cement

Results 326 - 350 of 514Sort Results By: Published Date | Title | Company Name

Can You Really Support Business Continuity Requirements?

Published By: VMTurbo     Published Date: Mar 25, 2015
Intelligent N+X Redundancy, Placement Affinities, & Future Proofing in the Virtualized Data Center Virtualization brought about the ability to simplify business continuity management in IT. Workload portability and data replication capabilities mean that physical infrastructure failures no longer need impact application services, and they can rapidly be recovered even in the event of complete site failure. However, Enterprises and Service Providers face new challenges ensuring they have enough compute capacity in their virtualized data centers to support their business continuity requirements, while at the same time not over provisioning infrastructure capacity resulting in unnecessary capital expenditure.
Tags : 
continuity requirements, vmturbo, virtualization, workload portability, data replication, it management, knowledge management, enterprise applications
    
VMTurbo

Assuring Application Performance at Scale

Published By: VMTurbo     Published Date: Jul 08, 2015
This paper explores the benefits of incorporating network traffic to topology information in VM placement decisions, as well as the integration between VMTrubo and Arista Networks.
Tags : 
application assurance, application quality, integration, application management, virtualization, mobility, storage virtualization, application delivery
    
VMTurbo

Adobe Stock for Enterprise: Efficiency Through Integration

Published By: Adobe     Published Date: Jan 26, 2017
Your week is full of deadlines. But in order to meet them, your team often loses hours to exhaustive search and file-sharing practices. Using that time for more creative concepting could make for bigger long-term gains. And Adobe has the tools to help. Adobe Creative Cloud Libraries allow your workgroups to collaborate and share projects across programs and computers—no matter their individual locations. And Adobe Stock seamlessly integrates images for direct placement into apps like Adobe Photoshop, Illustrator, and InDesign. Download Pfeiffer Consulting’s new Adobe Stock Benchmark Reports to learn more about the efficiency and productivity gains linked to using Adobe Stock.
Tags : 
adobe, adobe creative cloud, stock, creative, marketing, design
    
Adobe

Is Your Next Generation Firewall Plug and Play Ready?

Published By: Intel Security     Published Date: Jan 20, 2015
Companies of all sizes with multiple remote locations can benefit from plug-and-play next-generation firewalls. Traditional methods can take a long time to implement and can prove expensive. With plug-and-play deployments, on the other hand, you save money, conserve resources, reduce the likelihood of errors, and get single-pane-of-glass centralized management.
Tags : 
plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade
    
Intel Security

ThreatAnalyzer: Better Defend Your Network from Targeted Attacks

Published By: ThreatTrack Security     Published Date: May 21, 2015
Watch the Better Defend Your Network from Targeted Attacks webinar to learn about the broad array of enhancements and new capabilities that enable you to better defend your network from advanced malware threats.
Tags : 
targeted attacks, cyberattacks, malware threats, malware analysis sandbox, cybersecurity, security, it management, knowledge management
    
ThreatTrack Security

What Android for Work Means for the Enterprise

Published By: MobileIron     Published Date: Oct 21, 2016
The release of Android for Work, combined with the enterprise upgrades in Lollipop, delivers an outstanding opportunity for companies that have long waited to support Android devices as part of their BYOD mix. It also cements the need for a multi-OS EMM platform that is capable of delivering configurations across Android, iOS, and Windows devices. For organizations that want to take advantage of Android for Work, the first step will be to find an EMM provider with with a comprehensive platform and broad experience with multi-OS deployments to ensure their success. Download now to learn more!
Tags : 
    
MobileIron

Quantifying the Business Value of Nutanix Solutions

Published By: CDW     Published Date: Sep 21, 2015
Years of IT infrastructure advancements have helped to drive out vast amounts of costs within the datacenter. Technologies like server and storage virtualization, data deduplication, and flash-based storage systems (to name just a few) have contributed to improvements of utilization rates, performance, and resiliency for most organizations. Unfortunately, organizations still struggle with deeply rooted operational inefficiencies related to IT departments with silos of technology and expertise that lead to higher complexity, limited scalability, and suboptimal levels of agility. The recent tectonic shifts caused by the rise of 3rd Platform applications that focus on social, mobile, cloud, and big data environments have amplified the pains associated with these structural inefficiencies.
Tags : 
quantify, infrastructure, performance, resiliency, data deduplication, datacenter, virtualization, it management
    
CDW

Getting the Infrastructure Right for Surveillance Systems

Published By: HPE Intel     Published Date: Feb 19, 2016
The rising demands for capturing and managing video surveillance data are placing new pressures on state and local governments, law enforcement agencies, and education officials. The challenges go beyond the expanding costs of equipment, storage, software and management time. Officials must also lay the right foundation to scale their capabilities, improve performance and still remain flexible in a rapidly evolving ecosystem of surveillance tools. Find out what state, local government and education IT leaders need to know, and what steps you can take to: • Improve performance and ROI on cameras-per-server for the dollars invested • Optimize and simplify the management of daily surveillance processing, including the integration of facial recognition, redaction and analysis software • Fortify reliability and dependability to reduce the risk of surveillance data retrieval failures.
Tags : 
    
HPE Intel

Guide to Antivirus (AV) Replacement: What You Need to Know Before Replacing Your Current AV Solution

Published By: CrowdStrike     Published Date: Nov 28, 2018
The Guide to AV Replacement provides in-depth information from leading security experts that will guide you through each phase of your decision-making process. From the critical elements you need to consider, to how to evaluate and review solutions, you’ll get expert advice that can help you choose a security solution that best fits your organization’s requirements. Before initiating a change from your current AV solution read this guide to learn: • How to plan an AV replacement project and the critical elements to consider • How to measure important factors such as protection, performance and time-to-value when reviewing AV replacement solutions • What prevalent technologies are available and what are the pros and cons of each? • How to measure the efficacy of a solution and what steps you should take to ensure you’re getting accurate results • Why you should consider evaluating CrowdStrike Falcon’s next-gen AV replacement and how it fulfills the criteria outlined in the guide
Tags : 
    
CrowdStrike

An IT Professional’s Guide to Display Technology

Published By: Epson     Published Date: Dec 18, 2017
When it comes to display technology today, businesses tend to invest in flat panel TVs without much thought. But visual communication is an important element essential for success. When a new product is unveiled to a room of editors, when engineers analyze a circuit board, or when a teacher attempts to bring a classroom subject to life, visuals are as powerful as the spoken word, if not more. This paper offers insight on the state of visual display to ensure you make the right decision on your next investment, whether it’s a replacement, revamp, or remodel. Learn how to use and maintain visual display technology to make the greatest positive impact on your organization with the highest return of investment.
Tags : 
display technology, visual communication, virtual display, projectors
    
Epson

Strategies to Defend the Digital Healthcare Enterprise Against Patient Data Breaches 

Published By: Thales     Published Date: Jul 13, 2017
Watch expert Nancy Spizzo for an informative recorded webinar, where she'll use real-world examples to highlight best practices and dispel myths about patient data protection. Spizzo will also discuss current trends in healthcare data security and HIPAA enforcement.
Tags : 
thales, data protection, health records, data security, hippa, hacker detection, intrusion prevention, best practices
    
Thales

Oracle Enters the High-Growth All-Flash Array Market with an Oracle-Optimized Solution

Published By: Oracle     Published Date: Aug 19, 2016
This white paper summarizes Oracle's announcement of the new All Flash FS.
Tags : 
    
Oracle

Managing Millennials: Engaging with the Newest Generation of Workers

Published By: Skillsoft     Published Date: Mar 03, 2015
This ExecBlueprint describes effective approaches for recruiting and retaining this generation that has been alternatively described as entitled and creative. First, you may need to address conflicts with older workers if they resent millennials’ demands for flexible work arrangements, career advancement, and open relationships with leadership.
Tags : 
managing millennials, recruiting, retaining, millennial practices, development programs, benchmarking, mentoring programs
    
Skillsoft

Why You Need a Better Way to Manage Email Attachments

Published By: NetShelter - YouSendIt     Published Date: Dec 14, 2011
Read this white paper to learn why implementing a secure email attachment management solution can help you enhance security and productivity.
Tags : 
email attachments, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage
    
NetShelter - YouSendIt

The Definitive Guide to Logon Script Replacement

Published By: Dell Software     Published Date: Jul 18, 2012
Paper: Replacing Logon Scripts
Tags : 
technology, script replacement, logon, networking, client-server, processor, white paper, business technology
    
Dell Software

Provide your customers with latest advancements in online security to increase potential

Published By: VeriSign Incorp.     Published Date: Jul 13, 2009
Online visitors are becoming ever so wary about transacting online.  One way to reassure them about transacting on your site is to make sure you have the latest in SSL on your site.  Read this guide to learn about the latest in SSL. Learn more today!
Tags : 
verisign, trust, seal, trust mark, ssl, extended validation (ev) ssl
    
VeriSign Incorp.

Security-as-a-Service: Threat Mitigation from the Cloud

Published By: Mimecast     Published Date: May 11, 2009
Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.
Tags : 
mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive
    
Mimecast

Network and Endpoint Data Leak Prevention: Comprehensive Protection Using a Best-of-Breed Approach

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak
    
Trend Micro, Inc.

9 Social Insights that Drive Real Business Results

Published By: Bazaarvoice     Published Date: Nov 05, 2014
Thanks to social, consumers are more vocal than ever and their opinions are influencing the purchase decisions of consumers all across the web. Learn how to turn social data into strategic business advantage with nine guiding insights to improve your bottom line today.
Tags : 
bazaarvoice, business results, business insights, social segmentation, product innovation, consumer research, product enhancements, product performance
    
Bazaarvoice

Keeping Your Laptop Users Up & Running - a How To Guide

Published By: Datacastle     Published Date: Jul 09, 2010
How to address business continuity, information security, policy enforcement, and regulatory compliance challenges for your laptop users.
Tags : 
datacastle, business resiliency planning, mobile workforce, business continuity, information security, policy enforcement, regulatory compliance, backup and data protection
    
Datacastle

The Brand Marketer's Guide to In-Image Advertising

Published By: GumGum     Published Date: Aug 14, 2013
Download this white paper for a basic overview of in-image advertising and how the agency community can use it to reach their objectives.
Tags : 
in-image advertising, display advertising, brand marketing, contextual placement, contextual targeting
    
GumGum

What Is Your Most Effective Source of Hire?

Published By: Jobvite     Published Date: May 15, 2013
Can you directly link your recruiting sources to successful employee performance? Don’t worry. Only 22% of organizations claim to have mastered this skill, according to a recent Analyst Insight report from Aberdeen Group. Download your report now.
Tags : 
new hires, jobvite, recruiting, job placement, job recruiting, new staff, staffing, hire management
    
Jobvite

Simplify Your Migration to the Public Services Network (PSN)

Published By: AlienVault     Published Date: Oct 21, 2014
The Public Services Network (PSN) is a programme intended to improve communication services across the UK government by reducing the cost and complexity of digital communication across the public sector. The PSN will create one logical network, based on industry standards, thus improving performance and security. The PSN is a replacement to the GSi (Government Secured Intranet), and all Public Sector agencies must migrate to the PSN by 31 October 2014. AlienVault’s Unified Security Management (USM) platform can provide you with the single solution you need to address many of the network- and security-related questions required to complete your PSN IA documentation.
Tags : 
communication, government, reducing cost, digital, network, public sector, logical, industry
    
AlienVault

5 Ways Dropbox for Business Keeps Your Data Protected

Published By: Dropbox for Business     Published Date: Jun 09, 2014
Protecting your data isn’t a feature on a checklist, something to be tacked on as an afterthought. Security is at the heart of Dropbox for Business, informing not only how we approach new features and enhancements, but also how we’ve designed the product itself. Download here to find out how we’ve built Dropbox for Business to keep data safe for all our users.
Tags : 
dropbox, business, data, protect, security, data management, data center
    
Dropbox for Business

Developing a Cap-and-Grow Strategy, and 14 Best Practices for Lync Deployment

Published By: Polycom     Published Date: Sep 24, 2014
There are many ways to take advantage of the rich set of collaboration tools provided with Microsoft Lync. IT leaders should consider a cap-and-grow strategy where investment dollars in legacy systems are capped and the financial and IT resources are reallocated to grow Lync. Once the company has a cap-and-grow Lync strategy, IT leaders should consider retirement of legacy infrastructure and how Lync can be leveraged as a replacement technology. Forward-looking IT leaders will consider Lync a strategic UC platform upon which to build a companywide collaboration strategy, rather than just a replacement for a legacy phone system. Get this report to read best practices for a Lync deployment.
Tags : 
grow, strategy, cap, best practices, lync, deployment, advantage, rich
    
Polycom
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.