global reach

Results 26 - 49 of 49Sort Results By: Published Date | Title | Company Name

SANS Institute Research: Cloud Security Defense in Detail if Not in Depth.

Published By: McAfee EMEA     Published Date: Mar 14, 2018
Use of cloud computing services continues to grow rapidly as organizations migrate business applications and data to cloud-based software, platform and infrastructure services. Gartner estimates 2017 will see growth of 18% in spending on public cloud services and that cloud adoption will infuence more than 50% of IT spending through 2020. Deloitte Global predicts that by the end of 2022 more than half of all IT spending will go to IT-as-a-service providers. In the 2016 edition of this survey, 56% of the security professionals responding said limitations on access to collect incident response data and evidence for forensic analysis was a key challenge to securing the cloud. Sixty-two percent said they were concerned about unauthorized access by outsiders, and 59% said they worried about access by other cloud tenants. Of the 10% who reported being breached, half blamed stolen credentials or compromised accounts.
Tags : 
    
McAfee EMEA

5 Myths of Cloud Computing

Published By: HP     Published Date: Oct 01, 2014
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. At the time this definition was published, “cloud” was already part of industry parlance, and was beginning to take root in the general lexicon. Additionally, global business spending for infrastructure and services related to the cloud had topped $78 billion. This year, enterprise spending on the cloud will reach an estimated $174 billion, and is expected to climb to $235 billion by 2017.2 Inevitably, as both business IT and consumer mindsets evolve toward the cloud in coming years, we will continue to witness dramatic growth in IT products in some areas, and significant reductions in other areas—resulting in a reshaping of the industry as a whole.
Tags : 
cloud, computing, on-demand, management, interaction, network, access, configurable, applications, servers, storage, model, it management, cloud computing
    
HP

Frost & Sullivan Report: Analysis of the Global Dynamic Publishing Market

Published By: Quark Software     Published Date: Mar 19, 2015
The growth of the dynamic publishing market is shaping the way organizations develop streamlined enterprise content management strategies, keep up with shifting end-user content consumption trends and acquire the best solutions for scalability, output and ease-of-use. Dynamic publishing solutions is critical for content creators looking to address the largest audience possible. In their report, Analysis of the Global Dynamic Publishing Market, Frost & Sullivan examines the impact and vendor solutions. Download the report to: • Learn why dynamic publishing solutions are gaining significant traction across all industries and verticals • Discover which vendors are competing in the market — from those that offer point-solutions, such as XML authoring tools, to those offering complete end-to-end platforms • Access the latest research and predictions on the dynamic publishing market, which is expected to reach $2.5 billion by 2017
Tags : 
xml authoring, structured authoring, structured content, dynamic publishing, enterprise publishing, automated publishing, publishing automation, xml publishing, publishing platform, xml software, compliance software, xml authoring tools, structured authoring tools, dita, enterprise content management, xml for document production, multi-channel publishing, omni-channel publishing, content reuse, digital publishing
    
Quark Software

Azure Cosmos DB E-book

Published By: Microsoft Azure     Published Date: Apr 11, 2018
When you extend the global reach of your enterprise, you’ll find new markets for your products and services. That means reaching more potential customers, bigger growth potential, and higher ROI. But to tap into those emerging markets, you need to provide the best, most consistent user experience. Now, it’s possible for you to build, deploy, and manage modern apps at scale with a globally-distributed database—without the hassles associated with hosting in your data center. Read the e-book Build Modern Apps with Big Data at a Global Scale and learn how Azure Cosmos DB, a globally-distributed turnkey database service, is transforming the world of modern data management. Keep access to your data available, consistent, and safe—with industry-leading, enterprise-grade security and compliance. Start developing the best app experience for your users based on five well-defined consistency models: Strong: Favors data consistency. Ideal for banks, e-commerce processing, and online booking. Boun
Tags : 
    
Microsoft Azure

Internet Outage Detection

Published By: ThousandEyes     Published Date: Mar 14, 2017
Internet Outage Detection provides insights from global traffic and routing data into outages that cause path termination in ISPs and unreachable BGP prefixes.
Tags : 
    
ThousandEyes

Education in a Digital World

Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
Where education connects with technology that works. For your school, college or university. With global reach and local focus, we deliver purpose built networking and communications for the education environment that enable secure, reliable collaboration between your faculty and students.
Tags : 
teachers, administrators, education leaders, cyber security, iot devices, digital content
    
Alcatel Lucent Enterprise

Measuring the True Business Benefits of Web Collaboration

Published By: WebEx     Published Date: Apr 02, 2009
In today's business environment, equipping information workers with the right tools to do their jobs is a fundamental element for maintaining competitive advantage. Organizations are striving to achieve global connectivity in a dynamic environment where travel is becoming more difficult and expensive, employees are more dispersed, and business boundaries are constantly being extended. To harness the benefits of the new work order, organizations are looking to achieve true collaboration with customers, partners, suppliers and employees. Simply put, the mantra is to "improve productivity while lowering costs." Web collaboration is becoming imperative in reaching this fundamental goal by offering "anytime anywhere" communications that impacts the bottom line and improves profitability.
Tags : 
webex, web collaboration, information workers, competitive advantage, on-demand web collaboration, roi, global connectivity, decision cycles, it infrastructure, virtual enterprise, metrics, industry benchmarks, sfa, crm, erp, synchronous meeting environment, webex mediatone network, return on investment, travel costs, labor costs
    
WebEx

Measuring True Business Benefits of Web Collaboration

Published By: WebEx.     Published Date: Apr 03, 2009
In today's business environment, equipping information workers with the right tools to do their jobs is a fundamental element for maintaining competitive advantage. Organizations are striving to achieve global connectivity in a dynamic environment where travel is becoming more difficult and expensive, employees are more dispersed, and business boundaries are constantly being extended.  Web collaboration is becoming imperative in reaching this fundamental goal by offering "anytime anywhere" communications that impacts the bottom line and improves profitability.
Tags : 
webex, web collaboration, information workers, competitive advantage, on-demand web collaboration, roi, global connectivity, decision cycles, it infrastructure, virtual enterprise, metrics, industry benchmarks, sfa, crm, erp, synchronous meeting environment, webex mediatone network, return on investment, travel costs, labor costs
    
WebEx.

Learning in the Cloud: 10 Factors to Consider

Published By: Skillsoft     Published Date: Nov 22, 2013
Cloud solutions are the “new normal” as organizations opt to deploy more business systems “in the cloud.” For learning professionals, cloud-based solutions provide a wide range of benefits from cost savings to decreased delivery time, to global reach. Before selecting a cloud-based learning provider, you should understand all the benefits and be prepared to ask potential providers critical questions regarding the architecture and management of the service you are considering.
Tags : 
skillsoft, cloud computing, learning management, system of engagement, cloud-based, learning architecture, cost savings, global reach, rapid deployment, application reliability, secure environment, enterprise integration, scalable for organizations, cloud solution, learning experience, cloud benefits companies, system integration, infrastructure, business integration, change management
    
Skillsoft

Case Study: Litmos Helps Marketwired Execute Superior Learning Strategy Globally

Published By: Litmos     Published Date: Apr 27, 2015
Using Litmos, Marketwired gained a trusted technology partner in executing their strategy and realized significant benefits as outlined below: - Rapid Deployment - Global Reach - Cost Savings - Anytime/Anywhere Access - Increased Manager Visibility
Tags : 
learning strategy, global reach, mobile access, visibility
    
Litmos

Trends in SAP Cybersecurity: Uncovering the Risks of SAP Cyber Breaches by Ponemon Institute

Published By: IBM     Published Date: Sep 30, 2016
Uncovering the Risks of SAP Cyber Breaches by Ponemon Institute How are organizations truly managing cybersecurity risks in their SAP ecosystem? Ponemon Institute’s latest study of 607 global IT security practitioners reveals senior level perceptions about SAP, its security challenges, and the risk of data breaches and cyberattacks.
Tags : 
ibm, security, ponemon institute, technology, fraud, sap, cyber breaches, knowledge management, enterprise applications, business technology
    
IBM

Reduce The Risk Of Insider-Related Data Loss With Intelligent, Integrated Security From IBM

Published By: IBM     Published Date: Apr 20, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM

Ponemon Institute’s 2017 Cost of Data Breach Study: Global Overview

Published By: IBM     Published Date: Jul 26, 2017
IBM Security and Ponemon Institute are pleased to release the 2017 Cost of Data Breach Study: Global Overview. According to our research, the average total cost of data breach for the 419 companies participating in this research decreased from $4.00 to $3.62 million The average cost for each lost or stolen record containing sensitive and confidential information also significantly decreased from $158 in 2016 to $141 in this year’s study. However, despite the decline in the overall cost, companies in this year’s study are having larger breaches. The average size of the data breaches in this research increased 1.8 percent
Tags : 
data breach, security, research study, data trends
    
IBM

Putting mobile first: best practices of mobile technology leaders - Findings from the IBM Global IT

Published By: IBM     Published Date: Oct 10, 2013
With 2.5 billion employee-owned mobile devices in the workplace today, enterprises are struggling to capture the business benefits while bracing their IT infrastructure against data breaches and a deluge of mobile traffic. A new study reveals that the most mobile-savvy organizations are employing specific best practices, including mobile planning, integration, optimization and management to achieve mobile infrastructure maturity.
Tags : 
mobiles, mobile technology, technology leaders, ibm, global it, it leaders, mobility, wireless, business benefits, mobile traffic, gaining traffic, employing practices, mobile infrastructure, infrastructure maturity, mobile devices, data breach, enterprises, it management, data management, ebusiness
    
IBM

Align IT infrastructure with customer demand. Learn how

Published By: CenturyLink Technology Solutions     Published Date: May 22, 2014
Read “Linedata Launches SaaS-Based Offering and Expands Global Reach with Markets Infrastructure” now, and learn how Linedata partnered with CenturyLink to expand its product offerings and achieve a global presence.
Tags : 
centurylink, agile it, it infrastructure, network infrastructure, data center, networking, infrastructure, network architecture, network management, compliance, service management, data center design and management, business technology
    
CenturyLink Technology Solutions

Forbes Insights: 8 Advantages of Video Conferencing

Published By: Cisco     Published Date: Nov 17, 2015
In today’s global economy, innovation matters. For teams to innovate rapidly and with great frequency, they must be able to clearly communicate and closely collaborate. Miscommunication, misunderstanding and misinterpretation only leads to costly errors, bottlenecked business processes and market misfires. Most of these issues are avoidable. A convergence of low-cost but high-quality technology and a highly competitive business environment is making video collaboration a channel of choice for today’s information workers and decision makers. The availability of relatively low-cost technology—including high-quality video conferencing equipment, high-bandwidth networks and easy-to-use applications and tools—is bringing video collaboration within reach of today’s workforce. The impact on innovation and productivity—as well as critical business processes, from customer service to problem-solving—is only just starting to be felt.
Tags : 
cisco, forbes insights, video conferencing, productivity, collaboration, it management, wireless, knowledge management, business technology
    
Cisco

Tapjoy: Prioritizing big data agility and scalability

Published By: Cisco     Published Date: Jan 05, 2016
With a global monthly reach consisting of more than 500 million mobile users and billions of requests, Tapjoy historically relied heavily on their IT footprint. They needed an environment that would allow them to accelerate the development and improve the performance of their big data algorithms, which help drive real time decision-making that delivers the best content to their global audience. Read more to learn how Tapjoy engineers opted for a cloud-based model to run their big data platform instead of bare metal, prioritizing agility and the ability to scale over bare metal performance.
Tags : 
    
Cisco

Symantec Internet Security Threat Report

Published By: Symantec     Published Date: Oct 07, 2014
The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Highlights from the 2014 Internet Security Threat Report Key Findings • 91% increase in targeted attacks campaigns in 2013 • 62% increase in the number of breaches in 2013
Tags : 
internet security, target attacks, breaches, threat activity, emerging trends, cybercrime, security
    
Symantec

Running Tapjoys mobile ad platform on Cisco Metapod

Published By: Cisco     Published Date: Jul 11, 2016
With a global monthly reach consisting of more than 500 million mobile users and billions of requests, Tapjoy historically relied heavily on their IT footprint. They needed an environment that would allow them to accelerate the development and improve the performance of their big data algorithms, which help drive real time decision-making that delivers the best content to their global audience. Tapjoy engineers opted for a cloud-based model to run their big data platform instead of bare metal, prioritizing agility and the ability to scale over bare metal performance. Initially they deployed at AWS, but as the platform grew and their AWS costs increased, Tapjoy began to look for ways to better manage their growing public-cloud spend while increasing efficiency. They needed to do this without compromising the cloud experience they were giving their developers.
Tags : 
    
Cisco

The Connected Vehicle: Big Data, Big Opportunities

Published By: SAS     Published Date: Jun 05, 2017
The opportunities for the automotive industry are enormous as the number of connected vehicles is projected to outpace global population growth for the next 10 years. The data collected from these vehicles, up to 30 terabytes each day, will have wide-reaching implications for drivers and manufacturers alike.
Tags : 
    
SAS

Into the Breach: A Look at Real Incidents from the Case Files

Published By: Varonis     Published Date: Nov 12, 2013
Verizon’s longstanding Data Breach Investigations Report1, or DBIR, is an excellent starting point to understand the larger trends in security and data protection.
Tags : 
varonis, medical insurer, mortgage lender, retailer, data breach investigations report, dbir, larger trends, security, data protection, global scale, breach activity, validated breach incidents, collect personal details, hackers, breach statistics, security decisions, exposed data, it deficiencies, access control, web service security
    
Varonis

Security Services: 2015 Global Cost of Data Breach Study

Published By: IBM     Published Date: Oct 02, 2015
2015 Global Cost of Data Breach Study. The gold standard benchmark from Ponemon Institute and IBM.
Tags : 
    
IBM

Gartner MQ for Hyperconverged Infrastructure

Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"MVP ASSET IN STORAGE CAMPAIGN • HPE enhanced the perception of SimpliVity's supportability and stability by leveraging the global go-to-market reach and capabilities of HPE and its channel partners. • SimpliVity delivers robust data services, such as in-line global compression and deduplication combined with an integrated backup solution and rapid disaster recovery capabilities for operational simplicity and cost reduction. • The HPE ProLiant DL380 installed base and global market acceptance make SimpliVity one of the top choices as an HCI platform for existing HPE customers."
Tags : 
    
Hewlett Packard Enterprise

Privileged Access Threat Report 2018

Published By: BeyondTrust     Published Date: Apr 04, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage. Our 2018 re
Tags : 
    
BeyondTrust
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.