Secure Content Management White Papers

Secure Content Management is any of the strategies and technologies employed in the information technology industry for managing the capture, storage, security, revision control, retrieval, distribution, preservation and destruction of documents and content.
Results 1 - 25 of 136Sort Results By: Published Date | Title | Company Name
By: Box     Published Date: Oct 22, 2014

Box helps Marketing teams save time, keep branding consistent and increase efficiency. Learn how Box helps Marketers send large files, work with agencies and create campaigns quickly and productively.

Tags : box, marketing, large files, file transfer, marketing campaigns, productivity, email security, wireless messaging
    
By: MaaS360 by Fiberlink     Published Date: Sep 30, 2014

There's an app for that, but is it secure? Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process.

Tags : application security, mobile enterprise, malm, device compliance, data loss prevention, it management, application performance management, best practices
    
By: Bit9     Published Date: Sep 30, 2014

Retailers and other covered organizations face increasing pressure to not only comply with PCI DSS 3.0, but to also protect servers and endpoints from evolving security threats. This new white paper explains how a positive security solution can help you achieve both goals, and avoid the costs and risks of non-compliance and/or a security breach.

Tags : pci compliance, endpoint monitoring, dss security, security solutions, security, it management, content management system, secure content management
    
By: Bit9     Published Date: Sep 30, 2014

This new eBook explains how a single, positive security solution, such as Bit9, facilitates the convergence of compliance and security—one agent that provides visibility, detection, response and protection and can automate and manage compliance for PCI-DSS, SOX, HIPAA, FISMA, GLBA, GPG 13, NERC CIP and other regulations.

Tags : it security, pci compliance, industry regulations, security solutions, security, it management, risk management, content management system
    
By: Box     Published Date: Jul 02, 2014

Today, marketers face many challenges, and often have to do more with less. These are important challenges for marketers and with less visibility but increased need to produce more, marketing teams are facing larger hurdles than ever before. There’s a better, more productive way to work as a marketer: Download this white paper to discover how.

Tags : box, marketing tools, files, ftp, video files, collateral, storage budget, marketing roi
    
By: Lumension     Published Date: Feb 07, 2014

Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.

Tags : lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
    
By: Lumension     Published Date: Feb 07, 2014

Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?

Tags : lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content
    
By: Lumension     Published Date: Feb 07, 2014

Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.

Tags : lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products
    
By: Bit9     Published Date: Sep 30, 2014

In October 2013, Bit9 conducted its third-annual survey on server security. In the past year, the inability to detect or stop advanced attacks has remained a constant challenge for enterprises. This survey was designed to analyze these challenges from respondents who are responsible for their organization’s security posture.

Tags : server security, virtual servers, data breaches, targeted attacks, security, business analytics, risk management, secure content management
    
By: Sourcefire, LLC     Published Date: Sep 30, 2014

As threats continue to penetrate networks, organizations need to find new ways to defend against them. NSS Labs recently conducted the most rigorous next-generation firewall (NGFW) testing to date. Cisco ASA with FirePOWER Services excelled as compared to other tested products. Download this Data Sheet now to find out how Cisco ASA with FirePOWER Services excels in NSS Labs Testing.

Tags : cisco, sourcefire, network security, firewall security, next-generation firewall, ngfw, nss, nss labs
    
By: Arbor     Published Date: Sep 15, 2014

Sicherheitsanalysen stellen eine neue Anforderung im laufenden Wettrüsten zwischen Angegriffenen und Angreifern dar

Tags : security analytics, it security, cyber defenses, application security, firewalls, hacker detection, security management, secure content management
    
By: ForgeRock     Published Date: Sep 02, 2014

Watch this Gigaom Research On-Demand Webinar ; we will examine the immediate need to extend identity to customer audiences, the risks of doing so using legacy software, and the most effective path businesses can take to build for the future while recognizing value today.

Tags : forgerock, api, customer service, crm, business intelligence, business data, access management, identity management
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper debunks 7 virtualization DR myths

Tags : virtualization myths, disaster recovery, back up, high availability, virtual servers, data protection, backup and recovery, clustering
    
By: bitglass     Published Date: Aug 19, 2014

In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.

Tags : bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach
    
By: Citrix     Published Date: Jul 25, 2014

This paper presents 10 key points to consider as you develop your enterprise mobility strategy, encompassing security, user experience, IT operations and BYOD.

Tags : citrix, enteprise mobility, mobile workers, byod, remote access, end point security, mobile security, mobile application management
    
By: Citrix     Published Date: Jul 25, 2014

Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.

Tags : mobility, management, boyd, secure app, data delivery, security management, smart phones, secure content management
    
By: Box     Published Date: Jul 02, 2014

Today, businesses of all sizes are adopting cloud services to accelerate growth, create more efficient operations and expand their reach. In this white paper, you’ll find scenarios and economic justification for making a shift to enterprise content collaboration with Box.

Tags : box, collaboration, lan, infrastructure, data storage, data space, networking, storage
    
By: Foxit     Published Date: Jun 30, 2014

This whitepaper explains how Foxit is helping organizations standardize a PDF vendor which enhances user productivity and improves procurement efficiency.

Tags : foxit, pdf, pdf vendor, mobile pdf, file sharing, records management, rights management, pdf reader
    
By: HP     Published Date: Jun 27, 2014

Following a series of in-depth interviews with Senior IT professionals in various industries this video provides their findings and the direct and in-direct value derived from using HPs Backup, Recovery and Archiving solutions.

Tags : backup, recovery and archiving, hp solutions, storage, backup and recovery, storage area networks, storage management, storage virtualization
    
By: SilverSky     Published Date: May 22, 2014

Are you looking to enhance security and regulatory compliance around email, without having to add staff? SilverSky offers a game-changing Email Data Loss Prevention (DLP) solution, run on IBM SoftLayer, which can help. Read this paper to learn more and for helpful tips on preventing data loss.

Tags : silversky, ibm, email, email services, email service providers, email protection, email security, email data loss prevention
    
By: SilverSky     Published Date: May 22, 2014

Companies today are able to focus more time on their core competencies by trusting email and other resource-intensive activities to experts in the cloud. Thinking of moving services to the cloud? Read SilverSky’s comprehensive list of things to consider when evaluating cloud-based email solutions.

Tags : silversky, ibm, cloud, cloud-based email, cloud business email, email service, email solutions, cloud based email solutions
    
By: EarthLink Business     Published Date: May 15, 2014

This paper covers the latest security trends, reinforces best practices in securing a cloud infrastructure, and outlines how best to meet compliance requirements (e.g., PCI, HIPAA).

Tags : earthlink, cloud infrastructure, cloud computing, midsize businesses, cloud security, mobile security, workforce collaboration, earthlink
    
By: Box     Published Date: May 12, 2014

This recorded discussion will explain how you you can use Box's solutions to create, share, and collaborate on a marketing campaign from start to finish.

Tags : roi, marketing, collaboration, marketing roi, marketing project, file sharing, collaborate, ftp
    
By: Ipswitch     Published Date: May 02, 2014

With fewer resources and an increasing volume and size of file transfers each year, moving files in the extended enterprise has never seemed more complex. In this whitepaper, you’ll learn how to tackle the challenge of higher costs, increasing volume and size of file transfers, and fewer resources with one mature, managed file transfer process.

Tags : ftp client, ftp server, sftp client, ftp software, large file transfer, secure email service, ftp program, sftp server
    
By: Allscripts     Published Date: May 01, 2014

Virdee Medical, a busy private pediatric practice, traded paper charts for a hosted Allscripts solution in 2010. Now, with the improved efficiencies of Allscripts Professional in a hosted environment, Virdee Medical can focus more intently than ever on providing the highest quality patient care.

Tags : allscripts, virdee medical, ehr, practice management, electronic health record, time and investment, pediatric practice, allscripts professional
    
Start   Previous   1 2 3 4 5 6    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.