cad

Results 251 - 275 of 716Sort Results By: Published Date | Title | Company Name

Security By Design How Identity Allows You to Know Your Customers and Optimize Their Experience

Published By: Ping Identity     Published Date: Feb 12, 2016
There’s been a fundamental shift in best practices over the last decade to accommodate new multiple-screen behaviors seen by 70% of Internet-connected consumers. The disconnected nature of a siloed channel-by-channel approach won’t provide the consistent end-to-end experience that today’s connected consumer demands.
Tags : 
    
Ping Identity

Five Industry Trends in Learning

Published By: SilkRoad Technology     Published Date: Feb 24, 2016
For decades, learning in a corporate environment consisted of a day or a week of classroom-based training. However, technological advances delivered on the promise of a more complex learning protocol with automated, virtual, and experiential elements. At Connections 2014, SilkRoad’s annual user conference, a panel of learning professionals convened to discuss five major learning themes this year, including integration, mobility, engagement, compliance, and analytics.
Tags : 
silkroad, human resources, industry trend, learning
    
SilkRoad Technology

Conditional Access: Going Beyond Perimeter-Based Security

Published By: Jamf     Published Date: Jan 18, 2018
For decades, organizations built “walls” around their company and leveraged network perimeters as the first line of defense. But as workspaces have become more fluid, the security perimeter has changed. The concept of creating a network and protecting it by firewall may not be enough. It’s time to rethink a traditional, perimeter-based security model.
Tags : 
    
Jamf

5G Driving Device to Cloud Innovations

Published By: Intel     Published Date: Nov 29, 2016
Just after the turn of the decade researchers are predicting there will be somewhere north of 24 million subscriptions to next generation 5G networking services. Today most of those services are little more than pilot projects. But thanks to emerging network function virtualization (NFV) software running on Mobile Edge Computing (MEC) platforms enabled by Intel most of those 5G services should be in production before the end of the decade. Come learn how MEC platforms are about to transform every corner of the networking world to not only drive the creation of a vast array of new IT services, but also make networks more agile and responsive than anyone ever thought possible.
Tags : 
    
Intel

Brocade Checklist: The Future-Ready Network

Published By: Juniper Networks     Published Date: Aug 07, 2017
NUR WER SICH AUF DIE ZUKUNFT EINSTELLT, BLEIBT BESTEHEN. Wer sich im Wettbewerb behaupten möchte, braucht ein sicheres und leistungsstarkes Netzwerk, das auch auf Jahre hinaus ?exibel und zuverlässig ist.
Tags : 
    
Juniper Networks

Brocade Checklist: The Future-Ready Network

Published By: Juniper Networks     Published Date: Aug 08, 2017
AVANT D’ACHETER : LES CRITÈRES À PRENDRE EN COMPTE POUR LA MODERNISATION DE VOTRE RÉSEAU D’ENTREPRISE
Tags : 
    
Juniper Networks

Un modelo de madurez de gestión de accesos con privilegios para la transformación y automatización d

Published By: CA Technologies EMEA     Published Date: Aug 24, 2017
En la actualidad, el software se encuentra en el núcleo de la metodología de las empresas para competir y funcionar de forma eficaz en el siglo XXI. Durante mucho tiempo, la tecnología ha desempeñado un papel decisivo en la estrategia empresarial. Sin embargo, la transformación digital ha ampliado las iniciativas de transformación y aceleración del ciclo de entrega de software, así como los procesos de desarrollo de aplicaciones, a un imperativo que se extiende por toda la empresa y se interseca cada vez más con la otra preocupación que acucia a los directivos: la ciberseguridad.
Tags : 
ampliar el control, automatizar la autorizacion, escalar e integrar, facilitar tanto la monitorizacion, incorporar la capacidad
    
CA Technologies EMEA

Gestión de accesos con privilegios: una planificación para calcular el coste total de propiedad

Published By: CA Technologies EMEA     Published Date: Aug 24, 2017
Las cuentas de usuario con privilegios, ya se usurpen, sean objeto de abuso o, simplemente, se usen de forma incorrecta, se encuentran en el corazón de la mayoría de las infracciones relativas a datos. Los equipos de seguridad evalúan, cada vez más, soluciones de gestión de accesos con privilegios (PAM) completas para evitar el perjuicio que podría provocar un usuario malintencionado con privilegios altos o un usuario con privilegios que está cansado, estresado o que, sencillamente, comete un error. La presión que ejercen los ejecutivos y los equipos de auditoría para reducir la exposición de la empresa aseguran el esfuerzo, pero las soluciones de PAM completas pueden acarrear costes ocultos, según la estrategia de implementación adoptada.
Tags : 
almacen de contrasenas, monitorizacion de contrasenas, entornos hibridos
    
CA Technologies EMEA

Not Ready for Insurtech? Here’s Proven Automation You Can Use Now!

Published By: Fiserv     Published Date: Nov 06, 2017
The right kind of insurtech can modernize the financial close, freeing up time, money and resources so businesses can focus on strategic efforts and specific customer needs. Reconciliation of transactions and accounts across large organizations is one area where automation and digitization can have a major impact on the balance sheet. In the article, Not Ready for Insurtech? Here’s Proven Automation You Can Use Now!, learn how one of the top ten major insurance carriers has used digitization for the past decade to streamline their reconciliation efforts - saving time and money - while increasing their bottom line.
Tags : 
insurtech, financial automation, financial close, insurance reconciliation, insurance bottom line, insurance automation, digitization, digitalization
    
Fiserv

2018 Outlook: Customer Experience and Security Strike a Balance

Published By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 
2018 trends, aml trends, money laundering trends
    
Fiserv

See how Wasabi is transforming cloud storage with a radical, low-priced solution.

Published By: Wasabi     Published Date: Nov 13, 2018
For the past decade Amazon, Google and Microsoft offering comparable service have dominated cloud storage. Armed with revolutionary technology, Wasabi is transforming what technology can be and do. It is bringing low cost and high speed storage to everyone, eliminating vendor lock-in, and complicated tiers and pricing plans. In this white paper we focus on cloud storage pricing, comparing the economics of Wasabi versus the leading cloud storage options.
Tags : 
    
Wasabi

Risk & Response: Defending Financial Institutions with Cb Response

Published By: Carbon Black     Published Date: Apr 10, 2018
For decades, the financial services industry has endured constant change and uncertainty, from the depths of a financial crisis to widespread regulation overhauls. With the advent of more advanced cybersecurity threats, the industry has responded with rapid digital transformation to remain competitive while also pushing the envelope. Today, managing and mitigating cyber-related risks not only draws government scrutiny, but increased consumer scrutiny as well, with longstanding brand reputations anchored to institutions’ ability to protect its most sensitive data. In a recent survey of Americans, financial information was considered by consumers to be their most valuable personal information, worth even more than personal or family photos and videos. For consumers, failing to protect their data is a grave violation of trust, to the point where 72% would consider leaving their current financial institution if their sensitive information was taken hostage by ransomware.1 Not only does the
Tags : 
    
Carbon Black

The CFO's Guide to AI Strategy

Published By: Abacus Labs     Published Date: Jan 11, 2019
Artificial intelligence is no longer the stuff of science fiction. Led by advances being made in academia and Silicon Valley, computing power is growing at an unprecedented and accelerating rate. As AI becomes more prevalent in finance software, the question facing you, the finance leader, isn’t whether it will change your job, but how to prepare for its arrival. This paper is a primer designed to help you develop an AI strategy for your finance team. You’ll understand key concepts about this revolutionary technology, including how it works, why finance specifically stands to benefit, and how to apply AI in a way that returns the most value to your team.
Tags : 
    
Abacus Labs

HQ 2.0: The Next- Generation Corporate Center

Published By: PwC     Published Date: Apr 03, 2019
Not so very long ago, corporate executives commuted to a gleaming headquarters building, often in a beautifully landscaped suburban campus. Greeted by attentive security guards and smiling receptionists, they walked down well-appointed hallways lined with mahogany paneling and expensive artwork to their offices on the executive floor. There, they reviewed petitions that had percolated up the ladder, and dispatched decisions to be executed by the army of troops on the front lines. After decades of hard work, these individuals had ascended to the top of their pyramid, overseeing the processes and practices that made the enterprise work, and enjoying all the perquisites and power of a C-suite functional officer in the corporate center of a major company.
Tags : 
    
PwC

Breaking Down Walls With Digital Technology

Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. The diversity and bureaucratic nature of government agencies have complicated communication for decades. But today digital technologies offer a path to connectivity and information sharing that could help break the gridlock. Innovative mobile and field force automation (FFA) technologies are helping state and federal government agencies break down the walls that hindered cooperation and decision making between offices and field personnel. This document is designed to help ensure that your mobile device platform selection and processes provide the power, reliability, and flexibility you need to achieve your mission — in the office, in the field, or ten flights up in the air.
Tags : 
    
Fujitsu America, Inc.

The Future of Banking: A Financial Concierge for Everyone

Published By: Group M_IBM Q119     Published Date: Feb 08, 2019
Banking engagement is about to come full circle. Over the past few decades, banks have pushed customers to digital and self-service channels, with significant consequences. As customers take their transactions from the branches to the digital channels, banking has become less and less personal. Conversational Banking allows banks to have the best of both worlds as this always-on, personalized banking will be available at a fraction of the cost of relying on human agents alone. It is both instantaneous and personal. It feels intimate but is cost-effective. Read more to see how banks can start.
Tags : 
    
Group M_IBM Q119

The Future of Banking: A Financial Concierge for Everyone

Published By: Group M_IBM Q2'19     Published Date: Mar 29, 2019
Banking engagement is about to come full circle. Over the past few decades, banks have pushed customers to digital and self-service channels, with significant consequences. As customers take their transactions from the branches to the digital channels, banking has become less and less personal. Will this trend continue? To predict the future let’s first review how we got here.
Tags : 
    
Group M_IBM Q2'19

Stopping the Attackers You Trust: A deception-based approach to insider threats

Published By: Illusive Networks     Published Date: Apr 10, 2019
Though insider threats are not new, the challenge to get ahead of them has not lessened over the past decade. In this paper you’ll find insights on why detecting and deterring malicious lateral movement is an essential part of an insider threat program, how you can monitor for unauthorized access without eroding employee trust, and how you can expedite the investigation of potential malicious insider activity.
Tags : 
emerging threats, insider threats, malicious insiders, cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, enterprise security
    
Illusive Networks

L’état actuel du travail en France : La perte de productivité

Published By: Service Now     Published Date: Feb 15, 2017
Nous avons interrogé 300 cadres français. Les répondants provenaient d’un large éventail de secteurs, de toutes les tranches d’âge et représentaient un ensemble diversifié de fonctions, allant de l’ingénierie aux ressources humaines, en passant par la fabrication et la commercialisation.
Tags : 
productivity, survey, engineering, human resources, manufacturing, marketing
    
Service Now

La colaboración social en la empresa, fomenta una buena planificación de ventas y operaciones

Published By: Infor     Published Date: Mar 07, 2017
Como responsable de ventas y operaciones, usted tiene importantes responsabilidades, tales como establecer prioridades, planificar e implementar estrategias de la cadena de suministro, impulsar mejoras y, al mismo tiempo, adaptarse rápidamente a los requisitos cambiantes del mercado y de los clientes, y ajustar esos cambios en la demanda y en la oferta, y todo sin olvidar los resultados financieros.
Tags : 
    
Infor

What does GDPR mean for backup data

Published By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation is set to shake up modern data protection laws. With large-scale data breaches making news headlines on a weekly basis throughout 2017, data regulation authorities across Europe will be hoping this can help resolve the challenges of data protection. However, with so many questions around how to comply it is still unclear how far this regulation spreads. Technologists are now looking for answers, wanting to know how the GDPR will affect backup and nonprimary data sets and what needs to be done to be compliant. This white paper will explore and understand aspects of the regulation to help answer questions and give clarity over what data is covered by the GDPR and what organisations need to do to be compliant. Redstor have specialised in assisting organisations with data protection and management for almost two decades. Providing compliant services around the areas of Data Backup, Disaster Recovery and Archiving.
Tags : 
    
Redstor UK

Integrating and governing big data

Published By: IBM     Published Date: Apr 18, 2016
While the term 'big data' has only recently come into vogue, IBM has designed solutions capable of handling very large quantities of data for decades. IBM InfoSphere Information Server is designed to help organizations understand, cleanse, monitor, transform and deliver data.
Tags : 
ibm, ibm infosphere, big data, data optim, data management
    
IBM

Embracing Analytics as a Competitive Strategy for a Midmarket Organization

Published By: IBM     Published Date: Apr 19, 2016
The use of analytics will define the successful midmarket business of the next decade, just as it will define the successful larger organization in this information age. The past decade has seen rapid change in the business climates with an explosion of global competition and economic uncertainty. Despite this, many midmarket companies have thrived by using their size and agility as a competitive advantage. Certainly they have fewer resources than large corporations who are able to invest large sums in IT. However, small yachts can turn and adjust their course much quicker than large cruise ships. The same came be said for midmarket companies. The most successful organizations are ones that can react the quickest to changes in the market place. Midmarket companies can take advantage of their smaller size by being more agile and quicker to change, or even reinvent themselves, to respond to the market.
Tags : 
ibm, ibm pure data system, big data, data analytics, analytics architecture, competitive advantage, midmarket organization, data management
    
IBM

Integrating and governing big data

Published By: IBM     Published Date: Jul 06, 2016
While the term 'big data' has only recently come into vogue, IBM has designed solutions capable of handling very large quantities of data for decades. IBM InfoSphere Information Server is designed to help organizations understand, cleanse, monitor, transform and deliver data.
Tags : 
ibm, ibm infosphere, big data, data optim, data management, data center
    
IBM

Oracle ZFS Storage Appliance ZS7-2: A Powerful Alternative to Traditional NAS

Published By: Oracle     Published Date: Jan 28, 2019
For more than a decade, Oracle has developed and enhanced its ZFS Storage Appliance, giving its users a formidable unified and enterprise-grade storage offering. The latest release, ZS7-2, boasts upgraded hardware and software and is a timely reminder that more users might do well to evaluate this offering. It has a trifecta of advantages: (1) It’s notable performance, price-performance, and flexibility are all improved in this new release (2) There is a surprisingly inclusive set of functionalities, including excellent storage analytics that were developed even before analytics became a contemporary “must-have” (3) There’s a compelling group of “better together” elements that make ZFS Storage Appliance a particularly attractive choice for both Oracle Database environments and users that want to seamlessly integrate a cloud component into their IT infrastructure. Given the proven abilities of Oracle’s prior models, it’s also safe to assume that the new ZS7-2 will outperform other m
Tags : 
    
Oracle
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.