Papers Security KnowledgeWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Papers Security Knowledge returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Information Integration/ Metadata Management
 •   Enterprise Content Management (ECM)
 •   Document Management
 •   Records Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Enterprise Data Protection and Privacy
 •   Information Lifecycle Management
 •   Security Policies
 •   Storage Management

Related Searches
 •   B2B Papers Security Knowledge
 •   Linux Based Papers Security Knowledge
 •   Methods Papers Security
 •   Papers Security Assessment
 •   Papers Security Configurations
 •   Papers Security Contact
 •   Papers Security Knowledge Consults
 •   Papers Security Knowledge Specialist
 •   Proposals Papers Security
 •   Templates Papers
Advertisement

ALL RESULTS
1 - 25 of 485 | Next Page

Featured Sponsors

Enterprise Engineer 3.5 by McLaren Software.
McLaren's Enterprise Engineer application suite assures the integrity of your asset documentation, providing a single point of control to manage the lifecycle of asset related more...
>> Discover more offerings from McLaren Software.

7 Types of Hard CISSP Exam Questions and How To Approach Them by Global Knowledge Network, Inc.

March 2006 - (Free Research)
Throughout the CISSP preparation course offered by Global Knowledge, we cover the various security mechanisms, principles, concepts, and facts that will be included on the CISSP exam. 
(E-LEARNING TUTORIAL) READ ABSTRACT |

The Event Data Warehouse- Strategies for Improving Business Performance by Hexis Cyber Solutions Inc

July 2011 - (Free Research)
Organizations are at risk if they do not plan to implement an enterprise-wide security and event data warehouse to make strategic decisions. This paper introduces Event Data Warehouse, a unique, cost effective and proven solution, that provides actionable results that enable better business decisions. 
(WHITE PAPER) READ ABSTRACT |

What Are Your Obligations to Retain Email and Other Electronic Content? by Proofpoint, Inc.

October 2010 - (Free Research)
This paper discusses what drives organizations in both heavily-regulated and less regulated industries to retain email and other electronic content. It explores the content retention challenges faced by those organizations in the midst of stringent litigation and regulatory compliance demands. 
(WHITE PAPER) READ ABSTRACT |

Cognos Disclosure Management by IBM

December 2013 - (Free Research)
Access the following white paper to uncover how you can successfully manage your records both inside and outside of your company. Discover how you can effectively reduce risk, cost, and data inaccuracies, all while working seamlessly with your existing technologies. 
(WHITE PAPER) READ ABSTRACT |

The E-Discovery “How-To” Guide: Practical Recommendations for Streamlining Corporate E-Discovery by Clearwell Systems

October 2008 - (Free Research)
This paper breaks down the e-discovery process into phases, discusses best practices and relevant technologies for each phase, and provides a matrix to guide an e-discovery team’s decision making process. 
(WHITE PAPER) READ ABSTRACT |

Knowledge of threats and vulnerabilities by IBM

September 2010 - (Free Research)
IBM Security Solutions are built on the Secure by Design philosophy, which states that IT infrastructure should be designed, created and operated with security in mind. This paper focuses on how IBM helps clients understand the threat landscape and vulnerabilites. 
(WHITE PAPER) READ ABSTRACT |

Distributed Data Capture: Reducing the Cost of Remote Business Processes by Kofax, Inc.

March 2011 - (Free Research)
In today’s global economy, information exchange is vital. Competitive advantage goes to the companies that can share information and collaborate quickly and accurately in the most cost-effective manner. Read this white paper now to learn how to effectively lower the costs of your business's document capture process. 
(WHITE PAPER) READ ABSTRACT |

Best Practices In Enterprise Content Management: Five Tests to Evaluate Cloud Enterprise Content Management (ECM) by SpringCM

March 2011 - (Free Research)
This paper will explore 5 tests to determine whether an organization can benefit from a Cloud ECM solution. Proven ECM technologies improve the effectiveness and efficiency of information flow in a business, ensuring the right information reaches the right person when and where they need it without compromising security of intellectual property. 
(WHITE PAPER) READ ABSTRACT |

Records Management’s Breaking Point: Managing Electronic Records in High Volume Environments by ASG Software Solutions

December 2010 - (Free Research)
This white paper outlines some of the issues that make electronic records management so challenging, highlights why organizations need to tame the high-volume transactional records beast, and lastly, describes what to look for in a transactional records management solution. 
(WHITE PAPER) READ ABSTRACT |

Charting the way for the Information Governance imperative by RSD

September 2011 - (Free Research)
Read this white paper to learn more about how to reach compliance guidelines and better secure your most important information. 
(WHITE PAPER) READ ABSTRACT |

B.F. Saul Company Finds Flexibility in Sharing and Securing Information with TITUS by TITUS

March 2012 - (Free Research)
This brief white paper details a SharePoint security system that provides high-level security for important content while also allowing end-users to easily access the documents they need. 
(WHITE PAPER) READ ABSTRACT |

Protecting Confidential Documents in the Extended Enterprise: Common Misconceptions and Best-Practice Strategies by Brainloop Inc.

February 2008 - (Free Research)
This white paper discusses the enormous cost of data breaches, the rising importance of data security, and common misconceptions that exacerbate the problem of protecting your company's most important and confidential information. 
(WHITE PAPER) READ ABSTRACT |

The Moray Council Secures SharePoint Data with TITUS by TITUS

March 2012 - (Free Research)
This brief white paper details a SharePoint security system that protects your content while also allowing easy access to those who are authorized. 
(WHITE PAPER) READ ABSTRACT |

Effectively Manage Permissions in Microsoft SharePoint 2010 by TITUS

March 2012 - (Free Research)
This white paper details security permissions of SharePoint. Read on to learn how you can apply security permissions  to sensitive content in SharePoint and further you understanding of fine grained permissions within SharePoint without affecting business operations. 
(WHITE PAPER) READ ABSTRACT |

Iron Mountain EMR Scanning Survey Report by Iron Mountain

September 2011 - (Free Research)
70% of hospitals expect to meet EHR meaningful use guidelines this year. Yet, 78% expect to continue to treat patients using paper records for up to 5 more years despite the financial incentive for meeting these requirements. Inside this white paper, learn how your peers are transitioning to an EHR system. 
(WHITE PAPER) READ ABSTRACT |

Gone in 30 Days: Exchange, Retention, and Regulatory Compliance by Sherpa Software

September 2009 - (Free Research)
In this white paper, we will discuss how to discover, manage, and archive information within your Exchange enterprise to successfully limit your legal exposure and protect your corporate information. 
(WHITE PAPER) READ ABSTRACT |

Social Networking in the Enterprise: Benefits and Inhibitors by Cisco Systems, Inc.

June 2010 - (Free Research)
This white paper reveals the primary considerations for social networking, such as: business value and strategic relevance, adoption trends and concerns, and strategic considerations for ESS deployment. 
(WHITE PAPER)

Compliance in the Corporate World How Fax Server Technology Minimizes Compliance Risks by OpenText

April 2012 - (Free Research)
This white paper explores the potential compliance related benefits to adopting fax server technology. 
(WHITE PAPER) READ ABSTRACT |

The Impact of Corporate Real Estate on Records Management by Iron Mountain

December 2011 - (Free Research)
This white paper explores the hidden impact that shifting corporate real estate paradigms have on records management. Read now to ensure that the quality, accessibility and security of your organization's vital information assets remain unaffected. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Maximize the business value of your information by Iron Mountain

March 2012 - (Free Research)
Your company's information is the most valuable asset you have, so protecting it and getting the most business value possible from it is vital to your enterprise's success. Read this white paper to learn how to maximize the value of your physical and digital data to reduce costs, improve efficiency, and reduce risk. 
(WHITE PAPER) READ ABSTRACT |

Vulnerability Assessment by Symantec Corporation

October 2013 - (Free Research)
Access this white paper for the truth behind today's vulnerability assessment approaches, and why a clearer vision of the problem is needed for more successful security systems. Click now to unveil an opportunity to bridge the gap between vulnerability assessment and security management, and use actionable intelligence as effective defense. 
(WHITE PAPER) READ ABSTRACT |

Beyond FTP: Securing and Managing File Transfers by Linoma Software

March 2010 - (Free Research)
Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol. 
(WHITE PAPER) READ ABSTRACT |

Don't Overlook Records Management in Business Continuity Planning by Iron Mountain

November 2012 - (Free Research)
Effective business continuity (BC) and disaster recovery (DR) planning is a critical aspect of any business – without it you're at risk for serious consequences. But many enterprises today make the mistake of only planning for digital files. Read on to learn 10 steps to crafting a BC/DR plan for your digital and physical records. 
(WHITE PAPER) READ ABSTRACT |

The Bot Threat by Hewlett-Packard Limited

November 2012 - (Free Research)
In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks. 
(WHITE PAPER) READ ABSTRACT |

Desktop Virtualization: The Key for Securing Your Enterprise by Citrix

October 2010 - (Free Research)
In this paper, Citrix® unveils how desktop virtualization provide IT organizations visibility and control over data to help achieve security and regulatory requirements, without compromising business performance, productivity, and the user experience. 
(WHITE PAPER)

1 - 25 of 485 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts