Secure Content Management White Papers

Secure Content Management is any of the strategies and technologies employed in the information technology industry for managing the capture, storage, security, revision control, retrieval, distribution, preservation and destruction of documents and content.
Results 1 - 25 of 146Sort Results By: Published Date | Title | Company Name
By: Nexgate     Published Date: Jun 17, 2015

This report will outline a framework for assigning roles and responsibilities to manage social media risk.

Tags : proofpoint, nexgate, social media risk, social media, risk management, compliance, security policies, content delivery
    
By: 123Together     Published Date: Feb 05, 2009

Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity

Tags : 123together, it strategies, ediscovery, finra, regulation, security, finra, contact management
    
By: Diligent Corporation     Published Date: Jun 29, 2015

This paper reveals how the paperless workplace has been a much-pursued goal for almost as long as there have been computers in the office.

Tags : technology, board, paperless, paperless workplace, workplace, board portals, boardroom, electronic board solution
    
By: Diligent Corporation     Published Date: Jun 29, 2015

This white paper shows how board portals can help directors and company secretaries be more effective and secure in how they communicate.

Tags : board portal, advantages board portal, sharing documents, sharing information, benefits of board portals, electronic board solution, electronic board meeting, electronic board papers
    
By: Kaspersky     Published Date: Jun 15, 2015

Download Kaspersky Lab’s “Endpoint Security for Business: Technology in Action” to learn about threats you can see and those you can’t.

Tags : kaspersky, endpoint security, threats, threat management, data protection, network security, email security, hacker detection
    
By: Box     Published Date: May 28, 2015

This report illustrates how you can fast track your mobile and external collaboration initiatives.

Tags : sync, efss, mobility, track your mobile, security, cloud, hybrid, storage
    
By: Kaspersky     Published Date: May 11, 2015

Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isn’t enough.

Tags : kaspersky, cybersecurity, mitigation, online attacks, cyberattack, threat, threat protection, network security
    
By: Nexsan by Imation     Published Date: May 11, 2015

Heightened physical security concerns spanning all industries, coupled with technological advancements is driving the requirement for higher camera resolutions, more fields of view with wider dynamic range and longer storage retention periods.

Tags : imation, nexsan, physical security, camera, surveillence, storage, online surveillance, storage management
    
By: Document Cloud for Enterprise     Published Date: Apr 23, 2015

This white paper illustrates how Financial Services industry can simplify document communication, reduce costs and speed business.

Tags : fiance digital document, digital documents, benefits of using adobe document cloud, advantages of using digital documents, esign, content delivery, content management system, document management
    
By: Intel Security     Published Date: Feb 23, 2015

This paper reveals how cloud and compliance could be in one thanks to McAfee Enterprise Security Manager.

Tags : security information, security connected framework, big security data, big data, log management, siem, security event management, application security
    
By: NextGen     Published Date: Jan 29, 2015

Learn how Mirth’s HIE solution can support your growth, ease data sharing, and help you reach your goals. In this case study, you'll learn why the Chesapeake Regional Information System for our Patients (CRISP) moved to Mirth® solutions.

Tags : mirth, hiw, total cost, erp, system, information, connect, technology
    
By: Entrust     Published Date: Jan 16, 2015

Upon issuance, all SSL digital certificates have a finite lifespan and are no longer recognized as valid upon expiration. Certificates may have varying periods of validity and are often set to expire anywhere between one and five years based on company policy and/or cost considerations. This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.

Tags : entrust, ssl, certificates, security, professionals, management, lifecycle, certificate
    
By: Skyword     Published Date: Nov 14, 2014

Eventually, you’ll want to move your content strategy past awareness-driven content creation and start converting leads. To show meaningful content ROI, you must have a framework in place to create a diverse array of custom content, and this free eBook will give you the tools and strategy to get started. Download it today!

Tags : content strategy, content marketing, b2c content, b2b content, content marketing platform, content marketing agency, brand content, branded content
    
By: Kaseya     Published Date: Nov 12, 2014

While there are an innumerable number of ways you could improve your business’s information security posture, for the sake of brevity let’s shorten that list to the methods which often provide great benefits. Here are five ways that you can help your business reduce the chance of being victimized by cybercrime.

Tags : kaseya, cybercrime, reduce risk, cyber attacks, audits, authentication, security, automation
    
By: Box     Published Date: Nov 09, 2014

Read how some of the nation’s most progressive corporations are meeting the many needs of their mobile workers — without overwhelming their IT departments — with the help of Box.

Tags : box, file sharing, mobile workers, mobile phones, smartphones, collaboration, storage, remote access
    
By: Box     Published Date: Nov 09, 2014

Box recommends this report for any growing business or company considering an investment in enterprise content collaboration and cloud file sharing. Both let users access important content simply and securely, on any device: desktop, laptop, phone or tablet.

Tags : box, file sharing, content sharing, mobile workers, collaboration, cloud file sharing, network architecture, remote access
    
By: Box     Published Date: Nov 09, 2014

Join guest speakers Rob Koplowitz, VP and Principal Analyst at Forrester Research, Ted Schadler, VP and Principal Analyst at Forrester Research, and Whitney Bouck, SVP & GM of Enterprise at Box, for a complimentary webinar that will help you create a 3-step plan to select the right vendor for your business needs

Tags : box, content file sharing, collaboration, content sharing, mobile workforce, cloud computing, cloud storage, infrastructure
    
By: Box     Published Date: Nov 09, 2014

Box recommends this report for any growing business or company considering an investment in enterprise content collaboration and cloud file sharing. Both let users access important content simply and securely, on any device: desktop, laptop, phone or tablet.

Tags : box, file sharing, ecm, enterprise content management, cloud file sharing, collaboration, mobile workers, backup and recovery
    
By: IBM     Published Date: Nov 05, 2014

This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.

Tags : ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security
    
By: IBM     Published Date: Nov 05, 2014

How security and business continuity can shape the reputation and value of your company.

Tags : ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security
    
By: MaaS360 by Fiberlink     Published Date: Sep 30, 2014

There's an app for that, but is it secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.

Tags : application security, mobile enterprise, malm, device compliance, data loss prevention, it management, application performance management, best practices
    
By: Bit9     Published Date: Sep 30, 2014

Retailers and other covered organizations face increasing pressure to not only comply with PCI DSS 3.0, but to also protect servers and endpoints from evolving security threats. This new white paper explains how a positive security solution can help you achieve both goals, and avoid the costs and risks of non-compliance and/or a security breach.

Tags : pci compliance, endpoint monitoring, dss security, security solutions, security, it management, content management system, secure content management
    
By: Bit9     Published Date: Sep 30, 2014

This new eBook explains how a single, positive security solution, such as Bit9, facilitates the convergence of compliance and security—one agent that provides visibility, detection, response and protection and can automate and manage compliance for PCI-DSS, SOX, HIPAA, FISMA, GLBA, GPG 13, NERC CIP and other regulations.

Tags : it security, pci compliance, industry regulations, security solutions, security, it management, risk management, content management system
    
By: Bit9     Published Date: Sep 30, 2014

In October 2013, Bit9 conducted its third-annual survey on server security. In the past year, the inability to detect or stop advanced attacks has remained a constant challenge for enterprises. This survey was designed to analyze these challenges from respondents who are responsible for their organization’s security posture.

Tags : server security, virtual servers, data breaches, targeted attacks, security, business analytics, risk management, secure content management
    
By: Arbor     Published Date: Sep 15, 2014

Sicherheitsanalysen stellen eine neue Anforderung im laufenden Wettrüsten zwischen Angegriffenen und Angreifern dar

Tags : security analytics, it security, cyber defenses, application security, firewalls, hacker detection, security management, secure content management
    
Start   Previous   1 2 3 4 5 6    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.