it tools

Results 1 - 25 of 1762Sort Results By: Published Date | Title | Company Name

Top five IT networking trends

Published By: Cisco EMEA     Published Date: Oct 01, 2019
Small businesses are the backbone of every country’s workforce and arguably the hardest working. They create the most jobs and deliver growth – usually without the tools, resources, and support that larger enterprises take for granted – particularly in their use of technology
Tags : 
    
Cisco EMEA

Underwriting with 20/20 Vision

Published By: RMS     Published Date: Jul 25, 2019
The insurance industry boasts some of the most sophisticated modeling capabilities in the world. And yet the average property underwriter does not have access to the kind of predictive tools that carriers use at a portfolio level to manage risk aggregation, streamline reinsurance buying and optimize capitalization.
Tags : 
    
RMS

Demystifying Kubernetes

Published By: VMware     Published Date: Sep 12, 2019
Applications are the modern lifeblood of the enterprise, and the desire to keep up with market demands has elevated most enterprise IT strategies from purely on-premises to hybrid and multi-cloud. But the desire to be even more agile and productive—and connect with end users in new and exciting ways—is pushing investments even further into new application environments, development processes, and management tools all leveraging cloud-native technology. In this executive brief, we home in on one component of the cloud-native movement, Kubernetes, and break down its role in achieving enterprise agility, experimentation, and innovation for competitive gain.
Tags : 
    
VMware

The race for customers comes down to one thing: who knows them best

Published By: Experian     Published Date: Sep 26, 2019
"We are in an age of unprecedented opportunity, where ubiquitous data and new technologies are shaping the world and dramatically changing the way consumers interact with businesses like yours. The rise of fintech companies is driving competition, e-commerce has raised the bar for digital experiences, fraud is at an all-time high, and there is pressure to grow your business. You need to meet these challenges head on and do it in a way that can scale with the increasing volume — and value — of customers. All while meeting and exceeding customer expectations. We believe rapid, sustainable growth can be fuelled by acquiring the right customers and delivering customer experiences that align with their expectations. To succeed you need a comprehensive, unified view into your customers and their needs. As a business leader, how do you achieve these objectives? What can you do to attract and acquire new customers? What tools do you need to quickly act on insights and to make consistent, relev
Tags : 
    
Experian

Gigamon Whitepaper: Security at the Speed of Your Network

Published By: Gigamon     Published Date: Sep 03, 2019
This white paper will examine the security issues introduced by more data over faster networks, how an architectural approach can solve those challenges and introduces the GigaSECURE® Security Delivery Platform, the leading next-generation network packet broker purpose-built for security tools to work more efficiently across physical, virtual and cloud environments. In fact, IHS Markit1 has named Gigamon the market leader and the best-known vendor in the space with #1 market share in multiple industries – 36% overall and 59% in the government sector.
Tags : 
    
Gigamon

ESG Economic Validation Report: Analyzing the Benefits of Gigamon

Published By: Gigamon     Published Date: Sep 03, 2019
Dataflow is increasing at a rate unseen in history. Network managers are tasked with enabling massive quantities of new data in a secure and highly available fashion, all while facilitating access to new types of form factors and data stores. This challenge is often met with layers of networking hardware and tools resulting in a complex mess, or even worse, a culture of network protectionism that inhibits business innovation.
Tags : 
    
Gigamon

Test and Deploy New Cybersecurity Technologies Faster

Published By: Gigamon     Published Date: Sep 03, 2019
With new threats emerging every day, IT organizations need to frequently upgrade or introduce new cybersecurity tools and technologies. The problem is that it can be very difficult to set up realistic tests that show how technologies will perform under real-world conditions.
Tags : 
    
Gigamon

ESG Brief: The Importance of a Common Distributed Data Services Layer

Published By: Gigamon     Published Date: Sep 03, 2019
The IT pendulum is swinging to distributed computing environments, network perimeters are dissolving, and compute is being distributed across various parts of organizations’ infrastructure—including, at times, their extended ecosystem. As a result, organizations need to ensure the appropriate levels of visibility and security at these remote locations, without dramatically increasing staff or tools. They need to invest in solutions that can scale to provide increased coverage and visibility, but that also ensure efficient use of resources. By implementing a common distributed data services layer as part of a comprehensive security operations and analytics platform architecture (SOAPA) and network operations architecture, organizations can reduce costs, mitigate risks, and improve operational efficiency.
Tags : 
    
Gigamon

EMA Report: Understanding the Value of Application-Aware Network Operations

Published By: Gigamon     Published Date: Sep 03, 2019
Network operations teams can no longer ignore the application layer. Application experience can make or break a digital enterprise, and today most enterprises are digital. To deliver optimal performance, network operations tools must be application-aware. However, application-awareness in the network and security tool layer is expensive and difficult to scale. Enterprises can mitigate these challenges with a network visibility architecture that includes application-aware network packet brokers (NPBs). EMA recommends that today’s network operations teams modernize their approach with full application visibility. EMA research has found that network teams are increasingly focused on directly addressing security risk reduction, service quality, end-user experience, and application performance. All of these new network operations benchmarks will require deeper application-level visibility. For instance, a network team focused on service quality will want to take a top-down approach to perfo
Tags : 
    
Gigamon

Network Architecture with Security in Mind

Published By: Gigamon     Published Date: Sep 03, 2019
Network performance and security are vital elements of any business. Organisations are increasingly adopting virtualisation and cloud technologies to boost productivity, cost savings and market reach. With the added complexity of distributed network architectures, full visibility is necessary to ensure continued high performance and security. Greater volumes of data, rapidlyevolving threats and stricter regulations have forced organisations to deploy new categories of security tools, e.g. Web Access Firewalls (WAFs) or Intrusion Prevention Systems (IPS). Yet, simply adding more security tools may not always be the most efficient solution.
Tags : 
    
Gigamon

2019 Cyberthreat Defense Report - Executive Summary

Published By: Gigamon     Published Date: Sep 11, 2019
CyberEdge Group’s sixth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a survey of 1,200 IT security decision makers and practitioners conducted in November 2018, the report delivers countless insights IT security teams can use to better understand how their perceptions, priorities, and security postures stack up against those of their peers. Notable Findings ? Cyberthreat trifecta. Of 11 categories of cyberthreats, malware is the greatest concern for responding organizations, followed closely by phishing and ransomware (see Figure 1). ? Healthy security budgets. The average security budget is increasing 4.9% in 2019 and represents 12.5% of an organization’s overall budget for IT. ? Threat hunting obstacle. The top inhibitor to achieving effective threat-hunting capabilities is the difficulty organizations are having implementing or integrating related tools. ? Security’s mos
Tags : 
    
Gigamon

Enterprise Cybersecurity Adoption Trends across Asia-Pacific

Published By: Juniper Networks     Published Date: Sep 26, 2019
Businesses in the Asia-Pacific (APAC) region manage many disparate security tools, frequently without a centralized information management platform. They also suffer a deluge of threat alerts, although only a small percentage of these require further investigation.
Tags : 
    
Juniper Networks

Supply chains are transforming from reactive to predictive, cognitive and even self-healing

Published By: HERE Technologies     Published Date: Sep 23, 2019
It’s time to move your supply chain into the realm of super-intelligent. This special report is for anyone looking to enhance their supply chain operations by utilizing the latest in technological advances such as artificial intelligence (AI), machine learning and the Internet of Things (IoT). With smart use of these tools, businesses can anticipate problems and develop solutions before they occur. Forward-thinking leaders are using this disruption to optimize their supply chains and push the quality of their findings to a whole new level. In it, you’ll learn: • The markers of a truly cognitive supply chain • The crucial role of location intelligence in supply chain optimization • The impact increased visibility has on every area of your supply chain, including asset, inventory, fleet and energy management
Tags : 
    
HERE Technologies

Indoor inventory tracking

Published By: HERE Technologies     Published Date: Sep 26, 2019
Misplacing sizable, expensive tooling equipment inside large industrial complexes, factories and warehouses is a problem that doesn't get the attention it deserves. When essential inventory gets lost, whole production lines can grind to a halt. Indoor tracking is the optimal way to keep tabs on all mobile equipment around the factory floor. As one of the world's leading location platforms, HERE shares insights and solutions for implementing indoor tracking in a way that can streamline and optimize production processes. Read the eBook to discover how to: • locate inventory and assets quickly to lower downtime and improve job satisfaction • save money spent on replacing lost tools and wasted employee time • use insights into asset utilization for forecasting or maintenance schedules.
Tags : 
    
HERE Technologies

Transformation story: New brain power for high-volume transaction screening

Published By: KPMG     Published Date: Jun 06, 2019
High-volume administrative tasks are a feature of every business. We helped a global bank develop a machine learning algorithm to help with the task of reviewing over 100,000 ‘sanctions alerts’ every day. Read this story to find out: • what other benefits AI can deliver beyond cost savings • how AI tools achieve greater accuracy than human reviewers • what it takes to apply AI and Machine Learning successfully in a regulated sector.
Tags : 
    
KPMG

6 Ways to Make Your Security Stack Work Harder

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck."
Tags : 
    
Cisco Umbrella EMEA

A single solution to govern, manage, and consume all shared data assets

Published By: TIBCO Software     Published Date: Jun 14, 2019
As recognized leader in master data management (MDM), and a pioneer in data asset management, TIBCO EBX™ software is an innovative, single solution for managing, governing, and consuming all your shared data assets. It includes all the enterprise class capabilities you need to create data management applications including user interfaces for authoring and data stewardship, workflow, hierarchy management, and data integration tools. And it provides an accurate, trusted view of business functions, insights, and decisions to empower better decisions and faster, smarter actions. Download this datasheet to learn: What makes EBX™ software unique Various capabilities of EBX software The data it manages
Tags : 
    
TIBCO Software

Hemlock Semiconductor Manufactures Success with TIBCO Connected Intelligence

Published By: TIBCO Software     Published Date: Jul 22, 2019
Global producer of polycrystalline silicon for semiconductors, Hemlock Semiconductor needed to accelerate process optimization and eliminate cost. With TIBCO® Connected Intelligence, Hemlock achieved centralized, self-service, governed analysis; revenue gains; cost savings; and more. Fueled by double-digit growth in the markets it serves, Hemlock Semiconductor is adapting to the increasing commoditization within the polysilicon industry and better positioning itself to compete. A key factor in this plan is to equip process-knowledgeable personnel with the skills and tools to accelerate delivery of process optimizations and associated cost elimination. Hemlock turned to a TIBCO® Connected Intelligence solution to address the challenges. By implementing TIBCO Spotfire® and TIBCO® Streaming analytics, TIBCO® Data Science, and TIBCO® Data Virtualization, the company created more self-service analytics. Adding TIBCO BusinessWorks™ integration let the company realize the vision of connect
Tags : 
    
TIBCO Software

When do you need more than a simple diagraming tool?

Published By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
Basic diagramming tools allow business users to define an initial business process and provide a good path to getting your processes off of sticky notes and into a digital format. However, if company-wide collaboration, real-time change management and integration with automation tools are important to you, a dedicated process modeling tool may be your better choice.
Tags : 
    
Group M_IBM Q4'19

Trend Micro Managed XDR, A Managed Detection and Response (MDR) Service

Published By: Trend Micro     Published Date: Aug 07, 2019
As the threat landscape evolves, organizations have accepted the fact that they have to take a more proactive detection approach to advanced threats rather than relying on traditional defenses. As a result, customers have turned to detection and response tools that allow for proactive “hunting” for Indicators of Attack (IoA) and reactive “sweeping” for indicators of compromise (IoCs). Once found, those tools are required to automatically respond to attacks or to at least provide for an action from the Incident Response (IR) staff. Unfortunately, due to the number and complexity of both these attacks and the detection/response tools, organizations struggle to hire enough qualified staff and stay on top of the discovered threats. This is compounded by a worldwide cybersecurity skills shortage. Managed detection and response (XDR) provides advanced threat hunting, detection, and response as a service to organizations that seek assistance for their own IR staff, or for those who wish to o
Tags : 
    
Trend Micro

ESG Webinar Moving Beyond EDR to XDR

Published By: Trend Micro     Published Date: Aug 13, 2019
While threat prevention continues to improve with the use of advanced techniques, adversaries are outpacing these advances requiring security teams to implement threat detection and response programs. Security teams are often addressing the process haphazardly, using disconnected point tools and manual processes that consume too many analysts and result in slow mean-time to detection and response. While EDR has enabled security teams to take important steps forward for detection and response, ultimately it can only look at the endpoints which limits the scope of threats that can be detected and if something is detected, limits the view of who and what is affected and thus, how best to respond. ESG therefore recommends looking beyond the endpoint and utilizing natively integrated security solutions across more than just one vector to improve detection and response times. The more data you can knit together, the more effective you can be to uncover the security incidents most dangerous to your organization. Watch this webinar to learn about the value of XDR: connecting detection and response across multiple security layers. Dave Gruber, senior analyst at ESG, shares recent research and his views on the evolution of threat detection and response; making the case for expanding the capabilities and expectations of detection and response solutions. Wendy Moore, VP of Product Marketing, discusses Trend Micro’s own XDR strategy and the unique value that Trend Micro can bring to detection, investigation and response.
Tags : 
    
Trend Micro

Top 5 Reasons You Need EDR

Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
Endpoint detection and response (EDR) tools are built to supplement endpoint security with increased detection, investigation, and response capabilities. However, the hype surrounding EDR tools can make it difficult to understand how exactly they can be used and why they are needed. Making matters worse, today’s EDR solutions often struggle to provide value for many organizations as they can be difficult to use, lack sufficient protection capabilities, and are resource intensive. Sophos Intercept X Advanced with EDR integrates intelligent EDR with the industry’s top-rated endpoint protection in a single solution, making it the easiest way for organizations to answer the tough questions about security incidents. Here are some additional reasons to consider an EDR solution.
Tags : 
    
Pine Cove Consulting

THE PERSONALIZATION HANDBOOK FOR RETAIL MARKETERS

Published By: Selligent Marketing Cloud     Published Date: Sep 24, 2019
Retailers who can identify their customers and deliver hyperpersonalized engagement on any channel are the ones thriving in this new age of retail. As the old model of inventory-led retail becomes obsolete, forward-thinking marketers deliver a new generation of shopping experiences with a common focus: the individual consumer. In our Personalization Handbook for Retail Marketers, we’ll provide a toolset of proven strategies and technologies to help marketers leverage personalization for longterm wins such as increased customer loyalty, spending frequency and lifetime value. Starting things off, we’ll discuss why hyper-personalization is the only constant in today’s rapidly changing retail landscape.
Tags : 
    
Selligent Marketing Cloud

Hiding in Plain Sight: How to fund innovation using money you already have

Published By: Apptio     Published Date: Oct 09, 2019
"CIOs are under constant pressure to deliver innovation and efficiency, and at a lower cost to boot. Fortunately, when it comes to enterprise IT spend, chances are the necessary resources to drive improvements are already there, hidden in budget padding. All you need are the right tools to identify and exploit them. Download this brief to: -Understand your budget-to-actual variances and what causes them -Learn how to course-correct towards freeing up fettered funds for growing your business"
Tags : 
    
Apptio

Why Contact Centers Are Essential in a Digital-First World

Published By: ttec     Published Date: Oct 01, 2019
In an age of tech-savvy customers and self-service channels, do companies still need to invest in contact centers and staff to provide support? The answer is, yes. Consumers have been trained to find the information they need on their own online or with their mobile device. But when they do pick up to the phone and reach out to customer service, they expect representatives to solve what are often complex questions. They expect human interactions. This enormous shift in which customer service representatives are perceived as a last resort puts increased pressure on contact center associates who already have the odds stacked against them. The staff must be trained to quickly handle issues that frequently require access to a wide variety of information, but a lack of investment means many associates are often unprepared and lack the right resources to help customers. To change the outcome, customer service representatives need the right training and tools to not only understand the issue,
Tags : 
    
ttec
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.