cio

Results 176 - 200 of 1383Sort Results By: Published Date | Title | Company Name

The New Role of the CIO

Published By: Workday APAC     Published Date: Apr 10, 2019
The role of today’s CIO is changing. Read “CIO of the Future” for an important discussion on the skills CIOs need to master to be able to lead in a world of rapidly changing demands.
Tags : 
    
Workday APAC

The CIO guide to cloud native applications - Own your Cloud Native Journey

Published By: Avanade DACH     Published Date: Jan 08, 2019
To compete in today’s world, business leaders are placing increased demands on IT. Unfortunately, many IT departments are not able to deliver future innovation with their current infrastructure, applications and processes. To meet these demands, IT must digitally transform the enterprise through the adoption of cloud native practices, allowing them to both optimize and transform their existing infrastructure and applications. Recent Avanade research supports this thinking, finding that 88% of senior IT decision-makers believe that IT modernization is crucial to addressing the emerging requirements of the digital business1 . On the upside, those surveyed also indicated that by modernizing their IT infrastructures they expect to deliver real business results, such as boosting annual revenue by 14%, while at the same time reducing business operating costs by 13%1 . For many, this sounds like a winning strategy but what does it mean to adopt cloud native approaches, and how does it impact
Tags : 
    
Avanade  DACH

Boost IT Visibility & Value with Service Catalog

Published By: ServiceNow     Published Date: Nov 05, 2012
Many CIOs are being pressured to demonstrate IT value. A service catalog can help you promote your services in a way the business can easily understand. It will become your service management foundation that can boost IT visibility and constantly demonstrate IT value to the business.
Tags : 
servicenow, it management, it visibility, it value, service catalog, data management, business technology
    
ServiceNow

The Modern CIO: Leading the Way

Published By: ServiceNow     Published Date: Nov 05, 2012
Top IT leaders and CIOs from around the globe gathered to discuss technology advances and increased business demands. This white paper discusses the method of selecting new technologies for today's needs, CIOs strategic role and more.
Tags : 
servicenow, cio, strategic management, technology, data management, business technology, data center
    
ServiceNow

Three IT Imperatives CIOs Use To Drive Change Throughout the Enterprise

Published By: ServiceNow     Published Date: Mar 11, 2013
In this white paper, you will find out how to: Consolidate to drive enterprise visibility and standardization Enable intuitive, approachable and business friendly IT Automate to accelerate IT responsiveness and innovation
Tags : 
it management, cio, operations, business, change management, collaboration, productivity, project management
    
ServiceNow

Guida a un approccio integrato delle sfide odierne dell'informatica

Published By: Oracle     Published Date: Nov 08, 2017
I progressi nel campo digitale rivoluzionano in profondità il nostro modo di lavorare, introducendo innovazioni nei nostri uffici praticamente ogni giorno. Queste tecnologie hanno alzato il livello delle aspettative, costringendo le aziende a operare con un'agilità senza precedenti. Questi cambiamenti sono grandi opportunità, ma purtroppo ci imbattiamo anche in nuovi ostacoli che possono intralciare la nostra marcia verso il successo, come la necessità di innovare rapidamente, di minimizzare i costi e di reagire prontamente alle pressioni della concorrenza.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle

You & IaaS. Adopt, disrupt and thrive

Published By: Oracle     Published Date: Nov 08, 2017
IT departments are under constant pressure to do more with less. Now, as well as keeping the lights on, they are expected to deliver projects that create real business value. As more businesses use digital technologies to disrupt their markets, this pressure is intensifying. Infrastructure as a service (IaaS) is evolving against this background. Initially, it caught CIOs’ attention because it helped them cut costs. Today, IaaS underpins organizations’ agility in the face of disruption and drives innovation-led growth.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle

Productividad en el lugar de trabajo

Published By: Dell EMEA     Published Date: Sep 09, 2019
En cuanto a durabilidad, nadie iguala a Dell. Nuestras máquinas no solo tienen las características de seguridad, las prestaciones y la capacidad de gestión que inspiran la confianza de los departamentos informáticos, sino que además están diseñadas para ciclos de vida largos, lo que reduce la generación de residuos y los costes del reciclaje. No es de extrañar que duren tanto. Ese es el pasado. ¿Pero qué pasa con las funciones innovadoras? El 2 en 1 Latitude 7400 utiliza el nuevo ExpressSign-in de Dell para detectar la presencia de los usuarios, activar el sistema en aproximadamente un segundo y realizar un escaneo de reconocimiento facial que permite iniciar sesión con Windows Hello. Los usuarios pueden simplemente sentarse en su escritorio y empezar a trabajar, sin tener que pulsar Control+Alt+Supr ni presionar el botón de encendido. De hecho, es el primer PC del mundo que usa un sensor de proximidad con Intel® Context Sensing Technology. Cuando los usuarios se aparten para hacer un
Tags : 
    
Dell EMEA

2013 Mobile Malware Report

Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking
    
Blue Coat Systems

Secure Web Gateway Buyers Guide

Published By: Blue Coat Systems     Published Date: Jun 26, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
secure web gateway, web-based threats, web, solution, technology, networking, security, business technology
    
Blue Coat Systems

Building a Web Security Architecture: Physical Appliance, Virtual Appliance, SaaS, or Hybrid - ESG

Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas, security, technology, data management
    
Blue Coat Systems

Mobile Security Challenge Emerges

Published By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, wireless
    
Blue Coat Systems

2013 Mobile Malware Report

Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss, anti spam, anti virus
    
Blue Coat Systems

Secure Web Gateway Buyers Guide

Published By: Blue Coat Systems     Published Date: Jul 18, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
gateway, web, security, application security, email security, internet security, security management, vulnerability management
    
Blue Coat Systems

Building a Web Security Architecture: Physical Appliance, Virtual Appliance, SaaS, or Hybrid - ESG

Published By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, appliance, virtual, physical, saas, hybrid, access control, application security
    
Blue Coat Systems

Ponemon Institute Research Report: The Post Breach Boom

Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : 
data, non-malicious, malicious, ponemon, solera network, application security, encryption, internet security
    
Blue Coat Systems

Key Drivers: Why CIOs Believe Empowered Users Set the Agenda for Enterprise Security

Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Several years ago, a transformation in IT began to take place; a transformation from an IT-centric view of technology to a business-centric view of technology that Forrester refers to as business technology (BT). This transformation has a profound impact on the role of the CIO. The CIO must now view himself or herself as a business enabler. He or she must focus on continuously aligning with business objectives, improving delivery capability to support business processes that bring new products and services to market more quickly, fostering innovation, and reducing costs through improved performance. In this custom Technology Adoption Profile (TAP), the data confirms this trend.
Tags : 
security, technology, business technology, cio, application security, email security, internet security, network security appliance
    
Blue Coat Systems

Top Words Used in Spear Phishing Attacks

Published By: FireEye     Published Date: Nov 27, 2012
Aided by their targets' porous defenses and unwitting end users, today's cybercriminals are able to deliver advanced malware that exploits systems and enables a range of malicious activities.
Tags : 
fireeye, spear phishing attacks, cybercriminals, malware, malicious activities, security, business technology
    
FireEye

Real-world Attack Case Study: Misuse of Keys and Certificates Bypass Critical Security Controls

Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi

CFO Research: Construindo Alta Performance nas Soluções de Finanças

Published By: SAP     Published Date: Nov 06, 2015
Este relatório sobre a pesquisa global com executivos financeiros examina como as finanças devem transformar processos e sistemas discretos em cadeias de valor em rede e plataforma de tecnologia comum e ainda automatizar intervenções manuais. Com o Ariba Network, a SAP proporciona visibilidade completa e em tempo real dos dados-chave e conecta finanças a suprimento, tesouraria e muito mais.
Tags : 
    
SAP

Pesquisa da CFO: A próxima etapa na criação da função de Finanças do Valor Adicionado

Published By: SAP     Published Date: Nov 06, 2015
Leia a pesquisa da CFO Research com executivos financeiros de grandes companhias e saiba como eles estão se adaptando ao ritmo acelerado das empresas, dos mercados e da tecnologia.
Tags : 
    
SAP

Informe de investigación de GRC - Managing Risk in an Age of Complexity

Published By: SAP     Published Date: Nov 16, 2015
Lea el plan de cinco puntos para darle a su negocio una ventaja competitiva con una eficacia y efectividad aumentadas dentro de GRC. Descargue el informe de investigación para saber más sobre el futuro de la estrategia de manejo de riesgo.
Tags : 
    
SAP

B2B eCommerce Technology OD Webcast

Published By: Oracle     Published Date: Dec 17, 2015
View this on demand webcast to learn how the head of eCommerce and CIO of Carolina Biological partnered together to successfully make the switch to digital eBusiness, increase customer loyalty, and reduce costs and time to market.
Tags : 
oracle, webinar, digital ebusiness, customer loyalty, b2b ecommerce, internet retailer, networking, data management
    
Oracle

Rethinking Security In Business Notebooks

Published By: HP Inc.     Published Date: Feb 03, 2016
An average of 30,000 new websites are identified as distributing malicious code to site visitors every day. According to a recent Spiceworks survey, IT professionals are relying mostly on software level security solutions. Download this whitepaper to learn how HP Elitebooks block and outsmart security threats.
Tags : 
    
HP Inc.

Global Computer Security Trends

Published By: HP Inc.     Published Date: Feb 03, 2016
IT decision-makers weigh in Securing computers and their data against cyber-attacks and malicious applications is imperative in today’s business environments. IT professionals know this. But which methods are they using to secure laptops and desktops, and just how effective are these methods? See what 650 IT decision-makers had to say.
Tags : 
    
HP Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.