RecruitingBlogscom

Follow Us:

 

links

Results 51 - 75 of 141Sort Results By: Published Date | Title | Company Name
Published By: NAVEX Global     Published Date: Jul 17, 2017
Download your Definitive Guide to Policy Management for real-world examples of companies avoiding litigation and penalties by having a well thought out compliance programme. Organisations that approach policy management strategically and exercise ruthless discipline with respect to their policies yield massive returns in organisational alignment, corporate culture, and ultimately their bottom-line results. And when incidents occur or regulators come knocking, you'll be prepared.
Tags : 
policies, enforcement, perception, culture, templates, meta-policy, properties, links
    
NAVEX Global
Published By: Amazon     Published Date: Nov 07, 2013
An easy way to get started using Amazon Web Services is by deploying development and test workloads. This solution briefing outlines some of the challenges that customers face with these workloads, and how AWS can help address them. In addition, it provides an overview of AWS, highlights some key services for these scenarios and provides links so that you can obtain more information about any service that you are interested in.
Tags : 
amazon web services, aws, aws cloud, cloud services, cloud computing, development, test, testing, deployment development, test workloads, business technology
    
Amazon
Published By: Comcast Business     Published Date: Mar 24, 2015
For today’s businesses, fast Internet access is more than a competitive advantage. It is an operational necessity. Changes in the way companies are working – and the tools they are using – have created the need for high-speed connections to services and individuals off-site. Across the country, in-house servers are rapidly being replaced by cloud-based infrastructure. Videoconferencing is helping businesses cut travel costs. Mobile devices – with easy links to work-related content – are enabling more employees to be more productive, from any location. All of these applications have one factor in common: they require bandwidth. And plenty of it. Download this white paper to learn more about high-speed internet connections.
Tags : 
dsl, high-speed internet, cable, internet connection, productivity, bandwith, enterprise applications, data management
    
Comcast Business
Published By: Silver Peak     Published Date: Jun 24, 2013
Running multiple data centers can be costly and complex. While using shared WAN links is a viable option for cutting costs, many organizations would rather incur the additional expense of private lines than sacrifice performance. This resource details the challenges of sharing WAN links and explores how WAN optimization – which employs a set of technologies to improve the bandwidth, latency, and loss characteristics of WAN links – can help you achieve the private line performance you need without the high price tag.
Tags : 
data centers, wan links, optimization, technology, improve bandwidth, boost performance, disaster recovery, backup, networking, security, storage, business technology
    
Silver Peak
Published By: Citrix Online     Published Date: Feb 28, 2008
Virtual meetings are all the rage these days. More workers are mobile, the marketplace is global and technology seamlessly links people and places like never before. But to ensure that your virtual meetings are productive, you've got to do a little fine-tuning.
Tags : 
virtual meeting, citrix, telecommuting, collaboration, travel, expense, two way communication
    
Citrix Online
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Published By: Intralinks     Published Date: Jan 16, 2015
As the tide of data continues to rise, the burden of protecting sensitive data and preventing security breaches can be crushing. This Forrester TechRadar ™: Data Security report provides a framework for developing a long-term approach to keeping your organization’s information secure. This TechRadar evaluates 20 of the key traditional and emerging data security technologies that can be used to support the key recommendations and best practices of Forrester’s Data Security and Control framework. Key Contents: - Why the Future of Data Security Matters - Why Do These 20 Technologies Appear in the TechRadar?- Most Tech is Still in the Early Stages
Tags : 
data security, sensitive data, secure information, control framework, security
    
Intralinks
Published By: Yottaa, Inc.     Published Date: May 09, 2014
Most sites aspire to faster page load times. But in order to improve, you first need goals based on real data. Only robust performance benchmarking will tell you how your user experience stacks up against competitors, and how performance varies in all the regions you sell to. This guide presents 9 key tips to ensure you get actionable insights from benchmarking performance against competitors, including common oversights and best practices. The guide also links to free tools that can help you to accomplish your benchmarking project. Download the eBook here!
Tags : 
benchmarking, performance monitoring, website testing, page load time, web performance, optimization, testing tools, free tools, content delivery network, front end optimization, pingdom, neustar, gtmetrix, keynote, gomez, e-commerce, mobile optimization, m-commerce, website development
    
Yottaa, Inc.
Published By: iLinc     Published Date: Feb 11, 2010
This Frost & Sullivan whitepaper describes the new communications-enabled business processes (CEBP) and links it to web conferencing/collaboration.
Tags : 
ilinc, salesforce, webinar, presentation, cebp, web conferencing, video conferencing, visual aid, social networking
    
iLinc
Published By: Schneider Electric     Published Date: Sep 19, 2017
When your power system has aging switchgear, you need to work harder to maintain safety and reliability. But easy-to-install options are available to upgrade aging switchgear to bring safety and reliability up to modern standards. Find out how switchgear modernization works in the comprehensive "Answer Guide: Make Aging Switchgear Last Longer and Perform Better." The guide includes information like the 4 Big Wins of Modernization, embedded demonstration videos, an FAQ on how to modernize and links to other modernization resources.
Tags : 
switchgear modernization, mv circuit breakers, lv circuit breakers, switchgear upgrades, electrical distribution equipment, schneider electric, circuit breaker upgrade, obsolete switchgear
    
Schneider Electric
Published By: MarkMonitor®     Published Date: Apr 25, 2013
Learn how U.K. jeweler, Links of London, beat back the counterfeiters, increasing their web traffic by 50% and reducing their CPC spending on branded terms by 41%!
Tags : 
driving traffic, increase web traffic, reduce spending, brand protection, brand protection strategies, cut cpc spending, social media
    
MarkMonitor®
Published By: Curalate     Published Date: Jul 17, 2014
In today's visual web, consumers are sharing brands’ images at record pace, taking content from brands' websites and saving it to visual social media like Pinterest, where relevancy trumps recency. This behavior significantly extends the life of products, creating engagement with images long after they've been sold out or removed from brands' (digital) shelves. In fact, nearly 50% of Pinterest's top pins send users to expired product pages, dead links and 404 pages. This is a major, major red flag...
Tags : 
instagram marketing, pinterest marketing, tumblr marketing, visual marketing, pinterest analytics, instagram analytics, pinterest for business, instagram for business, user generated content, social media management tools, visual social marketing, social media marketing tools, instagram tool, pinterest tool, curalate, emerging marketing, social media
    
Curalate
Published By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : 
data security, compliance, technology, network security, regulatory compliance, security, knowledge management, enterprise applications, data management, data center
    
Intralinks
Published By: HP and Intel® Xeon® processors     Published Date: Aug 01, 2012
An increasingly global and mobile workforce is changing the way IT needs to support the business. Worker demographics are also changing, resulting in different expectations on how IT delivers data and applications. HP and VMware make this important move to Client Virtualization safe and easy by testing and developing the most popular solutions. On its sixth generation Client Virtualization reference architecture, HP tests many combinations of storage, networking, and blades to best handle the Client Virtualization workloads.
Tags : 
client virtualization, reference architecture, core design, client virtualization, active directory, local users, vdi, user data, outsourcing, work from home, branch, endpoint devices, firewall, vpn, stacking links, storage, data management
    
HP and Intel® Xeon® processors
Published By: IBM Corporation     Published Date: Jun 30, 2011
This menu interface provides a high-level overview, product demonstrations, expert interviews, and resource links for the IBM Data Center Automation solution.
Tags : 
automation, launchpad, ibm, isms, ibm data center, data recovery, wireless internet, business intelligence, 802.11, wi-fi, authentication, vulnerability, san, nas, crm, erp, wireless security, wireless lan, communications software, converged networks
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 30, 2011
This menu interface provides a high-level overview, product demonstrations, expert interviews, and resource links for the IBM Energy Management solution.
Tags : 
energy management, tivoli, disaster prevention, infrastructure, bms, building management system, ecosystem, opc, power and cost savings, energy optimization
    
IBM Corporation
Published By: Intralinks     Published Date: May 29, 2013
The monolithic corporation we grew up with is being replaced by ecosystems of more specialized business entities, sometimes called “extended enterprises.” With this evolution has come a need for closer inter-enterprise collaboration and information flow – but with it also comes increased security and compliance risks.
Tags : 
secure, collaboration, cloud, inter-enterprise, information, compliance, strategies, security, software development, storage, data management
    
Intralinks
Published By: Microsoft Office 365     Published Date: Mar 01, 2018
Your company's security vulnerabilities can be attacked in various ways, such as cyber attacks or intentional infractions from within. And an increasingly mobile world, with geographically dispersed workers working on different devices, the surface exposed to attacks is greater than ever. Get the free security e-book and find out how Microsoft 365 Enterprise can help you find and monitor security issues such as the following: Infractions from local and remote templates Intentional infractions from within External malicious sources
Tags : 
    
Microsoft Office 365
Published By: Intralinks     Published Date: Aug 28, 2015
In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
security, it management, data management, business technology
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
The truth is that they can get a lot worse – and no one is immune. Your company’s data has never been at greater risk. There is no doubt that 2014 was a dire year for many organizations, as they failed to properly protect their computer systems and the data held upon them. As if it wasn’t bad enough keeping on top of new zero-day vulnerabilities, targeted attacks, and revelations of state-sponsored espionage, users are potentially exposing companies’ most important data by not following best practices and using consumer-grade cloud services that aren’t built with enterprise needs in mind. An ever more mobile workforce wants to work on their files remotely but may be taking dangerous risks with sensitive corporate data at the same time. In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
intralinks, security, data, threat, business technology
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015
Tags : 
intralinks, security, data, threat, business technology
    
Intralinks
Published By: Astrocom     Published Date: Dec 13, 2007
Enterprises with mission critical applications are exploring the benefits of disaster recovery sites for their data centers to ensure business continuity. Special network technology is needed to ensure that site failover and failback occurs reliably and predictably. An ideal solution should provide reliable network connections, manage inbound and outbound traffic over multiple WAN links, failover to a secondary data center if all links at the primary data center are down, and eliminate deployment barriers and costs of multi-homing with BGP (Border Gateway Protocol).
Tags : 
data center, datacenter, data centers, business continuity, disaster recovery, backup, recovery, failover, redundancy, high availability, astrocom
    
Astrocom
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top