hi def

Results 326 - 350 of 1110Sort Results By: Published Date | Title | Company Name

Enabling and Optimizing Hybrid IT Operations

Published By: IBM     Published Date: Jul 26, 2017
It is generally accepted that a hybrid approach to IT operations gives enterprises both financial and operational flexibility— allowing them to apply new technologies with little or no capital investment and tap expertise without hiring new personnel. But it is still an imperfect solution, and with sophisticated new attacks propagating at an accelerated rate, security has become a top concern. This is evidenced by the growing number of C-level security executives and by the intensive efforts of IT organizations to identify and address the gaps in their enterprise defenses and improve their ability to respond to those attacks. It is clear that security for hybrid IT environments is due for an advanced upgrade.
Tags : 
information technology, optimization, it security, data protection
    
IBM

Enabling Media and Entertainment Companies to Reach their Creative Goals

Published By: Equinix     Published Date: Aug 14, 2015
This white paper shows how Equinix has created the Equinix Media and Entertainment Ecosystem (EMEE) — a solution that leverages our global facilities and the software defined network (SDN) provisioning power of the Equinix Cloud Exchange.
Tags : 
equinix, emee equinix, equinix cloud exchange, network architecture, network management, network performance, storage management, storage virtualization
    
Equinix

End-To-End Server Security: The IT Leader's Guide

Published By: Dell     Published Date: Feb 02, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell

End-To-End Server Security: The IT Leader's Guide

Published By: Dell EMC     Published Date: Feb 07, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell EMC

Engaging in the age of the customer

Published By: IBM     Published Date: Nov 10, 2016
Are you aware of the ongoing dialog about your products and services? Are you participating? Recent surveys show that organizations that deliver good customer experiences are reaping greater revenues than those that don’t. Yet companies are struggling to pivot towards the customer, because it often requires a complete overhaul of management, culture and technologies. This session will show how to defeat content chaos, streamline and accelerate onboarding and service processes, minimize friction with customers, use analytics to anticipate and prepare for customer needs, and give your front-line people the tools they need to offer a superior experience that will grow your revenues and generate great word of mouth.
Tags : 
ibm, analytics, ecm, engagement, customer, enterprise applications, business technology
    
IBM

Enhancing the effectiveness of rolling forecasts with a four-part best-in-class approach

Published By: Infosys BPM Ltd     Published Date: Feb 12, 2019
An effective rolling forecast is important to estimate long term financial plans. Every organization undertakes this process as a finance activity. However, when the forecasted data is examined on its effectiveness for decision making, more often than not the results are disappointing, and the rolling forecast process needs to be redefined. This paper talks about effective rolling forecasts that utilize resources, technologies, processes, and business intelligence to deliver actionable insights. A best-in-class matured RF process will enable CFOs to deliver great results through increased revenue and cost reductions, and create new benchmarks for the organization.
Tags : 
    
Infosys BPM Ltd

Ensuring Business Continuity with a Multi-Layered AV Defense

Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment, application security, business continuity, email security, ssl
    
Blue Coat Systems

Enterprise Architecture Is More Than Engineering

Published By: Burton Group     Published Date: Jul 07, 2008
While many enterprise architecture (EA) programs may be less than effective or threatened by extinction, the EA discipline is still an important set of skills and processes that improve IT decision-making and CIO effectiveness. Yet, after decades of architecting systems, the advent of several EA frameworks, and the many definitions available for the term EA, we still strive to understand what EA is, what it does, and what it looks like when it is successful.
Tags : 
architecture, architect, network architecture, it management, network design, network management, burton group, enterprise architecture
    
Burton Group

Enterprise SD-WAN in the Real World

Published By: Forcepoint     Published Date: Jun 06, 2019
Unlike traditional network architectures, software-defined wide-area networking (SD-WAN) makes it possible to harness existing network technology to better align operations and business policies. While many companies identify a need to evolve to SD-WAN, they are not always convinced SD-WAN can deliver the necessary enterprise capabilities. Join us for a webinar with Link-Connect to learn how they use Forcepoint NGFWs to deliver enterprise-class SD-WAN to manage more than 400 sites from a single management console. In this webcast, learn how Forcepoint NGFW: Simplifies operations. Management is easier with central management, visibility and hierarchical policies. Saves investment dollars. Smarter use of capacity and the ability to visualize and prioritize traffic reduces connectivity costs. Boosts business outcomes. Optimized capacity, increased security and ensured high availability
Tags : 
    
Forcepoint

ERP Cloudification

Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 30, 2019
Leading medical devices company were facing business continuity post acquisition, thereby increasing maintenance costs accordingly. LTI proposed to implement Oracle Fusion Cloud which helped in faster and minimal requirement of technical manpower. Benefits i. In-time Delivery with ZERO defects ii. Scalable products with low maintenance costs Download full case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)

ESG - What's Needed for Cloud Computing

Published By: Riverbed     Published Date: Mar 31, 2011
Just what is cloud computing anyway? Skeptics might say it is nothing but industry hyperbole, visionaries might say it is the future of IT. In reality, both statements are true-cloud computing has been embellished by the tech industry, but it does hold real potential for new types of on-¬-demand dynamic IT services. This paper seeks to clarify the definition of cloud computing, identify how far along users are in terms of cloud deployment, and examine the role of the network in the cloud computing model.
Tags : 
riverbed, cloud computing, networking
    
Riverbed

ESG whitepaper: Defining Tier One Storage in the Modern Data Center (Analyst Report)

Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Aug 16, 2012
This report defines "tier-1" storage in the modern IT world and in the data centers and services that support it.
Tags : 
backup and recovery
    
Sponsored by HP and Intel® Xeon® processors

ESG whitepaper: Defining Tier One Storage in the Modern Data Center (Analyst Report)

Published By: Sponsored by HP and Intel®     Published Date: Nov 14, 2012
This report defines "tier-1" storage in the modern IT world and in the data centers and services that support it.
Tags : 
data centers, data storage, tier one, virtualization, storage tiers, storage, data management, cloud computing
    
Sponsored by HP and Intel®

ESG WP: Integrated Network Security Architecture: Threat-Focused Next-Generation Firewall

Published By: Cisco     Published Date: Apr 08, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection
    
Cisco

European consumer attitudes to mobile commerce: Key barriers and opportunities

Published By: ATG, Inc.     Published Date: Oct 07, 2010
This research should help define how to best include mobile as part of an integrated commerce strategy.
Tags : 
atg, mobile commerce, ebusiness, internet shopping, customer interaction service, customer relationship management, customer satisfaction, customer service
    
ATG, Inc.

Evaluate New Converged Infrastructures to Underpin the Software-Defined Data Center

Published By: Nutanix, Inc.     Published Date: May 07, 2013
This report defines storage-centric virtualized infrastructure, its opportunity and use cases, and the emerging vendor landscape that IT infrastructure and operations groups should evaluate as they purse the software-defined data center.
Tags : 
converged infrastrucutres, storage, virtualization, server, storage-centric, lun, modular expansion, backup and recovery
    
Nutanix, Inc.

Evolution of Regulatory Capital Planning, Measurement and Management

Published By: SAS     Published Date: Aug 03, 2016
Banks and financial institutions have faced a spate of regulations centered on capital adequacy since the financial crisis started in 2008. The Basel Committee on Banking Supervision (BCBS) initiated a series of reforms to strengthen risk, capital and liquidity rules across banks. Among the important changes recommended are new rules for calculating Tier I and Tier II capital and the inclusion of additional risk measurement components for market risk, liquidity risk and counterparty risk. Despite these changes, a key drawback of the Basel framework is its focus on historical capital adequacy. While being useful, it does not help assess the impact of stress events on banks from an ex-ante basis. Hence regulatory agencies in several jurisdictions have mandated banks to define a forward-looking capital plan that incorporates stress scenarios.
Tags : 
best practices, business management, finance, banking, financial crisis, business analytics
    
SAS

Exceptional Digital Experiences -- Compelling, Empowering, and Relevant

Published By: IBM     Published Date: Jun 11, 2014
Read this paper to discover how engaging in exceptional digital experiences redefines the ways we live, work and play.
Tags : 
ibm, ibm customer experience suite, ivm employee experience suite, digital experience, social business, social media, customer engagement
    
IBM

Exploit Kits: Cybercrime’s Growth Industry

Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.
Tags : 
threattrack, security, threat, track, information, admins, best, practices
    
ThreatTrack Security

Exploring Software-Defined Networking with Brocade

Published By: Brocade     Published Date: Jun 12, 2015
This paper provides an overview of Software-Defined Networking (SDN), expected use cases, and Brocade contributions to SDN innovation.
Tags : 
software-defined networking, sdn, network, network flexibility, apis, application programming interfaces, sdn innovation, network architecture
    
Brocade

Extending Lotus Sametime with HD Video

Published By: IBM     Published Date: Aug 10, 2009
This podcast focuses on how you can reduce costs and improve distributed team collaboration through the use of high definition conferencing and unified communications solutions from IBM and Radvision.
Tags : 
ibm, high definition, web conferencing, communications, travel costs, ibm, radvision, team collaboration
    
IBM

F5 and WhiteHat Integrate Web Application Assessment and Defense Technologies

Published By: F5 Networks Inc     Published Date: Jan 22, 2009
On March 10, 2008, F5, a leader in application delivery, and WhiteHat Security, an innovator in application security assessment, announced they would be partnering to create an integrated Web application assessment and firewall technology. This product integration will incorporate WhiteHat’s Sentinel assessment technology and F5’s ASM attack blocking technology into a single solution.
Tags : 
web application assessment, defense technologies, whitehat security, web application vulnerabilities, security, enterprise applications, internet security
    
F5 Networks Inc

Failing to Meet Mobile App User Expectations; A Mobile User Survey

Published By: HP AppPulse Mobile     Published Date: Jun 05, 2015
With this Dimensional Research report, discover how mobile monitoring software can help you better understand users and their experience with your mobile application. Users reach for mobile devices many times every day, specifically to use mobile apps. Mobile device users heavily rely on peer reviews and star ratings to help them choose their apps. Once a mobile app is installed, that app is judged for its speed, responsiveness and stability, which define the user experience and overall satisfaction.
Tags : 
mobile, applications, customer satisfaction, mobile computing, mobile data systems, mobile workers, application integration, application performance management
    
HP AppPulse Mobile

Failure to Protect Keys and Certificates Undermines Critical Security Controls

Published By: Venafi     Published Date: Mar 26, 2015
Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
keys, certificates, security controls, apt, advances persistent threat, cryptographic keys, cybercriminals, cyber attacks
    
Venafi

Federal Telepresence: Dispelling the Myths

Published By: LifeSize, a division of Logitech     Published Date: Aug 25, 2011
The top five myths of federal telepresence, along with the truth
Tags : 
lifesize, video conferencing, multimedia presentation, productivity, high definition
    
LifeSize, a division of Logitech
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.