net

Results 1 - 25 of 7688Sort Results By: Published Date | Title | Company Name

4 Common Questions Asked of Our Security and Risk Consultants

Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017

4 Reasons Why Excel and Construction Don’t Mix

Published By: Procore     Published Date: Jun 25, 2019
Did you know that more than 1.2 billion people use Microsoft Office? That’s one in 7 people. A huge portion of the world’s economy is managed through it: from small businesses all the way up to Fortune 500 corporations. Despite its popularity, Excel has its fair share of critics. What originated as rumblings among IT professionals and tech blogs, has quickly trickled into major business and technology publications. Some might think it harsh, but we want to show you the risks of using Excel in your business and help you understand how you can protect yourself, your company and your data from what Forbes refers to as ‘the most dangerous software on the planet’.
Tags : 
    
Procore

A Deep Dive into Ransomware's Evolution

Published By: CrowdStrike     Published Date: Feb 01, 2017
Once a “consumer-only” problem, Ransomware now has an established business case for profitability, and that’s driving criminals to expand their operations and hunt for more lucrative prey. As a result, commercial enterprises and other large organizations are increasingly in the crosshairs. Consider these facts: ? Ransomware attacks doubled in 2015 ? The number of new ransomware variants increased 17% in Q1 2016 ? The FBI estimates that ransomware will net criminals $1 billion in 2016 This white paper dives into the inner workings of ransomware, its perpetrators and how they are evolving to maximize profits. You’ll also learn how companies are fighting back, and review best practices for protecting your organization from becoming another victim of electronic extortion.
Tags : 
    
CrowdStrike

Accélérer l’agilité de l’entreprise avec des cycles plus courts d’actualisation des serveurs

Published By: Dell and VMWare     Published Date: Oct 26, 2017
Une transformation fondamentale englobant le personnel, les processus et la technologie permet aux entreprises de rester compétitives dans l’économie d’aujourd’hui, basée sur l’innovation. Des initiatives telles que la sécurité avancée, les services de détection des fraudes, l’Internet des objets (IoT) avec ses consommateurs connectés, l’expérience de réalité virtuelle ou augmentée, l’apprentissage machine et approfondi et les applications cognitives optimisent les avantages pour l’entreprise comme la maintenance et le marketing prédictifs.
Tags : 
    
Dell and VMWare

Atmosphere Digital: Rethinking Security in the Cloud

Published By: G Suite     Published Date: Jun 28, 2016
Now you can experience the ease and flexibility of open, collaborative tools while gaining better protection for your data. As Google security experts and customers share their vision for a safer Internet, discover how Google’s innovative security technology meets the unique challenges of working and living in the cloud.
Tags : 
    
G Suite

Beginner’s Guide to SSL Certificates (PTBR)

Published By: Symantec     Published Date: Nov 30, 2015
Seja você um indivíduo ou uma empresa, a segurança online deve ser abordada da mesma forma como você abordaria a segurança física da sua casa ou escritório. Ela não somente o faz se sentir mais seguro, mas protege também as pessoas que visitam sua casa, seu local de trabalho ou site. É importante entender os riscos potenciais e então garantir a proteção total contra eles. No rápido mundo da tecnologia, nem sempre é fácil se manter a par dos avanços mais recentes. Por isso, a formação de parcerias com empresas conceituadas de segurança na Internet é uma estratégia inteligente.
Tags : 
    
Symantec

Build a Business Case for Network Virtualization

Published By: Juniper Networks     Published Date: Feb 18, 2015
Learn how to improve your business agility in this Whitepaper on building a business case for network virtualization. Find out how your network can deliver new levels of performance and resiliency.
Tags : 
business agility, network architecture, virtualization, network, cloud computing, data center, data management, firewalls
    
Juniper Networks

Enterprise Agile Delivery: Modern ALM for Confident Software Delivery

Published By: Panaya     Published Date: May 31, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: › Strategiaclly align feature releases and backlogs with your overall business strategy › Identify and prioritize dev and test activities with visibility into project waves and portfolios › Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks › Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
    
Panaya

Étude de cas Global Investment Bank

Published By: Juniper Networks     Published Date: Jan 11, 2016
Découvrez comment Juniper Networks a aidé une institution financière internationale à construire un réseau plus flexible et plus sûr. La simplification de la sécurité et la consolidation des data centers ont permis une réduction des dépenses d'exploitation.
Tags : 
    
Juniper Networks

IBM Planning Analytics guided demo: Build a book for revenue planning

Published By: IBM     Published Date: May 23, 2018
IBM Planning Analytics is the fast, flexible, planning solution that helps you align financial plans with corporate objectives linked to operational tactics and market events. In this quick, 10- minute guided demo, you’ll get hands-on experience with IBM Planning Analytics by building a book for revenue planning. You’ll play the role of a financial planner and learn how to: • Create a book for revenue planning in Planning Analytics Workspace • Adjust the plan by increasing sales through an online channel by 20% • Review the impact of your changes on net profit
Tags : 
ibm planning analytics, revenue planning, income statement
    
IBM

IDC Next-Gen Wireless LANs Rise to the Challenge of the Mobile Enterprise.

Published By: Aruba Networks     Published Date: May 21, 2013
The increase in enterprise WLANs is being driven largely by the rapid growth of mobile devices in the enterprise — what many are calling the "consumerization of IT" — and the resultant increase in enterprise mobility applications.
Tags : 
aruba, aruba networks, consumerization of it, wireless lans, mobile enterprise, enterprise mobility, wireless
    
Aruba Networks

Managing Access to Legacy Web Applications with Okta

Published By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
    
OKTA

Oracle Value Chain Execution The Reinvented Logistics Excellence (French)

Published By: Oracle     Published Date: Sep 06, 2016
Learn why our world-leading, unified solution is relied on by market-leading companies across the planet.
Tags : 
supply chain, supply chain management, oracle, security, security application, cloud computing, unified solution, risk
    
Oracle

Scalability & Capacity Planning: Considerations when Investing in IT Infrastructure

Published By: NetShelter - CyrusOne     Published Date: Oct 12, 2011
This whitepaper outlines issues that arise when planning for growth of IT infrastructure and explains how the colocation of data centers can provide scalability, enabling users to modify capacity quickly to meet fluctuating demand.
Tags : 
cyrus one, data center, texas, infrastructure, capacity, planning, colocation, scablability
    
NetShelter - CyrusOne

Software First Infrastructure Strategy for the Data Center

Published By: Apstra     Published Date: Aug 19, 2019
Typically, and since the dawn of time, network infrastructure teams chose the hardware and switch Operating System (OS) first, then designed their infrastructure, including how their infrastructure was built around this choice.
Tags : 
    
Apstra

SUSE Cloud Application Platform on Amazon EKS

Published By: AWS     Published Date: Oct 03, 2019
Christian Elsenhuber - AWS & Carsten Duch - SUSE Join our webinar and learn more about the SUSE Cloud Application Platform on Amazon Elastic Kubernetes Service (Amazon EKS). The webinar will show you how SUSE accelerates the use of applications in containers. With integrated automation and customization features, SUSE helps your DevOps teams deliver container applications, accelerate innovation, and improve the responsiveness of your IT.
Tags : 
    
AWS

Telefónica Deutschland verbessert Verfügbarkeit mit Veeam

Published By: Veeam '18     Published Date: May 07, 2019
Mit rund 49 Millionen Kunden gehört Telefónica Deutschland zu den drei bundesweit führenden Telekommunikationsanbietern. Mit seiner Wachstumsstrategie verfolgt der Konzern das Ziel, das führende digitale Telekommunikationsunternehmen in Deutschland zu werden und den Kunden das beste Erlebnis bei Netz, Produkten und Services zu bieten. Hierzu sollen die Kunden von Telefónica Deutschland 24.7.365 Zugriff auf das Netz haben.
Tags : 
    
Veeam '18

The Apstra Operating System (AOS) Architecture Overview

Published By: Apstra     Published Date: Aug 19, 2019
AOS delivers powerful, intent-driven automation of network services in vendor-agnostic environments by delivering it as an easily consumable service in response to consumer-specified intent. Network devices serve packets, AOS services serve application workloads. According to numerous studies, 70-80% of outages are due to configuration change applied to a living system, and not due to initial deployment. Initial, one-time deployment can be seen as sort of a “hello world” application; the real complexities arise as the system evolves. With AOS, configuration, telemetry, and expectations are derived from the single source of truth - the intent - in an idempotent fashion, and as such there is no implementation difference between initial deployment or change management.
Tags : 
    
Apstra

The Future of Insurance and Artificial Intelligence

Published By: Equinix EMEA     Published Date: May 22, 2019
Much has been written about the impact of technology on insurance, this most traditional of industries. Artificial intelligence (AI), connected cars, drones and the Internet of Things (IoT) are all becoming integral to the insurance and automotive industries. This becomes obvious when using your car’s navigation system – an everyday action that might well lead to a chain of events few would even think of today. To find out more download this whitepaper today.
Tags : 
    
Equinix EMEA

Too Much of a Good thing? Enterprise Cybersecurity Adoption Trends across Asia Pacific

Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
    
Juniper Networks

TOSS OUT THE RULERS, BRING IN THE (CLOUD) WI-FI

Published By: Ruckus Wireless     Published Date: Jul 16, 2018
Students and teachers at Belleville Township High School District now rely on Ruckus Networks to stay connected to laptops, tablets, and smartphones. With Ruckus Cloud Wi-Fi, the IT team at Belleville Township High School District is able to access and manage WLANs with a click of a button. Read this case study to learn why they chose Ruckus Cloud Wi-Fi, allowing Belleville to take classroom learning to the next level.
Tags : 
    
Ruckus Wireless

Veritas Netbackup 8.1.2. Top Reasons to Upgrade.

Published By: bChannels     Published Date: Dec 11, 2018
IT service continuity undoubtedly is at or near the very top of every IT organization’s list of strategic initiatives, considering the dramatic costs and implications of downtime. Download this informative whitepaper for some compelling reasons to upgrade.
Tags : 
    
bChannels

What Financial Institutions Should Look for in a Managed Security Service Provider

Published By: BAE Systems     Published Date: Dec 29, 2015
This framework will help you decide which MSSP best meets the needs of your financial institution
Tags : 
bae systems, applied intelligence, financial institution, managed security, managed security services, managed security service provider, mssp, data breach
    
BAE Systems

"Abandon Cart Emails" Why We Don't Buy

Published By: Bronto     Published Date: Mar 28, 2014
For this paper, sponsored by Magento and Bronto Software, over 1,000 online shoppers were surveyed about their awareness of shopping cart technology.
Tags : 
bronto, magneto, shopping cart adandonment, ecommerce, online shopping, marketing, online marketing, purchasing
    
Bronto

"CDO’s (Chief Digital Officers): Transformeer de business Ontdek hoe u een digitale impasse voorkomt

Published By: Workday Netherlands     Published Date: Mar 28, 2019
Uit nieuw onderzoek van IDC en Workday blijkt dat er in veel organisaties een digitale disconnectie bestaat. De kloof tussen de agenda van de CDO en het vermogen van de belangrijkste bedrijfssystemen om het bredere digitale transformatieprogramma te ondersteunen, wordt steeds groter. Dit heeft verschillende oorzaken: 80% zegt dat ze nieuwe digitale oplossingen niet, of slechts met moeite, kunnen integreren met bestaande processen voor finance en HR 80% geeft aan dat ze niet, of slechts met moeite, kunnen beschikken over realtime forecasts en dashboards 80% vindt het moeilijk of onmogelijk om finance- en HR-processen aan te passen aan nieuwe wet- en regelgeving Download ons whitepaper en lees alles over succesvolle, schaalbare digitale transformatie – en hoe u een digitale impasse voorkomt.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday Netherlands
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.