property

Results 1 - 25 of 103Sort Results By: Published Date | Title | Company Name
Published By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, intellectual property
    
Black Duck Software
Published By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
    
Delphix
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
According to a McKinsey study, half of all outsourced projects failed to meet their expected goals – while an Information Week Survey showed that 40% of outsourced projects did not save money! Factors that contribute to these problems include issues with quality, time zone challenges, and added travel expenses, among others.
Tags : 
collaborative consulting, infographic, offshoring, real company costs, language issues, communication issues, property risk, security systems
    
Collaborative Consulting
Published By: Dell     Published Date: Feb 02, 2015
Security breaches are expensive, costing U.S. businesses an average of $3.5 million per incident, which doesn’t include brand damage or other intangibles. Unfortunately, breaches are highly likely to happen, with 87% of organizations experiencing a breach in the past 12 months. Data, whether it’s intellectual property or personal data, needs to be protected. Dell Data Protection solutions provide encryption, malware protection, and authentication for Dell and non-Dell products, to equip businesses with a complete, easy-to-manage, end-user security solution.
Tags : 
dell, windows 8 pro, security, breaches, encryption, cost, compliance, malware
    
Dell
Published By: Cisco     Published Date: Jun 21, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
    
Cisco
Published By: Venafi     Published Date: Aug 07, 2015
It was recently found that most Global 2000 organisations have failed to completely remediate Heartbleed. This leaves these organisations vulnerable to cyberattacks, future brand damage, and intellectual property loss.
Tags : 
cyberattacks, security, cybercriminals, security application
    
Venafi
Published By: Verdasys     Published Date: Mar 28, 2012
In this white paper you will learn how data classification can be one of the most cost-effective methods for ensuring the value of data is maximized while still being used securely and how it can be a critical component to successfully govern information at an enterprise.
Tags : 
information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection
    
Verdasys
Published By: Verdasys     Published Date: Mar 28, 2012
In this whitepaper get the answers to the open gaps left in the WikiLeaks story and learn how you can prevent insider threats that are just as detrimental in your organization.
Tags : 
information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection
    
Verdasys
Published By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
    
CA Technologies
Published By: E-SignLive by Silanis     Published Date: Jan 29, 2014
In property and casualty insurance, closing new business quickly is key. The longer you leave documents on the kitchen table for signature, the higher the risk of drop-off. Today, people are online. That’s where they want to do business, and they are rewarding carriers and agents who can provide a fast and convenient digital experience. This eBook shows you how P&C companies of all sizes are using electronic signature technology get documents securely signed online – on any mobile device or computer, from anywhere, in minutes.
Tags : 
silanis, e-signatures, electronic signatures, insurance, property, casualty, security, legality
    
E-SignLive by Silanis
Published By: Oracle (Hospitality)     Published Date: Mar 28, 2017
Hotels and resorts with function space may well have an opportunity to boost their overall property revenue, given the escalating demand for function space and the fact that many of them have already maximized the value of their guest rooms through sophisticated revenue management capabilities. Success generally starts with a next-generation technology solution that can empower sales and catering personnel. Success also requires having in place the right organizational resources, business processes and performance metrics.
Tags : 
hotels, resorts, function, space, oracle, metrics
    
Oracle (Hospitality)
Published By: Oracle (Hospitality)     Published Date: Mar 28, 2017
Everything you need to know about next-generation hotel property management systems – and how to select the right one for your business.
Tags : 
hotel, property, management, systems, hoteliers, mobile, oracle
    
Oracle (Hospitality)
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Information is the engine of business growth in the digital age. Market intelligence, customer information, intellectual property and other data can be harnessed to create a quantifiable competitive advantage for a company and lay the path for future expansion. Yet as critical as data can be, the sweeping year-over-year proliferation in data volumes can quickly overwhelm an IT organization. This is much more than a budget problem: Without an effective data storage strategy, an organization is putting a critical resource at risk.
Tags : 
data storage management, microsoft windows server, market intelligence, customer information, intellectual property, data, it organizations, storage strategy
    
Dell & Microsoft
Published By: TriNet     Published Date: Jul 28, 2015
6 considerations from a serial entrepreneur and investor.
Tags : 
startup management, infrastructure, employee performance management, hr infrastructure, compliance, hr functions, safe harbors, tax benefits
    
TriNet
Published By: ClickSoftware     Published Date: Jun 30, 2014
Driving Change of Property and Casualty – Transform Your Customer Experience INSURERS ARE UNDERSTANDABLY EAGER to differentiate customer experience by automating mobile workforce management—especially when they can also cut operational costs, reduce carbon footprint, and streamline catastrophe response in the process. But this profound transformation in the daily lives of field claims and other mobile workers must be managed carefully to maximize benefits while minimizing disruption for all stakeholders.
Tags : 
clicksoftware, mobile, mobile workforce, property & casualty, workforce management, small business, finance
    
ClickSoftware
Published By: ClickSoftware     Published Date: Jun 30, 2014
Automating mobile workforce management can allow insurers to increase efficiency and improve service levels. When business is tough, that’s a great advantage
Tags : 
clicksoftware, mobile, mobile workforce, automation, casualty, small business, finance
    
ClickSoftware
Published By: VMware AirWatch     Published Date: Oct 21, 2016
The benefits of VCC include centralized desktop and application management, “any device” access to corporate IT resources, an increased ability to protect corporate intellectual property, and demonstrated compliance with industry and governmental regulations.
Tags : 
    
VMware AirWatch
Published By: Oracle     Published Date: Nov 08, 2016
Everything you need to know about selecting the right PMS for your property. A PMS can play a critical role in enhancing the guest experience. Different hoteliers have different expectations of a property management system.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Jan 09, 2017
This Guide gives you everything you need to know about next-generation hotel property management systems – and how to select the right one for your business.
Tags : 
hotel, hospitality, hotel management
    
Oracle
Published By: Intralinks     Published Date: Nov 23, 2015
There are multiple options for organizations with intellectual property and restricted information that must be shared between staff and business partners to adopt in order to avoid inadvertent release of restricted information to unauthorized personnel.
Tags : 
kuppingercole, information sharing, security, data, intralinks, enterprise applications, business technology, research
    
Intralinks
Published By: Intralinks     Published Date: Oct 14, 2015
There are multiple options for organizations with intellectual property and restricted information that must be shared between staff and business partners to adopt in order to avoid inadvertent release of restricted information to unauthorized personnel. This document will help in the selection of an optimal solution.
Tags : 
kuppingercole, information sharing, security, data, intralinks, enterprise applications, business technology, research
    
Intralinks
Published By: Arbor     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.
Tags : 
cyber threats, security, ddos, data breaches, atlas, frost & sullivan, cloud, hosting
    
Arbor
Published By: Citrix Systems     Published Date: Sep 17, 2015
Citrix XenApp delivers Windows apps as secure mobile services. With XenApp, IT can mobilize the business - increasing user productivity, while reducing costs by centralizing control and security of intellectual property.
Tags : 
citrix, xenapp, security, windows, app virtualization, it management
    
Citrix Systems
Published By: Delphix     Published Date: May 28, 2015
In a world of privacy regulation, intellectual property theft, and cybercrime, only a masking solution can secure vital data and enable outsourcing, third party analysis, and cloud deployments. Delphix delivers rapid deployment of masked data in minutes, service-based masking of production systems, and the ability to ship masked data across sites, to third parties, and into the cloud, with minimal network footprint.
Tags : 
    
Delphix
Published By: BAE Systems     Published Date: Dec 29, 2015
Learn about the challenges involved in combating first-party fraud and emerging best practices
Tags : 
bae systems, applied intelligence, fraud, first-party fraud, financial institution, network analytics, detection, prevention
    
BAE Systems
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.