Business Process SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Business Process Security returned the following results.
RSS What is RSS?
Related Categories

 •   Business Process Management (BPM)
 •   Data Security
 •   Enterprise Resource Planning (ERP)
 •   Business Process Automation
 •   Business Intelligence Solutions
 •   Security Policies
 •   Service Oriented Architecture (SOA)
 •   Security Monitoring
 •   Virtualization
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)

Related Searches
 •   Article About Business Process
 •   Business Package
 •   Business Process Plan
 •   Business Process Security Testing
 •   Business Technologies
 •   Costing Business Process Security
 •   Implementations Of Business
 •   Report Business Process Security
 •   Script Business Process
 •   Templates Business
Advertisement

ALL RESULTS
1 - 25 of 461 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

BPM e-guide: Is cloud right for you? by SearchSOA.com

May 12, 2014 - (Free Research)
Learn about the business conditions that help determine cloud computing decision-making. 
(EBOOK) READ ABSTRACT |

Achieving PCI Compliance with Log Management by Hexis Cyber Solutions Inc

July 1967 - (Free Research)
This white paper will review what is specifically called for in PCI DSS Requirement 10, explore the technical considerations of the requirement, and consider some different approaches to addressing the requirement. 
(WHITE PAPER) READ ABSTRACT |

Process-Driven Master Data Management for Dummies by Software AG

March 2012 - (Free Research)
This comprehensive guide covers topics from data governance and reference data to big data and cloud-enablement, uncovers MDM myths, and looks at new trends in MDM methodology. 
(BOOK) READ ABSTRACT |

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by Mimecast

August 2009 - (Free Research)
Email has become a critical business tool, but it is also the easiest way for information to escape from the confines of a business. Learn why email Data Leak Prevention is critical to safeguard the information that is inside your network. 
(WHITE PAPER) READ ABSTRACT |

Quality Assurance Throughout the Clinical Documentation Workflow by Nuance

December 2011 - (Free Research)
How can you successfully manage the clinical documentation creation process in order to maximize quality while also containing costs and ensuring patient confidentiality? This resource introduces a tool that enables you to do just that. Read on to learn more now. 
(WHITE PAPER) READ ABSTRACT |

Five Truths About Enterprise Data Protection by PGP Corporation

December 2008 - (Free Research)
How can your business secure data that is always on the move? Read this paper to learn valuable information for securing your data with an enterprise-wide data encryption strategy. 
(WHITE PAPER) READ ABSTRACT |

How to Choose a Distribution System by Sage Software

January 2012 - (Free Research)
Read this white paper to learn best practices for selecting the best distribution strategy and accompanying enterprise resource planning (ERP) software for your organization. 
(WHITE PAPER) READ ABSTRACT |

Mastering New Challenges in Text Analytics: Making Unstructured Data Ready for Predictive Analytics by SPSS Inc. Worldwide Headquarters

February 2009 - (Free Research)
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by SPSS Inc.'s text analytics solutions. 
(WHITE PAPER) READ ABSTRACT |

Unified Computing: An Agile Platform for Your Next Gen Virtualized Data Center by PC Connection

May 2011 - (Free Research)
The data center is under great pressure as managers try to balance business demands and operational limitations. This webcast discusses how to transform your data center through virtualization and process automation, bringing your organization exceptional benefits. 
(WEBCAST) READ ABSTRACT |

Linking Identity and Data Loss Prevention to Avoid Damage to Brand, Reputation and Competitiveness by CA Technologies.

May 2010 - (Free Research)
This report examines the issue of data governance through the publication of new primary research that examines how well European businesses understand the risks and what steps they have taken to address them. 
(WHITE PAPER) READ ABSTRACT |

Email As Part Of A Business Continuity Strategy: Why Always-On-Business Requires Always-On-Email by Mimecast

August 2009 - (Free Research)
The modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event. Maintaining access to email while upholding risk mitigation and compliance is a challenging endeavor. 
(WHITE PAPER) READ ABSTRACT |

Linking identity and data loss prevention to avoid damage to brand, reputation and competitiveness by CA Technologies.

June 2010 - (Free Research)
This report examines the issue of data governance through the publication of new primary research that examines how well European businesses understand the risks and what steps they have taken to address them. 
(WHITE PAPER) READ ABSTRACT |

Cloud-Ready Data Center Reference Architecture by Juniper Networks, Inc.

December 2011 - (Free Research)
<p>Without effective data center network architecture and processes in place, your business cannot embrace cloud computing. This white paper examines the current state of the data center and the steps you need to take to adapt to changing trends and enable the cloud.</p> 
(WHITE PAPER) READ ABSTRACT |

Compliance Frameworks That Enhance e-Discovery Effectiveness by AXS-One, a Daegis Company

October 2011 - (Free Research)
The threat of e-discovery is a dark cloud hovering over an enterprise. These projects require an excess of effort and money – and requests are often made with no prior notice. Thankfully, records management can alleviate the pain of e-discovery. This e-guide provides a high-level view of records management in the workplace. 
(EGUIDE) READ ABSTRACT |

How SAP Users hold the key to Business Process Improvement by Winshuttle, LLC

February 2011 - (Free Research)
This paper highlights the key role that SAP users play in enabling their organizations to improve processes, and discusses how their expertise is lost in some of the traditional approaches companies use to try to improve processes. Learn an alternative “user-centric” approach that will enable companies to measurably improve their processes. 
(WHITE PAPER) READ ABSTRACT |

Dancing with Elephants - Making Your Business Processes Agile by Fujitsu America, Inc.

January 2011 - (Free Research)
Think Agile BPM is not for you because you don't have simple processes that follow the same path every time? Think again. This webcast illustrates how Agile BPM allows you to get results by striking the right balance between structure and flexibility in processes how Fujitsu's Agile BPM solution can help you to achieve that goal. 
(WEBCAST) READ ABSTRACT |

Fujitsu Interstage Business Process Manager - Creating AGILE BPM by Fujitsu America, Inc.

January 2011 - (Free Research)
Fujitsu Interstage Business Process Manager (Interstage BPM) is a leading solution for Agile BPM - the next generation of BPM. Agile BPM is designed to flexibly address the requirements of all types of processes used to conduct a business: structured, unstructured, and hybrid process types, giving support to all forms of work. 
(WHITE PAPER) READ ABSTRACT |

Interstage Business Process Manager v11 Architecture Whitepaper by Fujitsu America, Inc.

January 2011 - (Free Research)
Interstage BPM's superior architecture lets business users and IT professionals collaborate on defining and refining business processes. It empowers knowledge workers to stretch processes to fit to the business needs and it provides developers with the ability to easily create and deploy high performance process-based applications. 
(WHITE PAPER) READ ABSTRACT |

How to Get Lean with Automated Process Discovery - Live demonstration and case study presentation by Fujitsu America, Inc.

March 2010 - (Free Research)
The biggest challenge to improving the efficiency of your business processes often lies in knowing how these processes really work in your organization. This webcast will teach you how to visualize and analyze your business processes from historical data, expose process waste and apply lean initiatives to achieve significant value. 
(WEBCAST) READ ABSTRACT |

20 Steps To Delivering The Perfect Order by Sterling Commerce, An IBM Company

March 2009 - (Free Research)
How can business process and applications professionals lead the charge in optimizing the processes and systems to deliver the perfect order? How does a business process and applications professional know the key steps to supporting a perfect order? Forrester has developed a best practices checklist of 20 steps required to support a perfect order. 
(ANALYST REPORT) READ ABSTRACT |

Unleashing Microsoft SharePoint 2010’s Web Content Management Features by AvePoint, Inc.

February 2011 - (Free Research)
In this white paper, we will discuss the requirements for dynamic websites in today’s hyper-competitive business landscape, the case for utilizing SharePoint Server 2010 for WCM, and how AvePoint’s DocAve Software Platform enhances the native WCM functionality SharePoint offers. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Audit and Compliance Reporting for the IBM System i (AS/400) by PowerTech

August 2008 - (Free Research)
This white paper outlines the key items that need to be reviewed on AS/400 for both configuration data and transactional log information from the audit journal, it also explains various challenges of auditing and reporting on the System i platform. 
(WHITE PAPER) READ ABSTRACT |

Expert data center management tips:  consolidating, collocating, or the cloud by SAVVIS

October 2011 - (Free Research)
This expert resource explains the differences between two methods of data center outsourcing management (IaaS and DCaaS). Discover which makes sense for your business, and learn about the pros and cons of collocation, including ensured uptime and increased security. 
(EGUIDE) READ ABSTRACT |

Special Reports on Modernizing Messaging Infrastructure by Sendmail, Inc.

November 2008 - (Free Research)
In this research note, Gartner outlines the top indicators of a potential IT train wreck in regards to messaging solutions. 
(NEWSLETTER) READ ABSTRACT |

Intel's Vision for the Ongoing Shift to Cloud Computing by Dell, Inc. and Intel®

April 2011 - (Free Research)
Cloud computing promises large gains in efficiency and flexibility at a time when demands on data centers are growing exponentially. Intel’s vision for the future of this technology focuses on key principles to make the vision a reality. View this resource to learn more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 461 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts