cio

Results 426 - 450 of 1304Sort Results By: Published Date | Title | Company Name

EDUCACION-BYOD PARA UNIVERSIDADES

Published By: Extreme Networks     Published Date: Feb 14, 2017
Los dispositivos móviles han irrumpido en los campus y centros educativos. Esto abre la posibilidad a todo un mundo de nuevas formas de aprendizaje, pero también plantea numerosos retos para la red y sus gestores. Este documento ofrece una valiosa orientacion para abordar con éxito estos desafíos.
Tags : 
    
Extreme Networks

EDUCACION-IOT PARA CAMPUS UNIVERSITARIOS

Published By: Extreme Networks     Published Date: Feb 14, 2017
Cada vez hay más dispositivos y sistemas autónomos que utilizan la red compo infraestructura de comunicación. Este fenómeno, conocido como “Internet of Things” es hoy día omnipresente en cualquier entorno, desde edificios inteligentes a hospitales. Las universidades y centros educativos no son ajenos a este fenómeno. En este documento se analiza la problemática concreta que IoT plantea a este tipo de entornos y la forma de darle respuesta
Tags : 
    
Extreme Networks

Administración pública y nuevas tecnologías: desde la “smart city” a la gestión de IoT

Published By: Extreme Networks     Published Date: Feb 14, 2017
La tecnología es hoy día el mejor aliado de cualquier Administración Pública para acercarse al ciudadano. Muchos organismos públicos están desplegando tecnologías de “edificación inteligente” tanto para para ofrecer al ciudadano una amplia gama de servicios on-line en sus sedes como para gestionar de forma más eficiente sistemas y servicios dentro de los edificios públicos. En este documento se analizan los retos y estrategias más adecuadas para el despliegue de este tipo de tecnologías.
Tags : 
    
Extreme Networks

eBOOK - CÓMO CONVERTIR LA RED EN UN ACTIVO DE NEGOCIO ESTRATÉGICO CON EXTREMEANALYTICS

Published By: Extreme Networks     Published Date: Feb 14, 2017
En este documento, se describen casos de uso concretos de cómo una solución de análisis de red e inteligencia de negocio ayuda a gestionar eficientemente las operaciones de TI de cualquier organización, obteniendo un conocimiento exhaustivo y en profundidad de cómo se utilizan los recursos de red
Tags : 
    
Extreme Networks

GUIA DE EVALUACION SDN: CINCO PREGUNTAS QUE TODO FABRICANTE DE SDN DEBE RESPONDER

Published By: Extreme Networks     Published Date: Feb 14, 2017
Este documento le ayudará a decidir qué plataforma SDN de las que se ofrecen en el mercado se adapta mejor a las necesidades de su organización, y le facilita la tarea de adaptar sus sistemas de TI a los rápidos cambios tecnológicos.
Tags : 
    
Extreme Networks

Ten Best Practices for URL Filtering: Protect users from accessing malicious websites

Published By: McAfee     Published Date: Sep 15, 2014
URL filtering is a type of content filtering that allows or blocks users from accessing specific websites. The practice has become an essential one on enterprise networks, with the goal of blocking employees from accessing content that would be a detriment to their productivity or the company as a whole. Blocked sites may include those that threaten the security of the organization, have objectionable content, or are bandwidth-intensive enough to strain company resources.
Tags : 
best practices, url filtering, network security, blocked sites, security management
    
McAfee

Eight Situational Awareness Tools Your Network Is Not Safe Without

Published By: McAfee     Published Date: Sep 15, 2014
With networks sprawling to massive proportions and malicious activity hitting hard, fast, and constantly evolving, situational awareness is more vital than ever in keeping your network secure. Situational awareness refers to the continuous monitoring of your network by analyzing bulk data collected from sources across the board. In other words, it delivers a detailed overview of all areas of your network so you know exactly what’s going on through increased visibility and response capabilities.
Tags : 
best practices, network security, it security, security management, threat response, hacker detection
    
McAfee

Industry Experts Speak Out on Advanced Evasion Techniques: What's Next

Published By: McAfee     Published Date: Sep 15, 2014
Advanced evasion techniques, or AETs, are delivery mechanisms used to disguise advanced persistent threats (APTs) and permit them to slip through network security undetected. AETs work by splitting up malicious payloads into smaller pieces, disguising them, and delivering them simultaneously across multiple and rarely used protocols. Once inside, AETs reassemble to unleash malware and continue an APT attack.
Tags : 
hacker detection, advanced evasion techniques, network security, it security, security management
    
McAfee

Network Performance and Security

Published By: McAfee     Published Date: Jan 20, 2015
CIOs and CISOs can avoid risky tradeoffs by deploying next-generation firewalls that are built for both security and network performance.
Tags : 
next generation firewall, network performance, mcafee next generation firewall, ngfw, networking, firewalls, internet security
    
McAfee

CIO Study: Hybrid Cloud Requires a Transition from IT Service Builder to IT Service Broker

Published By: NetApp     Published Date: Feb 19, 2015
According to a worldwide survey of IT executives,their organizations are already deploying multiple cloud models, and they expect that more than half of their IT services will be delivered via the cloud three years from now.
Tags : 
    
NetApp

CIO Study: Hybrid Cloud Requires a Transition from IT Service Builder to IT Service Broker

Published By: NetApp     Published Date: Aug 14, 2015
Hybrid cloud requires a transition.
Tags : 
transition, cloud computing, applications, storage, data, storage management, infrastructure
    
NetApp

Your BT Agenda Demands A Hybrid Cloud Storage Strategy

Published By: NetApp     Published Date: Aug 14, 2015
How CIO's handle storage.
Tags : 
cloud, cloud computing, data, storage, strategy, storage management, productivity, infrastructure management
    
NetApp

5 Questions about loT You Were Too Embarrassed to Ask

Published By: Aditi     Published Date: Jun 11, 2015
Your mobile device is speaking to your garage door. Your alarm is telling your coffee maker you are up and it’s time to get that caffeine kick going. Your car is dropping your thermostat a message, telling it to keep the house warm before you step in. This isn’t a quote from an Issac Asimov novel, it’s the reality of how the Internet of Things is making a difference to our lives. Most of us are consciously making the shift to a connected world, while at home or at work. While this has caught the public imagination, enterprises are chasing to fulfil their Internet-of-Things-ambitions and transform their customer experience. In this e-book we aim to address the 5 fundamental questions that one should not hesitate to ask about your foray into the world of Internet of Things, while telling you how it can reshape your business.
Tags : 
aditi, rfids scada, c-suite, optimization, lot, hybrid cloud, it management
    
Aditi

Imperativo de IoT en Gobierno y Salud

Published By: SAP SME     Published Date: Nov 02, 2017
Ha llegado el momento de utilizar el internet de las cosas (IoT) de modo inteligente para impulsar la eficiencia y la efectividad en la prestación de servicios. Piense en semáforos conectados y datos recolectados de sensores para medir cosas tales como niveles de acústica, calidad del aire, temperatura y presión. Las agencias de gobierno y los socios de prestación de servicios pueden utilizar IoT para tomar mejores decisiones más rápido y satisfacer las necesidades públicas con mayor efectividad.
Tags : 
    
SAP SME

Imperativo de IoT para Productos de Consumo

Published By: SAP SME     Published Date: Nov 02, 2017
Las expectativas del consumidor estan cambiando y los modelos de negocio tambien deberían hacerlo. En la era del consumidor digital, IDC asegura que solo aquellas empresas que puedan interactuar con cada consumidor individualmente –para construir relaciones a largo plazo que sean personales y auténticas– sobrevivirán y prosperarán.
Tags : 
    
SAP SME

IoT está habilitando una nueva era de valor para los accionistas en las empresas de energía y recurs

Published By: SAP SME     Published Date: Nov 02, 2017
La tecnología actual de IoT puede impulsar aún ás la innovación en las empresas de ENR. La disponibilidad de tecnología rentable basada en la nube, las analíticas y el machine learning ahora les permite a las empresas de ENR hacer mucho más con internet de las cosas (IoT).
Tags : 
    
SAP SME

El Futuro de los Servicios Continua la Entrega de una Ventaja Competitiva

Published By: SAP SME     Published Date: Nov 02, 2017
Existen muchas oportunidades disponibles para las empresas de servicios – desde los seguros hasta el transporte, las telecomunicaciones y la construcción. Poder aprovechar esas oportunidades depende del fortalecimiento de los contactos entre su personal, sus activos, su infraestructura y, por supuesto, sus clientes.
Tags : 
    
SAP SME

Imperativo de IoT para los Fabricantes Discretos

Published By: SAP SME     Published Date: Nov 02, 2017
Para el año 2019, 75% de los grandes fabricantes actualizarán sus operaciones y modelos operativos con IoT y conocimiento de situación basado en analíticas para mitigar los riesgos y acelerar el tiempo de llegada al mercado*. La misión de su empresa es transformar lo que diseña, construye, vende y mantiene
Tags : 
    
SAP SME

Infografía SAP Leonardo

Published By: SAP SME     Published Date: Nov 02, 2017
Con SAP Leonardo Internet of Things (IoT) las organizaciones pueden aprovechar la Big Data, las analíticas y la tecnología en la nube para alcanzar el éxito.
Tags : 
    
SAP SME

A New World Order for IT

Published By: Okta     Published Date: Jul 19, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta

Advancing to Bot Management and Security Credential Stuffing Becomes Top Concern

Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies

Protecting Higher Education From Costly Data Breaches

Published By: Jamf     Published Date: Mar 29, 2018
With large quantities of student and faculty information on hand, complicated information systems and distributed environments spread across departments, higher education institutions are subject to breaches in the same fashion and with the same magnitude as large corporations. But fear not, we're here to help. This white paper provides you with the confidence and know-how to combat the threat of security breaches and avoid the associated costs on your budget and sanity. After reading, you'll be able to: • Identify common types of security breaches • Work with faculty and staff to better secure your environment • Prevent hacks and malicious software from reaching university systems
Tags : 
    
Jamf

The Truth About Cloud Security (Accounting)

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: How built-in data encryption keeps your data safe Why more security pros are concerned with user behavior than cloud tools What your firm should know to utilize the cloud with confidence
Tags : 
data security, accounting, cloud security, data encryption
    
Citrix ShareFile

The Truth About Cloud Security (Finance)

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in finance that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: How built-in data encryption keeps your data safe Why more security pros are concerned with user behavior than cloud tools What your firm should know to utilize the cloud with confidence
Tags : 
finance, data security, cloud software, data encryption, security
    
Citrix ShareFile
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.