business requirements

Results 276 - 300 of 409Sort Results By: Published Date | Title | Company Name

Exploring the Fundamental Differences Between Network Memory and Application Caching

Published By: Silver Peak     Published Date: Oct 28, 2013
Enterprises have long been battling the inherent performance limitations of Wide Area Networks (WANs) when delivering applications to remote offices. Caching emerged in the 1990’s as a potential way of addressing this problem, accelerating the performance of specific applications, such as web services, while reducing overall WAN traffic. While caching achieved reasonable success for a few short years, the market for these point products ultimately subsided as a result of several operational and functional limitations. Enterprises require an application acceleration solution that spans all types of traffic, one that is easy to manage, and 100% data coherency when supporting business-critical applications. This white paper will address these issues and offer a solution that addresses these enterprise requirements. The result is a complete solution for improved application delivery across a distributed enterprise environment.
Tags : 
silver peak, network memory, application caching, wan, caching, networking
    
Silver Peak

Buyer's Guide - What Every Business Needs to Know When Selecting a Phone System

Published By: RingCentral     Published Date: May 14, 2013
Whether you are starting a new business or expanding your existing business, you will need to choose a business phone system that meets your organization's requirements. The obvious decision would be to go with what you already know - your service provider from your previous company, or the phone system at your other office location. Read this white paper to know what every business needs to know when selecting a phone system.
Tags : 
ringcentral, buyer's guide, selecting a phone system, business phone systems, service providers of phone systems
    
RingCentral

Buyer's Guide for Extended Collaboration

Published By: Intralinks     Published Date: Oct 30, 2014
Are you struggling with finding an enterprise collaboration solution that’s both easy to use and secure enough for your organization to share information outside the firewall? With the infiltration of consumer devices and applications into the enterprise, it’s even more difficult to control access to confidential data while enabling employees to get work done. This 16-page Buyers Guide to Enterprise Collaboration addresses the three key drivers of the selection process: Risk management strategy Accelerating business productivity Improving IT efficiency Even if you are already in an RFP process, or just starting to figure out your requirements, this Buyers’ Guide provides insight into the factors you should be considering, keepi
Tags : 
enterprise collaboration, firewall, risk management strategy, business productivity, it efficiency, security, enterprise applications
    
Intralinks

Buyer's Guide to Enterprise Collaboration Solutions

Published By: Intralinks     Published Date: Jan 16, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: Risk management – avoiding data breaches and loss of information that can result in non-compliance Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols This Buyer’s Guide offers a holistic approach for your evaluation process by examining the granular aspects of enterprise file sharing, as well as i
Tags : 
collaboration solutions, risk management, business productivity, it efficiency, business users, enterprise applications
    
Intralinks

How to Build EFSS Plans to Address Current and Future Business Requirements

Published By: Dropbox for Business     Published Date: May 07, 2015
Discusses the challenges organizations face when evaluating Enterprise File Sync and Share solutions
Tags : 
efss, accessibility, cloud storage, content management, mobility, virtualization, storage management, storage virtualization, mobile computing, best practices, business integration, content management system, productivity
    
Dropbox for Business

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Oct 09, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS

Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security

Published By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in today’s business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of today’s demanding IT environment.
Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment, it management, enterprise applications
    
Centrify Corporation

Eckerson Group: IBM Cognos Analytics-Governed Data Discovery Profile

Published By: IBM     Published Date: Jul 19, 2016
Learn how IBM Cognos Analytics incorporates many governed discovery features, with which business users can easily expose the underlying data modelling of existing reports and modify it to an individual or departmental requirements
Tags : 
ibm, ibm cognos analytics, analytics, business intelligence, business analytics, business integration, business management, business metrics, business technology
    
IBM

TDWI Best Practices: Accelerating the Path to Value with Business Intelligence and Analytics (custom

Published By: SAS     Published Date: Mar 06, 2018
With decisions riding on the timeliness and quality of analytics, business stakeholders are less patient with delays in the development of new applications that provide reports, analysis, and access to diverse data itself. Executives, managers, and frontline personnel fear that decisions based on old and incomplete data or formulated using slow, outmoded, and limited reporting functionality will be bad decisions. A deficient information supply chain hinders quick responses to shifting situations and increases exposure to financial and regulatory risk—putting a business at a competitive disadvantage. Stakeholders are demanding better access to data, faster development of business intelligence (BI) and analytics applications, and agile solutions in sync with requirements.
Tags : 
    
SAS

Considerations for Owning vs. Outsourcing Data Center Physical Infrastructure

Published By: Schneider Electric     Published Date: Jun 04, 2014
When faced with the decision of upgrading an existing data center, building new, or leasing space in a retail colocation data center, there are both quantitative and qualitative differences to consider. The 10-year TCO may favor upgrading or building over outsourcing, however, this paper demonstrates that the economics may be overwhelmed by a business’ sensitivity to cash flow, cash cross-over point, deployment timeframe, data center life expectancy, regulatory requirements, and other strategic factors. This paper discusses how to assess these key factors to help make a sound decision.
Tags : 
schneider, electric, data, infrastructure, upgrade, retail, outsource, own, data management, business technology, data center
    
Schneider Electric

A New Approach to Designing a Modern Storage Infrastructure

Published By: Pillar Data Systems     Published Date: Apr 20, 2010
In this brief 23-minute on-demand Webinar, opinion leaders from Pillar Data Systems and industry experts from featured analyst firm, Gartner, Inc., break down the challenges that today's organizations face and help them to select a flexible storage platform that will adapt to changing business and application requirements while minimizing risks and reducing management complexity.
Tags : 
pillar data systems, modern storage infrastructure, it infrastructure, productivity, tco, green it, data, infrastructure, clustering, storage area networks, storage management, total cost of ownership, green computing
    
Pillar Data Systems

Building a Business Case for AP Automation

Published By: Esker     Published Date: Jun 29, 2015
Read the white paper‚ Building a Business Case for AP Automation: How to Propel Your Project to the Top of the List‚ to discover how AP automation creates benefits for the entire business such as: • Cost savings due to fewer manual processing tasks and less IT requirements • Complete visibility and control thanks to customizable dashboards and metrics • Faster payment cycles with the ability to capture more early payment discounts • Improved employee productivity and supplier satisfaction
Tags : 
accounts payable, finance management, ap automation, infrastructure, employee productivity, supplier satisfaction, payment cycles, payment discounts
    
Esker

What Every Business Needs to Know When Selecting a Phone System

Published By: RingCentral     Published Date: Dec 05, 2013
Whether you are starting a new business or expanding your existing business, you will need to choose a business phone system that meets your organisation’s requirements. This guide provides you with essential information and tools so you can understand your options, and make the decision that meets the needs - and ambitions - of your business.
Tags : 
phone system, business phone, business network, wireless phones, business communications, voip, phone lines, iphone, ringcentral, ip networks, ip telephony, small business networks, tcp/ip protocol, mobile data systems, wireless application software, wireless communications, wireless infrastructure
    
RingCentral

The Definitive Guide To Sales and Use Tax

Published By: Avalara     Published Date: Jan 28, 2014
For years, “tax-free online shopping” has brought customers to the web in droves, all while raising the ire of brick-and-mortar retailers claiming an unfair price advantage to sellers offering prices free of sales tax. At the center of these debates lies the small to medium business, attempting to navigate changing sales tax requirements, and facing increased scrutiny under these new rules. Sales tax compliance is becoming a sticky wicket, as state and local governments revise tax laws to increase revenue, and Congress considers granting states the authority to make remote sellers charge sales tax. This Definitive Guide lays out sales and use tax basics as well as commonly misunderstood elements of sales tax compliance, to provide you a one-stop reference for all things sales and use tax related. The last two sections include a state-by-state summary of sales tax rules and regulations, and a glossary of terms. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices, audit, compliance, enterprise applications
    
Avalara

Evolving Data Landscape Creates Challenges for Array of Industries

Published By: QTS Data Centers     Published Date: Feb 17, 2017
As businesses and agencies face increasingly complex security requirements, it makes less and less sense for these organizations to invest resources in the operation and management of their own data centers. Enterprises are leaving the data center business, opting instead to seek a partner for their data center, colocation and cloud needs.
Tags : 
    
QTS Data Centers

Modern Tier-1 storage designed for ITaaS and cloud

Published By: HP     Published Date: Jul 22, 2014
IT has never been more important to doing business, which means that IT infrastructure must be simpler, smarter, faster, more flexible, and more business-aligned than ever. New service delivery models are driving new Tier-1 storage requirements that reveal how the traditional focus on performance and availability are clearly not enough to support virtualization, ITaaS, and new cloud service delivery models. The world is moving rapidly towards a New Style of IT, and will leave behind any business that doesn’t adapt even more rapidly. Is your storage ready?
Tags : 
tier-1, itaas, cloud, technology, infrastructure, storage, data management, business technology
    
HP

Becoming Masters of our (ITSM) Domain – A Case Study Webinar

Published By: Samanage     Published Date: Aug 22, 2014
One of the oldest and largest global private equity firms, The Riverside Company was fed up with their complex ITSM solution, the costly consultants it required to maintain, and the sub-par customer service they received from their vendor. In this webinar, Eric Feldman, Director of IT at Riverside, shares behind-the-scenes details of how they regained control of their domain, including: "IT"SM…and Beyond – Cross functional business challenges that drove their requirements The journey – What they learned about cloud ITSM along the way The tangible benefits – Immediate business impact and what’s now possible including more accurate budgeting and building economies of scale If you’re actively looking at, or merely thinking about a new IT Service Management (ITSM) solution for your organization, this is one conversation you don’t want to miss. Like Riverside, you can get control and become master of your own IT domain.
Tags : 
samanage, itsm, riverside, itsm solutions, vendors, it management, knowledge management, enterprise applications
    
Samanage

The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164

Published By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : 
tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi, health and human services, hhs, health care, insurance, ehrs, electronic ph, ephi, access controls, password management, account management, access control, unique user identification
    
Tripwire

Simplicity, Productivity & Profitability - How Software as a Service is Revolutionizing ICM

Published By: IBM     Published Date: Jul 31, 2014
Read this new paper and learn why more organizations are responding to this dilemma by choosing cloud-based ICM.
Tags : 
ibm, business analytics, sales, incentive compensation management, icm, icm requirements, icm solutions, sales process management, cloud based icm
    
IBM

Scotiabank Case Study

Published By: IBM     Published Date: Nov 22, 2014
Financial organizations are under intense pressure to grow their business while keeping costs in check and meeting regulatory requirements. This can be a huge challenge for banking leadership and especially those managing payments infrastructures. How can banks improve business agility and ensure faster compliance? Integrated transaction management hubs deliver differentiated products to customers now, provide a platform for future and enable ongoing market share growth.
Tags : 
commercial payment center, payments infrastructures, business agility, integrated transaction management, software development, enterprise applications, data management, business technology
    
IBM

Information Lifecycle Governance Requirements Kit

Published By: IBM     Published Date: Aug 28, 2014
Data volumes are getting out of control, but choosing the right information lifecycle governance solution can be a huge challenge, with multiple stakeholders, numerous business processes, and extensive solution requirements. Use this requirements kit from the Compliance, Governance and Oversight Council (CGOC) to find the tools and technology you need.
Tags : 
ilg, data volumes, cgoc, information economics, it management, business intelligence, configuration management, service oriented architecture, business technology
    
IBM

Scotiabank Case Study

Published By: IBM     Published Date: Oct 06, 2014
Financial organizations are under intense pressure to grow their business while keeping costs in check and meeting regulatory requirements. This can be a huge challenge for banking leadership and especially those managing payments infrastructures. How can banks improve business agility and ensure faster compliance? Integrated transaction management hubs deliver differentiated products to customers now, provide a platform for future and enable ongoing market share growth.
Tags : 
payments infrastructures, transaction management, payment transformation, single payments platform, knowledge management, business analytics, business intelligence, business management, spend management
    
IBM

Three Guiding Principles for Data Security and Compliance

Published By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, cloud, social business, big data, data security, data protection, privacy, security, it management, knowledge management, data management
    
IBM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.