Secure Content Management White Papers

Secure Content Management is any of the strategies and technologies employed in the information technology industry for managing the capture, storage, security, revision control, retrieval, distribution, preservation and destruction of documents and content.
Results 1 - 25 of 126Sort Results By: Published Date | Title | Company Name
By: Citrix     Published Date: Jul 25, 2014

This paper presents 10 key points to consider as you develop your enterprise mobility strategy, encompassing security, user experience, IT operations and BYOD.

Tags : citrix, enteprise mobility, mobile workers, byod, remote access, end point security, mobile security, mobile application management
    
By: Box     Published Date: Jul 02, 2014

Today, businesses of all sizes are adopting cloud services to accelerate growth, create more efficient operations and expand their reach. In this white paper, you’ll find scenarios and economic justification for making a shift to enterprise content collaboration with Box.

Tags : box, collaboration, lan, infrastructure, data storage, data space, networking, storage
    
By: Box     Published Date: May 12, 2014

This recorded discussion will explain how you you can use Box's solutions to create, share, and collaborate on a marketing campaign from start to finish.

Tags : roi, marketing, collaboration, marketing roi, marketing project, file sharing, collaborate, ftp
    
By: Allscripts     Published Date: May 01, 2014

Virdee Medical, a busy private pediatric practice, traded paper charts for a hosted Allscripts solution in 2010. Now, with the improved efficiencies of Allscripts Professional in a hosted environment, Virdee Medical can focus more intently than ever on providing the highest quality patient care.

Tags : allscripts, virdee medical, ehr, practice management, electronic health record, time and investment, pediatric practice, allscripts professional
    
By: Kaspersky     Published Date: Feb 14, 2014

Are you guarding the cyber security gaps with patch management? Download Kaspersky Lab’s latest whitepaper, Your Data under Siege: Guard the Gaps with Patch Management, to learn about: how cybercriminals are utilizing weaknesses in trusted applications to distribute malware.

Tags : patch management, cybersecurity, firewalls, malware, hackers, virus, threats, network security
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection".

Tags : business protection, data protection, business security, it security, business continuity, database security, secure content management
    
By: Foxit     Published Date: Jun 30, 2014

This whitepaper explains how Foxit is helping organizations standardize a PDF vendor which enhances user productivity and improves procurement efficiency.

Tags : foxit, pdf, pdf vendor, mobile pdf, file sharing, records management, rights management, pdf reader
    
By: HP     Published Date: Jun 27, 2014

Following a series of in-depth interviews with Senior IT professionals in various industries this video provides their findings and the direct and in-direct value derived from using HPs Backup, Recovery and Archiving solutions.

Tags : backup, recovery and archiving, hp solutions, storage, backup and recovery, storage area networks, storage management, storage virtualization
    
By: SilverSky     Published Date: May 22, 2014

Are you looking to enhance security and regulatory compliance around email, without having to add staff? SilverSky offers a game-changing Email Data Loss Prevention (DLP) solution, run on IBM SoftLayer, which can help. Read this paper to learn more and for helpful tips on preventing data loss.

Tags : silversky, ibm, email, email services, email service providers, email protection, email security, email data loss prevention
    
By: SilverSky     Published Date: May 22, 2014

Companies today are able to focus more time on their core competencies by trusting email and other resource-intensive activities to experts in the cloud. Thinking of moving services to the cloud? Read SilverSky’s comprehensive list of things to consider when evaluating cloud-based email solutions.

Tags : silversky, ibm, cloud, cloud-based email, cloud business email, email service, email solutions, cloud based email solutions
    
By: EarthLink Business     Published Date: May 15, 2014

This paper covers the latest security trends, reinforces best practices in securing a cloud infrastructure, and outlines how best to meet compliance requirements (e.g., PCI, HIPAA).

Tags : earthlink, cloud infrastructure, cloud computing, midsize businesses, cloud security, mobile security, workforce collaboration, earthlink
    
By: Ipswitch     Published Date: May 02, 2014

With fewer resources and an increasing volume and size of file transfers each year, moving files in the extended enterprise has never seemed more complex. In this whitepaper, you’ll learn how to tackle the challenge of higher costs, increasing volume and size of file transfers, and fewer resources with one mature, managed file transfer process.

Tags : ftp client, ftp server, sftp client, ftp software, large file transfer, secure email service, ftp program, sftp server
    
By: Dyn     Published Date: Mar 27, 2014

In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

Tags : dyn, email, email security, message, security management, phishing, it management, secure transmission
    
By: Ipswitch     Published Date: Mar 14, 2014

This newly-released e-Guide provides IT professionals who are “in the trenches” with a concise assessment of the challenges they face with legacy file transfer systems—and looks at innovative solutions and best practices that can solve these problems.

Tags : ipswitch, file transfer, file transfer systems, stagnation, automation, file movement, file security, regulatory compliance
    
By: Ipswitch     Published Date: Mar 14, 2014

In this case study, you’ll learn how Rochester General Hospital leveraged MOVEit’s point and click simplicity to set up, manage and track more than 70 different file transfer operations between hospital servers and the systems used by payers and outside healthcare providers.

Tags : ipswitch, moveit, sensitive data, managed file transfer solution, file transfer, file transfer systems, records management, data security
    
By: Ipswitch     Published Date: Mar 14, 2014

This just-released e-Guide provides IT professionals who are “in the trenches” with a concise assessment of why legacy file transfer systems are no longer adequate in the face of today’s skyrocketing user demands. Specifically, the e-Guide exposes the limitations of “business as usual” file transfer solutions such as FTP and e-mail, and looks at an innovative solution that can make the IT professional’s job much easier

Tags : ipswitch, file transfer, file location, file transfer system, automation, integration, centralization, file transfer solution
    
By: Arbor     Published Date: Mar 13, 2014

For hosting and cloud service providers, learn how to secure your data and seize those opportunities of generating more revenue.

Tags : arbor, frost and sullivan, arbor networks, ddos protection, hosting providers, cloud providers, cloud service, attack trends
    
By: Arbor     Published Date: Mar 13, 2014

In this white paper, we’ll examine how the Pravail® portfolio from Arbor Networks can empower your network operations and security teams to more efficiently help protect the integrity and availability of your enterprise network against advanced attacks.

Tags : arbor, arbor networks, enterprise network, global attack, connecting workforces, internal operations, growing revenue, retaining customers
    
By: Arbor     Published Date: Mar 13, 2014

All enterprises need to have mitigation solutions in place. Information security is vital in the workplace and DDoS has become more complex over time. Determine whether services are the best option for primary protection through this whitepaper.

Tags : arbor, idc, distributed denial-of-service, ddos attack ddos solutions, dns reflection, exfiltration of data, security products, the cloud
    
By: IBM     Published Date: Mar 04, 2014

This paper explores how companies can more safely introduce employee- or corporate-owned mobile devices into the work-place, identify the risks inherent in their broader access to corpo-rate data, and derive enhanced business value.

Tags : ibm, mobile, mobile device, mobile security, security, mobility, enterprise, mobile enterprise
    
By: Adobe     Published Date: Feb 20, 2014

U.K. planning and design consultancy creates sustainable, dynamic, and progressive places for people to live, work, and play by standardizing on Adobe solutions.

Tags : adobe, adobe creative cloud, standardization, collaboration, tco, total cost of ownership, enterprise agreement, software deployment
    
By: Adobe     Published Date: Feb 20, 2014

As a valued customer, Adobe understands that your enterprise takes extensive advantage of our software, with anywhere from hundreds to thousands of licenses for a variety of Adobe solutions. With the Adobe Enterprise Term License Agreement (ETLA), we are now making the management and procurement of your Adobe software simpler, more flexible, and predictable.

Tags : adobe, adobe software, enterprise term licensing, etla, adobe solutions, software management, software compliance, tco
    
By: Lumension     Published Date: Feb 07, 2014

Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.

Tags : lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
    
By: Lumension     Published Date: Feb 07, 2014

Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?

Tags : lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content
    
By: Lumension     Published Date: Feb 07, 2014

Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.

Tags : lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products
    
Start   Previous   1 2 3 4 5 6    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.