law

Results 201 - 225 of 335Sort Results By: Published Date | Title | Company Name
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
This book explores the security challenges of virtualization in the data center, at the endpoint, and in the cloud. I explain why using traditional security products built for physical systems is a mistake for virtual systems. Finally, I explain how virtualaware security solutions provide in-depth security without compromising performance in virtual, cloud, and hybrid environments that include a mix of virtual and physical systems.
Tags : 
cloud security, virtualization security, virtualization, data center
    
CDW-Trend Micro
Published By: Polycom     Published Date: Jun 29, 2017
Law firms are under increasing pressure to respond quickly – often within hours – to client demands. Failure to increase agility can result in costly client churn, but law firms are often ill-equipped to be so nimble. As a result, it may be time to consider a technology that has been proven integral to law firms around the world - video collaboration. In under 30 minutes, we'll explain: Common use cases for video collaboration - going way beyond team meetings to the tasks at the heart of practicing law The types of solutions deployed - if you think an expensive, wall-mounted, on premise solution is your only option, you may be surprised by what's available From the meeting room to the courtroom - hear how a this technology is proliferating the courtroom and how the best lawyers will be equipped to take full advantage
Tags : 
video collaboration, law technology, client satisfaction, response time
    
Polycom
Published By: HPE Intel     Published Date: Feb 19, 2016
The rising demands for capturing and managing video surveillance data are placing new pressures on state and local governments, law enforcement agencies, and education officials. The challenges go beyond the expanding costs of equipment, storage, software and management time. Officials must also lay the right foundation to scale their capabilities, improve performance and still remain flexible in a rapidly evolving ecosystem of surveillance tools. Find out what state, local government and education IT leaders need to know, and what steps you can take to: • Improve performance and ROI on cameras-per-server for the dollars invested • Optimize and simplify the management of daily surveillance processing, including the integration of facial recognition, redaction and analysis software • Fortify reliability and dependability to reduce the risk of surveillance data retrieval failures.
Tags : 
    
HPE Intel
Published By: ThousandEyes     Published Date: Nov 17, 2016
Greg Schellenberg, Senior Systems and Network Engineer, uses ThousandEyes to rapidly locate issues with his LAN, WAN, cloud partners and remote employees. Watch this customer testimonial video to learn more!
Tags : 
    
ThousandEyes
Published By: ThousandEyes     Published Date: Mar 14, 2017
Greg Schellenberg, Senior Systems and Network Engineer, uses ThousandEyes to rapidly locate issues with his LAN, WAN, cloud partners and remote employees.
Tags : 
    
ThousandEyes
Published By: PwC     Published Date: Aug 27, 2019
Six hours a day. According to research, that’s how much of a lawyer’s time, on average, is spent on administrative tasks or new client development (sound familiar?). Fortunately, technology and the data it generates can help you streamline systems and processes — and reveal important insights about your firm. But what tools should you use? How should you implement them? We’ve got the answers. Our guide outlines what you need to know when leveraging technology to reduce admin inefficiencies and, better yet, increase cash flow. You’ll learn how to identify what metrics matter most to your practice: like billable hours, profitability by client and hiring decisions. It also spotlights helpful tools, like PwC’s InsightsOfficer, that turn data into insights, impacting your firm’s performance.
Tags : 
    
PwC
Published By: Rapid7     Published Date: May 22, 2012
Rapid7's CSO and Chief Architect of Metasploit leads this webcast which covers the most critical java-based security flaws and demonstrates the use of Metasploit in exploiting them. The target list includes web browsers, mobile platforms, embedded devices, application servers, and RPC services.
Tags : 
java, network security, security breach, security flaws, network intrusion
    
Rapid7
Published By: Qualys     Published Date: Nov 05, 2013
Patching is a key strategy for managing vulnerabilities and ensuring enterprise-wide security. Unfortunately, there are often so many flaws in software that patching becomes an overwhelming process. This white paper describes an approach to patch management that allows you to prioritize vulnerabilities that pose the greatest risk and accelerate the speed at which patches are applied. Also inside, find ten steps to improve patching – read on to learn more.
Tags : 
qualys, qualysguard, security, patch acceleration, vulnerability, vulnerability management, robustness, patching system
    
Qualys
Published By: G/O Digital     Published Date: Nov 13, 2014
It doesn't matter the legal field you specialize in – personal injury, bankruptcy, real estate, family law – you probably don’t have the time to focus on clients, the daily operations of your practice, and grow your business at the same time. To maintain a local business, you continually need to search for new business leads while still providing the best service to your clients and still find some time to sleep at night. This guide is here to help you boost your online lead generation with simple-to-execute solutions and best practices. Download this guide to help boost your online lead generation with simple-to-execute solutions and best practices.
Tags : 
digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media
    
G/O Digital
Published By: Black Duck Software     Published Date: May 18, 2016
Using open source code is not necessarily a problem, but not knowing what open source you’re using can be extremely dangerous, particularly when so much open source contains security flaws. In fact, the latest Future of Open Source Survey found that: - 55 percent of respondents had no formal policy or procedure for open source consumption - 98 percent were unaware of the open source code they were using "Application Security in 2016," a complimentary report from Black Duck Software, considers the key application security challenges your organization will face, with a special focus on staying both agile and secure with open source. Download the report today!
Tags : 
black duck, application security, security, open source, code
    
Black Duck Software
Published By: IntelliCorp     Published Date: May 31, 2012
Need to implement a pre-employment screening solution for your organization or want to evaluate your current program? Download this free whitepaper to receive a clear explanation of what you should consider to help mitigate risk.
Tags : 
intellicorp, background check, pre-employment screening, background screening company, fcra, consumer report, criminal search, sex offender registry
    
IntelliCorp
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations
    
Qualys
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerabilities
    
Qualys
Published By: Mimecast     Published Date: Sep 30, 2008
Today, email management is not only a filing and storage challenge. Because law firms and attorneys must be equipped to take control of litigation, email authenticity must be unquestionable with strong chains of custody, constant availability, and tamper-proof security. This white paper summarizes the author's experiences of litigating in fractured environments, particularly as they pertain to email. Learn the 12 steps that will help you gain control of your electronically stored data.
Tags : 
mimecast, saas, email solutions, evidence, security, email managemeng, archiving, ediscovery
    
Mimecast
Published By: Arkadin     Published Date: Sep 11, 2013
The legal industry, like almost all others, is faced with doing more with fewer resources. This whitepaper provides valuable information on how remote collaboration solutions such as audio, video, and web conferencing can help lower costs, increase productivity, and drive incremental revenue.
Tags : 
legal, legal solutions, legal communications, legal collaboration, legal conferencing, legal issues, compliance laws, law
    
Arkadin
Published By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : 
data security, compliance, technology, network security, regulatory compliance
    
Intralinks
Published By: Intralinks     Published Date: Mar 12, 2014
In the age of Edward Snowden and the NSA, there are increasing concerns about data privacy and especially where best to keep data secure. The prevalence of cloud computing and cloud-based storage and collaboration services is only exacerbating these concerns. Many organizations are confused about regulations that protect data in different countries and jurisdictions, and don’t know what steps to take to ensure their cloud collaboration vendor can provide adequate safeguards. While pushback and reform efforts are evolving, the reality is that companies must operate within the law. Deciding where to house your data and how to move it is an exercise in understanding the relevant legal regimes and the application of risk analysis in the decision making process. This white paper will examine those elements with regard to cloud-based storage and processing.
Tags : 
data privacy, technology, data, security, safeguards, cloud computing
    
Intralinks
Published By: Special Counsel     Published Date: Mar 25, 2015
Law firms and corporate legal departments seek experienced legal professionals with business acumen and knowledge of technology. The supply of these professionals is struggling to meet the demand, but that could change. The latest white paper from Special Counsel explores which legal – and non-legal – skills are critical in today’s evolving legal industry.
Tags : 
talent shortage, skills gap, legal talent shortage, legal soft skills, legal professional development, legal employment, legal recruiting
    
Special Counsel
Published By: Rosetta Stone     Published Date: Dec 07, 2017
The new federal law, Every Student Succeeds Act (ESSA), creates new opportunities to secure funding for language programming. Funding is available, but the strategies to secure the money must be carefully measured. Taking a strategic approach to this opportunity is critical. Download the whitepaper to read more about the funding sources that should play into your strategies.
Tags : 
language programs, k-12, rosetta stone, every student succeeds act (essa), federal funding strategies
    
Rosetta Stone
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
BlackBerry Cylance
Published By: SAS     Published Date: Apr 04, 2018
Opioid use grabs headlines when important celebrities overdose. Prince is sadly the most recent. But the problem is persistent and pervasive. The marginally good news is that the number of opioid prescriptions written started to decline last year. Overdose deaths, however, continued to rise. Also in the news have been lawsuits against pharmaceutical companies and distributors for helping to create the astounding oversupply of opioids, but the root causes go deeper. Physicians and their patients, medical policy makers and licensing boards, pharma companies and pharmacies all have played roles. And all must work together to stem the opioid epidemic and achieve the fundamental objectives of reducing addiction and deaths.
Tags : 
    
SAS
Published By: Rainmaker Systems Inc.     Published Date: Jan 13, 2012
It's a marketer's dream that their company can establish such customer loyalty that the consumer won't ever leave them for their competitors. But in today's highly competitive landscape, it's increasingly difficult to keep your business customers loyal to your brand year after year. Nonetheless, by making it easy for them to renew, you're one step closer to retaining the customer at minimal expense.
Tags : 
rainmaker, marketing, b2b, crm, customer, renewals, roi
    
Rainmaker Systems Inc.
Published By: IBM     Published Date: Mar 04, 2014
The age of the customer. Possibly no term better illustrates the current era of business. Customers expect their experience to be flawless at every touchpoint, and with competitors only a click (or tap) away, company leaders have a strong incentive to deliver. Online retailers have set a high standard in the way that they engage customers on an ongoing basis—not just during the commercial transaction, but before, during and after each interaction with the customer. Can service providers in industries such as banking, insurance, healthcare and government meet the challenge?
Tags : 
business operations, business process management, bpm, process automation, smarter process, age of customer
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search