auto

Results 3226 - 3250 of 3384Sort Results By: Published Date | Title | Company Name

Casos de TRANSFORMACIÓN de empresas con la tecnología de AirWatch

Published By: VMware AirWatch     Published Date: May 24, 2016
La movilidad sigue siendo una de las principales oportunidades estratégicas para cualquier tipo de empresa gracias al potencial para que sea más competitiva, ya sea incrementando la productividad de los empleados o captando clientes con métodos innovadores. Para aprovechar dicho potencial, la movilidad empresarial debe brindar a los usuarios una experiencia fluida entre dispositivos de distinto tipo y habilitar un área de trabajo segura para las aplicaciones empresariales clave. Para satisfacer las necesidades móviles de los empleados y la cartera de clientes, las empresas deben disponer de soluciones de autogestión y BYOD (Bring Your Own Device) fiables con una plataforma establecida cuya capacidad de ampliación permita la incorporación de nuevos procesos.
Tags : 
data management, business practices, data center. data application, enterprise applications, security, best practices, business analytics, business integration
    
VMware AirWatch

ITIL eBook

Published By: ServiceNow     Published Date: Jan 13, 2017
The End of Now. The Beginning of Now. Your IT service desk is swamped from the moment work begins. It’s unclear how to gain control without the right tracking, prioritization and reporting. But with the right guidance, you can improve IT service delivery and demonstrate how IT is performing to support the business. This eBook, the first in a series that addresses key aspects of IT Service Management, provides best practices on how to: Accelerate incident resolution with automation and prioritization Improve change management processes with better controls and visibility Optimize reporting for setting goals, aligning priorities, demonstrating results
Tags : 
    
ServiceNow

Top 5 Reasons to Automate Identity Lifecycle

Published By: Okta     Published Date: May 09, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
    
Okta

1:1 Conversations with Video: Marketing Automation, Interactivity, and Personalization

Published By: Oracle_Hospitality Hotels     Published Date: Sep 26, 2016
Enable valuable digital dialogues through a combination of marketing automation, interactive video, and personalized content. Intelligently crafting these elements of your campaign, while effectively integrating the tech stack tools that empower 1:1 conversations (OVP, MAP, and CRM), can create a remarkable video marketing strategy.
Tags : 
    
Oracle_Hospitality Hotels

Composable Infrastructure Puts IT Transformation on Track

Published By: Lenovo and Intel®     Published Date: Sep 04, 2018
IT teams today are under pressure to build on-premises environments that mimic the agility and flexibility of public cloud services. It’s a challenge for IT teams to choose the right technology to invest in for servicing on-premises workloads. With high automation and minimal configuration or management, composable infrastructure fast tracks IT modernization by aligning IT delivery and operations, giving seamless access to dynamic, automated resources that can react in real-time. In this white paper, learn how composable infrastructure, powered by the Intel® Xeon® Platinum processor, can deliver the cloud-level efficiency and flexibility required for competitive business differentiation.
Tags : 
    
Lenovo and Intel®

Change Agent: RPA Causing Organizations to Rethink Business Workflow

Published By: BlackLine     Published Date: Apr 10, 2017
For many, the idea of Robotic Process Automation (RPA) might conjure images of large automated assembly line welders and pickers. But RPA actually refers to software robots, or applications that replicate human interaction with a user interface on a computer system. Download now to learn more!
Tags : 
    
BlackLine

Oracle EBS Integration playbook

Published By: Coupa     Published Date: Mar 07, 2016
User adoption of automated business processes for procurement, invoicing and expense management still hovers around 20-40%. Coupa’s modern, easy-to-use, easy-to-configure platform can change that. Coupa helps extend the reach of your Oracle ERP system, by plugging seamlessly into your established framework.
Tags : 
    
Coupa

Detecting Sophisticated Bots with Bot Manager Premier

Published By: Akamai Technologies     Published Date: Oct 31, 2017
Before organizations can address their bot challenges, they need the ability to detect the many types of bots interacting with their websites and web applications on a daily basis. Bots come in many shapes and sizes, ranging from simple scripts to sophisticated automation tools, and continuously evolve over time. As detection technologies improve, so too do the technologies available to bot operators as they update their bots to evade the latest detection mechanisms. When evaluating a bot management solution, organizations should consider its detection technologies and their effectiveness against the current and future bot landscape, while maintaining the lowest possible level of false positives and negatives.
Tags : 
bot manager, bot interaction bot detection
    
Akamai Technologies

The Forrester Wave™: Web Application Firewalls, Q2 2018

Published By: Akamai Technologies     Published Date: Nov 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies

7 Ways to Mitigate Increases in Audit Fees

Published By: IBM     Published Date: Jul 14, 2016
How are some companies decreasing audit fees in the face of pressure to increase them? In this follow-up report to the 2015 Audit Fee Survey, Financial Executives Research Foundation interviewed several senior-level financial executives and audit partners. These interviews revealed best practices in mitigating increases in audit fees and how to work more efficiently and effectively with auditors. Access this report to learn the reasons for increased audit fees and the impact of PCAOB inspections. You'll also discover how to review current audit focus areas, improve internal controls, automate processes, and review audit hours and fees.
Tags : 
best practices, audit, finance, efficiency, productivity, business management, business technology
    
IBM

Case Study: Cloud Reporting for SOX Controls Management yields 238% ROI

Published By: IBM     Published Date: Jul 14, 2016
Workiva commissioned Forrester Consulting to conduct a Total Economic ImpactTM study and examine the potential return on investment (ROI) enterprises may realize by deploying Wdesk for Controls Management. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Wdesk on their organizations and how it can be leveraged to optimize the processes necessary to deliver Sarbanes-Oxley (SOX) compliance. This in-depth financial summary finds a 238% three-year, risk-adjusted ROI for a large auto parts retailer. Key outcomes include reduced the effort required to formulate and update processes and controls for SOX compliance resulting in a three-year benefit of $190,568, and simplified audit efforts with improved audit trails in financial controls, delivering three-year present value benefits of $128,965.
Tags : 
cloud reporting, business management, economic impact, forrester, consulting, mobile computing, best practices, business analytics
    
IBM

VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud

Published By: AWS     Published Date: Nov 12, 2018
If your organization runs VMware vSphere-based cloud infrastructure in your on-premises data center, but you have been reluctant to migrate applications to the cloud for fear of losing some VMware vSphere-based cloud capabilities, VMware Cloud on AWS solves this problem by seamlessly integrating your familiar VMware virtualization and cloud management tools with Amazon Web Services (AWS). Many organizations believe that moving their applications to the cloud makes it necessary to introduce new tools, skills, and processes. This can present a new set of challenges because learning to use new tools, applying new skills, and adapting to new processes can be costly and time-consuming. In this eBook, we dive deeper into how these challenges can hinder hybrid cloud adoption and cover how VMware Cloud on AWS can help your organization overcome these challenges. Join our webinar to learn The benefits of Disaster Recovery-as-a-Service (DRaaS), delivering on-site protection. How automated or
Tags : 
    
AWS

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS

How Informatica Enabled Secure, Keyless SSH Access with Aporeto

Published By: AWS     Published Date: Oct 01, 2019
Trying to keep up with the growing number of instances and containers, Informatica would spin up new security policies with shared key access. This led to a sprawling, complex network of multiple security interfaces that were difficult to manage. Informatica began working with Aporeto to track, block, and audit users through their environment, and eventually implemented keyless SSH access to their Amazon Elastic Compute Cloud (Amazon EC2) instances. Read our case study to learn how Aporeto saved Informatica hundreds of development hours with automated authentication and authorization policies across their environment.
Tags : 
    
AWS

Protect Your Cloud Data: Investment Firm Deters Threats with SaaS Endpoint Protection

Published By: AWS     Published Date: Oct 07, 2019
Cyberattacks and undetected threats present constant risks to the safety of critical data and applications. CrowdStrike can help you overcome that risk with unified endpoint protection and real-time monitoring. This solution helps your organization gain visibility across your entire AWS environment and automatically detect and mitigate threats before they impact your business. Register now to learn how CrowdStrike has helped Oak Hill Advisors (OHA), a global investment firm, secure the assets in their AWS environment by immediately assessing issues and automating their incident responses.
Tags : 
    
AWS

Gain Rapid Threat Protection with Automated DDoS and WAF Solutions

Published By: AWS     Published Date: Oct 07, 2019
Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousness—and scope—of the attacks they constantly face. APN Security Competency Partner Imperva provides automated security solutions that can help you defend against both known and zero-day attacks and increase visibility across your entire Amazon Web Services (AWS) environment, to rapidly stop attacks and quickly identify the real threats that need to be investigated. Join our upcoming webinar to learn how DigiCert has protected both their AWS and on-premises environments from DDoS attacks and other threats by using Imperva’s SaaS Web Application Security solution. This versatile security offering helps keep application workloads safe across cloud and on-premises environments and can be managed from a single pane of glass, enabling security teams to more effectively and efficiently secure business
Tags : 
    
AWS

How Application Security Provider, Veracode, Boosted Cloud Visibility and Compliance

Published By: AWS     Published Date: Oct 07, 2019
Poor visibility into cloud deployments makes it difficult for organizations to enforce security and compliance across their cloud environment. Check Point CloudGuard Dome9 on Amazon Web Services (AWS) can help you gain deeper visibility of your traffic and configurations with automated assessments that strengthen your security posture and help you fulfill your part of the Shared Responsibility Model. Join the upcoming webinar with Check Point, Veracode, and AWS. Learn how Veracode improved their security posture using Check Point CloudGuard Dome9 on AWS.
Tags : 
    
AWS

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Oct 07, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS

Forrester Report: How Operations Become Faster, Cheaper – And Yet, More Human

Published By: Genesys     Published Date: Jun 08, 2018
Ease, effectiveness and emotion drive great customer service, but top-line growth requires that application development and delivery (AD&D) professionals keep an eye on trends.
Tags : 
customer service trends, customer service, growth, application development and delivery, customer experience, automation
    
Genesys

ContactBabel: The US Contact Center Decision-Makers' Guide: The Self-Services Chapter

Published By: Genesys     Published Date: Jul 13, 2018
When building artificial intelligence (AI) into your business strategy, it’s easy to become distracted by all the new technologies on the market—each one promising a better customer experience. Make decisions based on facts, not misconceptions. When you evaluate AI technologies, consider these facts: • Bots working with human agents enables a seamless customer journey • Automated self-service costs as little as 20 cents per interaction • A single platform makes it easier to deliver personalized, proactive and predictive experiences See how AI connects customer conversations in this new analyst guide, 2017 ContactBabel Inner Circle Guide to Self-Services.
Tags : 
    
Genesys

eBook: Blended AI for Customer Experience

Published By: Genesys     Published Date: Jul 13, 2018
Artificial Intelligence (AI) is staggering in its speed of handling simple requests and automating conversations. But AI solutions are not enough for the best customer experiences. Human emotions sometimes demand the human touch that only live agents can provide. Kate, Customer Experience AI by Genesys, combined with the power of human touch can improve customer experience, empower employees and dramatically reduce costs. This seamless combination of AI technology and humans, or “Blended AI by Genesys,” addresses the entire customer journey for the best possible outcomes. Download the eBook and learn how Kate and Blended AI lets you: • Personalize self-service • Connect customer conversations • Create smart agent experiences • Start small and deploy fast with MicroApps
Tags : 
    
Genesys

Get started with Puppet on Windows: 9-part recorded webinar series

Published By: Puppet     Published Date: Jul 05, 2016
Our recorded Windows webinar series covers all the basics and more to help you get started with Puppet. Each 45-minute recording focuses on a specific task you can automate with Puppet, as well as a demo of how it works. You’ll learn how to use automation to: • Manage local groups and Active Directory membership. • Manage Windows services, install packages and create scheduled tasks. • Deploy IIS and ASP.NET. • Set up Windows for system and application monitoring. • Get started on Azure with Puppet. Puppet can do a lot, so start small and build on each success. Enjoy the demos!
Tags : 
    
Puppet

Blackboard

Published By: Oracle HCM Cloud     Published Date: Nov 30, 2016
Blackboard moves PeopleSoft to Oracle HCM Cloud, which allows them to focus more closely on how to enrich their HR processes with cloud tools that automate.
Tags : 
    
Oracle HCM Cloud

HPE InfoSight: Artificial Intelligence for your Hybrid Cloud World

Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
"Managing infrastructure has always brought frustration, headaches, and wasted time. That’s because IT professionals have to spend their days, nights, and weekends dealing with problems and manually tuning their infrastructure. Traditional monitoring and support are too far removed from infrastructure, resulting in an endless cycle of break-fix-tune-repeat. Infrastructure powered by artificial intelligence, however, can overcome the limitations of humans and traditional tools. This white paper explores how HPE InfoSight with its recommendation engine paves the path for an autonomous data center your Hybrid Cloud World."
Tags : 
    
Hewlett Packard Enterprise

Ovum Decision Matrix: Selecting a Privileged Identity Management Solution, 2015–2016 Publication Dat

Published By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
    
CA Technologies
Start   Previous    122 123 124 125 126 127 128 129 130 131 132 133 134 135 136    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.