saas

Results 1 - 25 of 866Sort Results By: Published Date | Title | Company Name
By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
     Absolute Software
By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user, data regulation, encryption
     Absolute Software
By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm
     Absolute Software
By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user
     Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
     Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
     Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
     Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
     Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
     Absolute Software
By: Absolute Software     Published Date: Apr 11, 2013
There has yet to be a demonstrated case where an organization has reduced ITSSM spending over a five-year period solely on the basis of licensing in the SaaS model versus the perpetual model.
Tags : absolute software, saas, ssm, saas model, cost savings, perpetual model, itssm
     Absolute Software
By: ActiveProspect, Inc.     Published Date: Sep 19, 2013
In this whitepaper, provided by the law firm of Klein Moynihan Turco LLP (KMT) and ActiveProspect, a marketing SaaS provider, offers a comprehensive overview of the legal aspects of the new TCPA regulations and simple solution to verify and store proof of consent for Internet leads in order to comply with the new regulations.
Tags : tcpa, tcpa regulations, tcpa compliance, tcpa class action, telemarketing, telemarketing compliance, telemarketing regulations, telemarketing rules, call center compliance, do not call, prior express written consent, prior express consent, proof of opt-in, consent to call, outbound marketing, autodialed calls, prerecorded call, robocalls, autodialer, leadid
     ActiveProspect, Inc.
By: ActiveProspect, Inc.     Published Date: Sep 19, 2013
In this whitepaper, provided by the law firm of Klein Moynihan Turco LLP (KMT) and ActiveProspect, a marketing SaaS provider, offers a comprehensive overview of the legal aspects of the new TCPA regulations and simple solution to verify and store proof of consent for Internet leads in order to comply with the new regulations.
Tags : tcpa, tcpa regulations, tcpa compliance, tcpa class action, telemarketing, telemarketing compliance, telemarketing regulations, telemarketing rules, call center compliance, do not call, prior express written consent, prior express consent, proof of opt-in, consent to call, outbound marketing, autodialed calls, prerecorded call, robocalls, autodialer, leadid
     ActiveProspect, Inc.
By: Actuate     Published Date: May 19, 2014
A white paper providing a breakdown in five steps of embedding reports, dashboards and analytics.
Tags : embedding reports, dashboards, analytics, saas, actuate, software application providers, software development
     Actuate
By: Adaptive Planning     Published Date: Sep 16, 2013
Learn how to improve your total cost of ownership by implementing SaaS-Based Budgeting and how it will eliminate the need for your organization to purchase, deploy, and maintain IT infrastructure or application software.
Tags : software delivery, saas, software applications, it infrastructure, applications, solutions, technlogy
     Adaptive Planning
By: Adobe     Published Date: Oct 05, 2016
The cloud has been the hottest topic in information technology for the better part of the last decade. Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and now a new wave of Anything-as-a-Service (XaaS) continue to drive adoption of what we collectively call cloud services.
Tags : security, security application, cloud, cloud computing, cloud security
     Adobe
By: Adobe     Published Date: Feb 01, 2017
information technology for the better part of the last decade. Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and now a new wave of Anything-as-a-Service (XaaS) continue to drive adoption of what we collectively call cloud services.
Tags : 
     Adobe
By: Adobe     Published Date: Feb 01, 2017
The cloud has been the hottest topic in information technology for the better part of the last decade. Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and now a new wave of Anything-as-a-Service (XaaS) continue to drive adoption of what we collectively call cloud services.
Tags : 
     Adobe
By: Adobe     Published Date: Feb 01, 2017
The cloud has been the hottest topic in information technology for the better part of the last decade. Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and now a new wave of Anything-as-a-Service (XaaS) continue to drive adoption of what we collectively call cloud services.
Tags : 
     Adobe
By: Adobe     Published Date: Mar 21, 2017
Le cloud est devenu un incontournable des technologies de l'information depuis près de dix ans. SaaS (Software-as-a-Service), IaaS (Infrastructure-as-a-Service), PaaS (Platform-as-a-Service) et désormais XaaS (Anything-as-a-Service) : autant de solutions technologiques proposées sous forme de services qui stimulent l'adoption de ce que nous appelons collectivement les services cloud.
Tags : 
     Adobe
By: Adobe     Published Date: Aug 11, 2015
In this research study hear from more than 1,500 line-of-business leaders, IT leaders, and information workers about the effectiveness of their organization’s document-based business processes.
Tags : adobe, enterprise, mobile, security, saas, document management, cloud, it management, human resource technology, business technology
     Adobe
By: Adobe     Published Date: Aug 11, 2015
The purpose of this research is to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : adobe, enterprise, mobile, security, saas, document management, cloud, business technology
     Adobe
By: Adobe     Published Date: Nov 10, 2015
Download this white paper to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : adobe, document security, data security, mobile device, enterprise, mobile, security, saas, document management, cloud, data center
     Adobe
By: Adobe     Published Date: Nov 10, 2015
Watch this seminar and hear experts from Penton Media and Adobe discuss methods to ensure that sensitive documents are handled by the right people - and no one else.
Tags : ibm, document management, data security, productivity, enterprise, mobile, security, saas, document management, cloud, business technology, data center
     Adobe
By: Adobe     Published Date: Nov 10, 2015
With Adobe Document Cloud you can win and retain the best, slash costs and delays, and free everyone to focus on the projects that drive your organization forward.
Tags : ibm, human resources, talent, adobe, document cloud sales management, contracts, e-signatures, quote to cash, sales contract management, enterprise, mobile, security, saas, document management, cloud, knowledge management, business technology
     Adobe
By: Adobe     Published Date: Mar 02, 2017
Read this Info-Tech white paper, Security Concerns Overcome: Customers moving to SaaS, and learn five ways you can work with your SaaS vendor that will inspire your confidence in their security skills.
Tags : security, saas, customer experience, cloud computing
     Adobe
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com