it capabilities

Results 901 - 925 of 1256Sort Results By: Published Date | Title | Company Name

Optimizing Rack Power Distribution

Published By: Eaton     Published Date: Jan 26, 2016
This white paper discusses the forces shaping today’s data centers and describes the capabilities businesses should look for when selecting PDUs.
Tags : 
eaton, pdus, data centers, rack power distribution, operating efficiency, multi-tenant data centers, it management, knowledge management
    
Eaton

Faster Problem Resolution with Efficient Remote Support Capabilities

Published By: Citrix Online     Published Date: Aug 09, 2010
This series takes you through the many issues that plague the modern help desk, and states the case for implementing user-centric remote support.
Tags : 
citrix, gotoassist, remote support, help desk, configuration, service delivery, return on investment, roi
    
Citrix Online

How can you turbocharge your digital transformation through always on customer experiences?

Published By: Group M_IBM Q2'19     Published Date: Jun 10, 2019
In the era of individual-centered economy, customers are demanding faster, more personalized services. To deliver these services, successful organizations realize the benefits of accurate and trusted master data. And in today's always on society, companies can no longer afford to allow downtime for maintenance and scheduled upgrades for these services and the supporting applications. With low latency capabilities in IBM InfoSphere Master Data Management designed to easily connect to applications in a zero-downtime environment, the highest demands for user interactions can now be realized. As a result, businesses can therefore take the next step in their digital transformation initiatives to truly drive personalized differentiated customer experiences to separate themselves in today's crowded marketplace. View this webinar to discover how IBM MDM puts these capabilities within easy reach. The webinar will: Reveal how these capabilities are being delivered on-premise and on t
Tags : 
    
Group M_IBM Q2'19

Effective Security with a Continuous Approach to ISO 27001 Compliance

Published By: Tripwire     Published Date: Jul 08, 2008
The Tripwire Enterprise solution provides organizations with powerful configuration control through its configuration assessment and change auditing capabilities. In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. This provides immediate visibility into the state of their systems, and through automating the process, saves time and effort over a manual efforts.
Tags : 
tripwire, iso, iso 27001, security, compliance, comply, isms, information security
    
Tripwire

Top 10 Website Solution Capabilities

Published By: Limelight     Published Date: Sep 10, 2012
In this report you will learn how today's WCM platforms are fusing the best marketing automation practices with content management, allowing marketers to leverage content in new and innovative ways.
Tags : 
website marketing, content management, marketing automation, website analytics, social engagement, crm, dynamic content
    
Limelight

Three must-have capabilities for today's warehouse environment

Published By: IBM     Published Date: Apr 16, 2014
Speed, simplicity and affordability: 3 capabilities businesses need from their warehousing environment. IBM DB2 with BLU Acceleration gives organizations a complete, multipurpose environment to rapidly distill insight from their data, make timely decisions and capitalize on opportunities
Tags : 
ibm, data warehouse, warehouse environment, speed, simplicity, affordibility, db2 with blu, acceleration
    
IBM

Running at the speed of business

Published By: IBM     Published Date: Apr 16, 2014
IBM DB2 offers multi-platform flexibility and optimized capabilities for a variety of workloads. This e-book highlights some common scenarios where DB2 helps businesses derive unprecedented value from expanding data stores—affordably and reliably.
Tags : 
ibm, ibm db2, platform, flexibility, workload, data stores, agile, infrastructure
    
IBM

Mobility on hold: Get back on track with mobile risk mitigation

Published By: IBM     Published Date: Nov 04, 2014
Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.
Tags : 
mobility, mobile risk, security, mitigation
    
IBM

Smart Changes, Big ROI

Published By: IBM     Published Date: Jul 30, 2014
Read this analyst white paper to identify key strategies and capabilities for effective multi-author, recurring narrative reporting and disclosure management.
Tags : 
ibm, business analytics, finance, automation, record to report, rtr, rtr process, disclosure management
    
IBM

Greater Expectations: Consumers are asking for Tomorrow, Today

Published By: IBM     Published Date: Aug 06, 2014
The future era of retailing has arrived, marked by dramatic signs of change. To stay competitive, retailers need to do three things quickly: using Social, Location and Mobile (SoLoMo) capabilities; enable shoppers’ desires for self-service retailing and assess current retail capabilities
Tags : 
ibm, retail, consumers, retailers, social, location, mobile, self-service
    
IBM

IBM Threat Protection System

Published By: IBM     Published Date: Nov 05, 2014
IBM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.
Tags : 
ibm, ibm threat protection, security, it security, protection system, threat protection system, prevention, detection
    
IBM

Six Key Security Considerations for Responsible Cloud Migration

Published By: Symantec     Published Date: Jul 11, 2017
Responsible cloud migration can be achieved by a diligent approach to a few core security considerations. By choosing a secure web gateway with the ability to deliver these advanced capabilities, organizations will find themselves in a great position to proactively address these issues and ensure a safe and compliant move to the cloud.
Tags : 
cloud migration, cloud computing, cloud security, cloud-access security, threat prevention
    
Symantec

Cognitive Equipment Advisor PoV

Published By: Group M_IBM Q2'19     Published Date: May 23, 2019
US ground forces handle massive amounts of information and data while working under unpredictable conditions. These conditions don’t always allow military intelligence analysts access to a technologically reliable way to share information.  AI can help develop a comprehensive intelligence picture and a true sense of cognitive situational understanding (CSU). These technologies can help analyze the massive amounts of data the military receives. And because AI programs are constantly adding new capabilities and tools, they can help the military prepare for the battlefield of the future. Read how. 
Tags : 
    
Group M_IBM Q2'19

Supercharge Salesforce.com initiatives with a 360° view of the customer

Published By: IBM     Published Date: Oct 01, 2014
Salesforce.com is an industry leading cloud CRM solution which helps organizations streamline and effectively manage sales processes, customers and opportunities. The effectiveness of these initiatives can be improved dramatically by providing Salesforce with a 3600 view of the Customer to overcome the limitation of fragmented data that Salesforce currently relies on. This paper discusses how InfoSphere capabilities can be used to create comprehensive and accurate 3600 views of your customers from internal and external sources. This data is integrated seamlessly within Salesforce.com to help your sales teams get a complete view of the customer to help find the right contacts, allocate resources efficiently and identify new opportunities. This helps your sales teams be more efficient, effective and ultimately improve your win rate and drive more revenue.
Tags : 
salesforce, crm solution, data integration, data management, business intelligence, business process management, customer interaction service, customer relationship management
    
IBM

Secure the Mobile Enterprise

Published By: IBM MaaS360     Published Date: Oct 08, 2015
This discusses the unique risks associated with mobile devices and capabilities to consider when building their road map to a secure mobile enterprise.
Tags : 
ibm, fiberlink, maas360, mobile, enterprise, security, networking, wireless
    
IBM MaaS360

Guard data in government environments by implementing continuous diagnostics and mitigation

Published By: IBM     Published Date: Feb 11, 2015
IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities; correlate and analyze critical data; and increase risk-based decision-making at the federal enterprise level.
Tags : 
ibm, ibm security, continuous diagnostics, network monitoring capabilities, risk-based decision-making, security, it management, best practices
    
IBM

IBM Threat Protection System

Published By: IBM     Published Date: Feb 11, 2015
BM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.
Tags : 
ibm, threat protection system, automated response capabilities, it security practices, security, it management, data management, best practices
    
IBM

Beyond the Next Generation: Putting Advanced Network Security To Work

Published By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : 
data security, ibm, converged network security, security risk, networking, security, it management, knowledge management
    
IBM

IAM Buyers Guide: Select the Right Solution for Identity and Access Assurance

Published By: IBM     Published Date: Apr 09, 2015
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects. It then provides a checklist for evaluating solutions and defines the capabilities required to address security complexity, compliance and cost.
Tags : 
access management solution, ibm, security risk, security compliance, networking, security, it management, knowledge management
    
IBM

Cloud Requires Dynamic Security

Published By: IBM     Published Date: Apr 09, 2015
Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio. A comprehensive set of capabilities that provide access management, data and application protection, and deep visibility.
Tags : 
cloud, cloud security, ibm, ibm dynamic cloud security portfolio, access management, data protection, application protection, visibility
    
IBM

IBM Watson Explorer - Explore, Analyze and Interpret Information for Better Business Outcomes

Published By: IBM     Published Date: Jul 14, 2015
Begin your journey toward becoming a cognitive enterprise and start gaining unprecedented value from your own data. Watson Explorer reduces unnecessary research time and allows enterprises to work smarter and faster. Read this brochure to learn how Watson Explorer combines content and data with cognitive computing capabilities to help your organization work more efficiently and make better decisions.
Tags : 
ibm, watson, software, explorer, applications, developer, cloud
    
IBM

Forrester Research Report: Supporting the Zero Trust Model of Information Security

Published By: IBM     Published Date: Jul 15, 2015
This paper evaluates the market’s readiness for Zero Trust concepts and technologies, based on Forrester’s own market data and a custom study of the same audience.
Tags : 
intrusion prevention system, encrypted tunnels, it security, security management, network analysis, visibility capabilities, compliance, disaster recovery
    
IBM

Beyond the Next Generation: Putting Advanced Network Security To Work

Published By: IBM     Published Date: Jul 15, 2015
In this report, EMA highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application.
Tags : 
network management, network security, enterprise management, security technology, converged security systems, application protocols, network architecture, compliance
    
IBM

Combat the latest security attacks with global threat intelligence

Published By: IBM     Published Date: Jul 15, 2015
This white paper will discuss how the X-Force team collects, analyzes and distributes threat intelligence to IBM customers, as well as how this data is used to enrich the capabilities of the IBM Security portfolio.
Tags : 
intelligence technology, security management, threat intelligence, intelligence protection, security solutions, compliance, internet security, intrusion detection
    
IBM

The Case For Security Intelligence Services, Hosted From The Cloud

Published By: IBM     Published Date: Oct 02, 2015
Moving your company's security intelligence monitoring and management to the cloud can provide access to market leading capabilities and reduce capital expense. This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : 
cloud, security intelligence, ibm security, ibm security intelligence solution, security, it management
    
IBM
Start   Previous    30 31 32 33 34 35 36 37 38 39 40 41 42 43 44    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.