data

Results 1 - 25 of 8540Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: May 05, 2017
Web application and DDoS attacks hit enterprises without warning or reason. Most Distributed Denial of Service (DDoS) attacks require little skill to launch with attackers can simply rent resources from DDoS-for-hire sites at a low cost.. In comparison, DDoS attacks typically result in: Operational disruption Loss of confidential data Lost user productivity Reputational harm Damage to partner and customer relations Lost revenue Depending on your industry, that could add up to tens of thousands of dollars in damage and in some cases it could be millions. Only 2% of organizations said their web applications had not been compromised in the past 12 months 98% said they had.
Tags : 
ddos, technical support, data security, application security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 05, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing website infrastructure or within a data center with security measures in the cloud for a more robust security posture. We share Akamais approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, data, akamai
    
Akamai Technologies
Published By: Dell     Published Date: May 09, 2017
Dells approach to PC Lifecycle management is designed to help customers make the change from IT maintenance to innovation all while controlling their PC infrastructure costs. With this eGuide IT professionals will learn how to deploy, secure, and support PCs with unparalleled efficiency leveraging Dells industry-leading hardware, services, and security solutions. Access the eGuide from Dell and Intel and you will learn: Why IT needs to take a different approach PC lifecycle management The four critical stages of the PC lifecycle (Plan, Deploy, Manage, and Retire) How to partner with Dell to strategically migrate to Windows 10 What solutions can help in each phase to reduce costs and increase IT productivity The latest security solutions to protect data and employees
Tags : 
    
Dell
Published By: Dell     Published Date: May 09, 2017
The workplace is changing and the one-size-fits-all approach to technology is changing along with it. As a result, your organization may need to rethink how to keep productivity high, promote collaboration, delight employees with the latest devices all while keeping IT within budget. This interactive eGuide will be your one-stop resource to understand all the new innovation available in Dells latest notebooks, desktops, 2-in-1s and ecosystem that can keep your organization future-ready. Access the eGuide from Dell and Intel and you will learn: How the workplace and workforce is changing What tools and solutions help IT go from maintenance to innovation How innovation is changing notebooks, 2-in-1s, desktops and workstations The latest Windows 10 features employees will be talking about What you need to keep endpoints and data secure
Tags : 
    
Dell
Published By: Dell     Published Date: May 09, 2017
Productivity has become synonymous with revenue for many organizations. The theory is simple: The more your employees can get done, the more income they can generate. And yet data from the Bureau of Labor Statistics shows that the productivity level in the United States is actually fairly low, topping out at 3.1% in one quarter and going into negative digits in others over the past few years.1 This means labor productivity, measured in output per hour of labor, is low orin many quartersshrinking. Download this white paper from Dell and Intel to learn more. Intel Inside. Powerful Productivity Outside. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: May 10, 2017
IT departments in organizations of all types are looking to increase the agility, scalability, and cost-effectiveness of their data centers and storage initiatives. While the cloud, hybrid cloud, and private cloud options tend to be the first options that come to mind for many of these IT professionals, many are finding that hyperconverged infrastructures provide many of the same benefits. In this Enterprise Strategy Group white paper, uncover the many benefits of hyperconverged infrastructures and information on Dell EMC and Intel's Hyperconverged VxRack System 1000.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 10, 2017
While just about everyone is writing about how IT and the businesses it serves need to be transformed, the actual industry answers to both digital and IT transformation remain unclear at best. Are transformational initiatives all about analytics and big data? Or are they about the move to cloud in all its varieties? Support for mobile? More agile ways of working and developing software? Or are they actually all about crafting teams to promote more proactive dialog between the business and IT? The truth is, of course, digital and IT transformation depend on all of the above and more. They also depend on a resilient infrastructure thats easily adapted to changing business priorities without requiring long hours spent on maintenance, updates, and addressing problems of service availability. But making all this work clearly and cohesively is far beyond the purview of almost any solution todaywhether from a software management perspective or from a hardware infrastructure perspective.
Tags : 
    
Dell EMC
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state
    
Aberdeen
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Whats the best analytic approach for your business? As technology has evolved, so has our ability to process data at an incredible rate, making it possible to perform what has become known as Anticipatory Analytics. While still a relatively new concept, anticipatory analytics is gaining prevalence as a methodology. If youre seeking to understand the future needs of your business before they show obvious signs, anticipatory analytics cant be ignored. In this document, youll learn: The advantages of anticipatory analytics The key enablers of anticipatory analytics How anticipatory can be leveraged for your business Why anticipatory can give you first-mover advantage When to use anticipatory or predictive analytics, based on your goals
Tags : 
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
A tool for finance leaders to unify disparate customer data with financial and strategic ROI If youve found yourself sweating in a smoky billiard room, wondering what role customer data should play in financeas well as in your companys long-term strategythis eBook will help you hone your pool shark skills. Inside, youll find insights about. How to identify patterns in your customer portfolio, and why it matters. Avoiding four critical data billiard blunders. Key questions to ask while youre segmenting your data. How to tell if your portfolio segmentation strategy is working with the right reporting. This eBook will help you navigate the crowded billiard room of customer data and how you can use it to drive cross-functional value for your team.
Tags : 
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Long-term success in business has always been about more than just who you know and what you do. Its dependent on what you do with your customers, prospects, suppliers and partners to help them succeed. How do you grow relationships with companies where your knowledge of their business is not fully understood, or limited at best? The answer: Data.
Tags : 
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Creating predictive analytics from alternative data has become the current focus of the biggest quant trading firms in the industry The democratization of financial services data and technology, together with more intense competition, makes the needs of todays market participants vastly different from those of previous generations. Firms must locate untapped sources of data for both public and non-public companies. This alternative data, such as payment data and other non-public information, from sources beyond the common channels, can be a predictive indicator of market performance; a difference maker in assisting firms as they develop models to evaluate their investments. By combining our unique data sets with advanced analytics, traders, analysts and managers can seek predictive signals and actionable information utilizing their own models. View our research report to learn how alternative data, our 'Information Alpha,' can help you earn differentiated investment returns.
Tags : 
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Complexity, globalization and digitalization are just some of the elements at play in the risk landscapeand data is becoming a core part of understanding and navigating risk. How do modern finance leaders view, navigate and manage enterprise risk with data? Dun & Bradstreet surveyed global finance leaders across industries and business types. Here are the top trends that emerged from the study: 1. The Enterprise Risk & Strategy DisconnectFinance leaders are using data and managing risk programs, but over 65% of finance leaders say theres missing link between risk and strategy. 2. The Risks of the Use and Misuse of DataUp to 50% of the data used to manage modern risk is disconnected. Only 15% of leaders are confident about the quality of their data. 3. Risky RelationshipsOnly 20% of finance leaders say the data they use to manage risk is fully integrated and shared. Download the study to learn how finance leaders are approaching data and enterprise risk management
Tags : 
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Navigating Uncertainty & Disruption in a Post-Brexit World Risk management and finance professionals are navigating an unprecedented period of uncertainty. In a post-Brexit world, how can business leaders best navigate disruption? Data has become the most valuable business commodity, but not all data is meaningful. Data that helps you uncover hidden associations with customers, partners and suppliers can be a true catalyst for business transformation and growth. In this ebook, we have mapped out the crucial steps in the journey towards operationalizing relationship data to: - Define Relationship Data - Use relationship data to unlock new opportunities - Apply relationship data across the organization to drive growth
Tags : 
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Stories and statistics behind successful analytics projects The adoption of analytics across the enterprise is accelerating, and with good reason. Analytics can offer a competitive advantage by helping to identify growth opportunities, circumnavigate risk and improve customer relationships. These insights are becoming crucial parts of the business strategy for executives representing a wide array of industries. Check out our latest eBook to see how some of the worlds leading companies are using analytics to meet their needs. Youll receive diverse examples of how organizations applied the latest statistical methodologies, such as: scorecard build, regression, decision trees, machine learning and material change to uncover meaning in data. The examples represent global brands across critical industries Financial Services, Insurance, High-Tech, Aerospace, Manufacturing and others where analytics helped answer their most challenging questions.
Tags : 
    
Dun & Bradstreet
Published By: Entrust Datacard     Published Date: May 10, 2017
Entrust Datacard provides customers with a commercial security public key infrastructure (PKI) solution that addresses authentication and data protection needs for enterprise and government customers
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 10, 2017
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively.
Tags : 
certificate management, digital business, pki, datacard, certificate management, application integration, database development, virtualization
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 10, 2017
The rapid rise of digital business is moving public key infrastructure (PKI) into the spotlight. Once commonly viewed as a deep-weeds technology reserved for niche applications, PKI is now emerging as a core technology for securing cloud, mobile and Internet of Things (IoT) initiatives.
Tags : 
digital, cloud, cloud computing, internet of things, intrastructure, virtualization, infrastructure
    
Entrust Datacard
Published By: Cisco     Published Date: Mar 17, 2017
This paper considers how IT must meet the challenge of devising a datacenter strategy that transforms the datacenter for a multicloud world.
Tags : 
digital transformation, hybrid cloud, data centers, infrastructure, architecture, operations, cloud applications
    
Cisco
Published By: IBM APAC     Published Date: May 18, 2017
According to industry analyst IDC, the mean cost of an hour of downtime can range from USD 224,952 to USD 1,659,428, depending on the size of your organization.1 And each instance of downtime increases your total cost of ownership (TCO) and eats away at your IT budget.
Tags : 
tco, idc, ibm, cloud, mobile, hardware
    
IBM APAC
Published By: IBM APAC     Published Date: May 18, 2017
Today, everything computes. Intelligence has been infused into things no one would recognize as computers: appliances, cars, roadways, clothes, even rivers and cornfields. Tomorrow, many of these things will think, thanks to breakthroughs in cognitive computing. Even the things that dont think themselves will continue collecting and reporting the massive quantities of data that feed cognitive systems.
Tags : 
ibm, tss, cloud, mobile, appliances
    
IBM APAC
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Entrusts SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, youll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Document signing certificates enable organizations to digitally sign Adobe, Microsoft Office and other document types, marking them with visual trust indicators that verify the publishers identityan indication that the document has not been altered. With document signing certificates organizations can authenticate documents, allowing for secure and efficient electronic transmission of official papers including legal documents, invoices, engineering plans and diagrams, diplomas, charters and more while reducing costs associated with printing and maintaining paper files. This white paper will discuss: The history of document signing What digital signatures are and how they function The benefits and objectives of implementing document signing certificates Real world use cases of document signing certificates
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Properly managed, multi-server and wildcard certificates can provide increased flexibility. Since the consequences of a compromise can be more severe than they would be for a conventional certificate, supplemental safeguards should be employed. In the absence of these safeguards, we do not recommend the use of either multi-server or Wildcard certificates, due to both the security risks involved and the expanded scope of management issues in the wake of a compromise.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.