information work

Results 76 - 100 of 484Sort Results By: Published Date | Title | Company Name

BROTHER SECURITY: White Paper November 2017

Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother

Make Information Governance a Seamless Part of the Way You Work

Published By: Box     Published Date: Nov 24, 2015
Organizations are struggling to ensure their content is appropriately secure, while remaining easily searchable, accessible and shareable both inside and outside of the enterprise.
Tags : 
box, business, enterprise, information governance, content, security, knowledge management, enterprise applications, business technology
    
Box

How to Architect “Zero Trust” Network Segmentation in Industrial Control Systems

Published By: Palo Alto Networks     Published Date: Feb 24, 2016
This webinar, hosted by Palo Alto Networks, focuses on deployment of 'Zero Trust Network Segmentation' in industrial control systems in large scale, mult-plant environments. We begin with an explanation of the concepts behind 'Zero Trust', scalability, the best ways to adapt existing networking and segmentation without needing to reconfigure infrastructure, and how Palo Alto's platform adresses these needs. Speakers Lionel Jacobs is the Sr. ICS Security Architect at Palo Alto Netowrks Jonathan S. is an Information Security Architect at a Global F&B Manufacturer Del Rodillas (Moderator) is the Sr. Manager of ICS Initiative at Palo Alto Networks
Tags : 
zero trust, networking, network segmentation, ics, scale, infrastructure, enterprise
    
Palo Alto Networks

Better Search Experiences with Unified Information Access

Published By: Lucidworks     Published Date: Aug 24, 2016
This white paper discusses the imperative demand faced by organizations to create satisfying and relevant search experiences for their users. Executives who read this white paper will learn what it means to the overall organization to provide unified information access; the impact and benefits of and challenges to pursuing a strategy to unite information across an organization; and the strategies and examples of organizations that have effectively utilized tools to support unified information access in the pursuit of delivering a superior and more relevant search experience for their users.
Tags : 
search experience, unified information access, lucidworks, information strategy, relevant search, ecommerce search
    
Lucidworks

The Real SaaS Manifesto Defining The True Benefits Of Software-As-A-Service

Published By: Workday     Published Date: Jul 19, 2017
Multi-tenancy is a key feature of Workday and enables multiple customers to share one physical instance of the Workday system in a highly secure environment. Multi-tenancy is enabled through the Workday Object Management Server (OMS). Workday OMS allows servers to host multiple customer tenants simultaneously and builds “security walls” between each of the tenants. Thanks to Workday OMS, there is no way for any worker in one tenant to access the information of another tenant. Workday delivers its software using a continuous development model. Builds are rolled out weekly that contain new features, bug fixes, or performance improvements. Twice a year, Workday takes all the features put into preview and releases them to production for all customers. Workday customers are never landlocked on an old release, and all customers can utilize new features for the products they purchased as soon as they are live.
Tags : 
organizational security, site security, communication security, application security, database security, software licensing, installation
    
Workday

Demystifying Cloud Security

Published By: Workday     Published Date: Jul 19, 2017
Today’s business climate demands that corporations have a flexible computing infrastructure. Because of the agility it provides, cloud computing is garnering interest in many organisations. As they look at such possible deployments, however, some CIOs become hamstrung by security concerns. They feel that the traditional method of securing information in premises-based systems is the best way. While that option worked for many years, the threat landscape today is more diverse and more potentially damaging than ever before.
Tags : 
security, it department, system set-up, cloud suppliers, frameworks, human resources, enterprise financial, planning data
    
Workday

Advanced Strategies to Flexibly Manage the Long-Term Business and IT Impact of Bots

Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
control, visibility, customer, financial risk, web fraud, bots, infrastructure
    
Akamai Technologies Australia

How Gerson Fueled 77% YoY Digital Sales Growth

Published By: Salsify     Published Date: Mar 15, 2019
With over 10,000 SKUs across two divisions and multiple brands, seasonal and home decor manufacturer and distributor The Gerson Companies needed a better way to organize product market data and expand across hundreds of retailers. After investing in product experience management, the company was able to centralize product information in Salsify and empower its network of independent retailer with the data needed to sell successfully online. Featuring: Orin Borgelt, Chief Technology & Sales Officer Learn more about the step-by-step approach The Gerson Companies team took to take control of their data and increase sales on the digital shelf: Build a centralized, flexible, and accessible source of production information to arm all divisions of Gerson with the most up-to-date product inventory. Meet requirements for retailers. The Gerson Companies uses Salsify to syndicate product information across the digital shelf for their B2C divisions. Develop a new sales channels: Gerson uses Sa
Tags : 
    
Salsify

Overcoming Your Five Obstacles to Growth

Published By: Netsuite     Published Date: Sep 06, 2017
Moving your company to the cloud allows for more efficient and effective business operations—essential for growing an organization. Companies plagued by inaccurate, out of date information can instead get real-time access to critical business data anywhere. NetSuite has worked with businesses across all industries to guide them through the many phases of growth, from start-up to ramp up to IPO. Learn how to overcome the five obstacles to successful growth and why NetSuite will be the last business system you will ever need.
Tags : 
    
Netsuite

Deep Learning: A Practitioner's approach

Published By: Pure Storage     Published Date: Apr 18, 2018
Although interest in machine learning has reached a high point, lofty expectations often scuttle projects before they get very far. How can machine learning- especially deep neutral networks- make a real difference in your organization? This hands-on guide not only provides the most practical information available on the subject but also helps you get started building efficient deep learning networks.
Tags : 
    
Pure Storage

Data Is Your Story: The Language of Data Infrastructure Modernization

Published By: Hitachi Vantara     Published Date: Aug 14, 2018
In this book, we are going to look at the key trends driving the modernization of data infrastructure. We’ll see how organizations are adapting and flourishing in a data-driven world. For some time, headlines have been around the internet of things (IoT), big data and data analytics. While these developments are important, the reality is that you cannot take full advantage of them without modernization. We’re going to look at these trends and priorities in detail, then look at the three key drivers of modernization: governance, mobilization and analytics. We’ll also consider the technologies that make up modern data infrastructure including artificial intelligence (AI), flash storage, converged and hyperconverged platforms and software-defined infrastructures. By making sense of data, we make sense of the world. With more data than ever before, we have the tools to turn all that information into intelligent innovation and change the way the world works.
Tags : 
data infrastructure, big data, internet of things
    
Hitachi Vantara

Perimeter-only IT security is over

Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed. The cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply how business is done. The availability of mobile devices and cloud services has redefined how and where people work. Applications and servers are moving to the cloud faster than ever to take advantage of cost savings, scalability, and accessibility. The age of perimeter-only security is over. Find out more today about how Cisco can help.
Tags : 
    
Cisco Umbrella EMEA

Whitepaper: School Information Security 

Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Protect the network, use the network to protect students Your schools use a growing amount of networked information and devices as an essential part of teaching and administration. Research on the Internet, laptops in class, distance learning, and online homework are some of the official technologies that your students use. Unofficially, this list extends to mobile phones (with cameras), digital music and video players, blogs, instant messaging, social networking sites, and networked or online gaming. Behind the scenes are databases with student information, class schedules, attendance records, copies of exams and answers, financial transactions, and even video surveillance. All of these rely on a robust and secure network infrastructure. Cisco Umbrella can provides these, download this whitepaper to find out more!
Tags : 
    
Cisco Umbrella EMEA

No More Chewy Centers: The Zero Trust Model Of Information Security

Published By: IBM     Published Date: May 02, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM

Partnering with Certainty Series: Customer Demands at the Edge - Should I Stay or Should I Go?

Published By: Schneider Electric     Published Date: Jan 26, 2018
The 4th and final event in our Partnering with Certainty Webinar Series, "Customer Demands at the Edge." Customers have lots of decisions to make as they feel their way through the changing IT landscape. Which infrastructure and applications should stay on their own premises (if any) and what can they safely move to the cloud? Fill out your information and click "Register" to watch the fourth and final event in our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Should I Stay or Should I Go?” This webinar originally aired on December 7th, 2017. This final webinar in our webinar series is focused on ways partners can help customers answer the types of questions above and, in the process, become trusted advisors. We’ll go over how to use tools including the EcoStruxure IT suite to analyze customer traffic and help them decide the best home for each application, whether on-premises or in the cloud. (Hopefully we’ll figure out a way to work in the classic Clash tune as well!)
Tags : 
    
Schneider Electric

Quick Demo: Workday Student

Published By: Workday     Published Date: Jan 10, 2019
Workday Student is an end-to-end student and faculty lifecycle information system that works seamlessly with Workday Financial Management, Workday Human Capital Management, and Workday Grants Management to unite the entire campus under one current, configurable, easy-to-use application.
Tags : 
    
Workday

Enterprise Case Study: Reallocating Resources from Administration to Academia

Published By: Workday     Published Date: Mar 02, 2018
To thrive in an outcome-based funding model, your institution needs an ERP and student information system that is efficient and adaptable in order to channel more resources into learning and support student success. Read the Ovum case study to learn how Broward College accomplished this with one cloud-based Workday system.
Tags : 
    
Workday

Advanced Network Protection with McAfee Next Generation Firewall

Published By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee

Creating an environment that accelerates transformation

Published By: Dell     Published Date: Sep 26, 2017
Government organizations need a workforce approach that not only enables employees to make informed decisions and work more efficiently, but also promotes engagement and satisfaction. Download this whitepaper to learn more about how to enable employees to better focus on their core roles and expertise and how to access the right information on demand to be more productive. As well, determine best practices for selecting the right devices to enable the organization as a whole to accomplish its mission, meet citizens’ needs, and attract and retain the workforce it needs for the future.
Tags : 
    
Dell

Intralinks VIA Buyer’s Guide 2015

Published By: Intralinks     Published Date: Apr 13, 2015
The increased mobility of the workforce is changing the way we work. Business users want the flexibility to share and collaborate on content that drives their business while IT needs to ensure the security of that data, no matter where it goes. An effective enterprise collaboration solution must consider people, processes and technologies to be effective, but where to begin? This comprehensive Buyer’s Guide offers guidance on how to develop your organization’s requirements with regard to: • Risk management – avoiding data breaches and loss of information that can result in non-compliance • Business productivity - allowing for secure collaboration while enabling teams to work anywhere on any device • IT efficiency - supporting the full breadth of external business content requirements while integrating with existing applications and protocols
Tags : 
    
Intralinks

Seamless Communications and Collaboration

Published By: Mitel     Published Date: Dec 20, 2016
Employees leverage information and analysis that bring relevance to communications with the goal of removing waste, working more efficiently, and bringing the full weight of their company to every customer engagement.
Tags : 
    
Mitel

Protecting Higher Education From Costly Data Breaches

Published By: Jamf     Published Date: Mar 29, 2018
With large quantities of student and faculty information on hand, complicated information systems and distributed environments spread across departments, higher education institutions are subject to breaches in the same fashion and with the same magnitude as large corporations. But fear not, we're here to help. This white paper provides you with the confidence and know-how to combat the threat of security breaches and avoid the associated costs on your budget and sanity. After reading, you'll be able to: • Identify common types of security breaches • Work with faculty and staff to better secure your environment • Prevent hacks and malicious software from reaching university systems
Tags : 
    
Jamf

European Businesses: You have a BYOD programme whether you like it or not

Published By: Lookout     Published Date: Sep 25, 2017
“We don’t have a BYOD programme.” This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.