information management

Results 351 - 375 of 651Sort Results By: Published Date | Title | Company Name
Published By: TIBCO     Published Date: Aug 18, 2014
Digitalization—the process of exploiting digital information to maximize business success—has increased the value of your data to the point where it is arguably your most important asset. This paper explains why mastery will not be possible with merely adequate integration technology.
Tags : 
tibco, integration, data integration, business integration, business intelligence, intelligence, analytics, digitalization, information management, business technology
    
TIBCO
Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security, threatscape, networking
    
Cyveillance
Published By: SAS     Published Date: Mar 06, 2018
Business intelligence has come a long way ? from assistance with report generation to self-service platforms for discovery and analytical insight. As technological capabilities and business aptitude with information continue to advance, the next generation of BI will be even more capable and valuable to the enterprise. To discuss today’s success factors and tomorrow’s opportunities, IIA spoke with Rick Styll, Senior Manager, Visual Analytics Product Management at SAS, and Tapan Patel, Principal Product Marketing Manager at SAS.
Tags : 
    
SAS
Published By: Intralinks     Published Date: Nov 23, 2015
This Buyer’s Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as infrastructure and extended collaboration, including Information Rights Management (IRM).
Tags : 
intralinks, infrastructure, information rights management, data management, business technology, data center
    
Intralinks
Published By: Safenet     Published Date: Oct 11, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
Tags : 
safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management
    
Safenet
Published By: OnBase by Hyland     Published Date: Jun 26, 2017
Digital transformation is a concept on every IT and business leader’s mind, from improving back-office operations to creating better front-office experiences. Yet when it comes to adopting the latest information management technologies and digitally transforming operational processes, some organizations are further along than others. Download this report to find out how your organization stacks up.
Tags : 
strategy, digital, transformation, onbase, hyland, information, management, cloud, governance, content, back-office, whitepaper, enterprise, transforming, business, industry
    
OnBase by Hyland
Published By: LogLogic     Published Date: Mar 15, 2012
Garnering critical IT insight helps organizations and individuals make the right decisions to better serve customers, partners, regulatory bodies and internal employees and answer many important business challenges. This whitepaper describes LogLogic's philosophy and evolution of IT Data Management.
Tags : 
log management, siem, big data, storage, sem, pci compliance, it operations, data storage, data forensics, security intelligence, splunk, rsa envision, logrhythm, arcsight, compliance, hipaa, nitro security, q1 labs, security event management, syslog
    
LogLogic
Published By: Collaborative Consulting     Published Date: Jan 15, 2014
When a pharmaceutical company discovered its risks under the new Patient Protection and Affordable Care Act, it turned to Collaborative to comb and consolidate its data. The result: compliance and insight into new business opportunities, too, through a company-wide business data warehouse and enhanced business intelligence.
Tags : 
collaborative consulting, data, data warehouse, complicane, risk management, business intelligence, consolidation, infrastructure, information management, it management, business technology
    
Collaborative Consulting
Published By: IBM     Published Date: Aug 21, 2008
For a growing business, it’s increasingly difficult to integrate technological solutions and services to improve service management. So various frameworks have been created to help today’s IT professionals optimize their use of technology in managing IT processes. The third version of the Information Technology Infrastructure Library (ITIL) provides the latest set of process best practices for any service management improvement effort.
Tags : 
ibm, ibm mi, ibm grm, itil, service management, it management
    
IBM
Published By: Symantec.cloud     Published Date: Apr 28, 2011
This whitepaper discusses key considerations for conducting effective eDiscovery.
Tags : 
symantec.cloud, ediscovery, frcp, fre, edrm, imrm, data management, information management, content preservation, business content, electronic data content, litigation, esi
    
Symantec.cloud
Published By: Soffront     Published Date: Aug 21, 2009
Companies are discovering that a Knowledge Management System (KMS) has grown from a nice to have concept, to a must-have asset in customer facing departments. Providing immediate answers to customers requires easy access to the important product and business knowledge of an organization. KMS makes that possible.
Tags : 
knowledge management, information management, knowledge base, product information management, pim, product knowledge, customer service, customer support, call center management, soffront
    
Soffront
Published By: STARLIMS     Published Date: Apr 16, 2014
Learn how Laboratory Information Systems (LIS) are becoming outdated and see how they are being replaced by Information Management Systems that can provide flexible management capabilities that provide informatics solutions.
Tags : 
starlims, lims, laboratories, lis systems
    
STARLIMS
Published By: Epicor     Published Date: Sep 07, 2018
As technology improves, lawn and garden retailers are relying more and more on their customer service to gain an advantage and differentiate themselves from the competition. Providing a pleasant customer experience can turn a first-time shopper into a lifelong buyer. In this guide, you’ll discover the important role mobile technology plays in delivering faster, service. Retailers everywhere are implementing mobile tools to empower their employees to support customers—from stock and pricing information to mobile checkout. Epicor Eagle N Series is a fully integrated retail management system that offers a whole host of mobile tools to help you service your customers, stay informed, and make decisions from anywhere. Read our guide and learn how the mobility of Epicor Eagle N Series can provide your retail business with a competitive advantage.
Tags : 
retail store software, retail sales software, retail saas, business retail software, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas
    
Epicor
Published By: Epicor     Published Date: Oct 29, 2018
As technology improves, lawn and garden retailers are relying more and more on their customer service to gain an advantage and differentiate themselves from the competition. Providing a pleasant customer experience can turn a first-time shopper into a lifelong buyer. In this guide, you’ll discover the important role mobile technology plays in delivering faster, service. Retailers everywhere are implementing mobile tools to empower their employees to support customers—from stock and pricing information to mobile checkout. Epicor Eagle N Series is a fully integrated retail management system that offers a whole host of mobile tools to help you service your customers, stay informed, and make decisions from anywhere. Read our guide and learn how the mobility of Epicor Eagle N Series can provide your retail business with a competitive advantage.
Tags : 
retail store software, retail sales software, retail saas, business retail software, epicor eagle, retail pos, point of sale (pos) system, shopping cart software
    
Epicor
Published By: Epicor     Published Date: Aug 30, 2018
As technology improves, lawn and garden retailers are relying more and more on their customer service to gain an advantage and differentiate themselves from the competition. Providing a pleasant customer experience can turn a first-time shopper into a lifelong buyer. In this guide, you’ll discover the important role mobile technology plays in delivering faster, service. Retailers everywhere are implementing mobile tools to empower their employees to support customers—from stock and pricing information to mobile checkout. Epicor Eagle N Series is a fully integrated retail management system that offers a whole host of mobile tools to help you service your customers, stay informed, and make decisions from anywhere. Read our guide and learn how the mobility of Epicor Eagle N Series can provide your retail business with a competitive advantage.
Tags : 
retail store software, retail sales software, retail saas, business retail software, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas
    
Epicor
Published By: Code42     Published Date: Apr 22, 2016
Rapid changes in technology and software, and the nearly universal shift to electronically stored information (ESI), has made eDiscovery more complex and expensive. In a movement to simplify and standardize their procedures—and dissolve some of the extra tensions surrounding litigation—many organizations are bringing phases of the eDiscovery process in house, in particular legal hold. Among other benefits, Code42 eDiscovery simplifies legal hold management. Litigation preparation can be a large task crossing over many departments, but will consistently feature two main players: Legal and IT. This document focuses on those two groups, and aims to enable one to see the eDiscovery world through the point of view of one group—or the other. Read more to find out the details.
Tags : 
code 42, legal process, ediscovery, litigation issues, enterprise applications
    
Code42
Published By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, log management solution, threat detection, fraud prevention, risk management
    
Q1 Labs
Published By: McAfee     Published Date: Feb 06, 2013
Integrating SIEM and threat intelligence to mitigate bad actors is essential for having a resilient security posture. The McAfee response is to expand the Security Connected framework by pairing McAfee SIEM and McAfee Global Threat Intelligence.
Tags : 
threat intelligence, bad actors, siem, mcafee global threat intelligence, mcafee gti, mcafee risk advisor, security connected
    
McAfee
Published By: Mainline Information Systems     Published Date: Oct 27, 2009
This webcast discusses live partition mobility and a LPAR set up on Power 6 Blade.
Tags : 
power virtualization, mainline information systems, lpar, power live partition mobility, lpm, workload management
    
Mainline Information Systems
Published By: IBM     Published Date: Nov 17, 2009
This paper provides an overview of what is required to create an environment to leverage information dynamically for innovation and competitive advantage.
Tags : 
content management, information management, data integration, ibm, li campaign, ibm li, leveraging information, data management
    
IBM
Published By: SOCRATIQ Intelligence Systems     Published Date: Feb 14, 2007
This White Paper discusses how intelligence agency management can apply machine translation as a much-needed support tool that can make linguists and intelligence analysts more effective in producing meaningful and actionable results.
Tags : 
translation, terrorists, homeland security, language, socratiq, voice recognition, business management, cia, information management, analytical applications, homeland, tongue, socratiq
    
SOCRATIQ Intelligence Systems
Published By: LogRhythm     Published Date: Sep 26, 2008
Find out more about how LogRhythm can help organizations fulfill The Federal Information Security Management Act (FISMA) requirements in documentation and implementation of controls for IT systems that support operations and assets.
Tags : 
fisma, nist compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations, event management solution, enterprise applications
    
LogRhythm
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee