White Papers

Channel: Information Management - William McKnight RSS Feed for Information Management - William McKnight

 

Displaying 1–15 (of 1865)

Popularity is determined by a calculation of page views and community comments.

Title Date
Amazon Web Services: Risk and Compliance Summary
This comprehensive guide will assist AWS customers with integrating AWS into their existing control framework supporting their IT environment. Read on for a risk and compliance overview, and follow along with the AWS risk and compliance program that includes: risk management, control environment, and information security.

sponsored by: Intel Amazon Web Services
11-30-2014
Information Management: A new game plan for building a retention strategey that works Summary
Consult the following white paper to uncover the steps and focal points you need to take and pay attention to in order to build a record retention strategy that works in today's data-driven environment.

sponsored by: IBM
10-30-2014
Information Lifecycle Governance Leader Reference Guide Summary
Find out how adopting an Information Lifecycle Governance (ILG) approach can help you achieve success with information economics.

sponsored by: IBM
10-29-2014
Exercising Control Over Mobile Access Summary
In this expert e-guide, explore several tips for managing mobile authentication methods and learn how to control what mobile devices can and cannot do inside your network.

sponsored by: Aruba Networks
10-29-2014
Information Lifecycle Governance Requirements Kit Summary
Find out what it takes to reach Level 4 maturity according to the Information Lifecycle Governance Requirements Kit.

sponsored by: IBM
10-29-2014
Is the Heart of Your SAP System at Risk? Summary
The following white paper explores the often-overlooked cyber-layer of the SAP system and provides practical advice on how to prevent security risks and attacks from taking place within this realm.

sponsored by: Onapsis
10-28-2014
Protect Your Company's Lifeblood Summary
The following white paper examines the potential hazards of overlooking ERP application layer security and offers insight into a platform solution intended to help improve visibility and descrease security vulnerabilities.

sponsored by: Onapsis
10-28-2014
SharePoint 2013: Clouding the issues Summary
Unfortunately, SharePoint 2013 is far from free of errors. The following report looks at the adoption rates and roll-out status for SharePoint as an ECM/DM system, the ongoing issues of user adoption, and overall project success for initiatives. Read on to learn how to overcome these problems and what you can do to succeed with your own projects.

sponsored by: IBM
10-28-2014
Secure mobile access that goes beyond the classroom door. Summary
Provide fast, secure access to campus resources and deliver productivity applications on personal or institution-owned devices. Read the use case and discover how Dell™ Enterprise Mobility Management enables you to secure sensitive information, manage access to your campus network and simplify management across device types and platforms.

sponsored by: Dell Software
10-27-2014
Fast, secure mobile access to patient records and resources. Summary
Maximize mobile productivity, secure private patient data and ensure that your organization remains in compliance with healthcare regulations. Read the use case and discover how Dell™ Enterprise Mobility Management enables healthcare organizations to achieve their goals while helping them to embrace their unique mobile/BYOD strategy.

sponsored by: Dell Software
10-27-2014
Comprehensive Enterprise Mobile Management for iOS 8 Summary
This exclusive white paper offers a comprehensive enterprise mobile management guide for iOS 8 devices. You'll also discover the key differences between iOS 7 and 8 in regards to mobile management. Read on to learn more.

sponsored by: Citrix
10-27-2014
Content Enabling the Mobile Workforce Summary
The following white paper distinguishes the challenges that are presenting themselves within the business environment with the drive for mobile. Learn which technology is available to help overcome many of the various obstacles with mobile initiatives and more.

sponsored by: IBM
10-27-2014
Unstructured Data Identification and Management Summary
The following white paper examines the seemingly infinite amount of data management problems that face many organizations today and explores an unstructured data identification and management system designed to help alleviate many, if not all of these challenges.

sponsored by: IBM
10-24-2014
Capture: Why it's so Essential to Enterprise Content Mangement Summary
In this AIIM report, learn more about why capture is an essential part of successful enterprise content management (ECM) environments. Discover when to capture, distributing capture, and how to enhance capture by using recognition and automation technologies. The question is not whether you will capture as much as it is when and where.

sponsored by: IBM
10-24-2014
Pushing the Boundaries: Symantec’s Software-Defined Data Center Powered by Vmware vCloud Suite Summary
Evolving from an antivirus software company to a global Fortune 500 company, Symantec's mission is to help customers of all sizes secure and manage information. Their goal was to transform enterprise customer support services for faster, responsive service, and improve scalability and agility of IT service.

sponsored by: Symantec Corporation
10-23-2014

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>