Secure Content Management White Papers

Secure Content Management is any of the strategies and technologies employed in the information technology industry for managing the capture, storage, security, revision control, retrieval, distribution, preservation and destruction of documents and content.
Results 1 - 25 of 154Sort Results By: Published Date | Title | Company Name
By: Kaspersky     Published Date: Aug 27, 2015

Download Debunking the Top 5 Security Implementation Myths to learn why staying with your current, inferior technology costs your business more money in the long run.

Tags : kaspersky, attacks, cyberattacks, business process, security costs, it budget, network security, anti virus
    
By: Adobe     Published Date: Aug 04, 2015

This white paper explores how cloud-based e-signature technology can drastically reduce the time it takes to complete deal making process and at the same time improve customer satisfaction, document security, and more.

Tags : esign, e-signatures, online signatures, digital signatures for sales, sales, clous computing, document security, signed documents
    
By: Adobe     Published Date: Aug 04, 2015

The rapid adoption of e-signature solutions and the continued strong growth in the market for services and software is driven by several factors:

Tags : esign, e-signatures, online signatures, digital signatures for sales, sales, clous computing, document security, signed documents
    
By: Adobe     Published Date: Aug 04, 2015

Learn how e-signatures remove the last barrier between a hybrid paper to digital workflow to an all-electronic process, dramatically accelerating closure in any type of transaction that requires a contract.

Tags : electronic signatures, digital signatures, paper to digital, business intelligence, database, e-signatures, online signatures, authentication
    
By: Adobe     Published Date: Aug 04, 2015

Learn how technologies like e-signatures and document management are drastically improving HR processes.

Tags : e-signatures, electronic signatures, digital signatures, document management, improving hr with digital signatures, human resources, authentication, identity management
    
By: Adobe     Published Date: Aug 04, 2015

This white paper shows how IT departments can help the business implement a solution that integrates with existing business applications and transforms procurement into a fast, agile process—all in a trusted environment.

Tags : e-signatures, digital signatures, electronic signatures, e-signatures solution, e-signatures and procurement, authentication, identity management, content management system
    
By: Kaspersky     Published Date: Jun 15, 2015

Download Kaspersky Lab’s “Endpoint Security for Business: Technology in Action” to learn about threats you can see and those you can’t.

Tags : kaspersky, endpoint security, threats, threat management, data protection, network security, email security, hacker detection
    
By: Box     Published Date: May 28, 2015

This report illustrates how you can fast track your mobile and external collaboration initiatives.

Tags : sync, efss, mobility, track your mobile, security, cloud, hybrid, storage
    
By: Kaspersky     Published Date: May 11, 2015

Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isn’t enough.

Tags : kaspersky, cybersecurity, mitigation, online attacks, cyberattack, threat, threat protection, network security
    
By: 123Together     Published Date: Feb 05, 2009

Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity

Tags : 123together, it strategies, ediscovery, finra, regulation, security, finra, contact management
    
By: Diligent Corporation     Published Date: Jun 29, 2015

This paper reveals how the paperless workplace has been a much-pursued goal for almost as long as there have been computers in the office.

Tags : technology, board, paperless, paperless workplace, workplace, board portals, boardroom, electronic board solution
    
By: Diligent Corporation     Published Date: Jun 29, 2015

This white paper shows how board portals can help directors and company secretaries be more effective and secure in how they communicate.

Tags : board portal, advantages board portal, sharing documents, sharing information, benefits of board portals, electronic board solution, electronic board meeting, electronic board papers
    
By: Nexgate     Published Date: Jun 17, 2015

This report will outline a framework for assigning roles and responsibilities to manage social media risk.

Tags : proofpoint, nexgate, social media risk, social media, risk management, compliance, security policies, content delivery
    
By: Nexsan by Imation     Published Date: May 11, 2015

Heightened physical security concerns spanning all industries, coupled with technological advancements is driving the requirement for higher camera resolutions, more fields of view with wider dynamic range and longer storage retention periods.

Tags : imation, nexsan, physical security, camera, surveillence, storage, online surveillance, storage management
    
By: Document Cloud for Enterprise     Published Date: Apr 23, 2015

This white paper illustrates how Financial Services industry can simplify document communication, reduce costs and speed business.

Tags : fiance digital document, digital documents, benefits of using adobe document cloud, advantages of using digital documents, esign, content delivery, content management system, document management
    
By: Intel Security     Published Date: Feb 23, 2015

This paper reveals how cloud and compliance could be in one thanks to McAfee Enterprise Security Manager.

Tags : security information, security connected framework, big security data, big data, log management, siem, security event management, application security
    
By: NextGen     Published Date: Jan 29, 2015

Learn how Mirth’s HIE solution can support your growth, ease data sharing, and help you reach your goals. In this case study, you'll learn why the Chesapeake Regional Information System for our Patients (CRISP) moved to Mirth® solutions.

Tags : mirth, hiw, total cost, erp, system, information, connect, technology
    
By: Entrust     Published Date: Jan 16, 2015

Upon issuance, all SSL digital certificates have a finite lifespan and are no longer recognized as valid upon expiration. Certificates may have varying periods of validity and are often set to expire anywhere between one and five years based on company policy and/or cost considerations. This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.

Tags : entrust, ssl, certificates, security, professionals, management, lifecycle, certificate
    
By: Skyword     Published Date: Nov 14, 2014

Eventually, you’ll want to move your content strategy past awareness-driven content creation and start converting leads. To show meaningful content ROI, you must have a framework in place to create a diverse array of custom content, and this free eBook will give you the tools and strategy to get started. Download it today!

Tags : content strategy, content marketing, b2c content, b2b content, content marketing platform, content marketing agency, brand content, branded content
    
By: Kaseya     Published Date: Nov 12, 2014

While there are an innumerable number of ways you could improve your business’s information security posture, for the sake of brevity let’s shorten that list to the methods which often provide great benefits. Here are five ways that you can help your business reduce the chance of being victimized by cybercrime.

Tags : kaseya, cybercrime, reduce risk, cyber attacks, audits, authentication, security, automation
    
By: Box     Published Date: Nov 09, 2014

Read how some of the nation’s most progressive corporations are meeting the many needs of their mobile workers — without overwhelming their IT departments — with the help of Box.

Tags : box, file sharing, mobile workers, mobile phones, smartphones, collaboration, storage, remote access
    
By: Box     Published Date: Nov 09, 2014

Box recommends this report for any growing business or company considering an investment in enterprise content collaboration and cloud file sharing. Both let users access important content simply and securely, on any device: desktop, laptop, phone or tablet.

Tags : box, file sharing, content sharing, mobile workers, collaboration, cloud file sharing, network architecture, remote access
    
By: Box     Published Date: Nov 09, 2014

Join guest speakers Rob Koplowitz, VP and Principal Analyst at Forrester Research, Ted Schadler, VP and Principal Analyst at Forrester Research, and Whitney Bouck, SVP & GM of Enterprise at Box, for a complimentary webinar that will help you create a 3-step plan to select the right vendor for your business needs

Tags : box, content file sharing, collaboration, content sharing, mobile workforce, cloud computing, cloud storage, infrastructure
    
By: Box     Published Date: Nov 09, 2014

Box recommends this report for any growing business or company considering an investment in enterprise content collaboration and cloud file sharing. Both let users access important content simply and securely, on any device: desktop, laptop, phone or tablet.

Tags : box, file sharing, ecm, enterprise content management, cloud file sharing, collaboration, mobile workers, backup and recovery
    
By: IBM     Published Date: Nov 05, 2014

This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.

Tags : ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security
    
Start   Previous   1 2 3 4 5 6 7    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.