cement

Results 251 - 275 of 534Sort Results By: Published Date | Title | Company Name

Integrated Network Security Architecture: Threat-Focused Next-Generation Firewall

Published By: Cisco     Published Date: Jan 15, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, security, it management
    
Cisco

Integrated Network Security Architecture: Threat-focused Next-generation Firewall

Published By: Cisco     Published Date: Feb 13, 2015
The Enterprise Strategy Group (ESG) characterizes traditional security tactics as a "messy independent array of independent technologies." A decade ago, this could suffice, but it's no match for today's requirements. Read how an integrated, threat-focused approach can help.
Tags : 
network security, enterprise organizations, security threats, security architecture, central command, central control, firewall, distributed enforcement, integrated actionable intelligence, networking, security
    
Cisco

Intelligent Preservation - A New Strategy to Proactively Lower Litigation Costs While Protecting You

Published By: CompareBusinessProducts.com     Published Date: Jul 11, 2013
The costs of e-discovery are mind-blowing. Despite the technologists who announce advancements in storage, search and retrieval software to help drive down the unit costs, the frequency and sheer volume of e-discovery pushes costs in the opposite direction. With the ever burgeoning amount of data that is being created and retained each and every day, despite our best efforts to “govern” its retention, these costs seem destined to only escalate and further cut into corporate profits.
Tags : 
legal, litigation, preservation, strategy, technology, e-discovery, cost effectiveness
    
CompareBusinessProducts.com

Intel® Vision Products Help Advantech Address Major Retail Dilemmas

Published By: Intel     Published Date: Dec 13, 2018
Technology plays a key role in online shopping, where online retailers gain a greater understanding of their customers through data from their browsing and purchasing habits. Today, when consumers shop in brick-and-mortar stores, they expect the same personalized and responsive service. To help retailers achieve this level of service, a combination of hardware and software—Intel® Vision Accelerator Design products, cameras, AI deep learning video analysis technology— do the work for you. Uncover how Advantech system uses the Intel Vision Accelerator Design with Intel Movidius VPU to drive • Overall store performance such as the number of visitors and transactions, point-of-sale data, sales per shopper and the store’s ranking, and can distinguish traffic patterns by weather and time of day • Traffic and sales analysis for better staff allocation and marketing-event planning • Store heatmap analysis for more precise merchandise placement and product promotion
Tags : 
    
Intel

Intent-Based Networking in the limelight with Cisco's Launch of Catalyst 9000 Series Ethernet Switch

Published By: Cisco EMEA     Published Date: Nov 13, 2017
Cisco has recently unveiled its new intent-based networking strategy, called "The Network. Intuitive." The goal of intent-based networking is to allow greater levels of automation, security integration, and centralized manageability within a software subscription orientation. Intent-based networking is underpinned by Software-Defined Access (SDA), Cisco's automation engine built upon the company's Digital Network Architecture (DNA), which automates network segmentation, policy enforcement, and troubleshooting. Other core components of the announcement include a refresh of Cisco Catalyst switches, a new licensing model for infrastructure, and an all-in-one management console called DNA Center.
Tags : 
centralized operations, management, intelligent systems, multi vendor support, cloud, cisco
    
Cisco EMEA

IPMI Vulnerabilities: Don’t Panic, but Do Take Action : A CDW Blog

Published By: CDW     Published Date: Jul 11, 2013
In the context of these current vulnerability announcements, there is definite cause for concern: vulnerable systems are widespread, they can be exploited remotely, and the exploitation itself seems relatively simple. This means that we likely have only a short window of time before attacks become widespread.
Tags : 
cdw, cdw blog, ipmi, business intelligence, it management
    
CDW

Is It Time to Purchase a New ERP?

Published By: Epicor     Published Date: Jul 05, 2012
An ERP implementation is not easy, Just like surgery, there will be some "recovery" time. But that doesn't mean your business stops during that recovery period.
Tags : 
erp, erp replacement, business technology
    
Epicor

Is Outdated Software Preventing Retail Business Growth?

Published By: Epicor     Published Date: Aug 30, 2018
Does your current software give your lawn and garden business the visibility and flexibility you need to be responsive and competitive, or is outdated software negatively impacting business growth and excellent service? The retail world is becoming more complex. eCommerce has grown in the U.S.—from $42 billion to $236 billion in the last decade*—and lifestyle shopping is raising customer expectations. Having the right retail management software solution—one that can keep up with your business needs and the increasing pace of technology—is critical. Given the recent advancements in technology—and higher customer expectations—perhaps it’s time to ask if your retail management software is up to the task of nurturing and managing your growth over the coming decade. Epicor has been a part of successful lawn and garden retail businesses for years. Here are some risks you may face from using outdated software: 1. Excessive labor costs and hiring gaps 2. Operational inefficiencies 3. Insuff
Tags : 
retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas, advantages of retail store software, lawn and garden pos, nursery retail software, garden center retail software, garden retailers pos, garden retail software
    
Epicor

Is Outdated Software Preventing Retail Business Growth?

Published By: Epicor     Published Date: Aug 30, 2018
Does your current software give your business the visibility and flexibility you need to be responsive and competitive, or is outdated software negatively impacting business growth and excellent service? The retail world is becoming more complex. eCommerce has grown in the U.S.—from $42 billion to $236 billion in the last decade*—and lifestyle shopping is raising customer expectations. Having the right retail management software solution—one that can keep up with your business needs and the increasing pace of technology—is critical. Given the recent advancements in technology—and higher customer expectations—perhaps it’s time to ask if your retail management software is up to the task of nurturing and managing your growth over the coming decade. Epicor has been a part of successful retail businesses for years. Here are some risks you may face from using outdated software: 1. Excessive labor costs and hiring gaps 2. Operational inefficiencies 3. Insufficient data and insights 4. Dimi
Tags : 
retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas, advantages of retail store software
    
Epicor

Is Outdated Software Preventing Retail Business Growth?

Published By: Epicor     Published Date: Sep 20, 2018
Does your current software give your business the visibility and flexibility you need to be responsive and competitive, or is outdated software negatively impacting business growth and excellent service? The retail world is becoming more complex. eCommerce has grown in the U.S.—from $42 billion to $236 billion in the last decade*—and lifestyle shopping is raising customer expectations. Having the right retail management software solution—one that can keep up with your business needs and the increasing pace of technology—is critical. Given the recent advancements in technology—and higher customer expectations—perhaps it’s time to ask if your retail management software is up to the task of nurturing and managing your growth over the coming decade. Epicor has been a part of successful retail businesses for years. Here are some risks you may face from using outdated software: 1. Excessive labor costs and hiring gaps 2. Operational inefficiencies 3. Insufficient data and insights 4. Dimi
Tags : 
retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas, advantages of retail store software
    
Epicor

Is Outdated Software Preventing Retail Business Growth?

Published By: Epicor     Published Date: Sep 20, 2018
Does your current software give your business the visibility and flexibility you need to be responsive and competitive, or is outdated software negatively impacting business growth and excellent service? The retail world is becoming more complex. eCommerce has grown in the U.S.—from $42 billion to $236 billion in the last decade*—and lifestyle shopping is raising customer expectations. Having the right retail management software solution—one that can keep up with your business needs and the increasing pace of technology—is critical. Given the recent advancements in technology—and higher customer expectations—perhaps it’s time to ask if your retail management software is up to the task of nurturing and managing your growth over the coming decade. Epicor has been a part of successful retail businesses for years. Here are some risks you may face from using outdated software: 1. Excessive labor costs and hiring gaps 2. Operational inefficiencies 3. Insufficient data and insights 4. Dimi
Tags : 
retail store software, retail sales software, retail saas, business retail software, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas
    
Epicor

Is Outdated Software Preventing Retail Business Growth?

Published By: Epicor     Published Date: Sep 21, 2018
Does your current software give your business the visibility and flexibility you need to be responsive and competitive, or is outdated software negatively impacting business growth and excellent service? The retail world is becoming more complex. eCommerce has grown in the U.S.—from $42 billion to $236 billion in the last decade*—and lifestyle shopping is raising customer expectations. Having the right retail management software solution—one that can keep up with your business needs and the increasing pace of technology—is critical. Given the recent advancements in technology—and higher customer expectations—perhaps it’s time to ask if your retail management software is up to the task of nurturing and managing your growth over the coming decade. Epicor has been a part of successful retail businesses for years. Here are some risks you may face from using outdated software: 1. Excessive labor costs and hiring gaps 2. Operational inefficiencies 3. Insufficient data and insights 4. Dimi
Tags : 
retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas, advantages of retail store software
    
Epicor

Is Your Next Generation Firewall Plug and Play Ready?

Published By: McAfee     Published Date: Jan 20, 2015
When done right, a next generation firewall with plug-and-play capabilities can typically be up and running within a few minutes. Find out how you can quickly deploy hundreds of firewalls remotely with the latest NGFW.
Tags : 
plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade, networking, firewalls
    
McAfee

Is Your Next Generation Firewall Plug and Play Ready?

Published By: Intel Security     Published Date: Jan 20, 2015
Companies of all sizes with multiple remote locations can benefit from plug-and-play next-generation firewalls. Traditional methods can take a long time to implement and can prove expensive. With plug-and-play deployments, on the other hand, you save money, conserve resources, reduce the likelihood of errors, and get single-pane-of-glass centralized management.
Tags : 
plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade, security
    
Intel Security

IT'S ALL ABOUT SECURITY: THINGS TO KNOW BEFORE YOU OPEN THE DOORS TO SMARTPHONES

Published By: SAP     Published Date: Jun 30, 2011
This white paper will outline possible mobile device security threats and review how IT can effectively manage and secure a fleet of devices, whether they are personally owned or corporate owned. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to effectively protect end users, their devices, and the network infrastructure from attack, harm, or lost data.
Tags : 
sap, security, smartphones, tablets, productivity, mobility, security configuration, security enforcement, secure apps, mobile management, application security, patch management, wireless application software, wireless security, data protection
    
SAP

It's Time to Rethink Data Security

Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint

JobPad helped B2B resources cut costs by 90% while offering outplacement to all displaced workers

Published By: JobPad inc     Published Date: May 01, 2012
How B2B resources ,a college book seller, offered JobPad outplacement to all laid-off workers within a tight severance budget.
Tags : 
    
JobPad inc

Journey to the Hybrid Cloud

Published By: VMware     Published Date: Jul 01, 2016
Cloud computing adoption continues to expand as the overall benefits of cloud (cost efficiency, self-service, and IT standardization) are becoming more broadly recognized. While private cloud is the primary type of cloud infrastructure that is in use today, organizations are finding that cloud can no longer be a standalone IT sourcing and consumption model. Enterprises demand greater flexibility and scalability, leading them to invest in hybrid cloud models, which supply them with a seamless application, data, and management environment across all of their IT resources. IDC expects that the percentage of users who adopt private or public cloud models will diminish over the next several years, as enterprises increasingly choose to implement a hybrid cloud model.
Tags : 
vmware data center, vcloud air, vsphere, hybrid cloud, public cloud, private cloud, disaster recovery, data center extension, data center replacement, date center modernization, virtual private cloud
    
VMware

Keep Software Fixes On Course with Elementool Bug Tracking

Published By: Elementool Inc.     Published Date: Jan 28, 2008
Here’s a test: Can you list all the issues your software team is working on now? Can you sort them by severity, priority, features affected, and other criteria such as whether the issue is a bug, customer request, or product enhancement? Can you show the histories of all related comments and actions? Can you distribute this information easily to concerned individuals — showing only the information relevant to them?
Tags : 
bug tracking, project management, software development, effective management process, defect tracking, software testing, quality assurance, quality control, elementool
    
Elementool Inc.

Keeping Your Laptop Users Up & Running - a How To Guide

Published By: Datacastle     Published Date: Jul 09, 2010
How to address business continuity, information security, policy enforcement, and regulatory compliance challenges for your laptop users.
Tags : 
datacastle, business resiliency planning, mobile workforce, business continuity, information security, policy enforcement, regulatory compliance, backup and data protection, regulatory compliance, backup and recovery, compliance, mobile workers
    
Datacastle

Knowledge Management for Strategic Decisions with IBM Watson in Aerospace and Defense

Published By: IBM     Published Date: Dec 05, 2016
IBM Watson enables a global Aerospace and Defense company to use cognitive technologies to assess its portfolio enhancements, assess its offering competitiveness, and evaluate its supply and sales opportunities. Democratizing knowledge is key for success. Especially in an environment of constant change within corporate transformations, employees lose access to key information in order to support the company's operational stability during these changes. Watson takes over the role of a human expert to support a fast and fact-based steering of the company.
Tags : 
ibm, watson, leadership, knowledge management, aerospace, defense, enterprise applications, business technology
    
IBM

La sécurité évolue pour accompagner le travail moderne

Published By: Dell EMC EMEA     Published Date: Feb 28, 2019
Pour suivre l’essor de la mobilité professionnelle sans devenir victime des risques potentiels qui en découlent, le département IT doit être en mesure de résoudre efficacement des problèmes complexes, allant du provisionnement des services à l’achat des périphériques en passant par la supervision de la sécurité. Pourquoi ? Les professionnels de l’information ont besoin d’un accès aux informations sensibles sur un large éventail d’applications métiers et d’appareils, où qu’ils soient. En d’autres termes, des politiques de sécurité et de confidentialité qui n’entravent pas la productivité des utilisateurs leur permettront d’optimiser leurs performances. Téléchargez ce livre blanc pour en savoir plus sur les solutions Dell optimisées par Intel®.
Tags : 
    
Dell EMC EMEA

LA SICUREZZA IT NON È SEMPLICEMENTE PIÙ IMPORTANTE CHE MAI È L’UNICA COSA CHE CONTA.

Published By: Lenovo UK     Published Date: Sep 10, 2019
Sai identificare le tue aree più a rischio? Competere sul mercato e attuare la trasformazione digitale dell'azienda comporta la gestione di nuove minacce. Con ThinkShield di Lenovo hai una soluzione completa e realmente personalizzabile che protegge il tuo business a 360°. Servono in media 23 giorni per riemergere da un attacco ransomware1, scopri perché una soluzione di sicurezza IT è la risposta a questo problema. Scarica la guida alle soluzioni > 1 IBM: 2017 Global CODB Report Final (
Tags : 
    
Lenovo UK

LAN Security: Identity-Based Solution Guide

Published By: Nevis Networks     Published Date: Sep 04, 2007
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Tags : 
lan, lan security, network security, security policies, security policy, policy management, best practices, nevis, nevis networks, dos, infrastructure, dmz, access control, precision prospects, local area networking, identity management, policy based management, security management
    
Nevis Networks
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.