloud-based model to run their big data platform instead of bare metal, prioritizing agility and the ability to scale over bare metal performance. Initially they deployed at AWS, but as the platform grew and their AWS costs increased, Tapjoy began to look for ways to better manage their growing public-cloud spend while increasing efficiency. They needed to do this without compromising the cloud experience they were giving their developers.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Nov 30, 2016
CureSeq’s mission is to “revolutionize next-generation sequencing in the oncology space.” To accomplish this, the company must reach as many researchers and clinical oncologists as possible to help them identify and treat cancer. CureSeq, whose work has been published in scientific journals, needed a reliable online meeting solution to communicate effectively with critical stakeholders around the world. After struggling with several other solutions, the company selected Cisco WebEx to take advantage of the platform’s presentation and document-sharing capabilities and audio quality.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 17, 2017
76% of business decision makers use video conferencing at work. Read on to find out how video can improve and simplify communication.
Tags : 
collaboration, video conferencing, communication, conferencing, audio conferencing
    
Cisco
Published By: Cisco     Published Date: Sep 14, 2017
For all of the ways video conferencing is better than audio conferencing, it has unlocked a whole new cast of characters that everyone has seen by now.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 21, 2017
Businesses are battling immense competitive pressures. In order to succeed—or even survive—they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. Download this whitepaper to find out the benefits of Cisco ASAP Data Center Architecture.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
Cisco
Published By: Cisco     Published Date: Sep 21, 2017
For all of the ways video conferencing is better than audio conferencing, it has unlocked a whole new cast of characters that everyone has seen by now. Read on to find out how video can improve and simplify communication.
Tags : 
collaboration, video conferencing, communication, conferencing, audio conferencing
    
Cisco
Published By: Cisco     Published Date: Dec 20, 2018
This research finds that huddle spaces deliver tremendous value to businesses, with 9 out of 10 participants stating the adoption of open space environments is increasing the need for these huddle spaces. Huddle spaces require a wide variety of technologies to enable users and the business, such as audio and video conferencing abilities, digital whiteboards and scheduling solutions. Users stated that ease of use, solution reliability, and similar technology in each huddle space is key to their productivity. But nearly 8 out 10 users shared they were frustrated with meeting room technology recently. These problems generate support calls to IT on a weekly, if not daily, basis
Tags : 
    
Cisco
Published By: Cisco EMEA     Published Date: Apr 12, 2019
Dieser Bericht dokumentiert ein ESG Lab-Audit und die Validierung von Leistungstests der hyperkonvergenten Infrastruktur (HCI) von Cisco HyperFlex. Im Mittelpunkt stand dabei der Vergleich der hochgradig integrierten Cisco HyperFlex-All-FlashLösungen auf der Cisco UCS Plattform mit zwei rein softwarebasierten HCI-Lösungen von führenden Anbietern, die unabhängig für die Ausführung geschäftskritischer Workloads auf Cisco UCS-Hardware validiert wurden.
Tags : 
    
Cisco EMEA
Published By: Cisco Webex     Published Date: Feb 16, 2011
Beat your quotas-and your competition-with Cisco WebEx Meeting Center and Enterprise IM solutions.
Tags : 
cisco webex, webex meeting center, free trial, enterprise im solution, meeting online, integrated audio conferencing
    
Cisco Webex
Published By: Cisco Webex     Published Date: Feb 16, 2011
Ready to get started? Tell us about yourself and we'll contact you right away.
Tags : 
cisco webex, webex meeting center, free trial, sales cycle, customer interaction, video, imenterprise im solution, meeting online, integrated audio conferencing
    
Cisco Webex
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top