onc

Results 1 - 25 of 1879Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 08, 2019
Les solutions Cisco pour les runions L'envir et pour la collaboration en quipe L'environnement de tra vail a chang. Aujourd'hui, l'agilit pr vaut contre les schmas de fonctionnement classiques. Toutefois, dans notre monde moderne, la culture de l'inno vation doit venir des entreprises elles-mmes. Vos collaborateurs ont besoin d'un espace de tra vail qui met l'accent sur l'inno vation et la rapidit. Cisco Webex Teams est une plateforme qui oWre vos quipes tous les r outils dont elles ont besoin. Il s'agit d'un kit egroupant les technologies essentielles aux PME tournes vers l'a venir.
Tags : 
    
Cisco EMEA
Published By: Ricoh     Published Date: Mar 11, 2019
Todays CIOs no longer just oversee technology. They are now key strategists who guide their organizations and give them the tools they need to stay competitive. A study by Forbes Research stated that five years ago, a CIOs most critical skill was deploying technology. Now, the #1 way that CIOs provide value is by contributing to the corporate strategy, so they can advance business objectives and drive revenue.1 In particular, CEOs rely on the CIO for guidance around digital transformation. Organizations must transform how they operate and take advantage of new technologies to better engage customers and employees. Digital transformation falls squarely on the shoulders of IT leaders. CIOs are under pressure to drive transformation overcoming barriers such as cultures that are resistant to change, employees who want to upload files anywhere, and increased concerns about data security. CEOs also expect CIOs to achieve results now. The longer you wait, the more likely you will fall beh
Tags : 
    
Ricoh
Published By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, its important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at whats behind you, but you can often spot whats coming up quick, set to overtake you. Thats the spirit of this threat report. Weve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldnt be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. Its also highly likely that other threats, such as unauthorized M
Tags : 
    
Cisco EMEA
Published By: Here Technologies     Published Date: Apr 02, 2019
In todays interconnected world you need to future-proof the integrity and reputation of your business. Your companys network remains the Achilles heel of the whole enterprise because once compromised, your companys reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the worlds leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : 
    
Here Technologies
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless youve achieved that digital data nirvana (and you havent told the rest of us), youre going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last years study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This years research updates those findings and explores the benefits associated with privacy investment. Ciscos Data Privacy Benchmark Study utilizes data from Ciscos Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
The modern workplace is anywhere Complex work. Specialised teams all over the place. Theyre in offices, homes, hotels, cars and airports. It could hardly be any more different to the days when people sat in neat rows of desks. Thats the modern reality of business lifeits happening everywhere at once. Not only that, its happening on all kinds of devices, from desktop to mobile. And every generation of worker expects to have its workstyle accommodated. Today, co- workers mingle flexibly in pairs and groups, and those teams thrive on exchanging creative energy. They meet up in spaces designed specifically to encourage the cross-pollination of ideas. Their disruptive new concepts are where the next big growth opportunities are. The modern workplace is one where ongoing innovation is valued above all else. And flexibility extends well beyond four walls. Think about the way you work today and how it has evolved. Chances are its no longer 9 til 5. Mobile employees, contract workers, fr
Tags : 
    
Cisco EMEA
Published By: Dell EMC     Published Date: Feb 14, 2019
Isilon scale-out NAS delivers the analytics performance and extreme concurrency at scale to feed the most data hungry analytic algorithms. Access this overview from Dell and Intel to learn more. Intel Inside. Powerful Productivity Outside.
Tags : 
    
Dell EMC
Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
Microsoft Azure Reserved Virtual Machine (VM) Instances are an effective way to reduce your Azure spend. While the concept of reservations may be new to you, just remember that they enable you to make an all upfront payment towards your compute costs, thereby providing prioritised capacity. Read this eBook to learn: The benefits of Reserved VM Instances How to calculate the break-even point The options for modifying, exchanging, or cancelling your reservations
Tags : 
    
CloudHealth by VMware
Published By: Red Hat     Published Date: Feb 25, 2019
Linux diventato il sistema operativo standard per le infrastrutture basate sul cloud nonch quello pi utilizzato anche dalle applicazioni moderne. E questo perch, tra i numerosi benefici, offre un ambiente affidabile in grado di garantire scalabilit, sicurezza e un robusto supporto per le applicazioni. Red Hat Enterprise Linux consolida queste capacit proponendo un ambiente aziendale supportato e resistente, in grado di conseguire risparmi sui costi operativi, una migliore affidabilit e disponibilit, oltre che una maggiore scalabilit. Ci si traduce in un ROI (Return On Investment) maggiore per i nostri clienti aziendali. Lo studio Red Hat Enterprise Linux: valore per il business condotto da IDC rivela in che modo Red Hat Enterprise Linux in grado di supportare le operazioni aziendali di ciascuna delle 12 organizzazioni prese in esame. Tutte affermano che Red Hat offre loro un ambiente operativo economico, efficiente e affidabile. I vantaggi offerti da Red Hat Enterpris
Tags : 
    
Red Hat
Published By: Illusive Networks     Published Date: Apr 10, 2019
How well-equipped is your organization to stop malicious attackers once theyre inside your network? According to this study of over 600 IT security professionals, almost two-thirds of respondents lack efficient capabilities to detect and investigate stealth attackers before serious damage occurs. Download the report to learn the primary obstacles to better threat detection and incident response, how well organizations are hardening their environments against lateral movement, and how cybersecurity budgets are changing to address the reality that attackers will get in.
Tags : 
risk management, it security, ponemon institute, ponemon, cybersecurity, research report, cyber attack, data breach, apt, targeted attacks, threat management, cyber crime, cyber risk, illusive networks
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
Illusive Networks is proud to once again sponsor the Cyberthreat Defense Report by CyberEdge Group, now in its sixth year, to help security leaders assess and shape their cybersecurity programs. Download this comprehensive report to learn more about the most wanted security management and operations technology for 2019, which security processes organizations struggle with the most, and how organizations are trying to detect advanced cyberthreats more quickly.
Tags : 
cybersecurity, cyber threats, apt, targeted attacks, cyberedge, advanced persistent threats, threat management, illusive networks
    
Illusive Networks
Published By: Illusive Networks     Published Date: Apr 10, 2019
Do you know how attackers can move once theyre inside your network? The access footprint changes constantly as users log on and off, restart systems, change roles, and access resources. Until now, these conditions have only been visible when skilled analysts inspect individual systems. Attack Surface Manager reveals hidden credentials and paths to critical systems so you can continuously impede attacker movementwithout impeding the business.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, illusive networks
    
Illusive Networks
Published By: Forcepoint     Published Date: Mar 14, 2019
Once again, Forcepoint has been named a Top Player in this years report, citing strengths such as integration with Forcepoint CASB to extend DLP policies into cloud applications and more. Read the report to learn more.
Tags : 
data protection, data security, analyst report, dlp, cloud apps, data loss prevention, data leakage prevention, cybersecurity, cyber security, casb, radicati, radicati market quadrant
    
Forcepoint
Published By: Epicor     Published Date: Apr 11, 2019
With the speed at which technology is advancing, manufacturers cannot afford to use outdated manufacturing software. Legacy manufacturing management systems drag down your company with inefficiencies that are both apparent and hidden. These can prevent you from keeping up with your competition and achieving your growth potential. This Epicor white paper details why manufacturing industry technology experts say delaying this important business decision often places your company at risk. By using legacy manufacturing software, not only are you unable to tap into the latest technology trends, but you leave your business vulnerable to: Duplicate or inaccurate data Clunky system performance Security concerns A modern manufacturing ERP solution can eliminate these risks. Download the white paper to learn why implementing new manufacturing software built for business growth may be the most important step you take for the success of your company.
Tags : 
erp, manufacturing, industry 4.0
    
Epicor
Published By: Bluecore     Published Date: Apr 03, 2019
If the very purpose of technology is to make our lives easier and allow us to work smarter, why do most email marketers use technologies that do the exact opposite? Its time to break out of the Email Death Spiral and advance your marketing program with the next generation of email marketing technology. This guide explores exactly what your team needs to know to prepare for a successful change and how to best evaluate this next generation of email marketing technology, including: Understanding the next generation of email marketing technology Determining when its time for a change Prioritizing value with a proof of concept Approaching the ESP selection process Securing buy-in for the change Building a successful retail marketing program around your new ESP Creating a foundation for long term success
Tags : 
    
Bluecore
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing, network architecture, servers, traffic management, data center design and management
    
Coyote Point Systems
Published By: ASG Software Solutions     Published Date: Jul 13, 2009
Enterprise content is growing at an average rate of 200% per year-and the risks of noncompliance are growing even faster. This paper examines the business and technical difficulties of managing content from disparate systems and presents the most viable alternatives for addressing these challenges.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, application performance management, business activity monitoring, business analytics, business intelligence, business management, business process automation, application integration
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Nov 09, 2009
Composite applications can provide multiple benefits, such as business agility, better utilization of business software assets through code reuse, development efficiencies, and cost optimization. Once companies are skilled at deploying them, many find that they roll out new applications and integrations faster, while maximizing the value of "tried and true" software components.
Tags : 
asg, cmdb, bsm, itil, roi, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm, application integration, application performance management
    
ASG Software Solutions
Published By: Nuance Communications     Published Date: Mar 16, 2010
The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound, access control, authentication, business continuity, identity management, web service security, customer interaction service, customer relationship management, customer satisfaction, customer service, ebusiness
    
Nuance Communications
Published By: SAP     Published Date: Feb 03, 2017
To better understand the benefits, costs, and risks associated with implementation of SAP Business Objects Analytics solutions, Forrester interviewed four organizations with multiple years of experience using these analytics solutions from SAP across one or more of the following key analytics areas: planning, business intelligence, and predictive analytics. A composite, or representative, organization was developed to provide the conclusions of this cost and benefit analysis.
Tags : 
    
SAP
Published By: Entrust Datacard     Published Date: Nov 15, 2017
xx
Tags : 
    
Entrust Datacard
Published By: Spectrum Enterprise     Published Date: Feb 27, 2018
H&S Ventures provides management services for the Anaheim Ducks hockey team and its home-ice venuethe Honda Center. This popular indoor arena hosts scores of events and concerts, and H&S oversees everything from ticket sales to marketing and finance. H&Ss performance is measured by attendance, big-name bookings and how much fans spend on merchandise and concessions. Digital innovation plays a crucial role in creating a thrilling live experience that raises fans satisfaction and their average spend.
Tags : 
enterprise, digital, connection, revenues, marketing, tactics, technology
    
Spectrum Enterprise
Published By: Dell EMC     Published Date: Aug 23, 2018
Si les outils de conception 3D existent depuis quelque temps dj, la consumrisation de la ralit virtuelle fait merger des solutions de visualisation un rythme sans prcdent. La visualization a atteint un tel niveau que les concepteurs peuvent dsormais crer des images photoralistes de produits dans des environnements naturels avec plus de rapidit et de prcision. Cela permet une commercialisation encore plus rapide et donne aux clients la possibilit dexprimenter le produit par eux-mmes, sans encourir les cots rels de prototypage et de modlisation. Ce guide est conu pour vous donner un aperu des tout derniers dveloppements en matire de visualisation et prsente nos nouveaux centres dexcellence sur la ralit virtuelle, situs Limerick, Cork, Paris, Francfort, Duba, Santa Clara et Austin, o vous pourrez dcouvrir les atouts de ces technologies. Rahul Tikoo Directeur excutif et directeur gnral Dell Precision
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Aug 23, 2018
Bench gli strumenti di progettazione 3D siano disponibili da tempo, la consumerizzazione della realt virtuale offre nuove opzioni di visualizzazione a un ritmo senza precedenti. La visualizzazione ha raggiunto livelli tali da permettere ai progettisti di produrre immagini fotorealistiche dei prodotti in ambienti naturali in modo pi rapido e accurato, velocizzando il time-to-market e consentendo ai client di sperimentare autonomamente il prodotto, il tutto senza i costi associati alla realizzazione di prototipi e modelli. Questa guida offre una panoramica degli sviluppi pi recenti della visualizzazione e presenta i nostri nuovi centri di eccellenza per la realt virtuale di Limerick, Cork, Parigi, Francoforte, Dubai, Santa Clara e Austin, dove si potranno constatare concretamente i vantaggi. Rahul Tikoo Executive Director e General Manager Dell Precision
Tags : 
    
Dell EMC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.