Spreadsheet Guidelines SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Spreadsheet Guidelines Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Spreadsheets
 •   Security Policies
 •   Security Monitoring
 •   Network Security
 •   Business Intelligence Solutions
 •   Storage Management
 •   Application Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Storage Security

Related Searches
 •   Info About Spreadsheet
 •   Learning Spreadsheet
 •   Packages Spreadsheet Guidelines Security
 •   Records Spreadsheet Guidelines
 •   Remote Spreadsheet Guidelines Security
 •   Spreadsheet Billing
 •   Spreadsheet Guidelines Security Programs
 •   Spreadsheet Guidelines Security Video
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Getting the Most From Your SAP Production Reports by Symtrax Corporation

September 10, 2010 - (Free Research)
This eight-page whitepaper is a guideline for improving the rendering and efficiency of the complete SAP production reporting system. It discusses how to leverage the value of existing systems reports, and how to deliver timely, properly formatted reports and business documents. 
(WHITE PAPER) READ ABSTRACT |

The Critical Security Controls – Moving Beyond the Checklist Mentality by Lumension

August 13, 2009 - (Free Research)
The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization. 
(PODCAST) READ ABSTRACT |

Fast, Accurate Management Reporting: eight reasons why spreadsheets may be letting you down. by Indicee

April 05, 2010 - (Free Research)
While spreadsheets are useful for one off analysis and modeling, they’re not ideal for repeatedly creating reports from large volumes of data. More users are now replacing their spreadsheet based systems with Indicee. By doing so they are improving the timeliness and reliability of their business information with a cost-effective alternative. 
(WHITE PAPER) READ ABSTRACT |

The Risks of Using Spreadsheets for Statistical Analysis by IBM

October 26, 2011 - (Free Research)
This paper presents some points you should consider if you use, or plan to use, a spreadsheet to perform statistical analysis. It also describes an alternative that in many cases will be more suitable. 
(WHITE PAPER) READ ABSTRACT |

Controlling Microsoft Excel Chaos With Business Intelligence by Information Builders Inc. (E-mail this company)

August 2006 - (Free Research)
Enterprises can take control of the burgeoning number of unsanctioned spreadsheets by adopting a policy of centralized master spreadsheet generation. Learn how WebFOCUS creates fully summarized, organized, and styled Excel spreadsheets with complex formulas already in place, lowering the potential for keystroke and logic error. 
(WHITE PAPER) READ ABSTRACT |

Orange is the New Black by Innotas

November 2013 - (Free Research)
There's a reason those little boxes on your spreadsheets are called "cells."  In an age of over-crowded budgets and global competition, businesses need their IT organizations to do more than complete projects on time, on budget and with the required functionality. IT must become a true business partner. 
(WHITE PAPER) READ ABSTRACT |

SPSS Statistics White Paper: The Risk of Using Spreadsheets for Statistical Analysis by IBM

July 2013 - (Free Research)
Spreadsheets are widely used for statistical analysis, but only up to a certain point. This paper presents some points you should consider if you use, or plan to use, a spreadsheet to perform statistical analysis. It also describes an alternative that in many cases will be more suitable. 
(WHITE PAPER) READ ABSTRACT |

Transforming Spreadsheets: Planning, Budgeting and Forecasting for Midsize Companies by IBM

February 2011 - (Free Research)
In “Transforming Spreadsheets: Planning, Budgeting and Forecasting for Midsize Companies” you’ll discover how to transform spreadsheet-only processes into an effective financial performance management solution with IBM Cognos Express.  
(WHITE PAPER) READ ABSTRACT |

UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES by Intel

September 2013 - (Free Research)
This expert guide from SearchSecurity.com discusses the new Payment Card Industry (PCI) Mobile Payment Acceptance Security Guidelines and examines how to ensure compliance in a world where mobile payment has become ingrained into everyday life. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Go Forth & Comply - New Virtualization Guidelines from the PCI Council by Dell SecureWorks UK

August 2011 - (Free Research)
In this presentation transcript, principal security consultant at Dell SecureWorks, discuss the issues confronting organizations who wish to use virtualization technologies with their Cardholder Data Environment, summarize and clarify the recommendations from the PCI council and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Windows Mobile Netbook for the Enterprise with Low TCO by Celio Corp / REDFLY Mobile Companion

August 2008 - (Free Research)
The Windows Mobile smartphone is easily deployed with a wide array of productivity tools allowing the mobile user to quickly respond to customer requests, stay up-to-date on the latest company information or access remote desktops. 
(WHITE PAPER) READ ABSTRACT |

The Risks of Using Spreadsheets for Statistical Analysis by SPSS Inc. Worldwide Headquarters

March 2009 - (Free Research)
Are spreadsheets a help or a hindrance when performing data analysis? Get the real story from the author of SPSS for Dummies, Arthur Griffith. In this informative and entertaining webcast, you'll receive expert guidance on the proper uses and limitations of spreadsheets, as well as the strengths and benefits of SPSS Statistics. 
(WEBCAST) READ ABSTRACT |

Setting standards in IT Industries by DLT Solutions

March 2012 - (Free Research)
Building and adhering to security standards are essential for mitigating risk and ensuring adequate IT security. NIST is one of the first risk assessment standards, offering guidelines for securing the IT infrastructure. In this e-guide, gain an in-depth look into NIST and uncover how to decrease the risks that your industry faces. 
(EGUIDE) READ ABSTRACT |

Five data protection guidelines for business continuity - Presentation Transcript by Dell, Inc.

September 2012 - (Free Research)
Jon William Toigo covers data protection guidelines, including mirroring, tape backup and WAN-based replication technologies. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

IBM Lotus Sametime Software Integration with Microsoft Applications: Connecting, Conversing and Collaborating More Conveniently by IBM

March 2009 - (Free Research)
Check out this paper to learn about the many benefits of IBM Lotus Sametime software integration and how it can enhance the collaboration and unified communications capabilities of all your Microsoft Office applications. 
(WHITE PAPER) READ ABSTRACT |

Whitepaper: Dell Storage Selection Guidelines for Oracle Databases by Dell, Inc.

May 2011 - (Free Research)
Dell strives to simplify IT in order to reduce complexity in data centers and has a broad storage product portfolio to meet database customers' needs. These storage selection guidelines will help administrators choose an appropriate storage technology based on their requirements. 
(WHITE PAPER) READ ABSTRACT |

Open Trusted Technology Provider Standard (O-TTPS) by ComputerWeekly.com

April 2013 - (Free Research)
This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Implementing Storage Virt: Guidelines & Factors to Consider by Hewlett-Packard Company

August 2011 - (Free Research)
This SearchVirtualStorage.com E-Guide can help clarify by outlining 4 guidelines for implementing storage virtualization and by divulging factors to consider before deploying storage virt into your IT infrastructure. 
(EGUIDE) READ ABSTRACT |

File Transfer Survey: Results Highlight the Need for a Secure, Cost-Effective FTP Replacement by Attachmate Corporation

August 2010 - (Free Research)
Simply put, traditional file transfer protocol (FTP)-based solutions are ineffective. It's time to upgrade to a new approach that can help you meet data growth and increasingly stringent security and compliance measures head on. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Executive Paper: Oracle Crystal Ball by Oracle Corporation

September 2009 - (Free Research)
Increase revenue. Decrease costs. Reduce development time. Every day you strive to meet these goals. And each business decision you make either enables you to advance toward them - or impedes your progress. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Oracle Hyperion Capital Asset Planning by Oracle Corporation

December 2008 - (Free Research)
With Oracle Hyperion Capital Asset Planning your capital asset plans are an integral part of Oracle Hyperion Planning, allowing you to accurately assess the impact of capital decisions on overall expense plans. Read on to learn more. 
(DATA SHEET) READ ABSTRACT |

Strategy for Securing Mobile Content - 5 Key Guidelines by Accellion, Inc.

June 2013 - (Free Research)
Inside, you'll find 5 guidelines that every organization should follow for comprehensive mobile security. 
(WHITE PAPER) READ ABSTRACT |

Securing the enterprise application layer: Expert Guidelines by IBM

August 2011 - (Free Research)
If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust. 
(EGUIDE) READ ABSTRACT |

Mobile Configuration Management Functions for Successful MDM by Citrix Systems, Inc. (E-mail this company)

March 2013 - (Free Research)
This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more. 
(EGUIDE) READ ABSTRACT |

Mobilizing Windows applications by Citrix

December 2013 - (Free Research)
This whitepaper provides a project design guide that will help you construct and demonstrate a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts