file management

Results 76 - 100 of 148Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Aug 18, 2010
This paper discusses how consolidating your Microsoft® SQL Server®, Exchange, and SharePoint® Server data along with your Windows® files using NetApp® storage for Windows environments reduces the cost of physical storage as well as ongoing management costs in Windows environments.
Tags : 
netapp, storage, windows environment, microsoft, consolidation, server data, unified storage, database development, data integration
    
NetApp
Published By: IBM Corporation     Published Date: Apr 26, 2010
Register now to access a Smart Archive Strategy Library of assets that will help you make a case for the unified collection and classification of content and data.
Tags : 
ibm filenet, mail archiving, sharepoint archiving, file share archiving, backup and recovery, smart archive, information management, storage management
    
IBM Corporation
Published By: NetIQ     Published Date: Jul 07, 2011
Controlling distribution of passwords to highly sensitive environments in no longer enough; learn more about Privileged identity management (PIM) and what you can do to monitor and control your business to finest level of detail possible.
Tags : 
netiq, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester, fraud management, pattern recognition
    
NetIQ
Published By: IBM Unica     Published Date: Sep 08, 2011
This SiriusDecisions vendor profile features Unica, which offers a marketing automation platform that includes online and offline campaign management, Website and content personalization, activity-based campaign triggers, lead management, and customer data and Web analytics.
Tags : 
ibm, unica, siriusdecisions, vendor profile, field marketing, automation platforms, integrated enterprise, demand creation provider grid
    
IBM Unica
Published By: CDW     Published Date: Apr 04, 2016
The EMC VNX family delivers industry-leading innovation and enterprise capabilities for file and block storage in a scalable, easy-to-use unified storage solution. VNX storage combines powerful and flexible hardware with advanced efficiency, management, and protection software to meet your economical, and performance needs. With the VNX you can consolidate multiple workloads and still enjoy the best economics for yoru virtual and physical applications without compromise. The VNX allows you to enjoy the performance of flash at the cost-effectiveness of disk for all your mixed workloads. With industry leading application integration, you can start small and scale to multi-petabyte environments, you can utilize automated storage tiering, encryption, local and remote protection all while knowing that VNX is trusted by tens of thousands of customers.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence, data management, virtualization, infrastructure
    
CDW
Published By: DocuSign     Published Date: Jul 25, 2016
This short video profiles the use of DocuSign in Insurance with a special focus on our customer’s customer. See first hand how DocuSign improves customer experience, maximizes ROI, and ensures compliance as the global standard for Digital Transaction Management in Insurance
Tags : 
    
DocuSign
Published By: CDW - EMC     Published Date: Apr 07, 2016
The EMC VNX family delivers industry-leading innovation and enterprise capabilities for file and block storage in a scalable, easy-to-use unified storage solution. VNX storage combines powerful and flexible hardware with advanced efficiency, management, and protection software to meet your economical, and performance needs. With the VNX you can consolidate multiple workloads and still enjoy the best economics for yoru virtual and physical applications without compromise. The VNX allows you to enjoy the performance of flash at the cost-effectiveness of disk for all your mixed workloads. With industry leading application integration, you can start small and scale to multi-petabyte environments, you can utilize automated storage tiering, encryption, local and remote protection all while knowing that VNX is trusted by tens of thousands of customers.
Tags : 
storage management, performance management, best practices, application integration, software protection, business intelligence, it management, enterprise applications
    
CDW - EMC
Published By: Oracle     Published Date: Feb 10, 2016
In every company, today's ideas determine tomorrow's market profile. With rising competition, success can be achieved through a well-defined innovation process--one that connects upstream idea valuation to downstream production and release-to-market. To accomplish this, companies need to take a holistic approach to innovation management, connecting the process throughout all phases of the innovation lifecycle.
Tags : 
oracle, innovation management, best practices, holistic process, innovation process, innovation lifecycle, it management, wireless, data management
    
Oracle
Published By: EMC Backup & Recovery Solutions     Published Date: Mar 22, 2010
In this Solution Profile, we will concentrate on the importance of optimizing data protection for evolving virtual networks, and on working with a trusted partner. Virtualization technology works across all sizes of business to reduce costs, control management overhead, and increase flexibility. However, virtualization also requires that companies adapt their traditional backup and data protection practices to suit the rapidly changing virtualization infrastructure.
Tags : 
emc, vmware, taneja, virtual environments, virtualization, backup, data protection
    
EMC Backup & Recovery Solutions
Published By: HP and Intel® Xeon® processors     Published Date: Oct 04, 2012
Get help evaluating your next purchases and accelerate the business value of IT as your datacenter continues to evolve. Download this Technical Adoption Profile on How Blade Servers Impact Datacenter Management and Agility from Forrester Research.
Tags : 
blade servers, datacenter, agility, intel, business technology, data center
    
HP and Intel® Xeon® processors
Published By: IBM     Published Date: Dec 11, 2012
You've got a scanner, and you have a lot of paper to manage. Now what? Scanning documents one by one may fall short of modern approaches in terms of efficiency and time. There are plenty of solutions, but which one is right for you?
Tags : 
capture, ibm, file capture, data management, efficiency, time, technology, enterprise applications, business technology
    
IBM
Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, security, business technology
    
Intralinks
Published By: Globalscape     Published Date: Jun 27, 2014
Globalscape’s Enhanced File Transfer™ (EFT™) High Security module (HSM), with the Auditing and Reporting module (ARM), helps achieve or exceed security practices mandated by the most rigorous standards, including PCI DSS, FIPS 140-2 Validation, HIPAA, and Sarbanes-Oxley. This whitepaper discusses how EFT, the HSM, and ARM can help you achieve compliance and stay compliant with the PCI DSS.
Tags : 
globalscape, enhanced file transfer, high security module, auditing, reporting, security practices, compliance, file transfer, records management, information management
    
Globalscape
Published By: Globalscape     Published Date: Jun 27, 2014
The PCI Security Standards Council issued version 3 of their PCI DSS guidelines for processing electronic payments. Our whitepaper details the newest additions to the guidelines as well as tools and resources to help organizations comply with the standards.
Tags : 
globalscape, file transfer, security, compliance, payment information, electronic payments, ecommerce, security, information management, electronic processing
    
Globalscape
Published By: Dropbox for Business     Published Date: May 07, 2015
Dropbox is named the most popular Enterprise File Sync and Share Product over other vendors like Microsoft, Google Drive and Box.
Tags : 
efss, enterprise file sync and share, hybrid-cloud systems, data management, cloud migration, enterprise deployments, cloud computing, data integration, research, infrastructure management
    
Dropbox for Business
Published By: Box     Published Date: Nov 09, 2014
Box recommends this report for any growing business or company considering an investment in enterprise content collaboration and cloud file sharing. Both let users access important content simply and securely, on any device: desktop, laptop, phone or tablet.
Tags : 
box, file sharing, ecm, enterprise content management, cloud file sharing, collaboration, mobile workers, cloud computing
    
Box
Published By: Soonr     Published Date: Sep 03, 2014
Download to learn how Calamar Construction used the Soonr Workplace secure online fire sharing solution to solve several workplace challenges.
Tags : 
soonr, construction, online file sharing, secure file sharing, file sharing solution, workplace challenges, project management, knowledge management, enterprise applications, data management, cloud computing
    
Soonr
Published By: Soonr     Published Date: Sep 03, 2014
Business happens at the speed of “right now” across departmental, physical, geographical and organizational lines. Secure, anywhere, anytime access to the most up-to-minute business content ensures that employees, partners and customers can do business faster. Neither remote VPN access nor cloud-only sharing solutions provide the flexibility, security, and universal access required to support today’s business. What’s needed is a solution that offers the benefits of cloud-based file access along with the control and manageability of local file systems. Discover the Soonr Hybrid Cloud Sync and Share Solution that preserves existing file server infrastructure, while delivering complete mobile file sharing and collaboration capabilities.
Tags : 
soonr, cloud, sync and share, security, solutions, business support, vpn access, cloud sharingsoonr, network storage, file sharing, cloud file sharing, hybrid cloud, mobile file sharing, efss, it management, hybrid it, sync and share, vpn access, networking, cloud computing
    
Soonr
Published By: Soonr     Published Date: Sep 03, 2014
Download this guide for a critical look at 6 EFSS products - Accellion, Anchor/eFolder, Citrix Sharefile, Google Drive, Microsoft OneDrive and Soonr Workplace. In each of the first five, you'll discover 10 reasons why they are not well-suited for business. Then see how Soonr Workplace delivers mobile file sharing and collaboration in an enterprise-grade solution.
Tags : 
soonr, file sharing, mobile file sharing, file synchronisation, mobile collaboration, file storage, cloud file sharing, hybrid cloud, file sharing security, it management, knowledge management, efss solutions, hybrid cloud, enterprise applications, data center
    
Soonr
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware AirWatch
Published By: Profiles International     Published Date: Apr 08, 2011
Employee assessments can give organizations and managers consistent, in-depth, and objective information about their people. This Information helps leaders and managers rely less on gut instinct and make smarter people decisions.
Tags : 
employee assessment, job performance, hard skills, soft skills, job matching, employment lifecycle, productivity, roi, engagement, retention, organizational culture, climate, acquisition, utilization, efficiency, team chemistry, potential, solutions
    
Profiles International
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept