HIT Consultant Insightful coverage of healthcare innovation
 

it discovery

Results 176 - 200 of 211Sort Results By: Published Date | Title | Company Name
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Shavlik Security Suite can patch online and offline virtual machines; works both with an agent-based or agentless approach; supports legacy Windows platforms and a wide range of Microsoft and third-party applications; and furthermore provides strong control of scanning options, and a level of automated remediation that is impressive.
Tags : 
shavlik, security suite, virtual machine, legacy windows platform, third-party application, protection management, automated discovery, scanning, configuration management
    
Shavlik Technologies
Published By: Mimecast     Published Date: Oct 25, 2010
Download this whitepaper for 12 steps that ensure good evidential quality of email.
Tags : 
mimecast, email quality, civil procedures rules, email system, e-discovery
    
Mimecast
Published By: BlackBerry     Published Date: Jul 23, 2010
Investing in mobility is like investing in any other important business activity, and its success will largely depend on how closely it is aligned with both business and IT drivers. A successful mobility plan should focus on 'mobilizing' your critical business processes and include planning phases for discovery, development and deployment. This Guide focuses on how to build an effective mobility plan while providing valuable insight into the benefits of mobilizing your business applications.
Tags : 
blackberry, mobility, smartphones, cell phones, mobile workforce, e-commerce, handset, touchpoint
    
BlackBerry
Published By: Proofpoint     Published Date: Apr 22, 2010
This whitepaper addresses the key e-discovery challenges facing legal and IT departments today, form the impact of regulations such as the Federal Rules of Civil Procedure (FRCP) to the technology required to deal with them. Finally, this paper describes how businesses can develop a proactive strategy to deal with e-discovery requests in the event of litigation, saving time and money in the process.
Tags : 
proofpoint, email archiving, e-discovery, federal rules of civil procedure, frcp, electronic data, search and retrieval of messages
    
Proofpoint
Published By: ASG Software Solutions     Published Date: Mar 10, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, ema, configuration management, itsm, bsm, itil, asg, ddm, cms, bsm, bsp, metacmdb, configuration management, metadata, metacmdb, lob, sdm
    
ASG Software Solutions
Published By: Bloofusion     Published Date: Mar 01, 2010
Use the ten tough questions to quiz and help select your next SEO firm more effectively. Whether you are a CMO at billion dollar software firm or running your own online enterprise, at some point optimizing your site for discovery and favorable ranking by search engines for the terms that result in lead generation or purchase will become a priority.
Tags : 
bloofusion, ecommerce, url, ids, seo, cookie, optimization, tags, traffic
    
Bloofusion
Published By: Mimecast     Published Date: Feb 05, 2010
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage
    
Mimecast
Published By: Trend Micro SPN     Published Date: Nov 24, 2009
How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, infected, recovering, instant messaging
    
Trend Micro SPN
Published By: Mimecast     Published Date: Aug 19, 2009
Businesses over the past ten years have used email archiving solutions in order to meet record retention compliance, facilitate electronic discovery, and control message-related storage costs. Despite these benefits, many organizations still have not adopted an archiving solution and still simply enforce mailbox quotas or message deletion policies as the best way to manage messaging environments.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage
    
Mimecast
Published By: Numara Software     Published Date: Jul 16, 2009
See how this integrated out-of-the-box help desk, asset management and Change Management solution can help solve many IT help desk problems with ease.• Easily create tickets and requests • Automate repetitive workflows • Perform asset discovery • Manage software license compliance • Run pre-built dashboards and reports 
Tags : 
numara, help desk management, track it, asset management, asset discovery, tickets, requests, dashboards, license compliance, change management, processes, sla, service level agreement, best practices
    
Numara Software
Published By: IBM ILOG.     Published Date: Jul 14, 2009
Join product experts from IBM Rational and ILOG, IBM's newest acquisition, as they discuss how application discovery, analysis and business rule management solutions can provide immediate and affordable value; not only as your bridge to SOA, but as your future competitive advantage.
Tags : 
ibm, brms, ilog, acquistion, discover, application, business, analysis, management, solutions, value, soa, competitive advantage
    
IBM ILOG.
Published By: Numara Software     Published Date: Jul 09, 2009
In this informative webinar, you will learn about the challenges of implementing configuration management along with suggestions on how to get started, and best practices to ensure success. You will also learn how Numara® FootPrints® Configuration Management, with its fast implementation, practical approach to implementing configuration management and automated integration to auto-discovery tools, takes the pain and time out of creating and maintaining a functional CMDB. Learn more today!
Tags : 
configuration management, cmdb, numara, footprints, auto-discovery tools, hardware, itil, service management, call volume, it budget, service channel management, customer experience, sla, service management solution, projects, surveys, workflow, service desk, tracking, billing
    
Numara Software
Published By: Trend Micro SPN     Published Date: May 15, 2009
Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, threat discovery, worms, trojans, infected, recovering, instant messaging
    
Trend Micro SPN
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. Security requirements affect almost every business process and system, and successful security measures help protect a business’ brand value, stakeholder confidence, risk management strategies, and compliance status. Requirements vary among industries, geographies, and regions, but the need to protect privacy, retain important data, and facilitate e-discovery are common to all. This paper provides an overview of the regulatory landscape and identifies steps to take for defining a flexible compliance strategy.
Tags : 
trend micro, trend, e-discovery
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn, litigation, fines, personally identifiable information, pii, pci, payment card industry, phi, protected health information, pfi, personal financial information, pfi access control, audit
    
Trend Micro, Inc.
Published By: Mimecast     Published Date: Apr 16, 2009
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.
Tags : 
mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance
    
Mimecast
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Download this white paper to discovery the site-to-site channel bonding capabilities of PowerLink. Site-to-site channel bonding enables two or more sites with PowerLink installed to communicate with each other using the combined throughput of one or more connected WAN links. Learn more today!
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : 
ibm integrated data management, siebel crm, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth, data classification
    
IBM
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : 
ibm integrated data management, oracle e-business suite, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth, data classification
    
IBM
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : 
ibm integrated data management, jd edwards, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth, data classification
    
IBM
Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation, security, finra, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services
    
123Together
Published By: Mimosa Systems     Published Date: Jan 14, 2009
This paper describes how Cost and Breakeven Analysis of Email Discovery Using Mimosa NearPoint Email Archiving with eDiscovery Option. This customer is one of the largest manufacturers and marketers of healthcare supplements in North America with corporate headquarters in California. The company wanted to solve two related problems: eDiscovery risk and cost and PST propagation.
Tags : 
mimosa systems, ediscovery option, ediscovery risk, pst propogation, mimosa nearpoint
    
Mimosa Systems
Published By: Mimosa Systems     Published Date: Jan 14, 2009
Email archiving is emerging as a critical new IT application for managing email. For legal discovery, storage management, and regulatory compliance, email archiving provides important benefits that cannot be achieved with native email applications. The purpose of this “Email Archiving 101” paper is to provide a basic introduction to email archiving and explain how it benefits management of the email application server. The leading enterprise email application is Microsoft® Exchange Server, and this paper is geared toward this application; however, the principles discussed apply to all messaging applications.
Tags : 
mimosa systems, email archiving, mimosa nearpoint, microsoft exchange server, email applications, enterprise email application
    
Mimosa Systems
Published By: Mimosa Systems     Published Date: Jan 14, 2009
This white paper will present an improved approach to legal discovery for Microsoft® Exchange systems provided by Mimosa Systems. Unlike existing methods for legal discovery of Exchange Server data, Mimosa’s approach delivers major advances in performance and granularity of information. To begin this paper, we will review the industry forces that are driving the need to manage email for legal discovery, followed by a discussion of the market-leading enterprise messaging application—Microsoft Exchange Server and the challenges it presents for legal discovery.
Tags : 
mimosa systems, microsoft exchange systems, legal discovery, email for legal discovery
    
Mimosa Systems
Published By: BrightCove     Published Date: Nov 18, 2008
With the explosive growth of online video, traditional SEO has taken on a new dimension: video search and discovery. De-mystify the world of video search with a practical framework for video SEO and increase the value of your video content.
Tags : 
brightcove, video seo, contextual publishing, inbound links, video feeds & sitemaps, metadata, site architecture, emerging techniques, search engine optimization
    
BrightCove
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.