Secure Content Management White Papers

Secure Content Management is any of the strategies and technologies employed in the information technology industry for managing the capture, storage, security, revision control, retrieval, distribution, preservation and destruction of documents and content.
Results 1 - 25 of 132Sort Results By: Published Date | Title | Company Name
By: Arbor     Published Date: Sep 15, 2014

Sicherheitsanalysen stellen eine neue Anforderung im laufenden Wettrüsten zwischen Angegriffenen und Angreifern dar

Tags : security analytics, it security, cyber defenses, application security, firewalls, hacker detection, security management, secure content management
    
By: Box     Published Date: Jul 02, 2014

Today, businesses of all sizes are adopting cloud services to accelerate growth, create more efficient operations and expand their reach. In this white paper, you’ll find scenarios and economic justification for making a shift to enterprise content collaboration with Box.

Tags : box, collaboration, lan, infrastructure, data storage, data space, networking, storage
    
By: Box     Published Date: May 12, 2014

This recorded discussion will explain how you you can use Box's solutions to create, share, and collaborate on a marketing campaign from start to finish.

Tags : roi, marketing, collaboration, marketing roi, marketing project, file sharing, collaborate, ftp
    
By: ForgeRock     Published Date: Sep 02, 2014

Watch this Gigaom Research On-Demand Webinar ; we will examine the immediate need to extend identity to customer audiences, the risks of doing so using legacy software, and the most effective path businesses can take to build for the future while recognizing value today.

Tags : forgerock, api, customer service, crm, business intelligence, business data, access management, identity management
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper debunks 7 virtualization DR myths

Tags : virtualization myths, disaster recovery, back up, high availability, virtual servers, data protection, backup and recovery, clustering
    
By: bitglass     Published Date: Aug 19, 2014

In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.

Tags : bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach
    
By: Adobe     Published Date: Aug 05, 2014

IT decision-makers can use this analysis to better understand the modern workers they’re supporting, with the objective of making them more productive and better aligned with corporate objectives.

Tags : adobe, adobe systems, byod, collaboration, modern workforce, workforce management, mobile devices, mobile workers
    
By: Citrix     Published Date: Jul 25, 2014

This paper presents 10 key points to consider as you develop your enterprise mobility strategy, encompassing security, user experience, IT operations and BYOD.

Tags : citrix, enteprise mobility, mobile workers, byod, remote access, end point security, mobile security, mobile application management
    
By: Citrix     Published Date: Jul 25, 2014

Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.

Tags : mobility, management, boyd, secure app, data delivery, security management, smart phones, secure content management
    
By: Foxit     Published Date: Jun 30, 2014

This whitepaper explains how Foxit is helping organizations standardize a PDF vendor which enhances user productivity and improves procurement efficiency.

Tags : foxit, pdf, pdf vendor, mobile pdf, file sharing, records management, rights management, pdf reader
    
By: HP     Published Date: Jun 27, 2014

Following a series of in-depth interviews with Senior IT professionals in various industries this video provides their findings and the direct and in-direct value derived from using HPs Backup, Recovery and Archiving solutions.

Tags : backup, recovery and archiving, hp solutions, storage, backup and recovery, storage area networks, storage management, storage virtualization
    
By: SilverSky     Published Date: May 22, 2014

Are you looking to enhance security and regulatory compliance around email, without having to add staff? SilverSky offers a game-changing Email Data Loss Prevention (DLP) solution, run on IBM SoftLayer, which can help. Read this paper to learn more and for helpful tips on preventing data loss.

Tags : silversky, ibm, email, email services, email service providers, email protection, email security, email data loss prevention
    
By: SilverSky     Published Date: May 22, 2014

Companies today are able to focus more time on their core competencies by trusting email and other resource-intensive activities to experts in the cloud. Thinking of moving services to the cloud? Read SilverSky’s comprehensive list of things to consider when evaluating cloud-based email solutions.

Tags : silversky, ibm, cloud, cloud-based email, cloud business email, email service, email solutions, cloud based email solutions
    
By: EarthLink Business     Published Date: May 15, 2014

This paper covers the latest security trends, reinforces best practices in securing a cloud infrastructure, and outlines how best to meet compliance requirements (e.g., PCI, HIPAA).

Tags : earthlink, cloud infrastructure, cloud computing, midsize businesses, cloud security, mobile security, workforce collaboration, earthlink
    
By: Ipswitch     Published Date: May 02, 2014

With fewer resources and an increasing volume and size of file transfers each year, moving files in the extended enterprise has never seemed more complex. In this whitepaper, you’ll learn how to tackle the challenge of higher costs, increasing volume and size of file transfers, and fewer resources with one mature, managed file transfer process.

Tags : ftp client, ftp server, sftp client, ftp software, large file transfer, secure email service, ftp program, sftp server
    
By: Allscripts     Published Date: May 01, 2014

Virdee Medical, a busy private pediatric practice, traded paper charts for a hosted Allscripts solution in 2010. Now, with the improved efficiencies of Allscripts Professional in a hosted environment, Virdee Medical can focus more intently than ever on providing the highest quality patient care.

Tags : allscripts, virdee medical, ehr, practice management, electronic health record, time and investment, pediatric practice, allscripts professional
    
By: Dyn     Published Date: Mar 27, 2014

In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

Tags : dyn, email, email security, message, security management, phishing, it management, secure transmission
    
By: Ipswitch     Published Date: Mar 14, 2014

This newly-released e-Guide provides IT professionals who are “in the trenches” with a concise assessment of the challenges they face with legacy file transfer systems—and looks at innovative solutions and best practices that can solve these problems.

Tags : ipswitch, file transfer, file transfer systems, stagnation, automation, file movement, file security, regulatory compliance
    
By: Ipswitch     Published Date: Mar 14, 2014

In this case study, you’ll learn how Rochester General Hospital leveraged MOVEit’s point and click simplicity to set up, manage and track more than 70 different file transfer operations between hospital servers and the systems used by payers and outside healthcare providers.

Tags : ipswitch, moveit, sensitive data, managed file transfer solution, file transfer, file transfer systems, records management, data security
    
By: Ipswitch     Published Date: Mar 14, 2014

This just-released e-Guide provides IT professionals who are “in the trenches” with a concise assessment of why legacy file transfer systems are no longer adequate in the face of today’s skyrocketing user demands. Specifically, the e-Guide exposes the limitations of “business as usual” file transfer solutions such as FTP and e-mail, and looks at an innovative solution that can make the IT professional’s job much easier

Tags : ipswitch, file transfer, file location, file transfer system, automation, integration, centralization, file transfer solution
    
By: Arbor     Published Date: Mar 13, 2014

For hosting and cloud service providers, learn how to secure your data and seize those opportunities of generating more revenue.

Tags : arbor, frost and sullivan, arbor networks, ddos protection, hosting providers, cloud providers, cloud service, attack trends
    
By: Arbor     Published Date: Mar 13, 2014

In this white paper, we’ll examine how the Pravail® portfolio from Arbor Networks can empower your network operations and security teams to more efficiently help protect the integrity and availability of your enterprise network against advanced attacks.

Tags : arbor, arbor networks, enterprise network, global attack, connecting workforces, internal operations, growing revenue, retaining customers
    
By: Arbor     Published Date: Mar 13, 2014

All enterprises need to have mitigation solutions in place. Information security is vital in the workplace and DDoS has become more complex over time. Determine whether services are the best option for primary protection through this whitepaper.

Tags : arbor, idc, distributed denial-of-service, ddos attack ddos solutions, dns reflection, exfiltration of data, security products, the cloud
    
By: IBM     Published Date: Mar 04, 2014

This paper explores how companies can more safely introduce employee- or corporate-owned mobile devices into the work-place, identify the risks inherent in their broader access to corpo-rate data, and derive enhanced business value.

Tags : ibm, mobile, mobile device, mobile security, security, mobility, enterprise, mobile enterprise
    
By: Adobe     Published Date: Feb 20, 2014

U.K. planning and design consultancy creates sustainable, dynamic, and progressive places for people to live, work, and play by standardizing on Adobe solutions.

Tags : adobe, adobe creative cloud, standardization, collaboration, tco, total cost of ownership, enterprise agreement, software deployment
    
Start   Previous   1 2 3 4 5 6    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.