Secure Content Management White Papers

Secure Content Management is any of the strategies and technologies employed in the information technology industry for managing the capture, storage, security, revision control, retrieval, distribution, preservation and destruction of documents and content.
Results 1 - 25 of 115Sort Results By: Published Date | Title | Company Name
By: Dyn     Published Date: Mar 27, 2014

In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

Tags : dyn, email, email security, message, security management, phishing, it management, secure transmission
    
By: Arbor     Published Date: Mar 13, 2014

For hosting and cloud service providers, learn how to secure your data and seize those opportunities of generating more revenue.

Tags : arbor, frost and sullivan, arbor networks, ddos protection, hosting providers, cloud providers, cloud service, attack trends
    
By: Arbor     Published Date: Mar 13, 2014

In this white paper, we’ll examine how the Pravail® portfolio from Arbor Networks can empower your network operations and security teams to more efficiently help protect the integrity and availability of your enterprise network against advanced attacks.

Tags : arbor, arbor networks, enterprise network, global attack, connecting workforces, internal operations, growing revenue, retaining customers
    
By: Arbor     Published Date: Mar 13, 2014

All enterprises need to have mitigation solutions in place. Information security is vital in the workplace and DDoS has become more complex over time. Determine whether services are the best option for primary protection through this whitepaper.

Tags : arbor, idc, distributed denial-of-service, ddos attack ddos solutions, dns reflection, exfiltration of data, security products, the cloud
    
By: Kaspersky     Published Date: Feb 14, 2014

Are you guarding the cyber security gaps with patch management? Download Kaspersky Lab’s latest whitepaper, Your Data under Siege: Guard the Gaps with Patch Management, to learn about: how cybercriminals are utilizing weaknesses in trusted applications to distribute malware.

Tags : patch management, cybersecurity, firewalls, malware, hackers, virus, threats, network security
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection".

Tags : business protection, data protection, business security, it security, business continuity, database security, secure content management
    
By: Lumension     Published Date: Feb 07, 2014

Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.

Tags : lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
    
By: Lumension     Published Date: Feb 07, 2014

Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?

Tags : lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content
    
By: Lumension     Published Date: Feb 07, 2014

Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.

Tags : lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products
    
By: hightail     Published Date: Jan 17, 2014

Learn how the method of data collection and storage has changed and learn the 4 essential stages of managing your content in the digital age.

Tags : enterprise applications, data management, secure content management, cloud computing, content management
    
By: Ipswitch     Published Date: Mar 14, 2014

This newly-released e-Guide provides IT professionals who are “in the trenches” with a concise assessment of the challenges they face with legacy file transfer systems—and looks at innovative solutions and best practices that can solve these problems.

Tags : ipswitch, file transfer, file transfer systems, stagnation, automation, file movement, file security, regulatory compliance
    
By: Ipswitch     Published Date: Mar 14, 2014

In this case study, you’ll learn how Rochester General Hospital leveraged MOVEit’s point and click simplicity to set up, manage and track more than 70 different file transfer operations between hospital servers and the systems used by payers and outside healthcare providers.

Tags : ipswitch, moveit, sensitive data, managed file transfer solution, file transfer, file transfer systems, records management, data security
    
By: Ipswitch     Published Date: Mar 14, 2014

This just-released e-Guide provides IT professionals who are “in the trenches” with a concise assessment of why legacy file transfer systems are no longer adequate in the face of today’s skyrocketing user demands. Specifically, the e-Guide exposes the limitations of “business as usual” file transfer solutions such as FTP and e-mail, and looks at an innovative solution that can make the IT professional’s job much easier

Tags : ipswitch, file transfer, file location, file transfer system, automation, integration, centralization, file transfer solution
    
By: IBM     Published Date: Mar 04, 2014

This paper explores how companies can more safely introduce employee- or corporate-owned mobile devices into the work-place, identify the risks inherent in their broader access to corpo-rate data, and derive enhanced business value.

Tags : ibm, mobile, mobile device, mobile security, security, mobility, enterprise, mobile enterprise
    
By: Adobe     Published Date: Feb 20, 2014

U.K. planning and design consultancy creates sustainable, dynamic, and progressive places for people to live, work, and play by standardizing on Adobe solutions.

Tags : adobe, adobe creative cloud, standardization, collaboration, tco, total cost of ownership, enterprise agreement, software deployment
    
By: Adobe     Published Date: Feb 20, 2014

As a valued customer, Adobe understands that your enterprise takes extensive advantage of our software, with anywhere from hundreds to thousands of licenses for a variety of Adobe solutions. With the Adobe Enterprise Term License Agreement (ETLA), we are now making the management and procurement of your Adobe software simpler, more flexible, and predictable.

Tags : adobe, adobe software, enterprise term licensing, etla, adobe solutions, software management, software compliance, tco
    
By: IBM     Published Date: Jan 09, 2014

Simply put, software defined storage is the abstraction of storage services from storage hardware. This term is more than just marketing hype, it’s the logical evolution of storage virtualization from simply being a storage aggregator to the end goal of storage as a service. To achieve this goal, software defined storage needs a platform from which to centralize.

Tags : ibm, storage switzerland, storage platform, sds, software defined storage, data center, storage virtualization, data protection
    
By: CA Technologies     Published Date: Jan 08, 2014

Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.

Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
By: CA Technologies     Published Date: Jan 08, 2014

Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.

Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
By: CA Technologies     Published Date: Jan 08, 2014

Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.

Tags : ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience
    
By: CA Technologies     Published Date: Jan 06, 2014

Why should organizations take insider threats seriously? Because the stakes have never been higher, especially given the value enterprises place on intellectual capital and trade secrets.

Tags : mediacom, insider threats, substantial threats, bladley manning, edward snowden, malicious insiders, exploited insiders, sensitive information
    
By: Cisco Systems     Published Date: Dec 23, 2013

Faced with trends like cloud and the rapid rise of mobile devices, IT needs a new, simpler model of building networks to support and optimize applications. In this Lippis Report, learn how the Cisco ISR Application Experience Router helps you improve application speed, security, and control. Read Now

Tags : cisco, lippis, centric networking, cloud computing, network engineers, bandwidth, wan, wide area networks
    
By: Cisco Systems     Published Date: Dec 23, 2013

In June 2013, Cisco engaged Miercom to evaluate the capabilities and performance of the latest Cisco Integrated Service Router (ISR) for branch offices—the Cisco 4451-X ISR. Review the report in full and discover why Miercom awarded the Cisco 4451-X ISR the Performance Verified award. Read Report

Tags : cisco, cisco waas, miercom, cisco integrated service router, isr, branch offices, bandwidth, wan
    
By: Intralinks     Published Date: Nov 26, 2013

The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data.

Tags : intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, jurisdictional privacy heat map, compliance
    
By: IBM     Published Date: Nov 14, 2013

IBM Business Process Manager is a business process management platform designed to help enhance the visibility and management of an organization's business processes. Read this white paper to learn how you can help enable the optimization of the business value of your SAP implementation by using a BPM approach.

Tags : business operations, business process management, bpm, process automation, smarter process, smarter process approach, agility, analytics
    
Start   Previous   1 2 3 4 5    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.