Share us:
> Research Library > Technology > Knowledge Management > Secure Content Management
 

Secure Content Management

Secure Content Management is any of the strategies and technologies employed in the information technology industry for managing the capture, storage, security, revision control, retrieval, distribution, preservation and destruction of documents and content.
Results 1 - 25 of 180Sort Results By: Published Date | Title | Company Name
Case Study Published By: Cotendo     Published Date: Sep 01, 2010
The company needed a different CDN and website acceleration solution to provide its users with the level of responsiveness to changing stock market conditions that they depend on - and that Seeking Alpha demanded of itself.
Tags : 
cotendo, case study, real-time financial market information, cdn, content delivery
    
Cotendo
White Paper Published By: ASG Software Solutions     Published Date: May 12, 2010
For many organizations, managing and delivering the knowledge contained within documents is difficult or impossible due to technological disparity. Conventional approaches to knowledge management work within the constraints of disparate platforms, applications, and output devices, and fail to address technological disparity.
Tags : 
asg, cypress, managing delivery, knowledge management, document management
    
ASG Software Solutions
White Paper Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation
    
123Together
White Paper Published By: Code42     Published Date: Apr 22, 2016
Today, in the age of information, people are paid for their ideas: to create original knowledge products or add value to existing products. Given their self-reliance, it is not surprising that workers take pride in their outputs—up to half of employees take a portfolio of files with them when they leave. When employees move on, many feel entitled to the work they’ve created.They presume it is acceptable to transfer work documents to personal computers, removable media, tablets, smartphones or online file sharing apps. Some pilfered data is innocuous and already in the public realm. But some of it is classified. Read this paper to find out how to collect and secure data to protect operations, reputation and continuity when employees leave.
Tags : 
data protection, code 42, data security, intellectual property, database security
    
Code42
White Paper Published By: CDW     Published Date: Apr 04, 2016
Hewlett Packard Enterprise is helping protect organizations by building security and resiliency into the fabric of their enterprise, proactively detecting and responding to threats, and safeguarding continuity and compliance to effectively mitigate risk.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications
    
CDW
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Security is a top priority at Citrix. This whitepaper is meant to delve into the technical details of the security around the Citrix XenMobile solution and each of its components. Details include how Citrix implements secure mobile device management, mobile application management, mobile content management and more
Tags : 
citrix, xenmobile, mobile, security, mobile device management
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
"This report details Forrester’s findings about how well each vendor fulfills their criteria and where they stand in relation to each other to help infrastructure and operations professionals select the right partner for their enterprise mobile management.
Tags : 
citrix, enterprise, mobile, management, forrester
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
This white paper from Citrix provides a checklist to follow to ensure your company can embrace enterprise mobility securely.
Tags : 
citrix, enterprise, mobile, network management, network security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Citrix XenMobile and Citrix ShareFile meet the complex needs of your mobile workforce with a complete, integrated and secure enterprise mobility solution—with a consumer-like experience people love. Both products are included in XenMobile Enterprise.
Tags : 
citrix, mobile, . mdm, secure, file sharing
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.
Tags : 
citrix, enterprise, mobility, management, byod
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Traveling executives and Millennials alike expect to communicate, collaborate and access their important work applications and data from anywhere on whatever device they choose.
Tags : 
citrix, enterprise, application, enterprise, network security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
As organizations embrace smartphones, tablets and mobile applications, they are moving beyond simply providing mobile email and browser capability to offering mobile access to Windows-based and other corporate applications.
Tags : 
citrix, mobile, deployment, app, email security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
To help IT regain control over employee file sharing, Citrix offers ShareFile—an enterprise-class, IT-managed, secure file sync and sharing service. ShareFile offers IT the ability to control sensitive corporate data while meeting the mobility and collaboration needs of users. Download white paper and learn more.
Tags : 
citrix, sharefile, enterprise, security, email security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.
Tags : 
citrix, gartner, enterprise, mobility, management
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
To unlock the full potential of enterprise mobility, IT needs to allow people the freedom to access all their apps and data from any device, seamlessly and conveniently. White paper attached
Tags : 
citrix, mobility, security, data, mobile workers
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Get an overview of the cyberthreat landscape and see key findings from the “2015 Cyberthreat Defense Report.”
Tags : 
citrix, cyberthreat, infographic, 2015 report, application security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Customers, employees and partners are more frequently accessing web-delivered services from their mobile devices. At the same time, attackers are constantly discovering new ways to compromise security, including advanced malware and application layer attacks. Without the right tools, you are vulnerable. NetScaler gives you the visibility and control to manage, accelerate, and secure all your web properties, so you can deliver both the service and security your users demand. To learn more about web security and NetScaler, read the full report: Defend Web Properties from Modern Threats with Citrix NetScaler
Tags : 
citrix, security, netscaler, web, hacker detection
    
Citrix Systems, Inc.
White Paper Published By: Shareablee     Published Date: Dec 04, 2015
In the first half of 2015, social engagement for the average U.S. brand grew 52% year over year across Facebook, Twitter and Instagram. Shareablee unpacks this social growth and examines which categories and brands are capturing the largest share across the social web.
Tags : 
shareablee, social media, social media growth, facebook, instragram
    
Shareablee
White Paper Published By: TheMarketingScope     Published Date: Nov 19, 2015
In this white paper, we will provide an overview of the present state of mobility in the enterprise and identify loopholes and key areas of concern for the Public Sector.
Tags : 
byod, mobile devices, mobile workers, smartphones, mobile computing
    
TheMarketingScope
Webinar Published By: EMC     Published Date: Oct 13, 2015
MG Group explains their adoption of EMC Documentum Capital Projects to streamline information control and effective management in the world’s largest PET production plant
Tags : 
emc documentum capital projects, document management, share information, share documents, risk management
    
EMC
White Paper Published By: EMC     Published Date: Oct 12, 2015
This white paper highlights the extended collaboration issues commonly experienced companies in the energy and engineering industries.
Tags : 
collaboration, security risk, public cloud architecture, share documents, supplier exchange
    
EMC
White Paper Published By: IBM MaaS360     Published Date: Oct 08, 2015
Security is really about access; today’s work demands access to anything from anywhere on any device. Learn how to securely let employees share, edit and distribute work data across iOS, Android and Windows.
Tags : 
ibm, fiberlink, data security, mobile, mobile strategy
    
IBM MaaS360
White Paper Published By: TigerText     Published Date: Aug 30, 2015
Download this Healthcare Informatics e-book for a comprehensive understanding of the BYOD policy, the challenges faced, and the impact it could have on the industry.
Tags : 
tigertext, tiger text, byod, hippa compliance, patient data
    
TigerText
White Paper Published By: Kaspersky     Published Date: Aug 27, 2015
Download Debunking the Top 5 Security Implementation Myths to learn why staying with your current, inferior technology costs your business more money in the long run.
Tags : 
kaspersky, attacks, cyberattacks, business process, security costs
    
Kaspersky
White Paper Published By: Adobe     Published Date: Aug 04, 2015
This white paper explores how cloud-based e-signature technology can drastically reduce the time it takes to complete deal making process and at the same time improve customer satisfaction, document security, and more.
Tags : 
esign, e-signatures, online signatures, digital signatures for sales, sales
    
Adobe
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2017  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service