erp strategies

Results 1 - 25 of 153Sort Results By: Published Date | Title | Company Name

IDC MarketScape: Worldwide All Flash Array 2017 Vendor Assessment

Published By: NetApp APAC     Published Date: Jul 04, 2019
This IDC study provides an evaluation of 10 vendors that sell all-flash arrays (AFAs) for dense mixed enterprise workload consolidation that includes at least some mission-critical applications. "All-flash arrays are dominating primary storage spend in the enterprise, driving over 80% of that revenue in 2017," said Eric Burgener, research director, Storage. "Today's leading AFAs offer all the performance, capacity scalability, enterprise-class functionality, and datacenter integration capabilities needed to support dense mixed enterprise workload consolidation. More and more IT shops are recognizing this and committing to 'all flash for primary storage' strategies."
Tags : 
    
NetApp APAC

Enterprise data warehouse optimization

Published By: Group M_IBM Q3'19     Published Date: Jun 27, 2019
The enterprise data warehouse (EDW) has been at the cornerstone of enterprise data strategies for over 20 years. EDW systems have traditionally been built on relatively costly hardware infrastructures. But ever-growing data volume and increasingly complex processing have raised the cost of EDW software and hardware licenses while impacting the performance needed for analytic insights. Organizations can now use EDW offloading and optimization techniques to reduce costs of storing, processing and analyzing large volumes of data.
Tags : 
    
Group M_IBM Q3'19

Agile Integration for Today’s Cloud-Enabled Enterprise

Published By: Red Hat     Published Date: Sep 09, 2018
As enterprises work to balance IT innovation with efficiency—and increasingly adopt cloud-first strategies—agility is key. In this IDC InfoBrief, sponsored by Red Hat, learn 4 key capabilities supporting cloud adoption and agile integration approaches that offer faster, more flexible workflows.
Tags : 
    
Red Hat

Accelerating Enterprise Insights: 2013 IOUG In-Memory Strategies Survey

Published By: SAP     Published Date: May 18, 2014
Download this whitepaper to learn the results of this latest exploration of the emerging world of in-memory database technologies.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
    
SAP

Application Development In The Age of Business Automation: Fast, Flexible and Flowing

Published By: Red Hat     Published Date: Aug 22, 2018
In the emerging digital enterprise, there’s a good chance some application development will be taking place outside the information technology department. It’s not that the role of IT is in any way being diminished – in fact, IT managers are getting busier than ever, overseeing the technology strategies of their enterprises. Rather, the pieces are in place for business users to build and configure the essential business applications they need, on a self-service basis, with minimal or no involvement of their IT departments. As the world moves deeper into an era of ongoing disruption from digital players – be they startups, or teams within established enterprises – technology has become an essential part of every job, from the boardroom to the boiler room. Accordingly, the discipline of IT is no longer confined to the data center or development shop. Many business managers and professionals are building, launching or downloading their own applications to achieve productivity and respond
Tags : 
    
Red Hat

What Every CFO Needs to Know About Managing Services-Based Business Models

Published By: Financial Force     Published Date: Dec 01, 2017
Traditional business models are getting shattered by subscriptions. No one can doubt the new services economy is flourishing. The cloud, mobile, digital, connected devices, globalization - all these things have had a hand in reshaping business and powering new business models. Companies today are wrapping service-based business models and while this shift adds new complexities for finance and has major revenue recognition implications, it also gives finance leaders huge opportunities to become bigger value creators for their business and make a stronger impact on enterprise-wide strategies - not financials.
Tags : 
    
Financial Force

old asset

Published By: Oracle     Published Date: Jun 20, 2016
Research conducted by The Economist Intelligence Unit (EIU), sponsored by Oracle, provides answers. The results show that a proactive security strategy backed by a fully engaged C-suite and board of directors reduced the growth of cyber-attacks and breaches by 53% over comparable firms. These findings were compiled from responses by 300 firms, across multiple industries, against a range of attack modes and over a two-year period from February 2014 to January 2016. The lessons are clear. As cyber-attackers elevate their game, the response must be an enterprise solution. Only C-suites and boards of directors marshal the authority and resources to support a truly enterprise-wide approach. In sum, proactive cyber-security strategies, supported by senior management, can cut vulnerability to cyber-attack in half.
Tags : 
security, c-suite, data, cyber risk, enterprise, management, economist, intelligence unit
    
Oracle

Magic Quadrant for Intelligent Business Process Management Suites

Published By: Pega     Published Date: May 25, 2016
Adapting to changing market dynamics is not easy for any enterprise-class organization. To stay competitive, companies not only must adapt different go to market and customer service strategies but also embrace internal business process and workflow changes, which in many cases can be more difficult. Enter Intelligent Business Process Management Suites (iBPMS). According to Gartner, iBPMS compress the observation-to-action-to-outcome cycle, and help business transformation leaders, business process directors and solution architects establish a fluid capability to handle big change. Gartner evaluated 15 iBPMS vendors including Pegasystems. Download this Gartner Magic Quadrant analysis and gain a better understanding evolving iBPMS market and the solutions offered by each iBPMS vendor.
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, solutions, enterprise management
    
Pega

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware

5 Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware     Published Date: Feb 24, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: Seamless, secure end-user access to applications and files Easy-to-use enterprise app store Management security Fully integrated infrastructure stack Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware

Strategic Choices in SAP S/4HANA Deployment

Published By: SAP     Published Date: Nov 16, 2017
SAP S/4HANA is the next generation of SAP ERP. Taking full advantage of the SAP HANA in-memory platform, SAP S/4HANA promises to bring big innovations and benefits to enterprises. But when it comes to deployment, what are the strategies available?
Tags : 
    
SAP

A Ciso Guide to Multi-cloud Security

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
If your organization is one of the 95% of enterprises that operate in the cloud, you are already grappling with cloud security. And if your organization is one of the 85% of companies that use multiple Infrastructureas-a-Service (IaaS) and Software-as-a-Service (SaaS) clouds, you have additional issues to consider. Compared to the days when organizations managed everything on-premises or only had a handful of cloud deployments, this new multi-cloud world exacerbates the expansion of the attack surface and makes threat containment and accountability more difficult. Further, pressure on security teams to protect everything in the multi-cloud environment is leading to reactive and expensive threat management. If you are a security leader tasked with meeting the challenges of a multi-cloud environment, eventually you’ll find that siloed cloud security strategies fall short of the mark. But don’t wait. Now is the time to consider a holistic security approach that reclaims control from dispa
Tags : 
    
Fortinet EMEA

Sept conseils pour créer une entreprise imbattable

Published By: CA Technologies     Published Date: Nov 07, 2014
Guide pratique à l’attention des responsables métier et IT sur les actions à entreprendre dès MAINTENANT pour gérer la mobilité future de l’entreprise.
Tags : 
enterprise mobility, delivering a mobile strategy, flexible and secure infrastructures, byod, adopting mobility strategies, mobile computing, mobile data systems, mobile workers
    
CA Technologies

Frost & Sullivan Report – Credential Stuffing Becomes Top Concern

Published By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
web analytics, frost & sullivan, bot management, botnet
    
Akamai Technologies

Enabling the Modern Business through IT

Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Jun 10, 2015
Download this white paper on how cloud ERP can help IT meet rapidly evolving business needs. Discover the core characteristics of the modern enterprise, and the new ERP strategies adopted by rapidly growing enterprises like Williams-Sonoma and Knowledge Universe to support their growth.
Tags : 
business management software, cloud erp, erp, business software, accounting software, business accounting software, cloud financials, small business software
    
Netsuite DWASF Leads Display Q1 2015

Workload Awareness is Vital for Effective Enterprise Hybrid Cloud Strategies

Published By: Dell EMC     Published Date: Nov 02, 2015
Learn about Workload Awareness findings documented in a recent worldwide IDC survey of 683 enterprise IT decision makers.
Tags : 
emc, enterprise, hybrid, cloud, strategy, networking, security, it management
    
Dell EMC

Straight Talk 7 Consideration to Future-proof Your Load Balancing Strategy

Published By: Avi Networks     Published Date: Mar 06, 2019
Software-defined architectures have transformed enterprises to become more application-centric. With application owners seeking public-cloud-like simplicity and flexibility in their own data centers, IT teams are under pressure to reduce wait times to provision applications. Legacy load balancing solutions force network architects and administrators to purchase new hardware, manually configure virtual services, and inefficiently overprovision these appliances. Simultaneously, new infrastructure choices are also enabling IT teams to re-architect applications into autonomous microservices from monolithic or n-tier constructs. These transformations are forcing organizations to rethink load balancing strategies and application delivery controllers (ADCs) in their infrastructure.
Tags : 
    
Avi Networks

An Enterprise Architect’s Guide to API Integration for ESB and SOA

Published By: CA Technologies     Published Date: Aug 22, 2017
While some are still adjusting to the idea, you’re well aware that we’re living in an application economy. For the uninformed, an application economy is where everything is driven by a connected, mobile, application-based world where your customers are far more likely to experience your brand and interact with your enterprise through a software application than a live person. But, beyond the benefits, each day you’re feeling the pressure it exerts on your budget, resources and network. You’ve seen this wave swell on the horizon, and now it’s arrived: executives are enthusiastic and asking about strategies, and line-of-business leaders are requesting faster dev times and more complex projects. Staking out your place as a leader in this new landscape will require you to develop and deliver high-impact applications faster than ever before.
Tags : 
    
CA Technologies

Game Changing Cyber Defense Strategies

Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
    
Fidelis Cybersecurity

Securing the Enterprise 5 Pragmatic Steps to Security

Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Finding a strategic partnership with a trusted security expert that can assist you in all the aspects of information security is vital. SecureWorks is a market leader in security that can close the security gap in organisations by evaluating security maturity across an enterprise, help define security strategies and implement and manage security program plans. We are a true strategic partner that can help a CISO embed security at all levels of the organisation.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017

devops-practitioner-series_waste not want not

Published By: CA Technologies     Published Date: Jun 09, 2015
To support digital transformation imperatives, organizations are increasingly exploring DevOps style approaches for the continuous delivery of high quality software. Unfortunately, however, many enterprises remain burdened with accumulated technical debt and legacy wasteful practices – waste that can quickly inhibit the flow of value to customers and the business. Lean thinking provides organizations with a framework by which to quickly identify all forms of waste impacting the flow of value, which DevOps practitioners can apply in a software development context to quickly pinpoint and eliminate 8 elements of waste across people, process and technology dimensions. This paper presents the 8 elements of waste framework, strategies needed to identify and eliminate waste, and the metrics needed to measure effectiveness.
Tags : 
    
CA Technologies

Gartner: Innovative ERP Strategies for Today’s Era of Disruption

Published By: Workday UK     Published Date: Jun 14, 2019
Upgrading your ERP system can be vital to your organisation's survival in this era of disruption. This Gartner report offers actionable advice for IT leaders looking to keep pace with innovation, such as defining your ERP strategy goals and incorporating AI that can drive business value. Read now.
Tags : 
workday, workforce technology, digital strategy
    
Workday UK
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.