digital assets

Results 1 - 25 of 86Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Sep 12, 2019
Despite massive spend to protect enterprise digital assets, security breaches are still on the rise. The disconnect between the level of investment and the volume and impact of attacks is largely attributed to outdated approaches that favor perimeter protection and point solutions despite a digital supply chain that is more distributed than ever. For these reasons and more, enterprises need to start thinking differently about cybersecurity. Security doesnt need new products. It needs a new model. One that applies the principles of intrinsic security across the fabric of the organization, from the sales floor to the C-suite, from the infrastructure to the endpoint device. In this Essential Guidance executive brief, learn how intrinsic security differs from traditional security methods, and the steps CIOs need to take to operationalize this model for greater business agility without greater risk.
Tags : 
    
VMware
Published By: Adlib Software     Published Date: Jan 13, 2014
Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.
Tags : 
content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion
    
Adlib Software
Published By: AWS     Published Date: Oct 09, 2019
While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and production e
Tags : 
    
AWS
Published By: Extensis     Published Date: May 04, 2008
Integrated marketing communications agency, CMD, has an easy way of tracking the payoff from implementing Portfolio Server and Suitcase Server to manage their digital assets and fonts. It's called more billable hours.
Tags : 
cmd, extensis, font, website design, server, communications, digital asset management', configuration management
    
Extensis
Published By: Hitachi Vantara     Published Date: Mar 08, 2019
In a perfect world, downtime would be a thing of the past, however, as organizations continue their digital transformation journeys, more data assets are being createdgenerating, in turn, higher availability demands. Delivering on availability service levels is not just a technical responsibility, but also a business imperative extending well beyond IT. The consequences of failing to meet service levels can be dire and costly. Read this white paper to learn how the right tools can minimize downtime.
Tags : 
    
Hitachi Vantara
Published By: Hewlett Packard Enterprise     Published Date: Dec 13, 2016
Cloud computing is rapidly entering an entirely new phase one destined to prove far more transformative and disruptive than the initial phase of cloud deployment. Cloud is driving a comprehensive transformation of digital assets in organizations of all stripes as IT decision-makers begin to view the emerging cloud construct as a proxy for the transformation of IT itself.
Tags : 
    
Hewlett Packard Enterprise
Published By: Epicor     Published Date: Sep 20, 2017
As the world around us becomes increasingly digital, manufacturers must follow suit. Digital transformation presents significant opportunities to achieve growth by addressing key operational issues and aligning products and services to the demands of todays market. Growth looks different for every company, and with the vast array of digital technologies available, it can be hard to know where to start. Which technologies offer the greatest opportunity for your company to grow? How can you successfully embrace the digital revolution? Epicor has a history of helping manufacturers achieve growth by utilizing cutting-edge technology. By downloading these digital transformation assets, you will: Understand what growth might look like for your business Assess the capabilities needed to support your digital transformation journey Explore best practices to implement your digital transformation strategy Learn how to capitalize on growth opportunities with speed and conviction
Tags : 
    
Epicor
Published By: Hewlett Packard Enterprise     Published Date: Apr 13, 2016
To understand your organizations risk profile: You should start with a simple question: What are your digital assets and the cyber threats facing them, says HPE Security Services CTO, Andrzej Kawalec. Watch the MIT Technology Review interview with HPEs Kawalec and FireEye's Vitor Desouza in order to protect your organization from what has become daily, even hourly, attacks for many.
Tags : 
    
Hewlett Packard  Enterprise
Published By: HP Inc.     Published Date: May 20, 2019
With a couple of swipes, a like and a share, whats in today is gone tomorrow. Graphic design trends are changing rapidly, based on a fastspreading global pop culture that determines whats hot, and whats not, almost instantly. By creating unique printed and digital assets that engage consumers and drive social media posts (and a whole lot of likes and shares), brands can leverage the Instagram effect to attract customers. Start with these trends, and keep reinventing!
Tags : 
    
HP Inc.
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Digital experiences on mobile connections suffer from performance issues, and impatient users compound the challenges that slower, intermittent mobile connections raise. Firms need to build a new discrete delivery tier to improve users perception of mobile performance and drive conversion and engagement. By dynamically adjusting to context, this new delivery tier can adaptively send the right assets, optimize the sequence, and modulate streaming rich media. this report outlines the delivery tier technology options that application development and delivery (AD&D) professionals must embrace. this is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
mobile performance, technology, digital experience, media
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 19, 2019
Whether you're focused on public-facing websites or your company's assets and users, as someone who cares about digital security, your life is dominated by these trends that characterize the state of all things security in 2019: Attacks are growing, evolving, and becoming more sophisticated. And the types of attacks we see are proliferating. How do you protect your crown jewels when the castle has no walls? The answer is at the edge. When you deploy security at the edge, you are protecting your changing assets closer to the attack itself and moving digital experiences closer to users. In essence, you're deploying a single pane of glass, an extension of your infrastructure, that sits between you - your users, your digital experiences - and the always-changing nature of today's digital environment.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 04, 2019
Its a bold claim; one that hasnt always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone. Security is essential to the success of any digital business. If there is one thing you can always count on, however, its that security-related incursions are inevitable. And its news to no one to say that these disruptions can have dire consequences beyond downtime. Security breaches erode trust and damage reputation. Simply put, theres no longer a choice. As a CIO, CISO, or other security or IT leader, you know its your job to be the central agent stressing the connections between business and digital risk. Its your responsibility to find the talent and technology to ensure the protection of your digital assets. According to Gartner, by 2020, 100% of large enterprises will be asked to report on their cybersecurity and technology risks to their boards of directors at least annually. Thats up from 40% in 2018. Whether your
Tags : 
    
Akamai Technologies
Published By: Cisco     Published Date: Sep 21, 2017
Digital transformation isnt a technology or a product. Rather, its a philosophy for using digital assets to change the way an organization runs. It involves realigning technology and modifying business processes to better engage employees, customers and other constituents of the extended enterprise. Digital transformation significantly improves the performance and reach of an enterprise and has become a top priority for IT and business leaders across the globe. Read on to find out how Cisco's Architecture can enable Digital Transformation.
Tags : 
digital transformation, architecture, business processes, best practices, customer engagement, employee engagement
    
Cisco
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
This workshop explains and demonstrates how to secure your infrastructure, protect your digital assets, and automate threat detection and incident correctionproviding complete visibility into your data center security operations.
Tags : 
    
Hewlett Packard Enterprise
Published By: Adobe     Published Date: Nov 11, 2015
This paper reveals the seven trends impacting how digital marketers create, manage, deliver, and optimise their digital assets.
Tags : 
7 trends in digital asset use, create content, manage content, delivery content, omptimise content, customer experience, marketing channel, customer interaction
    
Adobe
Published By: Adobe     Published Date: Nov 11, 2015
This paper reveals how to use DAM to keep up with the constantly accelerating pace of digital business.
Tags : 
dam, digital asset management, digital assets, key considerations when choosing dam, application integration, content delivery, content management system, document management
    
Adobe
Published By: Adobe     Published Date: Nov 11, 2015
This paper reveals the seven trends impacting how digital marketers create, manage, deliver, and optimise their digital assets.
Tags : 
7 trends in digital asset use, create content, manage content, delivery content, omptimise content, customer experience, marketing channel, customer interaction
    
Adobe
Published By: Adobe     Published Date: Nov 11, 2015
This paper reveals how to use DAM to keep up with the constantly accelerating pace of digital business.
Tags : 
dam, digital asset management, digital assets, key considerations when choosing dam, application integration, content delivery, content management system, document management
    
Adobe
Published By: Adobe     Published Date: Nov 11, 2015
This paper reveals the seven trends impacting how digital marketers create, manage, deliver, and optimise their digital assets.
Tags : 
7 trends in digital asset use, create content, manage content, delivery content, omptimise content, customer experience, marketing channel, customer interaction
    
Adobe
Published By: Adobe     Published Date: Nov 11, 2015
This paper reveals how to use DAM to keep up with the constantly accelerating pace of digital business.
Tags : 
dam, digital asset management, digital assets, key considerations when choosing dam, application integration, content delivery, content management system, document management
    
Adobe
Published By: Adobe     Published Date: Jul 04, 2016
Your effectiveness at creating, sharing and deploying creative digital assets has a direct impact on your ability to create compelling customer experiences. And digital asset management (DAM) is the foundational piece in that effort. But be careful. Theres danger in the attitude, We have a DAM.
Tags : 
creative digital assets, share digital assets, asset management, digital asset management, dam, document management, information management
    
Adobe
Published By: Adobe     Published Date: Jul 04, 2016
Your effectiveness at creating, sharing and deploying creative digital assets has a direct impact on your ability to create compelling customer experiences. And digital asset management (DAM) is the foundational piece in that effort. But be careful. Theres danger in the attitude, We have a DAM.
Tags : 
creative digital assets, share digital assets, asset management, digital asset management, dam, document management, information management
    
Adobe
Published By: Adobe     Published Date: Jul 04, 2016
Your effectiveness at creating, sharing and deploying creative digital assets has a direct impact on your ability to create compelling customer experiences. And digital asset management (DAM) is the foundational piece in that effort. But be careful. Theres danger in the attitude, We have a DAM.
Tags : 
creative digital assets, share digital assets, asset management, digital asset management, dam, content management system, document management
    
Adobe
Published By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function especially IT security. Whether its discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for Panel Webinar: Reducing Cyber Exposure from Cloud to Containers. Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
    
Tenable
Published By: Schneider Electric     Published Date: Jun 03, 2019
Leveraging IIoT advancements, learn how to break traditional barriers between your power and process control systems to solve challenges across the full lifecycle of the plant. Download the white paper to learn more.
Tags : 
power, digital transformation, industrial internal of things, smart control, optimized assets, future of automation, reliability, safety
    
Schneider Electric
Start   Previous   1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.