cio

Results 1 - 25 of 1265Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless youve achieved that digital data nirvana (and you havent told the rest of us), youre going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless youve achieved that digital data nirvana (and you havent told the rest of us), youre going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: Gigamon     Published Date: Jun 10, 2019
Explosive data growth and network complexity hindering your ability to deliver results? We get it: the more complex the application infrastructure, the harder it is to ensure apps are functioning optimally. Read our new eBook, Driving Digital Transformation with Application Intelligence, to learn how to provide insight into applications across complex infrastructure. Discover previously hard-to-get information about bottlenecks, suspicious data, and user experience.
Tags : 
    
Gigamon
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jun 18, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a realityat least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with botsgood and badhas become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, its clear that bots are a driving force of technological change, and theyre here to stay. As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are maliciousand the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Infinidat EMEA     Published Date: May 15, 2019
Las soluciones de almacenamiento empresarial de INFINIDAT se basan en la arquitectura de almacenamiento nica y patentada de INFINIDAT: un conjunto totalmente abstracto de funciones de almacenamiento de?nido por software (SDS) integradas con lo mejor del hardware de consumo disponible para la venta. Al unir su software a una plataforma de referencia de hardware altamente probada, INFINIDAT presenta la primera solucin real de almacenamiento de?nido por software de clase empresarial.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 15, 2019
2017 no fue un ao fcil para los CIO/CISO, y 2018 tampoco da muestras de serlo. Con tantas brechas en los datos acaecidas tan solo en 2017 y capaces de acabar con la carrera de cualquiera, (Equifax, Uber, Yahoo son algunos ejemplos), y los requisitos normativos reforzados a nivel mundial, los CIO/ CISO tienen la responsabilidad corporativa de replantearse su enfoque sobre la seguridad de los datos.
Tags : 
    
Infinidat EMEA
Published By: Google Apigee APAC     Published Date: Jun 10, 2019
Five things every CMO should know about APIs. APIs power the digital marketing channels and the applications we use today. They are a window to your companys digital assets, exposing them so that developers and partners can build mobile apps and become an extension of your innovation engine. APIs are the technology that brings the CIO and the CMO together. In this ebook, see how a strong partnership between the CIO and CMO, centered around the customer, is essential to the success of todays API-powered digital businesses. Whats inside? APIs open opportunities for new distribution channels APIs connect businesses and enable growth with partners and developers APIs are the foundation for data exchange in digital ecosystems APIs create more customer value with existing business assets Fill out the form to get the ebook and receive a copy via email.
Tags : 
    
Google Apigee APAC
Published By: KPMG     Published Date: Jun 10, 2019
Todays customers want 24/7 access, mobile availability, quality, low prices, fast shipping, easy returns and instantaneous service. These expectations demand that every business function be customer-centric, including operations. Read this report to find out: how to create customer-centric operations to deliver the customer experience the eight essential components of a connected, customer-centric enterprise why alignment between the COO and CIO is essential five key steps to start transforming operations to drive growth and create value.
Tags : 
    
KPMG
Published By: Workday APAC     Published Date: May 08, 2019
"Technology today is shaking up the way we work. To help IT leaders navigate the best path forward, we created a digital magazine called CIO Perspectives. Read it for insights and guidance from leaders and visionaries on how to break free from day-to-day tasks and gain a greater perspective. Check it out now."
Tags : 
    
Workday APAC
Published By: Infinidat EMEA     Published Date: May 14, 2019
Digital transformation is a business enabler, one that also translates to an increase in the demand for greater storage capacity and performance. This increasing demand requires IT organizations to re-examine their data storage strategy as the growth in capacity doesnt align with a shrinking IT budget. To support the growth of the business and remain competitive in a global digital market, CIOs are asked more than ever to do more with less, while improving performance and availability at the same time.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isnt showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a companys internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a companys data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 war kein einfaches Jahr fr einen CIO / CISO, und auch 2018 gibt es derzeit keine Anzeichen dafr, dass es einfacher wird. Bei so vielen Datenversten, die sogar Karrieren beendeten, allein im Jahr 2017 (Equifax, Uber, Yahoo, um nur einige zu nennen) und mit weltweit verschrften regulatorischen Anforderungen haben CIOs / CISOs die unternehmerische Verantwortung, ihren Ansatz zur Datensicherheit zu berdenken. Abgesehen von der Einhaltung gesetzlicher Vorschriften sind Unternehmen gegenber ihren Kunden und Aktionren verp?ichtet, Daten zu schtzen und ihre Gefhrdung nicht nur gegenber externen Angreifern, sondern auch gegenber Mitarbeitern zu minimieren. Die im Jahr 2017 am hu?gsten genutzte Methode fr Datendiebstahl war das Phishing, welches sich an interne Mitarbeiter von Unternehmen richtete (siehe Report zur Untersuchung von Datenversten im Jahr 2017). Damit wurden diese Mitarbeiter unwissentlich mitschuldig an der Datenverletzung: ber 80% der erfolgreichen Cyber-An
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 15, 2019
Il 2017 non stato un anno facile per essere un CIO / CISO e il 2018 non sembra mostrare alcun segno di miglioramento in tal senso. Con cos tante violazioni di dati in grado di rovinare unintera carriera nel solo 2017 (Equifax, Uber, Yahoo per citare solo alcuni casi) e con requisiti normativi pi rigorosi in tutto il mondo, i CIO / CISO hanno la responsabilit societaria di rivedere il loro approccio alla sicurezza dei dati.
Tags : 
    
Infinidat EMEA
Published By: Ahead     Published Date: Jun 05, 2019
Digital Requires a New Level of Insight and Control Digital strategies have caused business executives to intensify their scrutiny of how technology affects bottom line performance. With a growing emphasis on differentiating the customer experience in highly competitive markets, these executives want to understand how their IT systems affect everything from brand perception to customer acquisition and loyalty. 3 | A Guide to Intelligent Operations Meanwhile, those same demanding business leaders lack appreciation and patience for the complexity of todays digital technology environment. While applications and user experiences are simpler and more intuitive, the backend processing, application interdependencies, and underlying infrastructure are more complex than ever, even in light of the benefits of abstraction, virtualization, and cloud computing (see Figure 1.) While CIOs have long been expected to improve stability and uptime - and done a pretty good job of it - the stakes are much
Tags : 
    
Ahead
Published By: Indegy     Published Date: Jun 17, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegys agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
cybersecurity, industrial networks, security capabilities, indegy
    
Indegy
Published By: KPMG     Published Date: Jun 06, 2019
In future, people with IT skills will no longer work only within the IT function. Instead, theyll be part of an ecosystem of technology talent across the enterprise. How should CIOs respond to this change? Read this briefing to find out: what the changing status of technology means for the IT workforce how CIOs can encourage employees to be IT enablers rather than IT doers why we need to rethink IT as a technology talent ecosystem why IT should no longer be the gatekeeper to technology and what it needs to become instead.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
20 years on from our first global survey of technology leaders, explore the changing role and growing influence of the CIO. Read this report to find out: the top-10 business issues facing customer-centric and digital leaders how successful organisations are turning their strategies into reality which emerging technologies organisations are investing in how IT leaders are aiming to plug the skills gap.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
Companies that use digital technologies to drive agility and responsiveness, and enhance the customer experience achieve higher revenue growth than their competitors. Find out how. Read this briefing to discover: how digital leaders are different from the average organisation key characteristics of digital leaders how the CIO can become the agent for digital change.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
Technology plays a pivotal role in delivering the customer experience. Explore the forces moving CX to the top of the IT agenda. Read this report to discover: how technology can help deliver what customers want four areas where the CIO can make the biggest impact priority actions for driving the CX agenda forward.
Tags : 
    
KPMG
Published By: Workday UK     Published Date: Apr 25, 2019
Technology is now shaking up the way we work. To help IT leaders navigate the best path forward, we created a digital magazine called CIO Perspectives. Read it for insights and guidance from leaders and visionaries on how to break free from day-to-day tasks and gain a greater perspective. Check it out now.
Tags : 
workday, workforce technology, digital strategy
    
Workday UK
Published By: NEC     Published Date: Sep 29, 2009
Written by: IDC Abner Germanow, Jonathan Edwards, Lee Doyle IDC believes the convergence of communications and mainstream IT architectures will drive significant innovation in business processes over the next decade.
Tags : 
it architecture, idc, automation, automated order processing, soa, service oriented architecture, soap, http, xml, wsdl, uddi, esbs, jee, .net, crm, san, business process automation, business process management, configuration management, edi
    
NEC
Published By: ASG Software Solutions     Published Date: Oct 16, 2008
Limited visibility has tethered CIOs' success in both IT and business. However, using federated CMDB technology, CIOs can view the complete IT infrastructure and the entire lifecycle of a business service.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, automation, it value chain, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, application performance management, business process automation, business process management, project management, application integration
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Mar 01, 2010
In Q4, 2009, ENTERPRISE MANAGEMENT ASSOCIATES (EMA) analysts worked with ASG to research how executives in IT and within the lines of business use dashboards to gain holistic insights into IT services as they impact business outcomes.
Tags : 
asg, ema, enterprise management associates, dashboards, cio, ceo, coo, cfo, side bar, application performance management, business integration, business intelligence, business management, business process automation, enterprise resource planning, enterprise software, workforce management
    
ASG Software Solutions
Published By: Vision Solutions     Published Date: Apr 24, 2008
This white paper will provide a road map to the most effective strategies and technologies to protect data and provide fast recovery should data be lost or corrupted due to accident or malicious action.
Tags : 
vision, high availability, ibm, cdp, aix, business intelligence, configuration management, data protection
    
Vision Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.