IntraLinks, Inc Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
IntraLinks, Inc

Overview: Intralinks' secure services enable instant and organized sharing of business-critical information among professionals, their external partners and advisors.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by IntraLinks, Inc.
Research offered by IntraLinks, Inc

A Guide to Data Privacy for Business and IT Executives by IntraLinks, Inc. December 31, 2013 - This white paper explains the latest global government efforts in enforcing stronger data privacy laws. Click now to uncover 6 data protection recommendations to help you mitigate the risks of information sharing and prevent regulatory and market sanctions.

  View A Guide to Data Privacy for Business and IT Executives research abstract

Buy the right enterprise collaboration solution the first time by IntraLinks, Inc. April 18, 2014 - Access the following buyer's guide to enterprise collaboration to learn what you need to look for when selecting an appropriate vendor for your unique situation.

  View Buy the right enterprise collaboration solution the first time research abstract

Confidential Collaboration: How to manage regulatory compliance & data privacy while keeping your data safe by IntraLinks, Inc. October 31, 2013 - This resource offers 4 key recommendations on how to maintain regulatory compliance while using collaborative processes.

  View Confidential Collaboration: How to manage regulatory compliance & data privacy while keeping your data safe research abstract

Cost-Effective Document Management Solutions for Business-Critical Processes - Part I: Why a New Generation of Enterprise Content Management Solutions Are Emerging to Meet the Need for Secure Document Exchange by IntraLinks, Inc. March 10, 2009 - This is Part I of a white paper series that examines online workspaces, a type of enterprise content management solution delivered in a Software-as-a-Service model. This paper provides an overview of online workspaces as an alternative to current document management methods.

  View Cost-Effective Document Management Solutions for Business-Critical Processes - Part I: Why a New Generation of Enterprise Content Management Solutions Are Emerging to Meet the Need for Secure Document Exchange research abstract

Creating Secure, Sharepoint-Based External Collaboration Portals by IntraLinks, Inc. April 21, 2014 - Consult the following white paper to explore where CIOs are going for easy-to-implement, low-cost solutions that are allowing them to securely externalize SharePoint content. Learn about the benefits of SharePoint externalization as well as various pain points to be aware of, possible hybrid solutions, and much more.

  View Creating Secure, Sharepoint-Based External Collaboration Portals research abstract

Data Privacy: Where Should I House My Data? by IntraLinks, Inc. April 17, 2014 - This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.

  View Data Privacy: Where Should I House My Data? research abstract

Enterpise Collaboration: Avoiding the Productivity and Control Trade-Off by IntraLinks, Inc. April 18, 2014 - The following white paper explores why exactly organizations fail to meet the collaborative needs of today and what you can do to improve your success with initiatives. Also learn how to secure enterprise collaboration in 6 steps.

  View Enterpise Collaboration: Avoiding the Productivity and Control Trade-Off research abstract

IAM Systems Now Leverage Intelligence to Address Cloud and Mobile Apps by IntraLinks, Inc. May 15, 2014 - This resource highlights the 4 newest roles for identity and access management (IAM) systems that enhance security for an expanding business environment.

  View IAM Systems Now Leverage Intelligence to Address Cloud and Mobile Apps research abstract

One Size Does Not Fit All: A Closer Look at Enterprise Application Integration Technology by IntraLinks, Inc. June 15, 2010 - This white paper discusses the driving forces that have made enterprise application integration so critical, reviews available integration approaches and outlines areas of consideration when selecting the best methodology for individual enterprise requirements. Read this paper to learn more.

  View One Size Does Not Fit All: A Closer Look at Enterprise Application Integration Technology research abstract

Securing Cloud Computing For Enterprise Collaboration by IntraLinks, Inc. April 21, 2014 - Consult the following white paper to explore the current state of security in the cloud as well as what you need to look for when selecting an appropriate vendor for your business. Learn about the 4 security areas that need to be covered, tips for getting info from service providers, security check lists, and more.

  View Securing Cloud Computing For Enterprise Collaboration research abstract

Sharing Sensitive Corporate Documents without Compromising Security and Governance by IntraLinks, Inc. April 21, 2013 - This informative resource discusses how your organization can utilize an IP security system built on a strong inter-enterprise document-sharing foundation to share sensitive documents without compromising security and governance.

  View Sharing Sensitive Corporate Documents without Compromising Security and Governance research abstract

The Most Powerful of Adversaries: NSA Programs and Techniques Provide Lessons in Data Privacy and Managing Enterprise Collaboration by IntraLinks, Inc. April 17, 2014 - This resource reveals best practices on how to protect intellectual property, especially from the U.S. National Security Agency (NSA) and other government actors, who have the power to exploit critical data.

  View The Most Powerful of Adversaries: NSA Programs and Techniques Provide Lessons in Data Privacy and Managing Enterprise Collaboration research abstract

Vulnerabilities, Attacks, Data Breaches: Which is most important? by IntraLinks, Inc. May 15, 2014 - This resource offers leading advice on how to leverage top vulnerability, attack, and data breach reports to help enhance your security strategies.

  View Vulnerabilities, Attacks, Data Breaches: Which is most important? research abstract

What Are The Real Threats? Using Threat Research Reports to Set Security Priorities by IntraLinks, Inc. May 14, 2014 - This resource features key findings from the top 4 security reports published in the last year to help IT pros better understand and identify potential threats.

  View What Are The Real Threats? Using Threat Research Reports to Set Security Priorities research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts