post

Results 76 - 100 of 462Sort Results By: Published Date | Title | Company Name
Published By: ThingWorx     Published Date: Dec 03, 2015
By all accounts, the Internet of Things (IoT) is a vast, fast-developing opportunity for the enterprise and everyone connected to the enterprise. This IoT market analysis roundup by Postscapes shows the wide range of numbers that represent the IoT market.
Tags : 
thingworx, iot developer, enterprise, postscapes, software development, knowledge management, enterprise applications
    
ThingWorx
Published By: Proofpoint     Published Date: Apr 28, 2017
Managing Business Email Compromise and Impostor Threats to Keep Your Organisation Protected
Tags : 
security, threat and vulnerability management, security, cyber attacks, email, threat detection
    
Proofpoint
Published By: DellEMC and Intel     Published Date: Sep 20, 2017
I database rappresentano spesso il motore su cui si basa l'attivit missioncritical dell'azienda. Sono alla base di online store, dati riservati e sistemi di gestione dei clienti e una soluzione che supporta livelli elevati di attivit del database pu rappresentare un grande vantaggio per la crescita aziendale. Intel Inside per nuove, infinite possibilit. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, il logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, il logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi e Xeon Inside sono marchi di Intel Corporation o di societ controllate da Intel negli Stati Uniti e/o in altri Paesi.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, il logo intel, intel atom, intel atom inside
    
DellEMC and  Intel
Published By: Dell and VMWare     Published Date: Oct 26, 2017
I database rappresentano spesso il motore su cui si basa l'attivit missioncritical dell'azienda. Sono alla base di online store, dati riservati e sistemi di gestione dei clienti e una soluzione che supporta livelli elevati di attivit del database pu rappresentare un grande vantaggio per la crescita aziendale.
Tags : 
    
Dell and VMWare
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
IDC, agenzia di intelligence del mercato IT, ha condotto uno studio globale su oltre 3.500 leader IT in tutto il mondo e ha riscontrato che le aziende di tutti i livelli stanno considerando i modelli PC as a Service per ridurre i costi, accorciare i cicli di aggiornamento e offrire apparecchiature migliori per i propri dipendenti. Dell PC as a Service (PCaaS) unisce hardware, software, servizi e finanziamento per lintero ciclo di vita in un'unica soluzione onnicomprensiva, a cui affanca un prezzo mensile per postazione unico e prevedibile offerto da Dell Financial Services. Scopri di pi sulle soluzioni Dell in collaborazione con Intel.
Tags : 
idc, service, guadagna, adozione, dell, intel
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Mar 13, 2018
Fresenius Medical Care North America is the premier provider of the highest quality healthcare to people with renal and other chronic conditions. In the US, 640,000 people live their lives with end-stage renal disease. Worldwide, more than three million people suffer from chronic kidney failure. Through its industry-leading network of 2,200 dialysis centers in the U.S., outpatient cardiac and vascular labs, and urgent care centersas well as North Americas largest practice of hospital and post-acute care providersFresenius Medical Care North America provides coordinated care for over 180,000 U.S. patients.
Tags : 
    
Dell PC Lifecycle
Published By: NetIQ     Published Date: Jun 11, 2012
Take the effort out of log management and gain the actionable information you need to improve your organization's security posture. Receive your complimentary whitepaper NOW!
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
    
NetIQ
Published By: Polycom     Published Date: Feb 25, 2015
AOL's wide-open, work-the-way-you-want approach seems perfectly suited to a company where staffers defy distance by overcoming more than miles. "Distance obviously is going to separate you and your colleagues, but flexibility is really what's going to bring it all together." AOL has identified Polycom collaboration as one of the top three mission-critical tools for the business.
Tags : 
polycom, aol, adap.tv, huffington post, collaboration, connectivity, communication, collaborative commerce
    
Polycom
Published By: Nokia     Published Date: Dec 22, 2015
This is a two-part post, the part 1 introduces the challenges of traditional WAN.
Tags : 
network, smarter, wan, business evolution, application, application integration, best practices, business analytics
    
Nokia
Published By: Akamai Technologies     Published Date: Sep 27, 2016
Learn about the origins, tactics, types, and targets of cyber- attacks and emerging threats and trends from post-attack analysis and intelligence by cybersecurity and DDoS mitigation experts. Includes quarter-over-quarter and year-over-year trends, plus spotlights on recent DDoS and web application attacks and review of the past quarters hot-topic issues in cybersecurity.
Tags : 
akamai, state of the internet, security, security report, cybersecurity, ddos, analytics, networking
    
Akamai Technologies
Published By: Movable Ink     Published Date: Oct 04, 2016
45% of emails are opened after an offer expires. See how Wyndham Hotels used a countdown timer to drive post-sale bookings and learn how to build best-in-class contextual email campaigns. Get our tips and tactics on building emails that see real results.
Tags : 
contextual marketing, email marketing, travel marketing, hospitality marketing, contextual email, real-time marketing
    
Movable Ink
Published By: Movable Ink     Published Date: Oct 04, 2016
45% of emails are opened after an offer expires. See how Wyndham Hotels used a countdown timer to drive post-sale bookings and learn how to build best-in-class contextual email campaigns. Get our tips and tactics on building emails that see real results.
Tags : 
contextual marketing, email marketing, travel marketing, hospitality marketing, contextual email, real-time marketing
    
Movable Ink
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
With the application economy in full swing, more organizations are turning to Continuous Testing and DevOps development practices in order to quickly roll out applications that reflect the ever-changing needs of tech-savvy, experience-driven consumers. Rigorous data they need, in the right formats. This forces teams to postpone their testing until the next sprint. As a result, organizations like yours are increasingly looking for ways to overcome the challenges of poor quality data and slow, manual data provisioning. They are also concerned about compliance and data privacy when using sensitive information for testing. CA Test Data Manager can help you mitigate all these concerns, so youre positioned to achieve real cost savings.
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
DevOps non pi una metodologia all'avanguardia, n lo sono la continuous delivery o l'approccio shift-left. Queste prassi e principi sono stati ormai adottati dalle aziende, almeno in una certa misura e, anche se in molti casi la transizione risultata incompleta, praticamente tutte le aziende conoscono e si sforzano di implementare i workflow e le strutture organizzative DevOps. Questo white paper spiega come utilizzare gli strumenti e le prassi DevOps in un'ottica incentrata sul cliente allo scopo di creare valore di business. Illustra le sfide che la maggior parte delle aziende deve affrontare per estendere le innovazioni DevOps al di l dell'ambito tecnico, identifica le lacune da colmare all'interno delle catene di continuous delivery per superare tali sfide e spiega come mettere il coinvolgimento degli utenti e la customer experience al centro di tutte le fasi della pipeline di delivery.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Introduzione CA Project & Portfolio Management (CA PPM) 15.3 consente di personalizzare i progetti per qualsiasi business unit, con la semplicit del drag-and-drop. Dal complicato workflow per HR o alla semplice gestione delle attivit per le vendite, oggi i lavoratori riescono ad avviare i progetti in pochi minuti, anzich in giorni. possibile integrare la collaborazione all'interno dell'applicazione per eliminare riunioni ridondanti, una familiare griglia di tipo Microsoft Excel per la gestione dei budget, una nuova connessione per strumenti di Business Intelligence (BI) di terze parti che consentono di trovare risposte, e si ottiene la pi moderna app di Project Portfolio Management attualmente sul mercato.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Challenge It is not uncommon for SAP system copies, including any post-editing, to take several days to complete. Meanwhile, testing, development and training activities come to a standstill, and the large number of manual tasks in the entire process ties up highly skilled SAP BASIS staff. Opportunity Enterprises are looking to automation as a way to accelerate SAP system copies and free up staff. However, this is only one part of the problem: What further complicates the system copy process is the need to safeguard sensitive data and manage huge data volumes while also ensuring that the data used in non-production systems adequately reflects the data in production systems so the quality of development, testing and training activities is not compromised. Benefits This white paper explains how a considerable portion of the SAP system copy process can be automated using the CA Automic Automated System Copy for SAP solution and SNP T-Bone, helping enterprises become more agile.
Tags : 
    
CA Technologies_Business_Automation
Published By: SafetyCulture     Published Date: Nov 27, 2018
Chain of Responsibility laws arent anything new. Youve got the general gist of things but have you stopped to think about the consequences if youre not fully compliant? Download our poster to hang where your whole team can see it. Because now, if youre not breach proof you could be up for a five-year jail sentence, or a $300,000 fine. Is it worth it? Make sure everyone in your team knows the risks, and are taking responsibility for keeping your vehicle standards up to scratch.
Tags : 
    
SafetyCulture
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 29, 2019
How do you build a security posture that is future proofed and yet drive cost down for your organisation? o Increase the efficiency and the return of your current security investments by simply add, upgrade or consolidate security devices without disrupting the capability or capacity to encrypt or decrypt traffic. o Reduces upfront capital cost by eliminating the need to over-provide for the network security infrastructure Download e-guide for industry best practices.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisations security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: IBM     Published Date: Feb 11, 2012
Check out this white paper to learn more about what to expect from IT in the post-cloud era.
Tags : 
cloud computing, environment, hardware, ibm corp., scenario, convergence, infrastructure, interoperability
    
IBM
Published By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that cant be patched: people. Thats why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employees inbox.
Tags : 
security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
De nos jours, les auteurs d'attaques, toujours plus inspirs, utilisent des outils automatiss pour puiser des informations sur leurs cibles dans les profils souvent publics disponibles sur les mdias sociaux. Ils savent donc o vous travaillez. De mme, le poste que vous occupez, vos centres d'intrt, vos loisirs, votre situation matrimoniale ou encore vos prcdents emplois n'ont plus aucun secret pour eux. Ils se servent de ces informations pour laborer des messages convaincants qui vous incitent cliquer sur une pice jointe ou une URL malveillante. Si vous tombez dans le pige, une charge active malveillante est injecte dans votre systme.
Tags : 
phishing, malware, des individus pris pour cible
    
Proofpoint
Published By: Proofpoint     Published Date: Aug 21, 2017
Tomber dans le pige tendu par un imposteur est plus facile qu'il n'y parat. Imaginez le scnario suivant : vous travaillez pour une importante socit qui a rcemment procd plusieurs acquisitions. Votre travail consiste rgler les factures. Un matin, vous recevez un message de votre PDG actuellement en dplacement. Il vous demande de virer des fonds afin de pouvoir entamer les ngociations de rachat d'une nouvelle entreprise et vous exhorte de garder l'information pour vous jusqu' la conclusion de l'accord.
Tags : 
directeur oprationnel, directeur financier, ressources humaines, service financier, gestion des salaires
    
Proofpoint
Published By: Gigamon     Published Date: Feb 20, 2019
Read Security at the Speed of Your Network to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.