business requirements

Results 376 - 400 of 409Sort Results By: Published Date | Title | Company Name

A Perspective On Standards: A Tool For Global Competitive Survival In A Complex Regulatory World

Published By: Rockwell Automation     Published Date: Jun 23, 2008
In today's global markets, companies are required to navigate a plethora of standards and regulatory requirements, making global business complex. Rockwell Automation's perspective is that the harmonization of standards and regulatory requirements is the best approach to facilitate global market access, competition and growth.
Tags : 
erp, automation, manufacturing, rockwell, rockwell automation, compliance
    
Rockwell Automation

Small-to-Medium Sized Business versus Enterprise Requirements for Application Delivery Optimization

Published By: KEMP Technologies     Published Date: Aug 04, 2008
The Web experience is changing for consumers. While the National Retail Federation reports that over 90 percent of customers research products on the Web before purchasing, a single product photo and description is not enough to close the sale. Through broadband, with Flash and JPEG product images, retailers are providing information to potential customers which will improve the likelihood of closing the sale.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
    
KEMP Technologies

REDPLAID Delivers Reliable Infrastructure for Hosting SMB’s Web Applications

Published By: KEMP Technologies     Published Date: Aug 04, 2008
Websites have become critical components of most businesses’ core operations. They support the brand and ordering process, serve as data information resources and assist in overall customer care. Having poor website performance or poor reliability can destroy or severely damage a business and its reputation. The increasing importance of these websites leads to critical requirements of security, reliability and scalability. Delivering these, however, can leave an SMB stretched beyond its resources.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
    
KEMP Technologies

Using Likewise to Comply with the PCI Data Security Standard

Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows, data protection
    
Likewise Software

Test and simulate rules using WebSphere ILOG Business Rules Management System

Published By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how WebSphere ILOG Business Rules Management System (BRMS) allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key performance indicators. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.
Tags : 
ibm ilog, brm, business rules management system, brms, websphere, test, simulate rules, business management
    
IBM ILOG.

Data Warehouse Modernization

Published By: SAS     Published Date: Aug 03, 2016
No matter the vintage or sophistication of your organizations data warehouse (DW) and the environment around it, it probably needs to be modernized in one or more ways. Thats because DWs and requirements for them continue to evolve. Many users need to get caught up by realigning the DW environment with new business requirements and technology challenges. Once caught up, they need a strategy for continuous modernization.
Tags : 
best practices, technology, data, business technology, business analytics, business intelligence, business management
    
SAS

Accelerate, De-risk Oracle EBS Upgrades

Published By: Delphix     Published Date: Apr 14, 2011
Delphix, announced that Oracle E-Business Suite customers can reduce risk and time, and cut additional storage requirements by using Delphix Server.
Tags : 
delphix, oracle, e-business suite upgrades, storage requirement, database virtualization, infrastructure, storage virtualization, database development
    
Delphix

Workshifting: a global market research report

Published By: Citrix Systems     Published Date: Oct 08, 2012
New business requirements are transforming the demands placed on IT. To operate effectively in today's fast-paced global environment, organizations need to be able to get work done anywhere, anytime, by any type of worker to achieve the best results. This is the context for the rise of workshifting-the practice of moving work to the most optimal location, time and resources.
Tags : 
citrix, workshifting, optimal location, virtualization, resources, technology, employee performance, desktop management
    
Citrix Systems

PCI Compliant Data Centers

Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance
    
Dell Storage

HRG Assessment: Comparing IBM PureSystems and HP Converged Systems - 2012

Published By: IBM     Published Date: Sep 27, 2013
Customers require flexible, agile and easy to consume IT solutions to succeed in business. With those requirements in mind, IBM recently announced PureSystems. Harvard Research Group (HRG) has taken a closer look at PureSystems and and how it compares to Cisco UCS.
Tags : 
ibm, ibm puresystems, it services, expert integrated systems, it solutions, software, hardware, networking
    
IBM

IBM Security Services Client Reference Guide

Published By: IBM     Published Date: Feb 05, 2014
From a communications equipment manufacturer optimizing investments with a security scan to a mutual insurance company reducing spam and threats with hosted web and email services, IBM security consultants have helped many companies evaluate their existing security practices against their business requirements and objectives. Read these customer references to learn how organizations managed risk, security and compliance with help from IBM.
Tags : 
    
IBM

Forrester - Top Unified Communication Trends For Midsize Businesses

Published By: Cisco     Published Date: Aug 27, 2015
Learn about the latest top unified communication trends and how others are planning for the future.
Tags : 
unified communication, communication trends, midsize business, byod, bring your own device, mobility, it management, workforce management
    
Cisco

APM Has to Change to Support DevOps

Published By: Riverbed     Published Date: Apr 14, 2017
"As companies undergo digital transformation, many IT organizations are embracing DevOps to better align with evolving business requirements, foster rapid innovation, and deliver high-performing services. But what IT leaders are failing to grasp is that this cultural shift also requires modifications to the underlying application performance management (APM) technologies and processes that have historically been used to manage IT service delivery. Read this analyst paper to explore: Key challenges IT organizations face as they roll out DevOps practices Additional APM tools and capabilities needed to support DevOps Recommendations for forming the right organizational structure and processes"
Tags : 
    
Riverbed

Gartner Report: Selecting the Most Suitable Platform for Cloud Service Integration

Published By: Dell Software     Published Date: Apr 29, 2015
Read this Gartner report and learn how to align your business and technical requirements as well as your strategic considerations with platforms that support cloud integration. Plus, gain insights into the decision framework that can help you determine the best solution for your organizations needs.
Tags : 
cloud service integration, business and technical requirements, strategic considerations, decision framework, integration platforms, enterprise applications
    
Dell Software

5 Steps to Implement and Maintain PCI DSS Compliance

Published By: AlienVault     Published Date: Jul 22, 2016
youll learn five steps to implement and maintain PCI DSS compliance at your organization by: Determining your true business requirements Inventorying locations and assets Segmenting environments Operationalizing controls Automating controls and control reporting Demonstrating compliance with PCI DSS is far from a trivial exercise.
Tags : 
    
AlienVault

Gartner Paper: APM Has to Change to Support DevOps

Published By: Riverbed     Published Date: Jul 10, 2017
As companies undergo digital transformation, many IT organizations are embracing DevOps to better align with evolving business requirements, foster rapid innovation, and deliver high-performing services
Tags : 
digital transformation, apm, service delivery, organizational structure
    
Riverbed

State of the Operational DBMS Market, 2017

Published By: NetApp     Published Date: Mar 05, 2018
By 2018, more than 70% of new DBMS deployments will leverage cloud for at least one use case. Read the Gartner report State of the Operational DBMS Market, 2017 and get the latest insights and recommendations on DBMS strategy. Discover how to: Evaluate modern data management capabilities before adopting new DBMS products Lead a nonrelational technology assessment to determine which DBMS best meets your business requirements Deploy a multimodel DBMS and reduce complexity in your data center
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp

Wainhouse Buyers Guide: Making Smart Group Collaboration Decisions

Published By: Polycom     Published Date: Feb 16, 2017
" Understand the buying criteria and make informed decisions for group video conferencing systems and the features and functions needed to enable collaboration in the 5 most common workspaces in enterprises of all sizes; Small/Huddle Rooms Teaming Rooms Standard Meeting Rooms Executive Boardrooms Reconfigurable Spaces Despite video conferencing becoming a mainstream business tool, many end user organizations remain confused about how to choose the group video conferencing systems that best address their requirements. Download your guide now."
Tags : 
polycom, business technology, wainhouse, collaboration
    
Polycom

Transform Your Business with HCI

Published By: Dell EMC     Published Date: Dec 01, 2017
Hyperconverged infrastructure is becoming a popular architecture choice, particularly for businesses consolidating infrastructure as part of a hybrid IT strategy to extend compute and storage resources outside the enterprise. At its current level of progress, HCI could soon become a foundation layer for the next generation of infrastructure at enterprises, midsized companies and remote deployments. Hybrid cloud is the next frontier for HCI, with most players looking to develop cloud orchestration and workload-migration capabilities to become hybrid cloud enablers for enterprises and service providers. Today, many organizations still have questions and uncertainty about HCI: What are the most effective uses of HCI today and in the future? This report will provide data and analysis to provide perspective on how the HCI market could be evolving, and to better understand the key requirements enterprise IT administrators should consider as they begin their initial deployments or expand
Tags : 
    
Dell EMC

Your Complete Guide to Modern ERP

Published By: Oracle     Published Date: May 03, 2018
More than 75% of business leaders say their current ERP system doesnt meet their requirements, let alone future plans. To enable todays data-driven organization, the very foundation from which you are operating needs to be re-established; it needs to be modernized. To help you navigate your own journey to modernization, weve crafted this handbook series to share the knowledge gained working with many thousands of companies using both legacy and modern ERP systems.
Tags : 
guide, erp, operation, data, organization, company
    
Oracle

How You Can Build Trust Between Your Security and Developer Teams

Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that arent built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro Deep Security is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that arent built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro Deep Security is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS

Automate Container Security Using DevOps Processes on AWS with Trend Micro

Published By: AWS     Published Date: Oct 07, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that arent built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro Deep Security is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, youll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS

ESG Assessing the Financial Impact of HPE InfoSight Predictive Analytics

Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Applications are the engines that drive todays digital businesses. When the infrastructure that powers those applications is difficult to administer, or fails, businesses and their IT organizations are severely impacted. Traditionally, IT assumed much of the responsibility to ensure availability and performance. In the digital era, however, the industry needs to evolve and reset the requirements on vendors. HPE Nimble Storage has broken away from convention and transformed how storage is managed and supported with the HPE InfoSight predictive analytics platform. HPE engaged ESG to conduct a quantitative survey of the HPE Nimble Storage installed base, as well as non-HPE Nimble Storage customers, to better assess how HPE InfoSight positively impacts customer environments. Both HPE InfoSight telemetry data and ESGs quantitative survey data show that the benefit delivered to HPE Nimble Storage customers is significant, driving: 79% lower IT operational expenses. 73% fewer trouble ti
Tags : 
    
Hewlett Packard Enterprise

Forrester: Hyperconvergence Infrastructure and you

Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
To support a business technology agenda, infrastructure and operations (I&O) professionals must factor critical aspects of their own environments into their decisions and understand how these requirements affect implicit and explicit weighting as they evaluate hyperconverged infrastructure (HCI) offerings. This report covers the major variations in workloads and data services that can make an impact on your selection and outlines a methodology for evaluating the true cost of these solutions.
Tags : 
    
Hewlett Packard Enterprise
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.