government

Results 476 - 493 of 493Sort Results By: Published Date | Title | Company Name
Published By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, password, password management, passcode, best practices, remote access
    
Secure Computing
Published By: Mediative     Published Date: Jan 14, 2008
Comparing the two search engines predominantly used by Chinese searchers – Baidu and Google.cn – Enquiro conducted an eye tracking study with Chinese students to answer how Search user interaction can differ between cultures, languages and reading patterns. How do Google and Baidu compare? And how do Chinese searchers use organic vs. paid listings?
Tags : 
china, asia, international, baldu, chinese, chinese government, culture, cultural influence, google.cn, google, search engine, search marketing, enquiro, enquiro research
    
Mediative
Published By: Vendor Guru     Published Date: Dec 21, 2007
Small and medium businesses (SMBs) continue to fuel demand for customer relationship management (CRM) systems, and more software firms are stepping up to offer appropriate technologies. SMBs, defined as companies with 1,000 or fewer employees, are searching for CRM solutions that will allow them to satisfy customers, control costs, and comply with various government regulations. But when choosing CRM software, it’s important to keep in mind that the needs of small and medium businesses aren’t always the same.
Tags : 
customer satisfaction, customer retention, crm, crm solution, customer relationship, customer service, vendorguru, vendor guru, quinstreet, retention, smb, small business, soho, small business crm, vendor guru general campaign
    
Vendor Guru
Published By: Computhink     Published Date: Dec 10, 2007
The job of a Records Management Office is to take all paper documents that need to be preserved, from all county offices, and implement a strategy to preserve them. When the law changed on January 1, 2001 to allow digitally scanned copies to be legal documents (The Illinois Electronic Records Act), the challenge to find a preservation system that would be both efficient and cost effective increased dramatically.
Tags : 
document management, records management, information, electronic document management, computhink, viewwise, viewise, government, records office
    
Computhink
Published By: Imprivata     Published Date: Nov 27, 2007
Increased pressure for cost-efficient administration, productive work environments and an array of strict government regulations are driving increased demand for integrated user Provisioning/SSO solutions that are affordable, easy to maintain and secure.
Tags : 
sso, single sign on, user management, authentication, identity management, imprivata, ppi, security
    
Imprivata
Published By: PassGo     Published Date: Oct 23, 2007
Looking at IT security history, the bad guys were always far more sophisticated than the people who tried to stop them. Even if companies or the government could conceive of IT security it was almost impossible to achieve it because of the lack of knowledgeable security professionals out there and the lack of security protection tools in the marketplace.
Tags : 
risk assessment, hacker, hackers, hacker detection, cyber crime, cybercrime, cybercrimes, intrusion, intrusion prevention, intrusion detection, network security, azoogle, azoogle ads
    
PassGo
Published By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : 
spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security, network security, intrusion, intrusion detection, intrusion prevention, trojan, risk management, cyberwarfare, cyber warfare, technolytics
    
Technolytics
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
CCU sought to encrypt its backup tapes for keeping customer data secure in transit and in storage at the offsite tape-vault vendor’s facility. As a financial institution, CCU was subject to stringent government regulations. With nearly 60 gigabytes of data to encrypt each night, CCU knew that a software solution was out of the question.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
As more states pass regulations governing the security, confidentiality, and integrity of customer data, a leading national bank has recognized its need to ensure the safety and security of personal data for its thousands of customers. To ensure compliance and maintain the security of this information, the bank has deployed NeoScale’s CryptoStor Tape appliances to help accomplish its objectives.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Asentria Corporation     Published Date: Sep 04, 2007
The use of pollable remote access units enable integration of phone systems with telecommunications management, plus system-wide access, monitoring and alarm notification that includes unmanned remote sites. Few telephone networks connect a user base that is involved in such a multitude of vital services as local government.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: COMDOM Software     Published Date: Aug 09, 2007
This paper provides an overview of costs of spam facing large organizations, such as multinational enterprises, universities, and governments, as well as small and medium sized businesses that own or operate networks used by employees and other end users.
Tags : 
spam, bayesian, filter, filtering, block, blocking, spamming, phishing, total cost of ownership, tco, messaging, email, email security, mail server, mail servers, comdom, comdom software
    
COMDOM Software
Published By: Palm, Inc.     Published Date: Mar 15, 2007
Smartphones and other handheld devices support government continuity of operations (COOP) by enabling its central tenets: decentralization and redundancy. Read this white paper to learn all benefits of using smart phones when an emergency strikes.
Tags : 
government, disaster recovery, disaster, terrorism, terrorist attacks, smartphone, smart phone, pda, handheld, wireless, mobile computing, palm
    
Palm, Inc.
Published By: ForeSee Results     Published Date: Feb 07, 2007
Find out how e-government agencies, departments and offices fared in customer satisfaction, and how satisfaction was earned, in this Q4 Report by Foresee Results.
Tags : 
loyalty and retention, e-government, customer satisfaction, foresee, foresee results
    
ForeSee Results
Published By: RiskWatch     Published Date: Feb 05, 2007
The integration of information security and physical security is an important trend that is becoming more widespread across both private corporations and government agencies. Read more about how and why you should implement a more holistic security strategy in this whitepaper.
Tags : 
security, network security, access control, compliance, secure content management, information security, physical security, holistic, riskwatch
    
RiskWatch
Published By: MCH     Published Date: Jan 29, 2007
Learn how local governments operate, who makes the purchasing decisions, what criteria influence buying decisions, and how timing can play a critical role in the success of your marketing campaigns.
Tags : 
government, local government, mch, mailings.com, database and list managers
    
MCH
Published By: Quocirca     Published Date: Nov 13, 2006
IT in the UK public sector is under intense scrutiny and needs to deliver better results:  much investment has been made which has too often failed to deliver. Projects have a history of being protracted and complex, offering significant challenges to all involved.
Tags : 
public sector, it management, government, project management, efficiency, productivity, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Nov 09, 2006
This paper looks at the particular challenges in public sector IT – the need to find efficiency savings at the same time as offering better service to citizens – and discusses the particular circumstances in which blade computing will be right for the public sector IT manager.
Tags : 
blade, blade server, blade servers, government, citizen, constituents, server selection, server implementation, service management, quocirca
    
Quocirca
Published By: Secure Computing     Published Date: Nov 30, 1999
Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. Find out in this paper how you can achieve automated configuration compliance with the SafeWord SecureWire IAM appliance from Secure Computing.
Tags : 
network architecture, network management, sarbanes oxley compliance, compliance, sox compliance, hipaa compliance, configuration management, government agency, secure computing, securecomputing
    
Secure Computing
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee