pinpoint

Results 1 - 25 of 53Sort Results By: Published Date | Title | Company Name
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated Vulnerability scores and how to interpret them Best practices for prioritizing vulnerability remediation How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: CA Technologies     Published Date: Jun 03, 2015
"To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
"To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 09, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
If youre not a unicorn now but want to be one, keep reading. Organizations are moving toward creating greater agility for their businesses. Its a big effort, but you will reap the rewards. In fact, youll see real business results even when you complete just the first step. This paper will help you: Identify steps to transform your organization and increase business agility Clarify what makes each step in your transformation stick Pinpoint the mindset changes you need to create and sustain the organizational health that empowers people to regularly and quickly respond to change
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isnt surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isnt simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Published By: Ciena     Published Date: Nov 15, 2016
Research and Education (R&E) networks are experiencing a surge in capacity demand as a result of the massive growth of streaming media (Netflix, Facebook, YouTube), growing utilization of public cloud services, and the continued need to support large scientific data file transfers for researchers collaborating around the globe. This increase in traffic is driving many operators to evaluate network backbone upgrades to 100G. Upgrading is necessary but costly. But what if operators could upgrade their R&E networks to 100G for 50 percent less CAPEX investment and extend the life of the existing routers, while actually simplifying the architecture to enable lower operational costs? Download our app note to learn how.
Tags : 
o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
How are R&E network operators rethinking networks to accelerate scientific discovery? Discover the answer in this Ciena white paper today.
Tags : 
o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
How are R&E network operators rethinking networks to accelerate scientific discovery? Discover the answer in this Ciena white paper today.
Tags : 
o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr
    
Ciena
Published By: Ciena     Published Date: Jun 12, 2017
Is your infrastructure, bandwidth, and scalability getting a top grade? How much bandwidth is enough and what are your options? We'll make sure you know.
Tags : 
network bandwidth, wan, bandwidth security, dark fiber optics, education network security, self-provisioned network, integrated access device, e-rate
    
Ciena
Published By: Ciena     Published Date: Jun 12, 2017
What if operators could upgrade their R&E networks to 100G for 50 percent less CAPEX investment and extend the life of the existing routers, while actually simplifying the architecture to enable lower operational costs? Download our app note to learn how.
Tags : 
o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr
    
Ciena
Published By: Cisco     Published Date: Jun 21, 2016
The Cisco Hyperlocation Solution is the industrys first Wi-Fi network-based location system that can help businesses and users pinpoint a users location to within one to three meters, depending on the deployment. Combining innovative RF antenna and module design, faster and more frequent data processing, and a powerful platform for customer engagement, it can help businesses create more personalized and profitable customer experiences.
Tags : 
    
Cisco
Published By: Clicktale     Published Date: Aug 06, 2015
Web site errors eat away at conversions, KPIs, ROI, and revenues. The key to catching elusive website errors? Focus on the users. In this new ClickTale white paper, learn to identify common user dropoff or abandonment behavior patterns which traditional tools simply cannot see. Once you pinpoint the errors themselves, you can assess their impact on user experience and conversions, and prioritize remediation.
Tags : 
website design, user experience, errors, web errors, digital customer experience, website elements, website layouts, web design
    
Clicktale
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance
    
Dell Storage
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Certain types of diseases seem to only occur within certain national boundaries. Malware is not one of them. A formidable threat to enterprise security since the 1980s, cybercrime is a truly global phenomenon, and no business is safe from its reach. A brief look at the history of malware attacks reveals a degree of variance within the virtual threat landscape that makes pinpointing and stopping such attacks extremely difficult. As the historic virus examples illustrate, the malware problem has been and will continue to be a constant threat. Since an offensive line against cybercrime is not possible, enterprises need to prepare the best defense they can.
Tags : 
entrust, malware, history, threat, concern, virus, sql, stuxnet
    
Entrust Datacard
Published By: Esker     Published Date: Mar 18, 2016
You know how to run an effective AP operation - we're not here to lecture you. This field guide is simply a handy resource for pinpointing the pains in your AP process and exploring potential solutions to fix them. Expect to take home some best practices on how to: - Secure AP invoicing cost savings of up to 80% - Drastically reduce your rate of invoice exceptions - Gain significantly more early payment discounts - Simplify workflow for every AP stakeholder Download the Accounts Payable field guide to learn more!
Tags : 
esker, accounts payable, ap team, best practices, ap stakeholder, invoice exceptions, it management, enterprise applications
    
Esker
Published By: Flexera     Published Date: Feb 19, 2019
Driven by easy-to-consume infrastructure and services, the adoption of public cloud surged in 2018. As a result, enterprises are seeking cost management solutions tools to curb waste, optimize cloud costs, and increase transparency. However, businesses must also factor the cost of licensed software into this equation, otherwise they may leave significant savings on the table. The ""Software License Management as a Critical Part of Cloud Cost Optimization"" white paper by industry analyst Enterprise Management Associates explores the consequences of not considering software license costs when deploying in the cloud and pinpoints why it occurs. Download the white paper to learn how.
Tags : 
    
Flexera
Published By: HERE Technologies     Published Date: Mar 28, 2019
Rich, real-time location intelligence enables third-party logistics (3PL) companies to deliver pinpoint accuracy and offer superior service, which ultimately means higher volumes, better timelines and more competitive budgets. This ebook looks at seven specific ways in which location data is being used by 3PL companies to enable more accurate fleet routing, precise tracking of vehicles and the ability to meet increasingly demanding customer expectations. As the worlds leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes), HERE can help 3PL companies develop key competitive advantages.
Tags : 
location data, mapping, here technologies
    
HERE Technologies
Published By: Here Technologies     Published Date: Mar 29, 2019
Rich, real-time location intelligence enables third-party logistics (3PL) companies to deliver pinpoint accuracy and offer superior service, which ultimately means higher volumes, better timelines and more competitive budgets. This ebook looks at seven specific ways in which location data is being used by 3PL companies to enable more accurate fleet routing, precise tracking of vehicles and the ability to meet increasingly demanding customer expectations. As the worlds leading location platform in 2018 (Source: Ovum and Counterpoint Research annual indexes), HERE can help 3PL companies develop key competitive advantages.
Tags : 
here technologies, transport and logistics
    
Here Technologies
Published By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
Storage is normally the first suspect when identifying the causes of the App-Data Gap, but the facts tell a different story. Flash Alone Isnt Enough. Infrastructure complexity makes it difficult to pinpoint the real problem, resulting in: Extended downtime and frustration Inefficient use of IT resources and budget Long hours spent resolving cross-vendor issues
Tags : 
    
Hewlett Packard Enterprise
Published By: HP     Published Date: Jan 20, 2015
Security breaches can happen anywhere in an organization, and having the ability to analyze any form of data can give you the edge against fraud, theft, and infiltration by pinpointing abnormal behavior patterns. Understanding your security vulnerabilities requires rapid, deep analytics against business data, machine data, and unstructured human information.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP
Published By: IBM     Published Date: Sep 18, 2008
As energy costs rise, your data center is being taxed and your business is at stake. CIOs are realizing they need to redesign and build energy-efficient data centers. This article simplifies that complex task. It explains how to pinpoint your biggest energy costs and match hardware, software and facilities options so you can create a truly green data center.
Tags : 
ibm, ibm mmdg, energy, green, green computing, data center, datacenter, network management
    
IBM
Published By: IBM     Published Date: Jun 25, 2012
Explore the four stages to transforming an organization from a traditional marketing communicator to a customer-centric communicator.
Tags : 
retail, ibm, marketing, pinpoint, customer service, offer, online, digital
    
IBM
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.