it standard

Results 101 - 125 of 688Sort Results By: Published Date | Title | Company Name

Creating a Safety Culture

Published By: SambaSaftey     Published Date: Mar 15, 2019
Today, it’s commonplace for companies to check the motor vehicle records (MVRs) of their drivers once a year. That’s considered due diligence. But what if one driver gets a moving violation or a citation for driving under the influence three weeks after the report was pulled? It could take months for that potentially costly issue to come to light. Likewise, a driver safety policy issued annually is typically worth about as much as the paper it’s written on. There is great potential in setting high standards and creating positive driving behaviors, but this must be a continual process informed by concrete policies, shared motivation to improve, useful data, and quality leadership. Fortunately, several important practices can help companies create a better safety culture –saving money, reducing risk and legal vulnerability, and keeping employees and communities safe. Here’s how.
Tags : 
    
SambaSaftey

Optimizing storage for a highly efficient data center environment

Published By: IBM     Published Date: May 02, 2013
The enormous volume, velocity and variety of data flooding the enterprise, along with the push for analytics and business intelligence, is creating a massive challenge that is overwhelming traditional storage approaches. As the demand for capacity continues to escalate, companies must be able to effectively and dynamically manage the storage supply, but also the demand for storage resources. The key is to optimize the infrastructure through standardization and virtualization, and replace manual tasks with policy-based automation.
Tags : 
optimize, storage, efficient, data center, analytics, business, virtualization
    
IBM

PCI Compliance for Dummies

Published By: Qualys     Published Date: Jul 19, 2012
Updated for PCI DSS Version 2.0 where internal scanning is now required! With the recent updates to PCI DSS, get all the facts and learn how to comply with our updated version of the book. The book is a guide to understanding how to protect cardholder data and comply with the requirements of PCI DSS. It arms you with the facts, in plain English, and shows you how to achieve PCI Compliance. Discover: . What the Payment Card Industry Data Security Standard (PCI DSS) is all about . The 12 Requirements of the PCI Standard . How to comply with PCI . 10 Best-Practices for PCI Compliance . How QualysGuard PCI simplifies PCI compliance
Tags : 
pci, technology, security, firewall, email, virus protection, anti spyware, anti virus, application security, email security, firewalls, internet security, business technology, research, data loss prevention
    
Qualys

Secure Cloud Infrastructure

Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"It is very well understood that Business Enterprises today need to become more agile, meet new and increasing workload and security requirements, while reducing overall IT cost and risk. To meet these requirements and remain competitive many companies are turning to cloud computing. Companies thus need to formulate a strategy that can easily move them from traditional on-premises IT to private or public clouds. Oracle understand the need for IT organizations to move to cloud computing at the same time also recognizes that moving to the cloud is a multi-step journey that starts with standardization and consolidation of IT infrastructure and ends by moving applications and data to the cloud. The PDF is meant to help you gauge through the Oracle’s SPARC servers and give you an experience of simplified journey to the cloud by using the same technology for both cloud and on-premises deployments. No matter where your IT organization is on the journey to the cloud SPARC servers will be an i
Tags : 
    
Oracle PaaS/IaaS/Hardware

Red Hat JBoss Fuse Compared With TIBCO ActiveMatrix BusinessWorks 6.3

Published By: JBoss Developer     Published Date: Oct 21, 2016
This competitive review between Red Hat and TIBCO integration technologies has presented multiple differences between the products. A notable difference is that only Red Hat JBoss Fuse is a 100% open source product. Red Hat is committed to leveraging existing open source projects and using open standards whenever possible for both product implementation and integration communication. This includes Camel, the de-facto integration standard included with Red Hat JBoss Fuse. Red Hat’s open source commitment extends to Active MQ, the upstream messaging technology used with JBoss A-MQ and included with Red Hat JBoss Fuse. Another difference is that Red Hat JBoss Fuse clustering is based on the upstream Fabric8 community project and offers much more functionality than TIBCO clustering options.
Tags : 
cloud, technology, competitive advantage, queuing protocol, open source, application integration, business intelligence, enterprise resource planning, enterprise software, service management
    
JBoss Developer

The GDPR Playbook: Discover, Plan, and Act On The Upcoming EU Data Protection Regulation

Published By: Proofpoint     Published Date: Aug 10, 2017
With data breaches at an all-time high, the time is now for organisations to identify and protect all personal EU data, and drive towards compliance to the GDPR–failure to do so will lead to significant disruption of business. What’s more, adhering to a compliance and standards based framework can ultimately help the business attract and retain more customers. In the case of the GDPR, compliance demonstrates the organisation’s investments in security, privacy, and customer care.
Tags : 
data audit, eu data, vendor risk, organisation, technology, archive management, messaging, content protection
    
Proofpoint

What Do You Mean TLS 1.3 Might Degrade My Security?

Published By: Gigamon     Published Date: Feb 20, 2019
Read “What Do You Mean TLS 1.3 Might Degrade My Security?” to learn about the good, the bad and the ugly as the industry moves to this new encryption standard. Learn how TLS 1.3 will impact your network, including the security implications. We’ll show you the potential implications for active and passive mode decryption as well as east-west traffic, what it means for threat hunting and compliance as well as how to prepare. Read now.
Tags : 
    
Gigamon

Business Models for Smart Machines

Published By: Schneider Electric     Published Date: Apr 23, 2019
After buzzing Industry 4.0 all over the media by all OT and IT experts, today, a few key concepts seem to unveil the potential that the industry believes is behind Industry 4.0. These include: Smart Machines, Smart Factory, cyber physical systems, Everything-as-a-Service and a few technologies like OPC UA, cloud and data analytics. Clearly, they are the innovation drivers and must-haves for every vendor of automation products that want to be recognized as leaders or challengers. Sooner or later they will become standards and used by followers and niche players, but the key question for the market of automation suppliers is not who is first in developing and providing all the nice concepts and technologies, but who is creating and combining them in the right way so that they can be turned into new revenue streams. We keep in mind that competitive advantages can be achieved through increasing operational efficiency, but the better way is through strategic uniqueness. Companies which ar
Tags : 
industry 4.0, iiot, smart machines, smart manufacturing, business models
    
Schneider Electric

How the United Arab Emirates University Sets the Standard for Network Security With HP

Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how the CIO of the United Arab Emirates University community addressed the major challenges faced by the University's network security professionals.
Tags : 
united arab emirates, united arab emirates university, network security, security, network, internet security, network security appliance, security management, vulnerability management
    
HP - Enterprise

Securing LTE Backhaul with IPsec

Published By: Tellabs     Published Date: Mar 23, 2012
Tellabs' white paper explains how IPsec addresses the security issues inherent in LTE networks. It also reviews the end-to-end protection solutions available in the IETF IPsec standard.
Tags : 
deploy, tellabs, network migration, migration, synchronization, ethernet, backhaul, backhaul network, scalability, revenues, networking, security
    
Tellabs

LTE Stretches Synchronization to New Limits

Published By: Tellabs     Published Date: Mar 23, 2012
Tellabs' white paper helps you find the right packet syntonization/synchronization solution for your LTE network. Learn how to migrate smoothly to IEEE 1588v2-based syntonization and how to support phase synchronization once final standards emerge.
Tags : 
deploy, tellabs, network migration, migration, synchronization, ethernet, backhaul, backhaul network, scalability, revenues, syntonization, lte network, packet, networking, security
    
Tellabs

Analyst White Paper: Prepare Contact Centers for the Future With SIP

Published By: Genesys     Published Date: Oct 16, 2013
The existing upgrade paths from legacy PBX and ACD suppliers make it difficult for contact center executives to contemplate the future of customer service on their own terms. If your ACD-based contact center has become a road block for adding capacity or adding channels such as social media and mobile, you might want to think about making the switch to a SIP-based contact center solution. SIP delivers two important advantages over legacy switching: 1. SIP is based on open standards, so you can choose hardware and software that is best suited for your environment. 2. SIP’s capability extends beyond voice to new media types such as mobile, social media and video. SIP-based contact centers provide a roadmap to sophisticated features without the complexity and expense of traditional proprietary ACDs. Learn more about how to build the next-generation customer service platform.
Tags : 
contact center, customer service, social media, mobile, sip, technology solution, technology, enterprise applications, business technology
    
Genesys

State of California Technical Case Study

Published By: NetApp     Published Date: Sep 29, 2014
California is the world’s eighth-largest economy, and its IT challenges exceed those of many national governments. That was particularly true during the budget crisis that began in 2008. In the face of severe budget cutbacks, state agencies needed to radically change the way they operated to keep meeting their missions to serve citizens. The State of California sets a new standard for IT with Shared Services. Learn how the California Natural Resources Agency harnessed the power of cloud computing to reduce IT capital costs by 42% and speed up service delivery by 70%.
Tags : 
it challenges, it standard, it capital costs, speed up service deliver, shared services, it management
    
NetApp

5 OAuth Essentials for API Access Control

Published By: CA Technologies     Published Date: Mar 06, 2015
OAuth offre all'utente il pieno controllo sulla delega dell'accesso a un'API. Questo consente l'integrazione tra servizi per conto di tale utente. Gli stessi fornitori web social che hanno reso popolare il modello costituito dall'esposizione di un'API per consentire agli sviluppatori di terze parti di arricchire le loro piattaforme, sono stati i primi ad applicare questi meccanismi di autorizzazione delegati. OAuth è stata definito nel 2006, per standardizzare i meccanismi di questo tipo.
Tags : 
    
CA Technologies

The Future of Consolidation

Published By: Anaplan     Published Date: Mar 05, 2015
Financial consolidation systems are the ‘engine room’ of the corporate finance department, enabling companies of all sizes to comply with regulatory reporting requirements, company law and global accounting standards as well satisfy management’s need for periodic management reporting. But all is not well with standalone consolidations applications that were developed in the 1990’s and which are still commonplace in some of the world’s largest multinationals. According to one recent report, 47 percent of companies have made substantial investments in the last year in their financial close, filing, and reporting. Yet, despite the considerable sums of money invested in the process, management teams across the globe remain dissatisfied with the quality and timeliness of management information.
Tags : 
consolidation, planning, survey, performance, sales, audience, finance, strategic exercise, compliance, software soliutions, knowledge management, business technology
    
Anaplan

Don’t Settle for AirWatch: Choose the Leader in Mobile Security Innovation

Published By: MobileIron     Published Date: Mar 21, 2017
Over the past few years, organizations have used a variety of tools and technologies to enable basic mobile device management (MDM) and essential apps like email and calendar. But those capabilities are inadequate for companies that want to move beyond the basics and transform their business processes by securely moving apps and data to the cloud. For AirWatch customers, this means they should start evaluating leading enterprise mobility management (EMM) platforms like MobileIron in order to achieve their mobile transformation goals. Our platform is 100% focused on building today’s modern enterprise architecture, which is quickly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services.
Tags : 
    
MobileIron

The Magic Quadrant for Enterprise File Synchronization and Sharing

Published By: Box     Published Date: Nov 24, 2015
Today's EFSS market offers a range of maturing options to IT leaders as well as mobile and collaboration planners. New capabilities for corporate system integration and enhanced content collaboration continue to add to standard EFSS functionality.
Tags : 
file sync, sharing, box, efss, ecm, collaboration, productivity, knowledge management, enterprise applications, data management, business technology
    
Box

From Invoice Capture to Archive: How to Achieve End-to-End AP Automation

Published By: Onbase     Published Date: Feb 18, 2016
Accounts payable has been talking about end-to-end integrated automation for at least 40 years. Today, the technology exists, but resources are limited and end-to-end AP automation is still not standard. Some AP departments have automated pieces of the AP process, but an end-to-end solution should include the ability to capture, integrate, measure, process, store, and access information.
Tags : 
accounts payable, business management, business practices, accounting, finance, business intelligence, productivity
    
Onbase

Cyber Insurance 101: Understanding the Ins and Outs of Coverage

Published By: illusive networks     Published Date: May 18, 2016
The growing need for cyber insurance is undeniable, yet the landscape is currently operating without standards, mostly due to the high number of unknowns regarding cyber risks. As a result, understanding how cyber insurance can help mitigate the costs for your company, if a cyber attack occurs, is quickly emerging as a best practice. Download this whitepaper and learn about what to consider when purchasing a cyber insurance plan, cyber Insurance Coverage: What Is (and Isn't) Covered, How Much Will the Coverage You Need Cost?, and how to step up cyber security efforts.
Tags : 
    
illusive networks

The Payment Card Industry: Data Security Standard and CA Privileged Access Management

Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
    
CA Technologies

The Ultimate Guide to Healthcare Marketing Attribution & ROI

Published By: Evariant     Published Date: Nov 08, 2018
Smarter growth for healthcare providers requires a strong patient acquisition engine that can demonstrate ROI. By focusing on the financial impact of marketing efforts, healthcare marketers demonstrates why these efforts warrant further investment. This guide presents the Evariant approach to calculating service line ROI from marketing spend. It includes a standard set of formulas and optional factors that may be relevant to certain service lines and system-wide operations.
Tags : 
healthcare marketing, marketing roi, patient acquisition, marketing measurement
    
Evariant

It's Time to Move Your Critical Data to SSD's

Published By: Micron     Published Date: Oct 14, 2016
Today’s IT professionals are well aware that users expect fast, reliable access to ever-growing amounts of data – from web content, to videos, to business intelligence data and more. Meeting the challenges of this exponential growth is nearly impossible with existing, spinning media storage technology. Hard disk drives (HDDs) have been the standard in data storage for decades, but they can no longer satisfy. They create bottlenecks in data access, they fail to meet the growing demands of higher user expectations, and they consume too much power. Download to learn how to solve this issue.
Tags : 
    
Micron

Web Customization in 5

Published By: Progress     Published Date: Oct 09, 2017
Tailoring experiences for customers is critical to make your business standout. Customization works well for organizations that want to enhance their standard customer experience but don’t have the necessary tools or strategy for in-depth personalization. Learn about the 5 best practices for customizing websites and the 5 biggest challenges marketers face while customizing their websites.
Tags : 
    
Progress

The Rise of Machine Learning (ML) in Cybersecurity

Published By: CrowdStrike     Published Date: Apr 10, 2017
All ML technology isn’t created equal. Learn how the CrowdStrike® ML-based Engine Defends Against Unknown Malware. While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? A new white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology — what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution, it dramatically increases your ability to detect attacks that use unknown malware.
Tags : 
    
CrowdStrike

The CFO Guide to Rev Re: Challenges and Solutions

Published By: FinancialForce     Published Date: Dec 01, 2017
Download this guide to review three major pain points that companies are facing as they prepare for the new revenue recognition standards-ASC 606 and IFRS 15- as they are fast approaching.
Tags : 
    
FinancialForce
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.