Practices KeyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Practices Key returned the following results.
RSS What is RSS?
Related Categories

 •   Storage Management
 •   Virtualization
 •   Enterprise Systems Management
 •   Network Security
 •   Storage Security
 •   Data Security
 •   Business Process Management (BPM)
 •   Endpoint Security
 •   Disk-based Backup & Storage/ RAID
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Billing Practices
 •   Form Practices
 •   Linux Based Practices Key
 •   Practices Automation
 •   Practices Databases
 •   Practices Key Device
 •   Practices Key Requirements
 •   Practices Key Schema
 •   Practices Roi
 •   Trend Practices
Advertisement

ALL RESULTS
1 - 25 of 455 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Top four considerations for securing Microsoft SharePoint by Sophos, Inc.

March 08, 2011 - (Free Research)
This webcast discusses the key risks and best practices to securing Microsoft SharePoint and protecting your organization's digital assets. 
(WEBCAST) READ ABSTRACT |

Securing Your Private Keys as Best Practice for Code Signing Certificates by Thawte Inc.

September 30, 2013 - (Free Research)
This paper describes recent security breaches and why they may have happened. It discusses best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Data Protection: Encryption, Key Management and Tokenization by nuBridges, Inc.

October 12, 2010 - (Free Research)
Protecting sensitive and business-critical data is essential to a company’s reputation, profitability and business objectives. This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices. 
(WHITE PAPER) READ ABSTRACT |

Multiple Country Implementation — Influencing Factors and Approaches by ComputerWeekly.com

August 31, 2012 - (Free Research)
This report from Cognizant explains the key factors which influence a multi-country solution development and implementation, along with the industry best practices and their key features. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Securing your Private Keys as Best Practice for Code Signing Certificates by VeriSign EMEA

July 28, 2011 - (Free Research)
This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers. 
(WHITE PAPER) READ ABSTRACT |

Key E-Discovery Issues to Consider in 2011 by Dell, Inc.

May 16, 2011 - (Free Research)
This white paper focuses on the key practices and technologies that organizations should pursue as they seek to improve their e-discovery practices and technologies. It also provides a brief overview on the relevant offerings from Dell. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Deploying SSD by SearchStorage.com

February 21, 2012 - (Free Research)
Check out this E-Brief for best practices and key considerations regarding SSD purchase and deployment. Learn the basics of solid state storage, determine if SSD is a good fit for your company and learn the keys to success before implementing. 
(EBRIEF) READ ABSTRACT |

Three Best Practices for Today's Profitable Contact Centers: Three Best Practices for Contributing to the Bottom Line by Avaya Inc.

July 2008 - (Free Research)
This white paper provides the three best practices for today's profitable contact centers. 
(WHITE PAPER) READ ABSTRACT |

Advanced Case Management: Making its Mark on Key Government Sectors by IBM

May 2012 - (Free Research)
Government agencies are frequently adopting advanced case management strategies to automate processes, streamline practices and achieve better, swifter results. This paper from IBM discusses how advanced case management strategies are taking hold in today's agencies and how these practices can help foster more efficient, effective environments. 
(WHITE PAPER) READ ABSTRACT |

Compliant Media Management: Best Practices Guide by Iron Mountain

May 2011 - (Free Research)
By following established best practices, you have the opportunity to both reduce the risks associated with a data breach and improve the overall efficiency of your media management program. Check out this E-Guide to learn the five key Best Practices Areas that your organization needs to know about, and more. 
(WHITE PAPER) READ ABSTRACT |

Worst Practices in Predictive Analytics by Information Builders

August 2012 - (Free Research)
According to IDC, predictive analytics has the potential to generate an average ROI of 145% -- but most companies today have implemented it incorrectly, thus preventing them from seeing any benefit. This paper explores the 5 common worst predictive analytics practices and provides you with 6 key steps to ensure a successful implementation. 
(WHITE PAPER) READ ABSTRACT |

Accelerate Performance in Human Resources by SAP America, Inc.

January 2012 - (Free Research)
This white paper addresses HR challenges and metrics solutions for improving operations. 
(WHITE PAPER) READ ABSTRACT |

Virtualization Best Practices to Accelerate Virtual Machine Migration by VMware, Inc.

April 2013 - (Free Research)
This expert e-guide discusses virtualization best practices and key advice about accelerating VM migration with VM provisioning software. 
(EGUIDE) READ ABSTRACT |

Key Strategies for your application integration approach by Oracle Corporation

October 2011 - (Free Research)
Application integration practices have their own patterns and languages and over the past few years the number of practices have grown immensely. This eguide will gives you expert advice on strategies for multiple application integration practices. 
(EGUIDE) READ ABSTRACT |

Mainframe Tape Technology: Eight Myths, Realities and Best Practices by CA Technologies.

July 2008 - (Free Research)
Read this paper to learn how organizations can mitigate risk, reduce TCO, address compliance requirements and optimize security and support by better managing and automating key tape-related processes, creating broad strategies for retention and encryption and implementing best practices. 
(WHITE PAPER) READ ABSTRACT |

Good to Great: Transform IT through Service Lifecycle Management by Hewlett-Packard Company

June 2008 - (Free Research)
This paper examines service lifecycle management SLcM and the ITIL v3 principles on which it is based. It shows how SLcM provides the framework for organizations to optimize business outcomes and facilitates continual service improvement. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Security Best Practices by SearchSecurity.com

April 2012 - (Free Research)
While mobile devices have become a key tool for businesses today, it has also introduced a number of security risks that must be addressed. In this expert guide, uncover some of the best mobile security practices and how to balance security and end-user morale. 
(EGUIDE) READ ABSTRACT |

User Profile Manager Best Practices Guide by Citrix

February 2009 - (Free Research)
This document provides the best practices for addressing the "last write wins" issue and key profile use case scenarios that can dramatically benefit with a User Profile Manager solution. 
(WHITE PAPER) READ ABSTRACT |

E-Book: The New Best Practices for Document Imaging, OCR, and Scanning by Nuance

July 2011 - (Free Research)
Successful document management begins with efficient and well-managed document imaging, scanning and capture processes. This eBook examines the latest trends in document imaging and scanning, as well as optical character recognition (OCR), and provides expert advice on best practices in those areas. 
(EBOOK)

Strategic Meeting Management: Best Practices for Success: A Tips and Tools Guide to Effective Implementation by StarCite

August 2008 - (Free Research)
In studying the best practices in strategic meeting management, there's proven evidence that a "managed" meetings program can generate significant and immediate cost savings for corporations of all sizes. 
(WHITE PAPER) READ ABSTRACT |

Five Areas of Records and Information Management Best Practices by Iron Mountain

June 2012 - (Free Research)
More than 73% of CIOs, general counsel and records managers surveyed in a recent compliance benchmark study indicated they do not proactively monitor their records program for compliance. Out of 4,000 respondents, 42% have no formal information security program and 61% struggle with discovery. Where does your company’s policy fall? 
(WHITE PAPER) READ ABSTRACT |

Virtualizing DR Best Practices for Leveraging Virtualization in Your Disaster Recovery Site by Citrix

January 2009 - (Free Research)
In this document George Crump explains key components in leveraging virtualization at DR site, some of the do's and don'ts, and how to get the most out of that investment. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Database Development Best Practices by Dell Software

April 2008 - (Free Research)
Check out the Best Practices video with Steven Feuerstein. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Best Practices for Unified Communications Migrations and Management by Dell Software

March 2012 - (Free Research)
In this presentation, Joel Blaiberg, author of “Four Steps to Planning a Successful Migration” shares key migration strategies, and best practices that can save your organization time and money when migrating communications to Office 365 or an on-premises or a hybrid environment. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Key Steps to Improving Enterprise Records Management by Iron Mountain

June 2013 - (Free Research)
Businesses are always looking for ways to improve. However, the challenges involved in applying consistent policies and executing centralized management oversight for all records are making it difficult for many enterprises to achieve the desired results. View this resource to uncover some of the biggest challenges. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 455 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts