rights

Results 51 - 75 of 98Sort Results By: Published Date | Title | Company Name
Published By: Zebra Technologies     Published Date: Jun 15, 2017
Mobile devices help clinicians improve the quality of patient care and save lives by improving staff communication and collaboration, and by providing instant access to a wealth of mission-critical information — from real-time lab results to a change in a patient’s condition or verification of the “5 rights” of medication administration at the patient bedside. In addition, mobility also helps healthcare organizations comply with important governmental and regulatory safety standards, without tasking an already overburdened nursing staff with additional paperwork. This white paper provides guidance for planning and implementing a clinical mobility solution in today’s healthcare environment, including a five-step roadmap to help key stakeholders identify needs.
Tags : 
clinical, mobility, strategy, best practices, device, save lives
    
Zebra Technologies
Published By: Veeam '18     Published Date: Mar 13, 2018
Another must have feature of any modern Availability solution is self-service restore. Self-service restore is essentially a delegation, or granting the task of restoring files within the guest OS to users that have administrative rights. In many organizations, there are users who are responsible for the applications running within the VMs. These application owners are the primary administrators for the files and folders within the VM — so why would they have to go to a backup administrator to simply restore a file? Self-service restore allows these applications owners to log into a portal, search through the content of the backups for their VMs only and perform any necessary restores of those files back to their original or new locations.
Tags : 
vmware, data, protection, recovery, files, technology, solutions
    
Veeam '18
Published By: Infosys     Published Date: Jun 12, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : 
internal, applications, data, hacks, privacy, enterprises
    
Infosys
Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Privilege Manager lets IT administrators grant selected privileges to users so they can update their own PCs, reducing help desk calls while maintaining a secure network. Elevate and manage user rights quickly and precisely with our Validation Logic targeting technology. Use privilege elevation rules from the Privilege Authority Community Edition, or create your own rules and allow administrator-level access to only the applications, Windows processes and ActiveX controls you deem safe.
Tags : 
user access, network security, verify files, elevate activex, setup.exe, setup.msi, elevate applications, target workstations
    
Dell Software
Published By: Attachmate     Published Date: Dec 05, 2013
From email to Dropbox and FTP, the file transfer process in most organizations is fraught with risk and simply does not meet most organizations’ corporate governance requirements. The result is that the status quo of file transfer in most organizations can be considered UFT—or Unmanaged File Transfer. What is needed to overcome the problem, therefore, is Managed File Transfer (MFT)—a solution that will enable complete control over content, its lifecycle, access rights to that information, the maintenance of an audit trail, and disposition of data according to corporate governance requirements. This white paper, sponsored by Attachmate and based on a survey conducted by Osterman Research, describes current file transfer practices and the extent of risk that organizations face by not managing file transfer properly. It also explains the benefits of MFT, provides guidelines for evaluating file transfer vendors, and describes FileXpress®, Attachmate’s MFT solution.
Tags : 
filexpress managed file transfer, download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management
    
Attachmate
Published By: Wyng     Published Date: Jan 13, 2016
The explosion of User Generated Content, or UGC, has drastically shifted the way people interact with brands. And as brands turn to UGC in place of their brand produced content, there are new risks that come with the rewards. To help mitigate these potential legal issues, we have developed a guide with everything you need to know about rights management.
Tags : 
search marketing, email marketing, website development, emerging marketing, social media, advertising agencies, internet marketing, crm & customer care
    
Wyng
Published By: HP VMware     Published Date: Mar 03, 2008
Blades are one of the fastest-growing segments in the IT industry. This white paper examines the requirements for servers, storage, and blade systems in the midmarket; describes the features and capabilities of the HP c3000; and outlines some of the challenges and opportunities HP will face as it seeks to extend its innovative HP BladeSystem c-Class product line to serve the needs of the midmarket.
Tags : 
blades, blade server, bladesystem, blade system, storage, virtual storage, hp vmware
    
HP VMware
Published By: Microsoft Office     Published Date: Nov 07, 2008
To allow organizations and individuals the flexibility to address their specific challenges, Microsoft has a variety of Microsoft® Office suites to select from. This paper describes the commonalities and differences among the suites of the 2007 Microsoft Office system: Microsoft Office Standard 2007, Microsoft Office Professional Plus 2007, Microsoft Office Enterprise 2007, and Microsoft Office Ultimate 2007. Each suite provides the core Microsoft Office applications as well as features that support integrated content management, information rights and policy, and integrated electronic forms; however, they differ in the selection of included applications and the ways in which advanced features are implemented.
Tags : 
microsoft, office, office suites 2007
    
Microsoft Office
Published By: LockLizard     Published Date: Dec 08, 2008
This paper covers why encryption is not enough to protect your electronic documents and why other factors such as the implementation of a DRM (digital rights management) system are equally important for document protection.  It covers key management, enforcing time limitations, and other methods of document control.
Tags : 
digital rights management, locklizard, key management, time limitations enforcement
    
LockLizard
Published By: LockLizard     Published Date: Dec 08, 2008
This white paper describes the differences between information, IPR and trade secrets, and where these might apply. 
Tags : 
ipr/drm protection, locklizard, drm controls, digital rights management
    
LockLizard
Published By: LockLizard     Published Date: Dec 08, 2008
This paper covers why intellectual property law is ineffective in protecting the rights of small authors and publishers. It covers intellectual property rights (IPR), licensing controls, copyright, and copyright protection.
Tags : 
intellectual property law, locklizard, intellectual property rights, licensing controls, copyright protection
    
LockLizard
Published By: LockLizard     Published Date: Dec 08, 2008
This paper explains what components make up a document security solution and which one is right for you.  It covers the use of encryption, copy protection, digital rights management and document collaboration as the methods available to protect information.
Tags : 
locklizard, document security, encryption, copy protection, digital rights management, document collaboration
    
LockLizard
Published By: ScriptLogic     Published Date: Jan 25, 2012
Privilege Authority Professional is the lowest cost Windows privilege management solution that provides the core features IT administrators need to simply and quickly elevate and manage user rights.
Tags : 
privilege authority, privilege authority professional, scriptlogic, active administrator, active directory, security, productivity, security management
    
ScriptLogic
Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Lumension
Published By: NetIQ     Published Date: Jul 27, 2011
Listen in as Andras Cser, Principal Analyst at Forrester Research, speaks about trends he is seeing in the Identity & Access Management (IAM) market, and specifically about the challenges and benefits of user provisioning.
Tags : 
active directory, ad administration, netiq, compliance, active directory administration, user provisioning, reduce administrative priviledge, itpa
    
NetIQ
Published By: VMTurbo     Published Date: Oct 24, 2013
This paper details VMTurbo’s approach to controlling workloads and the virtualized infrastructure in the desired state, leading to significant improvements in infrastructure efficiency and operational cost savings while assuring the storage performance of virtual workloads.
Tags : 
vmturbo, software defined control, sdc, workload, rightsizing, workload rightsizing, optimization, workload configuration
    
VMTurbo
Published By: VMTurbo     Published Date: Feb 11, 2014
Automatically and continuously optimizing workload configurations in your virtual environment
Tags : 
vmturbo, virtual environment, optimize workload configurations, workload rightsizing, virtualized data, data centers, infrastructure, risk solutions
    
VMTurbo
Published By: Mimecast     Published Date: Dec 20, 2018
According to Gartner, E-discovery readiness is an initiative that spans legal, IT and business stakeholder concerns and can also unify and align with archiving and data management strategies. To reduce risk and exposure, an E-discovery plan should be proactive and holistic instead of reactive and time pressured. This newsletter, “Strengthen E-Discovery Readiness to Reduce Cost and Risk” features Gartner research and offers guidance on the considerations for and E-discovery action plan, such as retention schedules, access rights, privacy concerns and security controls.
Tags : 
    
Mimecast
Published By: SubscriberMail     Published Date: Dec 12, 2008
Your email subscribers are likely feeling the economic crunch as much as—if not more than—your business. With that in mind, now is definitely the right time to keep your audience informed of any savings or promotional offers that are available. Even if business has been strong enough in the past that you were able to avoid offering special incentives, marketing in a time of economic uncertainty needs to be performed with an eye toward the future. Fostering customer loyalty now via special offers can pay dividends down the road when the economy rights itself.
Tags : 
subscribermail, email marketing, online marketing, e-marketing
    
SubscriberMail
Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration
    
Intralinks
Published By: AWS     Published Date: Oct 14, 2019
Containers have become the new infrastructure standard for development teams. While the “DIY container approach” (un-orchestrated containers) still has its use cases (e.g. low latency, longer compute jobs, predictable traffic), production-grade deployments require orchestration. DevOps teams are increasingly leveraging the benefits of Kubernetes and accelerating its adoption, taking it from a 27% adoption rate in 2018 to a 48% adoption rate in 2019 according to the RightScale “2019 State of the Cloud Report,” from Flexera. The same report also positions Amazon Elastic Kubernetes Service (Amazon EKS) as one of the fastest-growing managed Kubernetes offerings available, with a 44% adoption rate. Previously, containers were a technology deployed by individual teams – and were typically used for “application testing” in the enterprise world. Today, many organizations are now not only seeing the benefits of operationalizing containers to deploy production applications, but also re-positioni
Tags : 
    
AWS
Published By: SAP     Published Date: Apr 14, 2011
Discover how publishers, newspapers, studios, and broadcasting companies are using SAP solutions to automate the processes involved in acquisition and exploitation of content assets. They can accurately capture rights and effectively manage royalty processing for higher profits and better relationships.
Tags : 
intellectual property, contract management, rights availability, visibility, digital media content, rights management, content, royalties
    
SAP
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in today’s business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of today’s demanding IT environment.
Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment
    
Centrify Corporation
Published By: NewField IT     Published Date: Aug 19, 2008
In 2001, the international research group, Gartner released a briefing paper titled 'Rightsizing Output Fleets – The Hidden Gold Mine'. This research paper identified total print costs to be as much as 1-3% of an organization's revenue, a figure far higher than anyone had previously suggested. Gartner argued that print costs are so high they offer a 'goldmine' for any procurement or IT manager looking for savings.
Tags : 
    
NewField IT
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: