cad

Results 426 - 450 of 764Sort Results By: Published Date | Title | Company Name

Uso de los análisis de amenazas para proteger el acceso con privilegios y prevenir infracciones

Published By: CA Technologies EMEA     Published Date: May 23, 2018
La protección del acceso con privilegios y la prevención de infracciones siguen constituyendo preocupaciones urgentes en empresas de todos los tamaños. Los atacantes recurren a una gama mayor de métodos más sofisticados para infiltrarse en sistemas vulnerables y, a pesar de que las noticias sobre infracciones externas ocupan con frecuencia los titulares, las organizaciones también deben ser capaces de defenderse contra las amenazas internas. De hecho, dado que en la actualidad se recurre de forma generalizada a la externalización y la asociación para acometer labores clave, un mayor número de usuarios tiene, hoy en día, acceso con privilegios a sistemas empresariales de fundamental importancia. Además, resulta primordial que los administradores actuales de los sistemas comprendan cómo se están utilizando estos últimos, quién los usa y en qué condiciones. Desafortunadamente, las soluciones estándar de seguridad no pueden proteger el acceso interno o con privilegios de manera eficaz y ad
Tags : 
    
CA Technologies EMEA

Guía para diseño REST y API Si la única herramienta de la que se dispone es un martillo.

Published By: CA Technologies EMEA     Published Date: May 24, 2018
En su libro publicado en 1966, “The Psychology of Science”, el psicólogo norteamericano Abraham Maslow abordó la idea de que los profesionales de la psicología necesitaban acometer sus métodos de tratamiento desde diferentes perspectivas para poder contar con ideas nuevas y no simplemente seguir usando las mismas teorías y técnicas creadas por Freud y sus seguidores tantos años atrás. Consciente de la posible dificultad de cambiar de punto de vista, Maslow escribió: “Si la única herramienta de la que se dispone es un martillo, es tentador abordarlo todo como si de un clavo se tratara”. Todos nosotros hemos vivido esta experiencia. Nos acostumbramos tanto a la manera en la que se han ido haciendo las cosas que a veces no nos cuestionamos las razones para seguir haciéndolo así.
Tags : 
    
CA Technologies EMEA

Guía sobre la transformación digital para directores de digitalización

Published By: CA Technologies EMEA     Published Date: May 24, 2018
En la actualidad, la tecnología digital está por todas partes; la nube, los dispositivos móviles, las redes sociales y el Internet de las cosas están cambiando nuestra forma de trabajar y divertirnos. Este entorno digital que evoluciona a gran velocidad está, además, redefiniendo las relaciones entre la compañía y sus clientes, que ahora esperan recibir una experiencia cómoda e interactiva de sus marcas favoritas. La seguridad es también una prioridad. Los riesgos son ahora mayores, pues tanto la empresa como sus clientes intercambian una cantidad cada vez mayor de datos confidenciales.
Tags : 
    
CA Technologies EMEA

API360: El modelo completo de estrategia de API para la empresa

Published By: CA Technologies EMEA     Published Date: May 24, 2018
El crecimiento de su empresa es una prioridad continua. Además, a medida que la economía de las aplicaciones sigue creciendo, es probable que busque iniciativas de negocio digital para fomentar gran parte de dicho crecimiento. Algunos de los objetivos más prometedores de dicha estrategia son los siguientes: • Ofrecimiento de experiencias digitales superiores para consumidores a través de dispositivos móviles • Expansión de los flujos de mercados e ingresos a través de varios canales• Conexión de empleados y partners con los datos de la empresa en cualquier lugar y en todo momento • Lanzamiento de servicios nuevos innovadores en el Internet de las cosas (IoT)
Tags : 
    
CA Technologies EMEA

Arquitectura y estrategia de API Un enfoque coordinado

Published By: CA Technologies EMEA     Published Date: May 24, 2018
El auge de la interfaz de programación de aplicaciones (API por sus siglas en inglés) representa una oportunidad de negocio y supone un reto técnico. Para los líderes empresariales, las API representan una oportunidad para abrir nuevos flujos de ingresos y maximizar el valor ofrecido al cliente. Sin embargo, los arquitectos empresariales son los encargados de crear las API que posibilitan la reutilización de sistemas back-end en las nuevas aplicaciones web y móviles. Resulta esencial que todos los implicados comprendan que los objetivos de negocio y los retos técnicos de un programa de API están estrechamente relacionados. Los gestores de los programas deben responsabilizarse de comunicar con claridad los objetivos de negocio clave de una API propuesta a los arquitectos que deberán construir la interfaz.
Tags : 
    
CA Technologies EMEA

Las siete tendencias de la inteligencia empresarial

Published By: CA Technologies EMEA     Published Date: May 25, 2018
Muchas de las organizaciones más grandes y de mayor éxito del mundo utilizan CA Project & Portfolio Management (CA PPM) como la piedra angular de su estrategia de inteligencia empresarial (BI). De este modo, CA puede medir continuamente el pulso del mercado de forma directa con el fin de observar con sus propios ojos la evolución de las expectativas y el uso conforme las empresas adoptan las tecnologías de BI.
Tags : 
las, siete, tendencias, inteligencia, empresarial
    
CA Technologies EMEA

The Definitive Guide to Continuous Testing

Published By: CA Technologies EMEA     Published Date: Jul 18, 2018
As the pace of business continues to quicken, companies are starting to recognize that to stay competitive the process of developing and releasing software needs to change. Release cadence has greatly accelerated. There is no occasion anymore for a 6- to 18-month find-and-fix turnaround in which the customer will find the delay acceptable. Things need to move faster, and they need to be ready and perfect faster. Transforming to continuous testing is a journey, just like agile and DevOps was and still is. Companies and their IT teams will encounter setbacks, which must be anticipated and accepted. This is why planning is essential at every step in the continuous testing journey. Download this whitepaper to find out how CA Technologies can help your business today.
Tags : 
    
CA Technologies EMEA

Vulnerability Intelligence Report 2018

Published By: Tenable     Published Date: Jan 25, 2019
"The latest report from Tenable Research analyzes vulnerability prevalence in the wild, highlighting the cyber threats that security practitioners are dealing with in practice – not just in theory. Our research shows that enterprises must triage more than 100 critical vulnerabilities a day. To better understand where to focus remediation efforts, you need to find out how cyber defenders are actually acting. Download the report now to: -See why CVSS is an inadequate prioritization metric – and why you must prioritize vulnerabilities based on actual risk -Discover vulnerability trends in the ever-expanding attack surface -Learn whether your organization has one of the most common vulnerabilities (some are more than a decade old!)"
Tags : 
    
Tenable

Real world projects vs. Academic coding

Published By: Glider     Published Date: Jun 04, 2018
Recruiting great engineering talent is hard. The recruiting process for developers can feel like an impossible task because evaluating technical talent continues to evolve. The typical flow can be broken down into three basic steps: source, screen, and interview. Only recruiters truly understand the real challenges in finding qualified candidates but the pain doesn’t stop there. Learn more on tech recruiting by downloading this ebook by Glider
Tags : 
    
Glider

State of the Art Multi-Purpose Stadium Claims Victory with Seamless Digital Communications

Published By: Motorola Solutions     Published Date: Apr 26, 2019
The stadium had been using two-way radios to support daily operations for more than a decade — an analog-based system that was nearing end of life. The radios and the repeaters were starting to fail, creating communications gaps for employees. Being fully focused on the task at hand became challenging for employees that were concerned about the effectiveness of their radios on which they readily relied on for collaborating with other team members and addressing issues swiftly. The original system treated them well for a long time, but it came time to retire the equipment and make the move to digital.
Tags : 
    
Motorola Solutions

Retaining Share in Ambiguous Market Conditions: A Playbook for Building Products Distributors

Published By: Zilliant     Published Date: Oct 11, 2019
The building products / construction industry is more visibly representative of the health of the economy than any other. The avatar of the Great Recession may well be images of doomed projects on abandoned construction sites. As such, it’s unavoidable for leaders of building products distributors to experience market-induced anxiety as a matter of course. 2020 looms as the start of a new decade but many analysts fear it will also mark the end of the building boom. Recent indicators point to a slowdown at least. The existential question: what areas of building products distribution are ripe for reimagination, safeguarding against ambiguous market conditions now and in the future? This whitepaper provides the answers with a playbook that reveals where margins and revenue leak in most B2B distribution companies and provides reimagined strategies for retaining and growing share through price optimization, deal management and costing guidance.
Tags : 
    
Zilliant

The Future is Now: Creating an Intelligent Cloud Contact Center

Published By: Five9     Published Date: Aug 01, 2019
Today’s organizations compete on customer experience and this trend will define the shape and scope of contact centers well into the next decade. To deliver the level of seamless experiences that customers expect, contact centers will need to harness all the advantages technology can offer – specifically, the cloud – to create an “intelligent cloud contact center” that utilizes machine learning and real-time data analysis. So, step one is to move your contact center to the cloud. ASAP. Once you are operating a cloud contact center, the next step is to start leveraging everything this enables you to do. This is where the “Intelligent Cloud Contact Center” comes into play.”
Tags : 
    
Five9

The Future is Now: Creating an Intelligent Cloud Contact Center

Published By: Five9     Published Date: Oct 29, 2019
Today’s organizations compete on customer experience and this trend will define the shape and scope of contact centers well into the next decade. To deliver the level of seamless experiences that customers expect, contact centers will need to harness all the advantages technology can offer – specifically, the cloud – to create an “intelligent cloud contact center” that utilizes machine learning and real-time data analysis. So, step one is to move your contact center to the cloud. ASAP. Once you are operating a cloud contact center, the next step is to start leveraging everything this enables you to do. This is where the “Intelligent Cloud Contact Center” comes into play.”
Tags : 
    
Five9

The Total Cost of Ownership of Secure and Scalable Networking Infrastructures for the Enterprise

Published By: Brocade     Published Date: Nov 25, 2015
The New IP is enabling open, agile networks that unlock new possibilities for your organization. And you can make it happen on your own terms. This white paper explains how the Brocade Virtualized Application Delivery Controller provides a strategic way to reduce TCO.
Tags : 
brocade, networking, network infrastructure, vacd, vrouter, virtual solutions, it management
    
Brocade

Amazon Web Services: Enhance Application Delivery & Load Balancing, Brocade Virtual Traffic Manager

Published By: Brocade     Published Date: Nov 25, 2015
Your business demands more than the basic load balancing solution offered by Amazon Web Services. Boost application performance by adding a sophisticated Brocade vADC to seamlessly integrate with any application deployed on AWS—improve user experience, scalability, and control.
Tags : 
amazon, brocade, aws, fucntionality, amazon elb, web services, it management
    
Brocade

Keep Apps Running with Global Load Balancing

Published By: Brocade     Published Date: Nov 25, 2015
Improving traffic management can deliver big benefits, especially across a global infrastructure. Read this Brocade white paper to see how virtualizing traffic management helps you improve business continuity and transform the customer experience-without the cost and management overhead of additional hardware.
Tags : 
brocade, birtual, traffic manager, cloud, public cloud, san, data centers, it management
    
Brocade

Multi-Site and Campus-Area Wirelss LANs: Benefits of the Centralized Approached

Published By: Brocade     Published Date: Sep 07, 2010
This research study investigates industry best practices for mul-site and campus-area Wireless LANs (WLANs),based on a recent survey of 163 organizations.
Tags : 
wlan, wireless lan, wireless network performance, wireless network security, wlan security, higher education, healthcare, network performance, network performance management, network security, wireless infrastructure, wireless security
    
Brocade

Executive Briefing: Cloud and Security by ComputerWorld UK

Published By: Brocade     Published Date: Sep 07, 2010
There is a significant problem with cloud offerings, namely that they present new challenges to IT managers, both in general security within their own enterprises and in assessing the risk profiles inherent in each cloud offering they might source.
Tags : 
brocade, cloud computing, security, computerworld uk, internet security, security management
    
Brocade

Executive Briefing: IP Networking (ComputerWorld UK)

Published By: Brocade     Published Date: Sep 07, 2010
The emerging IP-centric Session Initiation Protocol (SIP) will be essential, allowing the creation of more sophisticated web-enabled communication and collaboration tools which benefit office, mobile and home workers.
Tags : 
brocade, ip networking, computerworld uk, ip-centric session initiation protocol, sip, ip networks, ip telephony, voice over ip
    
Brocade

Next-Gen LAN: Everything Except the Kitchen Sink

Published By: Brocade     Published Date: Sep 07, 2010
Tomorrow's local-area network will be the plumbing for everything business leaders want to do, from adding HC video to using FCoE to slash storage costs. So how we ensure our LANs are robust enough to handle the pressure?
Tags : 
brocade, lan, network computing, informationweek analytics, unified storage, data network, data center, hd videoconferencing, security, security management, video conferencing, voice recognition, voice over ip, cloud computing, data center design and management
    
Brocade

Wireless LANs in Higher Education

Published By: Brocade     Published Date: Sep 07, 2010
The trend toward more collaborative and open learning environments, fueled by the explosive adoption of mobile devices among students and faculty, makes higher-education campuses fertile ground for wireless LAN technology.
Tags : 
brocade, wireless lan, open learning, wlan, intrusion protection system, ips, internet security, intrusion detection, intrusion prevention, wireless hardware, wireless infrastructure, wireless security
    
Brocade

The Corporate Network of the Future: Convergence 2.0 (UK)

Published By: Brocade     Published Date: Sep 08, 2010
CIOs expect tomorrow's corporate networks to fulfill a wide range of sometimes-conflicting demands. But it won't happen overnight!
Tags : 
brocade, convergence 2.0, network operations, business performance, cloud, convergence, network performance, network performance management, application performance management, cloud computing
    
Brocade

Una protección para sus datos como la de los bancos para el dinero

Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Un nuevo modelo de seguridad que merece la pena entender y emular. Tradicionalmente, en materia de seguridad empresarial, se ha confiado en una estrategia tipo fuerte que blindaba los terminales de los usuarios y creaba muros en torno a la red. En la actualidad, esta estrategia no puede posibilitar ni proteger el uso de dispositivos móviles y funciones de SaaS, que se encuentran al otro lado del fuerte. En consecuencia, los directores de seguridad de la información (CISO, por sus siglas en inglés) se han dedicado a buscar nuevas soluciones capaces de proteger estas tecnologías actuales, así como de adaptarse a medida que cambian las necesidades empresariales y las amenazas.
Tags : 
    
CA Technologies EMEA

Un modelo de madurez de gestión de accesos con privilegios para la transformación

Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
En la actualidad, el software se encuentra en el núcleo de la metodología de las empresas para competir y funcionar de forma eficaz en el siglo XXI. Durante mucho tiempo, la tecnología ha desempeñado un papel decisivo en la estrategia empresarial. Sin embargo, la transformación digital ha ampliado las iniciativas de transformación y aceleración del ciclo de entrega de software, así como los procesos de desarrollo de aplicaciones, a un imperativo que se extiende por toda la empresa y se interseca cada vez más con la otra preocupación que acucia a los directivos: la ciberseguridad.
Tags : 
    
CA Technologies EMEA
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.