business information

Results 301 - 325 of 792Sort Results By: Published Date | Title | Company Name

Five Reasons Why Mobilizing Windows Applications is Simpler Than You Think

Published By: Citrix Systems     Published Date: Feb 27, 2014
Mobility and consumerization are little more than buzzwords without the applications that drive business activities. A successful enterprise mobility strategy places priority on applications first, mapping their mission to the variety of use cases out in the field. Success with mobilizing Microsoft® Windows® applications also requires a broad technology approach. The right approach integrates a universal client and single sign-on with a comprehensive application delivery platform to ensure information security and a seamless user experience. This paper describes how you can simplify application mobilization with Citrix.
Tags : 
citrix, mobile. mobilizing, windows applications, microsoft windows, it management
    
Citrix Systems

Build a cloud network leveraging best-in-class security and app delivery

Published By: Citrix Systems     Published Date: Nov 10, 2014
Many organizations are struggling with network infrastructure that is vastly outdated, and with the rise in cloud computing, the time to upgrade is now. Cloud-based network solutions for application delivery are a great way for businesses to ensure high levels of performance, security and flexibility. This guide explores two solutions that organizations use to build a network for today's evolving enterprise and how you can fully address cloud requirements for secure application delivery. Read now for this vital information on cloud networking!
Tags : 
optimization, enterprise, cloud services, mobile apps, virtual desktop, visibility, enterprise, organization, insight, real-time, traffic, native web, application, action analytics, netscaler, solve, control, security, data center
    
Citrix Systems

Three Ways Companies are Slashing IT Costs with VDI

Published By: Citrix Systems     Published Date: Apr 15, 2016
The need to reduce costs and simplify IT can
Tags : 
best practices, budget, business optimization, business management, information technology, business integration, business intelligence
    
Citrix Systems

Discover the Changes Needed for Utility Companies to Remain Competitive

Published By: Netezza IBM US     Published Date: May 09, 2012
To remain competitive utility companies will need to change from the traditional infrastructure-led business model to one being more information- and services-led.
Tags : 
utilities, analytics, ibm, carbon footprint
    
Netezza IBM US

The Pragmatic Path to Achieving NAC Results: Essential Implementation, Process and Control

Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data, access, it organization, security, protection, network, access, control, nac, interoperability, 802.1x standards, control, options
    
ForeScout

How to Simplify SSL Certificate Management

Published By: Symantec Corporation     Published Date: Aug 28, 2013
SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. For example, they protect remote communications via webmail, chat and IM. Browser-to-server communications for cloud-based services require SSL certificates to protect confidential information. In addition, SSL certificates are used to secure server-to-server communications for applications and data exchange. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services.
Tags : 
ssl certificates, communication, webmail, technical support, technology, data, security, knowledge management, data management, business technology
    
Symantec Corporation

Tackling Data Storage Management with Microsoft Windows Server 2012

Published By: Dell     Published Date: Sep 12, 2013
Information is the engine of business growth in the digital age. Market intelligence, customer information, intellectual property and other data can be harnessed to create a quantifiable competitive advantage for a company and lay the path for future expansion. Yet as critical as data can be, the sweeping year-over-year proliferation in data volumes can quickly overwhelm an IT organization. This is much more than a budget problem: Without an effective data storage strategy, an organization is putting a critical resource at risk.
Tags : 
data storage management, microsoft windows server, market intelligence, customer information, intellectual property, data, it organizations, storage strategy
    
Dell

CSO - Cloud Security and Myths and Strategies Uncovered

Published By: VMware, Inc     Published Date: Dec 05, 2013
This executive level paper highlights trends and findings from CIO’s 2011 Global Cloud Computing Adoption survey as it relates to Security and Compliance in the virtualized datacenter. Featured content includes debunked myths of securing cloud environments, how the secure cloud is a key business enabler for the CSO, as well as strategies for how to get started building a secure cloud initiative. Please download the white paper for more information.
Tags : 
vmware, global cloud computing adoption, security and compliance, virtualized datacenter, securing cloud environments, secure cloud initiative, networking, it management, wireless, knowledge management, enterprise applications, data management, business technology, data center
    
VMware, Inc

HP Haven: See the big picture in Big Data -- Pinpoint security risks with 100% better insights

Published By: HP     Published Date: Jan 20, 2015
Security breaches can happen anywhere in an organization, and having the ability to analyze any form of data can give you the edge against fraud, theft, and infiltration by pinpointing abnormal behavior patterns. Understanding your security vulnerabilities requires rapid, deep analytics against business data, machine data, and unstructured human information.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP

Business Phone Buying Guide: Selecting the Right Phone for Your Workspace

Published By: Polycom     Published Date: Mar 13, 2018
With the increase in mobility and the growth of distributed teams, it’s essential that you select audio devices that offer the best flexibility, quality and reach needed to support collaboration anywhere on any device. To meet these requirements, Polycom offers a broad selection of easy-to-use, high-quality desk phones, conference phones, and applications. The phones support crystal-clear conversations and seamlessly integrate with a wide range of communication environments including open-SIP and Skype for Business and Office 365. This comprehensive guide will provide you: Guidance on selecting devices for different workspaces Information on the newest collaboration features and benefits Overview and comparison of the latest Polycom desk phones and conference phones
Tags : 
voice collaboration, communication environments, polycom, microsoft office 365, skype for business
    
Polycom

The EMC Isilon Scale-out Data Lake

Published By: Dell EMC     Published Date: Mar 18, 2016
This white paper provides an introduction to the EMC Isilon scale-out data lake as the key enabler to store, manage, and protect unstructured data for traditional and emerging workloads. Business decision makers and architects can leverage the information provided here to make key strategy and implementation decisions for their storage infrastructure.
Tags : 
emc, emc isilon, data lake, storage, network, unstructured data, business technology
    
Dell EMC

Unified Endpoint Management: the Next Step in the Evolution of Device Management (Japanese)

Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware

Designing Cloud Databases for Dummies

Published By: Datastax     Published Date: Aug 03, 2018
Distributed cloud databases are transforming the way organizations do business. Read this new, informative guide to learn what distributed cloud databases are and why they’re what’s required to power Right-Now Economy applications. You'll also get straightforward yet detailed information on the database requirements for today’s applications, the limitations of relational databases, and the importance of data autonomy in database selection. With Designing a Distributed Cloud Database for Dummies, you'll learn how enterprises can meet and exceed customer expectations by way of modern applications and distributed cloud databases.
Tags : 
    
Datastax

Cybersecurity – What risk do you inherit from the businesses you work with?

Published By: FICO     Published Date: Apr 07, 2018
High profile data breaches such as those at Equifax and MyFitnessPal have made everyone aware of cyber-risk. It is not only the cyber-risk that exists within your business you need to assess – do you understand the risk you inherit from the businesses you work with such as your: -Suppliers -Customers -Acquisitions and mergers For vital information about why you should assess the different types of organization you work with; and to learn how you can do this quickly and easily - Read our guide ‘Why Should You Understand the Cybersecurity Risk of the Businesses You Work with?’
Tags : 
    
FICO

Cisco HyperFlex VDI for Citrix: Conquering the top five business challenges

Published By: Cisco and NVIDIA Corporation     Published Date: Feb 26, 2018
These are interesting and challenging times to be in business. Digital forces, such as the cloud, big data, mobility, and mobile apps are disrupting tried-and-true business models, as well as entire industries. These transformational advances are producing complexity, while workers are demanding simplicity. They require centralized infrastructures to keep information safe, even as agility and flexibility rule the day. Read this eBook to learn more about powerful forces of digital business transformation!
Tags : 
    
Cisco and NVIDIA Corporation

AFP Guide to Integrated Business Planning

Published By: Anaplan     Published Date: Mar 29, 2018
The concept of integrated business planning — closing gaps in an organization’s various planning functions and aligning operations and strategy with its financial performance — has existed in various forms for decades. What has changed is creation of planning platforms that can handle the fluidity of data to erase silos and enterprise borders where once there were multiple geographies, departments, time zones, languages and currencies. All elements of business are managing the avalanche of information coming to them. Just like connecting disparate people, we also must connect data that resides in various systems, applications and tools.
Tags : 
afp, ibp, business, organizations, enterprise, data, systems
    
Anaplan

AFP® Guide To Building an Integrated Business Planning Capability

Published By: Anaplan     Published Date: Sep 07, 2018
The concept of integrated business planning — closing gaps in an organization’s various planning functions and aligning operations and strategy with its inancial performance — has existed in various forms for decades. What has changed is creation of planning platforms that can handle the luidity of data to erase silos and enterprise borders where once there were multiple geographies, departments, time zones, languages and currencies. All elements of business are managing the avalanche of information coming to them. Just like connecting disparate people, we also must connect data that resides in various systems, applications and tools.
Tags : 
    
Anaplan

Third-Party Risk: Why Real-Time Intelligence Matters

Published By: Recorded Future     Published Date: Apr 18, 2019
Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. These business relationships can knowingly or unknowingly introduce different types of risks that need to be identified and managed as if these third parties were part of the enterprise itself. Recorded Future's latest risk intelligence offering enables threat intelligence teams to better understand, monitor, and measure their real-time exposure to these third-party risks. Armed with this information, organizations can better assess and prioritize risk mitigation actions.
Tags : 
    
Recorded Future

Management Reporting: Let’s Stop Reinventing the Wheel

Published By: Certent UK     Published Date: Apr 25, 2018
To conquer many challenges organizations face in today’s economic environment, business leaders need shared insights based on accurate, up-to-the-minute information and a shared analytic interpretation. Download this report to find out more
Tags : 
    
Certent UK

The essential migration checklist for identifying the right customer experience solution

Published By: Genesys     Published Date: Jun 19, 2019
Contact center technology plays a major role in the success of your customer experiences and business operations. Having the optimal solutions, infrastructure and provider in place are fundamental to meeting current and future goals and expectations. If you’re struggling with outdated contact center systems that limit channels and customer information, the best path forward is to migrate to a solution that lets you overcome those technology limitations. And the first step is to download this comprehensive checklist to evaluate key solutions and vendor considerations. You’ll learn how to: Identify business goals and outcomes that are most important for your organization Evaluate deployment options based on necessary flexibility and capabilities Understand your technology needs and priorities Assess vendor viability
Tags : 
    
Genesys

Leveraging the 360 Degree Customer View to Maximize Up-Sell and Cross-Sell Potential

Published By: Aberdeen Group     Published Date: Oct 19, 2011
A true 360 degree view of the customer is a win-win situation for all parties involved: buyers benefit from better service and efficiency, and sellers derive improved loyalty and, inevitably, more repeat business from established customers. This report will explore how Best-in-Class companies take a holistic approach to providing a complete, accurate and integrated view of customers to improve satisfaction and retention without losing sight of customer profitability. As a result of these strategies, companies with more accurate and timely information about their prospect or customer can more efficiently respond to communications, ensure customer satisfaction with better service, and drive toward a larger lifetime value of each account, customer or client.
Tags : 
aberdeen, technology, customer, up-sell, best in class companies, communications, customer satisfaction, business integration, business intelligence, business management, customer relationship management, customer service
    
Aberdeen Group

Lopez Research: An Introduction to the Internet of Things

Published By: Cisco     Published Date: Jul 11, 2016
IoT impacts every business. Mobile and the Internet of Things will change the types of devices that connect into a company’s systems. These newly connected devices will produce new types of data. The Internet of Things will help a business gain efficiencies, harness intelligence from a wide range of equipment, improve operations and increase customer satisfaction. IoT will also have a profound impact on people’s lives. It will improve public safety, transportation and healthcare with better information and faster communications of this information. While there are many ways that the Internet of Things could impact society and business, there are at least three major benefits of IOT that will impact every business, which include: communication, control and cost savings. Read to learn more!
Tags : 
    
Cisco

Wild, Wild West of Mobile App Reputation

Published By: Webroot UK     Published Date: Sep 25, 2013
Mobile applications are providing exciting new business opportunities for service providers and technology companies. Innovative firms are thriving by offering apps in app stores and app markets, by supporting apps with mobile services and infrastructure, and by managing apps through mobile device management (MDM) and mobile application management (MAM) products. Enterprises are providing mobile apps to their employees and customers through corporate app catalogs. But these business opportunities could be jeopardized by information security issues.
Tags : 
webroot, app reputation, app, mobile app, mam, enterprise mobile apps, app markets, mobile viruses, networking, security, enterprise applications
    
Webroot UK
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.