it enterprise

Results 326 - 350 of 4061Sort Results By: Published Date | Title | Company Name

How Modern ERP Helps Improve Productivity in Non-profit Organizations

Published By: Unit4     Published Date: Feb 19, 2019
When the need for non-profit organizations to maximize impact, efficiency, and accountability is greater than ever, a modern Enterprise Resource Planning solution (ERP) can deliver an array of tangible benefits. Learn how next generation ERP can help improve efficiency, add value to projects, and improve budget forecasting.
Tags : 
    
Unit4

Security Whitepaper

Published By: Automation Anywhere     Published Date: Feb 21, 2019
Robotic Process Automation was born with the vision of empowering business users to create software bots that could interact with enterprise systems just like humans. Its benefits include substantial time and cost savings, improved customer satisfaction, increased workforce morale, and the ability to build a competitive advantage over competitors. But to fully realize all these benefits, it’s important for businesses to select a solution with a robust RPA security architecture that supports core principles, such as least privileges and separation of duties while delivering end-to-end protection for the critical apps and sensitive data involved. This paper provides an overview of the industry’s highest standard for enterprise-grade security as demonstrated by the market’s leading Digital Workforce platform, Automation Anywhere Enterprise.
Tags : 
    
Automation Anywhere

Tackling RPA at scale – analyst report

Published By: Automation Anywhere     Published Date: Feb 21, 2019
Automation Anywhere’s flagship product is Automation Anywhere Enterprise – a RPA platform offering a variety of tools to help organisations develop, operate and manage RPA bots that automate data entry, data gathering and other repetitive, routine tasks usually carried out as part of high-volume, repetitive work (for example, service fulfilment work in call centres, shared-service centres, and back-office processing environments). Automation Anywhere Enterprise bots can add value both in unattended (server-based, lights-out operation) and attended (desktop-based, interactive) deployment configurations. In this report, MWD Advisors digs deeper into the features and capabilities of Automation Anywhere’s product portfolio, analysing its fast-growth trajectory and highlighting large-scale implementations.
Tags : 
    
Automation Anywhere

Transforming productivity for distributed, agile manufacturing enterprises with the FabPro 1000

Published By: 3D Systems     Published Date: Mar 07, 2019
To stay competitive, manufacturers have to meet the rapidly changing needs of customers while retaining high quality products, at the same time as controlling costs. Product lifetimes are shrinking and customers are expecting more customization and innovation. Agility is the key to staying ahead of the competition and meeting the needs of customers. The FabPro 1000 entry-level industrial 3D printer delivers production-grade parts, at high speed, with six sigma repeatability, and can be used across a distributed manufacturing and engineering enterprise. With a low cost of entry, FabPro 1000 enables agile manufacturing operations to meet customer needs rapidly and effectively empowers engineers to deliver more value and quality in the product development process. To find out more download this whitepaper today!
Tags : 
    
3D Systems

Data Management Predictions 2019

Published By: Oracle     Published Date: May 08, 2019
Oracle DBAs Share Insights about the Future of Cloud, Security, Artificial Intelligence, and Autonomous Computing. This year, in addition to canvasing analysts, pundits, and executives for their strategic insights, Oracle is interested in the tactical views, predictions, and opinions of master DBAs, database product experts, and Oracle ACE Directors. We gathered insights about database management, security, artificial intelligence, autonomous computing, and many other topics and cover how future trends will impact DBA careers during 2019, and beyond. The Intelligent Enterprise Era. Download predictions.
Tags : 
    
Oracle

3 Ways Data is Changing Customer Experience in Banking

Published By: The Economist Group     Published Date: Aug 22, 2019
In a digital world, customers expect banks to connect all the dots and deliver omnichannel experiences that are seamless, personalized, and yes, delightful. Whether your customers visit branch locations or engage on mobile apps, it’s essential that at the enterprise level, you're able to understand and anticipate their needs. Understanding your data is key to this kind of responsiveness. When you’re able to harness data and segment customers in new and exciting ways, target the right markets, and offer relevant products at the right time you can drive new opportunities, generate new revenue streams, and increase the value of every customer. To find out more download this whitepaper today.
Tags : 
    
The Economist Group

The Secure Data Center: An Integrative Approach to Achieving Holistic Security

Published By: Digital Realty     Published Date: Feb 24, 2015
Today’s headlines are replete with accounts of major corporations that have found themselves under attack for their enterprise data. For data center operators, ensuring the security and continuity of their clients’ business operations is a key and compelling imperative. See how Digital Realty approaches data center security.
Tags : 
data center, security, infrastructure, cloud computing, it management, business intelligence, business technology, infrastructure management
    
Digital Realty

MobileIron Content Security Service Datasheet

Published By: MobileIron     Published Date: Feb 17, 2015
The personal cloud is the most persistent data loss threat to the enterprise today because many employees use their own cloud services to store work documents. Traditionally, content security solutions functionally link security and storage which requires the migration of work documents to a new content storage repository in order to enforce security policies. This increases complexity by creating more repositories for the enterprise to manage. Most importantly, this approach does not solve the personal cloud problem because individual users continue to store their work documents, for convenience, in cloud services that IT cannot secure.
Tags : 
cloud, mobileiron, mobile, security
    
MobileIron

Top Five Things to Know About Enterprise Mobility Management

Published By: MobileIron     Published Date: Feb 17, 2015
Ready or not, the global mobility trend is forcing enterprises to enable a mobile workforce with business productivity tools on any device, regardless of the underlying operating system. As IT is quickly impacted by end-user technology decisions, enterprises can no longer ignore this reality, especially given the explosive global demand for mobile devices. This guide offers practical, step-by-step insight that can help any organization accelerate their journey to becoming a Mobile First enterprise by providing a detailed, best-practice deployment process and recommendations for finding the right enterprise mobility management (EMM) provider.
Tags : 
mobile, enterprise, emm, mobile management
    
MobileIron

Security for the Mobile First Era

Published By: MobileIron     Published Date: Feb 17, 2015
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile, open file architecture, mobileiron, security, sandboxed
    
MobileIron

10 Things IT Administrators Need to know about Android for work

Published By: MobileIron     Published Date: Mar 02, 2015
The Android platform has quickly established itself as a dominant mobile OS for consumers. However, enterprise IT has been slower to adopt Android broadly due to lack of Enterprise Mobility Management capabilities in Android and fragmentation. But the recent release of Android Lollipop reduces fragmentation and when combined with MobileIron enterprise mobility management (EMM) solutions, gives IT the tools needed to easily manage and secure apps and content on all types of Android devices. This will accelerate adoption of Android devices within the enterprise.
Tags : 
android, apps, vpn, work, multiple devices, emm
    
MobileIron

Why Moats And Castles Belong In The Past

Published By: Akamai Technologies     Published Date: Dec 11, 2018
The moat-and-castle approach to enterprise security no longer works. Once inside the walls, a person can pretty much do whatever they want. With EAA there is a new way more simple, secure, and convenient way to protect the enterprise.
Tags : 
    
Akamai Technologies

Remote Access Redefined: Managing the Rise of Third-Party Users

Published By: Akamai Technologies     Published Date: Dec 11, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
    
Akamai Technologies

5 Reasons Enterprises Need a New Access Model

Published By: Akamai Technologies     Published Date: Dec 11, 2018
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies

Adopt DNS Best Practices to Proactively Protect Against Malware

Published By: Akamai Technologies     Published Date: Dec 11, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
    
Akamai Technologies

The 4 Benefits of VPN Elimination

Published By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
    
Akamai Technologies

Zero Trust Delivers 6 Security and Business Benefits

Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies

Data Masking Reinvented

Published By: Delphix     Published Date: May 03, 2016
Data security is a top concern these days. In a world of privacy regulation, intellectual property theft, and cybercrime, ensuring data security and protecting sensitive enterprise data is crucial. Only a data masking solution can secure vital data and enable outsourcing, third-party analysis, and cloud deployments. But more often than not, masking projects fail. Some of the best data masking tools bottleneck processes and once masked, data is hard to move and manage across the application development lifecycle.
Tags : 
    
Delphix

Convergence's Early Adopters: Three Trends in Migration

Published By: Dell EMC     Published Date: Nov 02, 2015
A new IDG Research study reveals that IT professionals are already seriously considering converged systems. The advantages of converged systems are clear. Still, some reticence remains due to concerns about cost and ROI. Learn how converged systems bring value to the enterprise today and tomorrow. And see how Dell PowerEdge FX solutions smooth the road to convergence.
Tags : 
    
Dell EMC

Hyper-Converged, Simplicity Verified

Published By: Dell EMC     Published Date: Nov 04, 2016
Abstract: Dell EMC VxRail, powered by Intel® Xeon® processors, is the only fully integrated VMware hyper-converged infrastructure appliance, delivering a turnkey solution that simplifies and extends VMware environments. Streamline IT infrastructure, gain new levels of speed and performance to enhance the end-user experience, and spend more time on innovation. Plus, Dell EMC VxRail is more than 30% lower total cost of ownership compared to a build-your-own solution. This report looks at: • Super-fast deployment and scalability • Take on enterprise workloads and deliver a smooth yet powerful user experience • Keep peace of mind with accessibility and immediate issue alerts This report shows how you can streamline IT infrastructure, achieve new levels of speed and performance to improve end-user experiences, and allow extra time for innovation. Learn more, read this brief but interesting infographic.
Tags : 
it infrastructure, hyper-convergence, next-gen, storage, virtual machines, scale-out, storage management, enterprise software
    
Dell EMC

Cloud Computing Extends the Enterprise

Published By: QTS     Published Date: Feb 04, 2016
An FCW Digital Dialogue Download this Digital Dialogue from Federal Computer Week to learn how agencies like the General Services Administration and Department of Homeland Security are using the cloud to extend their enterprise and foster innovation.
Tags : 
cloud computing, fcw, qts, carahsoft, vmware
    
QTS

Dell Storage: Redefining the Economics of Enterprise Storage

Published By: Dell EMC     Published Date: Nov 10, 2015
Download this whitepaper to see how Dell offers the technology, know-how and experience to deliver new workload-optimized architectures that simplify IT for any size enterprise.
Tags : 
    
Dell EMC

Dell Solutions for Big Data & Analytics

Published By: Dell EMC     Published Date: Oct 08, 2015
Download this whitepaper to learn how Dell can help you realize the full value of your big data strategy—and to capitalize on all of your data, from enterprise systems to social media and the Internet of things.
Tags : 
    
Dell EMC

Kaspersky Security Solution for Data Centers

Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.
Tags : 
security application, data centers, data, cyber-attacks, security, prevent cyber-attacks, anti spam, anti spyware
    
Kaspersky Lab Australia and New Zealand

Why Moats And Castles Belong In The Past

Published By: Akamai Technologies     Published Date: Jun 14, 2018
The moats and castle approach is an antiquated, yet a common way, of protecting the enterprise network. This paper describes a new way to protect the enterprise which hides applications from the Internet, outside of the firewall, with zero open ports and a minimal attack surface.
Tags : 
security, enterprise security, eaa
    
Akamai Technologies
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.