sun

Results 251 - 275 of 390Sort Results By: Published Date | Title | Company Name
Published By: Nasuni     Published Date: Apr 28, 2011
Traditionally slow access speeds prevented the real use of the cloud in disaster recovery planning. However, modern cloud storage gateways accelerate the speed of access and can provide immediate access to data stored in the cloud. Read on to learn more today!
Tags : 
nasuni, disaster recovery, cloud storage, offsite data protection, backup and recovery, data protection, cloud computing
    
Nasuni
Published By: Nasuni     Published Date: Apr 28, 2011
This white paper examines the key security risks inherent in cloud storage solutions, as well as the methods that can be used to mitigate those risks.
Tags : 
nasuni filer, security, cloud storage, openpgp, storage management, security management, cloud computing
    
Nasuni
Published By: Nasuni     Published Date: Apr 28, 2011
How Cloud Enabled Virtual Filer is Protected.
Tags : 
nasuni, virtual filer, storage switzerland, backup, file server, data protection, cloud storage provider, virtualization
    
Nasuni
Published By: Nasuni     Published Date: Apr 28, 2011
While some will continue to find fault, smart business owners and IT managers will be using cloud storage solutions like Nasuni's Filer to solve problems and increase productivity.
Tags : 
nasuni filer, storage switzerland, cloud storage, productivity, storage management, storage virtualization, virtualization, cloud computing
    
Nasuni
Published By: Optis     Published Date: Jun 08, 2015
This e-book offers four areas to focus on to better leverage your constant flood of disparate people data and more efficiently, securely, and effectively control how your organization acquires, integrates, manages, retains, and disposes of that valuable data.
Tags : 
people data, business intelligence, data conversion, reporting and analytics, analytics
    
Optis
Published By: Red Hat     Published Date: Sep 08, 2017
TransUnion, a leading global risk and information solutions provider, used mainframe computers to support its global business. To improve IT performance and costs, the company launched an initiative, Project Spark, to migrate all of its applications and systems to a Red Hat® operating environment. With the new infrastructure—based on Red Hat Enterprise Linux®, Red Hat JBoss® Middleware, and other Red Hat products—TransUnion achieved faster time to market, greater competitive advantage, improved employee satisfaction, and significant operating cost savings.
Tags : 
    
Red Hat
Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
Unternehmen verzeichnen gegenwärtig einen dramatischen Anstieg von Spamund E-Mail-Angriffen. Diese Angriffe beeinträchtigen nicht nur die Produktivität der Mitarbeiter, sondern verbrauchen auch wertvolle IT-Arbeitszeit und Infrastruktur-Ressourcen. Diese Bedrohungen können auch Datenlecks und rechtliche Risiken mit sich bringen.
Tags : 
spamund, produktivität, trend, erkennung, sicherheitslösung
    
Trend Micro SaaS
Published By: Trend Micro SaaS     Published Date: Apr 02, 2009
Gehostete (d. h. webbasierte) Lösungen für Messaging-Sicherheit finden bei Unternehmen aller Größen immer mehr Anklang. Einige haben sich bereits für gehostete Services entschieden, während andere sich langsam mit der Idee anfreunden und nun eher Services von Dritten zur Verwaltung ihrer Sicherheits-infrastruktur nutzen als noch vor einem Jahr. Entscheidungsträger erkennen gerade jetzt im Zuge der aktuellen Wirtschaftskrise, dass gehostete Lösungen für E-Mail-Sicherheit eine kostengünstige Alternative darstellen und gleichzeitig die Sicherheit erhöhen.
Tags : 
trend micro, messaging-sicherheit, lösungen, osterman research, messaging-services, prozentsatz
    
Trend Micro SaaS
Published By: Trend Micro SaaS     Published Date: Dec 07, 2007
Um mit dem Wachstum Schritt zu halten und allen Schülern eine Umgebung zu bieten, in der sie optimal lernen und sich entfalten können, setzen die Shakopee-Schulen im Netzwerk eine vielschichtige Sicherheitslösung ein, die alle Standorte im Bezirk verbindet. Die IT-Abteilung muss ständig Funktionalität und Kosten gegeneinander abwägen, um mit der Installation ein Höchstmaß an Qualität und Nutzen zu gewährleisten.
Tags : 
trend micro, schutz, kosten-nutzen, shakopee-schulbezirks, funktionalität, interscan, officescan, pc-cillin
    
Trend Micro SaaS
Published By: Trend Micro SaaS     Published Date: Dec 05, 2007
eSecurityToGo hat sich auf Sicherheitslösungen für kleine und mittlere Unternehmen (SMB) von heute spezialisiert. Einen großen Teil des Kundenstamms bilden andere IT-Berater, die das umfassende Fachwissen und die besonderen Schwerpunkte von eSecurityToGo zu schätzen wissen. Das Unternehmen ist Reseller der kompletten Produktpalette von Trend Micro Lösungen. Es sichert sich damit zufriedene Kunden, die sich auch in Zukunft für Trend Micro entscheiden.
Tags : 
gegensatz, unternehmen, esecuritytogo, interscan messaging, trend micro, smb
    
Trend Micro SaaS
Published By: IBM     Published Date: Nov 07, 2011
Truly understanding your customer means not just listening to what they tell you explicitly, but also interpreting their interactions and recognizing when something significant happens - or doesn't happen. SunTrust Bank has found that customers' transactional data can be a goldmine of information for use in targeted marketing efforts. Often marketers overlook this data because it's too voluminous to put into a customer database. Leveraging an event detection technology makes this data immediately actionable for you to start communicating with customers.
Tags : 
    
IBM
Published By: SugarCRM     Published Date: Feb 21, 2014
Bei der Entscheidung für ein CRM-System ist es wichtig, sicherzustellen, dass keine versteckten Zusatzgebühren oder extra Kosten anfallen, die Einfluss auf den Return on Investment haben. Die Analyse zeigt die Gesamtbetriebskosten von ier führenden CRM-Lösungen für das mittlere Marktsegment.
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing
    
SugarCRM
Published By: SugarCRM     Published Date: Apr 08, 2014
Immer mehr Organisationen nutzen Software-as-a-Service- (SaaS) Lösungen wenn es um ihr Kundenbeziehungs-Management geht. dennoch gibt es Risiken, die man beachten
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing
    
SugarCRM
Published By: SugarCRM     Published Date: May 13, 2014
IBM nutzte das einzigartige, nutzerfokussierte CRM-System Sugar, um seine globale Vertriebsorganisation neu zu gestalten. Es wurde eine neue Lösung für Vertriebsrepräsentanten eingeführt, die weltweit Millionen von Opportunities verwalten. Lesen Sie in der Analyse von Ovum, einem führenden Technologie-Research-Unternehmen, wie IBM diese Herkulesaufgabe in Rekordzeit umsetzte.
Tags : 
ibm, crm, ovum, sugar, global sales organization, sugarcrm, success, it management
    
SugarCRM
Published By: IBM     Published Date: Apr 05, 2012
Your business demands that you have IT that supports more sophisticated and critical workloads and yet the future of your current Sun and HP environment is uncertain (no clear Sparc roadmap; lack of commitment to Itanium).
Tags : 
ibm, technology, netezza, analytics, enterprise analytics, application integration, application performance management, analytical applications
    
IBM
Published By: SunGard     Published Date: Aug 13, 2012
A leader in performance management, marketing, and training, Frontline Focus required a new data solution to keep information flowing and secure. Any solution had to be resilient, highly available,completely scalable, and cost-effective.
Tags : 
cloud, scalable, cost-effective, sunguard, virtual, cloud, iaas, capital
    
SunGard
Published By: SunGard     Published Date: Aug 13, 2012
Recovery-as-a-Service (RaaS) has been available for some time, and has leveraged a number of infrastructure options and recovery platforms. Many of these options have provided a recovery solution that is flexible, scalable, and secure. And in some cases, service providers offer fully managed solutions with the expertise to support heterogeneous IT environments.
Tags : 
cloud, recovery-as-a-service, raas, infrastructure, platforms, heterogeneous, networking, storage
    
SunGard
Published By: SunGard     Published Date: Aug 13, 2012
Today's IT organizations are faced with the daunting task of optimizing all aspects of their departments, including people, processes and technology. Optimizing and streamlining server utilization through virtualization represents one particularly exciting example. We found that one of the most popular usage models for virtualization is to drive down server procurements in development, test and production environments. When this model is followed, future server purchases are avoided; instead, new workloads are established on existing systems.
Tags : 
leveraging, visualization, optimizing, processes, technology, optimizing, server utlization, storage
    
SunGard
Published By: SunGard     Published Date: Aug 13, 2012
Whether your business is involved with it yet or not, cloud computing will play a significant role in the future of IT: it has already been enthusiastically embraced by small and medium sized businesses and its potential is also being accepted and exploited by larger enterprises.
Tags : 
services, cloud, infrastructure, cloud computing, significant, enthusiastically, benefits, environments
    
SunGard
Published By: SunGard     Published Date: Aug 13, 2012
Unicous marketing improves reliability and flexibility, reduces costs, and increases performance with SunGard Enterprise Cloud Services.
Tags : 
unicous marketing, sungrad, cloud, services, improve performance, efficiency, enterprise applications, infrastructure
    
SunGard
Published By: New Relic     Published Date: Jun 05, 2014
Configuration management (CM) tools like Puppet and Chef are really useful for keeping your systems in line, but what about your infrastructure? The Really Awesome New Cisco confIg Differ—or RANCID for short—is the first step in tackling this problem. Download to learn more!
Tags : 
new relic, devops, configuration management, rancid, networking, it management
    
New Relic
Published By: Dell EMC     Published Date: May 12, 2016
XtremIO transforms the way you deliver VDI. Whether you are rolling out 100 or 100,000 desktops, whether your users are call-center employees or sophisticated CAD designers, whether you are an 8 to 6 organization or you follow the sun with 24x7 operations, XtremIO delivers an incredibly cost effective, agile VDI storage platform with an amazingly consistent user experience. Here are the top 10 reasons why our customers deploy virtual desktops on XtremIO.
Tags : 
vdi, xtremio, virtual desktops, all-flash array, operations, cost effective, enterprise applications
    
Dell EMC
Published By: QuickPivot     Published Date: Jul 02, 2015
While it might feel crazy, complex and cobbled together, the marketing data and technology at your feet are pillars on which to build your brand. The modern marketer will not lurk in dark shadows, doomed to a life of misunderstanding, but will rise up and harness the tools at his fingertips to forever shift the brand/consumer relationship.
Tags : 
quickpivot, modern marketing, consumer relationships, brand awareness, marketing solutions, data analytics
    
QuickPivot
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries, investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence: Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security post
Tags : 
    
CrowdStrike
Published By: Fitbit     Published Date: Mar 21, 2017
"Have you ever caught yourself assuming that all Millennials are active athletes and all Baby Boomers are more sedentary? By making generalizations about employee health goals based on age groups, you risk misunderstanding your employees and their wellness goals. View this webinar and see how you can: * Manage your wellness program by defining your workforce according to personas * Motivate each employee based on fitness goals - regardless of their generation * Increase engagement with targeted communication and attractive incentives
Tags : 
    
Fitbit
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.