large scale

Results 101 - 125 of 137Sort Results By: Published Date | Title | Company Name

State of The Internet/Security

Published By: Akamai Technologies     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend wonít continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : 
internet, security, cryptocurrency, data, breaches, botnet
    
Akamai Technologies

Surveillance: The Ideal Fit for NUUO's Scaling NVRs

Published By: Seagate Technology     Published Date: Apr 14, 2015
Upgrading security systems to meet both current and future needs is no small feat. So when a Texas-based surveillance system integrator began work with a large national nonprofit foundation on its 20,000 square foot park-like property, existing infrastructure and future system deployment were primary considerations. With the objective to update the nonprofitís Virtual Management Software (VMS) while leveraging existing analog and IP cameras, the system integrator needed a cost-effective solution to meet their current needs with the ability to scale for rapid growth. Download this case study to learn more about how the system integrator engaged with NUUO, a leading NVR and VMS manufacturer known for seamless integration of 3rd party cameras to build a customized system that would suit the nonprofitís needs.
Tags : 
surveillance, security system, virtual management software, cameras, network performance management, intrusion prevention, network security appliance, security management, application integration, data integration
    
Seagate Technology

Symantec NetBackup 7.6 Benchmark Comparison: Data Protection In A Large Scale Environment (Part 1)

Published By: Symantec     Published Date: Oct 20, 2014
In this report, we'll present the results of a 3rd party benchmark test that looks into how a few of the most respected solutions out there fared across five very real-world test scenarios to determine who really is the King of Scale. Read the benchmark report to learn more.
Tags : 
symantec, data protection, backup and recovery, disaster recovery, data center, network security, email security
    
Symantec

Tackling RPA at scale Ė analyst report

Published By: Automation Anywhere     Published Date: Feb 21, 2019
Automation Anywhereís flagship product is Automation Anywhere Enterprise Ė a RPA platform offering a variety of tools to help organisations develop, operate and manage RPA bots that automate data entry, data gathering and other repetitive, routine tasks usually carried out as part of high-volume, repetitive work (for example, service fulfilment work in call centres, shared-service centres, and back-office processing environments). Automation Anywhere Enterprise bots can add value both in unattended (server-based, lights-out operation) and attended (desktop-based, interactive) deployment configurations. In this report, MWD Advisors digs deeper into the features and capabilities of Automation Anywhereís product portfolio, analysing its fast-growth trajectory and highlighting large-scale implementations.
Tags : 
    
Automation Anywhere

TDWI Best Practices: Data Lakes, Purposes, Practices, Patterns and Platforms (customized reports)

Published By: SAS     Published Date: Oct 18, 2017
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. To help users prepare, this TDWI Best Practices Report defines data lake types, then discusses their emerging best practices, enabling technologies and real-world applications. The reportís survey quantifies user trends and readiness f
Tags : 
    
SAS

Team uses APM tool to ID Attacker

Published By: Viavi Solutions     Published Date: Apr 01, 2015
With the expanding sophistication of large-scale breaches, the question isnít whether most organizations will be hacked Ė itís when. The APM for Security Forensics white paper shows you how performance monitoring tools can act as a network security camera. It also includes a case study of how one network team used a performance monitoring solution to identify the surprising source of an attack.
Tags : 
apm, security, application performance management, it infrastructure, it security, data loss, intrusion detection, intrusion prevention, network security appliance
    
Viavi Solutions

The 3 Stage Journey To The All Flash Cloud

Published By: Pure Storage     Published Date: Oct 09, 2017
Cloud computing and all-flash storage are two of the most important innovations driving next-generation IT initiatives. While it may seem at first that these are parallel trends, in reality they are inextricably intertwined. Without the benefits of all-flash storage ódriving new levels of performance, agility and management simplicity ó enterprises would not be able to modernize their infrastructures to deliver cloud services. It is no coincidence that the largest hyperscale cloud providers rely on all-flash storage solutions as their storage foundation. Pure Storage all-flash storage arrays provide enterprise customers with a safe, secure and smooth path to the all-flash cloud. You can take the journey in stages, starting small with a single application or two, and then adding more applications through consolidation and virtualization. You can also implement multiple stages at once.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Pure Storage

THE BUILDING BLOCKS OF ORGANIZATIONAL CHANGE: A Guide For The Modern Finance Leader

Published By: Oracle     Published Date: Sep 21, 2016
Overhauling your processes, rewiring your product focus, creating a new culture: large-scale, transformative organizational development and change is messy, difficultóand usually fails. This digibook contains a step-by-step guide to leading process management and overcoming the cultural and procedural challenges, with case studies and examples of how smart CFOs are leading the transformation of their enterprises.
Tags : 
    
Oracle

The Business Cloud Outlook

Published By: Microsoft Office 365     Published Date: Jan 21, 2016
Small to mid-sized businesses today face a tough task; providing helpful collaboration tools that big businesses offer, without the large costs. Microsoft commissioned Spiceworks, a network of IT pros, to survey over 250 IT experts working at small to mid-sized businesses to tell us how to do more with less. The IT pros had this to say, ďAs a result of using a cloud approach, nearly 80% [of surveyed IT pros] said theyíre saving money, seeing more productivity and better security.Ē Learn more in the free eBook and propel your small business into the cloud: ē Costs. Provide better tools to increase availability, productivity, and security while keeping costs down. ē Scale. Take advantage of self-servicing and discover the ability to quickly scale your business. ē Mobility. Make accessing information on the go easier for your mobile workforce.
Tags : 
it management
    
Microsoft Office 365

The Business Value of Dell EMC Flash Storage

Published By: Dell EMC     Published Date: Aug 01, 2019
IT Transformation is a concept that is not synonymous with digital transformation, but the two concepts are fundamentally linked. A business that transforms its IT infrastructure no longer has to rely on rigid, manual, siloed legacy technologies. Updating IT often yields a boost in IT operational speed, efficiency, scale, and cost effectiveness ? tasks become automated, processes streamlined, and resources freed up. These IT-level improvements fuel a larger-scale digital transformation enabling businesses to out-innovate, out-think, and out-pace its competitors in todayís digital economy. To learn more, download this report from Dell and Intelģ.
Tags : 
    
Dell EMC

The Comprehensive Guide to Marketing Platform RFPs

Published By: Emarsys     Published Date: Feb 14, 2018
Not all marketing platforms offer the same services or features, which is why itís so important that your RFP helps you compare them accurately. These tips should prepare you to collect the information needed to compare prospective vendors on your terms, not theirs. Additionally, our marketing RFP template was designed to help make the whole process easier. Customize it to meet your specific needs, and be sure you get all the information you need from every prospective vendor to make this important decision. Remember, you wouldnít partner with just anyone to climb Mount Everest. Selecting the right partner for your marketing platform is an important, strategic, long-term decision, with large-scale consequences. Choose wisely.
Tags : 
marketing, platform, rfp, vendors, services, optimization
    
Emarsys

The HR Guide to Smarter Volume Recruitment

Published By: CEB     Published Date: Nov 09, 2015
As an HR professional, you know the spotlight is on recruitment functions to prove their value to the business. Youíve seen how the volume of job applications has risen over the last few years, yet all it has done is create more work and rarely better outcomes Ė for candidates, recruiters or employers. Based on CEB research, this eBook uncovers the insights and solutions to overcome these volume recruitment challenges: ē How to create an effective employer brand ē How to optimize the candidate experience ē How to make the recruitment process more efficient
Tags : 
recruitment, recruiting, volume recruitment, volume hire, volume recruiting, high volume recruitment, high volume recruiting, applicant sifting, candidate sifting, sifting applications, large scale recruiting, graduate recruitment, pre-hire, pre-hire assessments, ability tests, employer branding, employer brand, candidate experience, talent assessments
    
CEB

The Ideal Intelligent Virtual Assistant Checklist for CX Black Belts

Published By: Interactions     Published Date: Oct 29, 2019
We all know that the customer experience is a big deal. By 2020, customer experience will overtake price and product as the key differentiator. But due to the complicated nature of integrating a large-scale, customer-facing technology like an IVA, many companies donít know where to start or how to ensure they are creating the best possible virtual assistant. Weíve compiled some key technologies and features that should be top of mind when assessing internal expertise or selecting an external vendor.
Tags : 
    
Interactions

The IoT Imperative for Consumer Industries

Published By: SAP     Published Date: Nov 22, 2017
Consumer industries are facing once in a lifetime changes in the way they engage and interact with their customers and consumers. Whether consumer products, retail, or wholesale, there are two broadly unifying trends. First, consumers have both heightened influence and increased expectations. Second, several largely untapped digital technologies have the potential to enable new capabilities to better satisfy customer needs. For the key consumer industries of agribusiness, consumer products, life sciences, retail, and wholesale, the Internet of Things (IoT) will enable many new opportunities. These industries have a shared goal and challenge: to be able to create and offer engaging end consumer and/or customer experiences at scale. Part of the way that companies will achieve this goal and respond to this challenge is by developing digital transformation (DX) strategies. Such strategies enable new and potentially disruptive capabilities with a broad range of technologies.
Tags : 
consumer, industries, interactions, customers, products, retails, wholesale, influence, digital, technologies
    
SAP

The Next Wave of the Bot-Driven Brute Force Attack

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in todayís assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion recordsóa large majority of which included usernames and passwords.1 This wasnít new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials arenít stolen just for funóthey are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are botsómalicious onesóbecause they enable cybercriminals to achieve scale. Thatís why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd

The ROI of Cloud Apps - Forrester Research Inc. Uncovers Long-Term Value in Cloud Apps

Published By: Box     Published Date: May 31, 2012
This Gilbane Group Beacon examines how large-≠scale trends are changing enterprise collaboration and content sharing expectations. It defines Cloud Content Management, an emerging set of content management practices.
Tags : 
cloud, content management, active control, collaboration, sharing, content sharing, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management
    
Box

The Role of Converged and Hyper-converged Infrastructure in IT Transformation

Published By: Dell EMC     Published Date: Aug 06, 2018
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. It sounds synonymous with digital transformation, but in actuality, IT Transformation is the set of enabling technologies, processes, and focus areas that make effective digital transformation possible. A company that transforms its IT infrastructure no longer has to rely on rigid, manual, siloed, legacy technologies. It sees a boost in IT operational speed, efficiency, scale, and cost effectivenessótasks are automated, processes streamlined, and resources are freed up. Those IT-level improvements fuel a larger-scale digital transformation, allowing the company to thrive in todayís digital economy. It is able to out-innovate, out-think, and out-pace its competitorsóultimately becoming the disruptor, not the disrupted.
Tags : 
    
Dell EMC

The Saas Advantage for Producing Product Catalogs

Published By: Catapult     Published Date: Apr 23, 2009
Software-as-a-Service is changing the way companies purchase technology solutions. Rather than securing large capital budgets and tying up IT labor for months, business executives can now address mission critical initiatives with subscription-based software solutions that scale with their business and can be implemented in little to no time.
Tags : 
saas, software-as-a-setvice, on-demand, catapult, on-premise application, management solution, vpn, version lock‚Äźin, pay‚Äźper‚Äźseat, flat‚Äźrate fee per transaction, salesforce.com, security, remote access, product information management, sales, sales strategies, data management, customer interaction service, customer relationship management, customer satisfaction
    
Catapult

The Socialbakers Guide to Managing Large Facebook Pages

Published By: Socialbakers     Published Date: Jan 20, 2015
Managing a large Facebook Page (500,000+ Fans) comes with a unique set of challenges. While itís great to have a large audience - it provides fantastic opportunities to generate high ROI from social - an audience of such scale comes with equally fantastic challenges. You need to be prepared in order to succeed.
Tags : 
how to manage large facebook pages, facebook pages with a large audience, challenges of large facebook pages, optimize facebook content, tips for managing large facebook pages, large facebook pages, network management, network performance, network performance management, traffic management, content management
    
Socialbakers

The Top Five Myths of Big Data Analytics

Published By: Teradata     Published Date: Jun 12, 2013
This paper takes a look at the hard truths and common misconceptions surrounding big data. In particular, it focuses on five common myths about large-scale analytics, athen offers a glimpse at the next steps necessary to make big data work for you.
Tags : 
big data, big data analytics, data driven marketing
    
Teradata

The Total Economic Impactô of Microsoft Azure IaaS

Published By: Microsoft Azure     Published Date: Apr 11, 2018
The 2017 study, The Total Economic Impactô of Microsoft Azure IaaS, gives insight into both the costs and benefits of large-scale Azure infrastructure as a service (IaaS) implementation. This commissioned study conducted by Forrester Consulting analyzes the return on investment and business impact that several enterprises experienced when moving from a primarily on-premises environment to Azure. The companies interviewed come from a variety of industries and locations (global/multinational, North American, and European). In addition to a 435 percent overall return on an Azure IaaS investment*, the businesses also experienced: Reduced data center and outsourcing costs. Website scale and performance improvements. Ease of experimentation through virtualized environments. Developer and tester improvements. Download the study to learn about the potential ROI that could be realized by shifting some or all of your management and operations to Azure.
Tags : 
    
Microsoft Azure

Three "To-Do's" To Keep Your ERP Current

Published By: Panaya     Published Date: Aug 26, 2016
In the era of digital transformation, where the speed of change requires business processes to be agile, change with evolving business context and respond to existing and emerging competition - organizational culture and large-scale business processes are still resistant to change. This Panaya whitepaper provides a practical "to-do" list that can help facilitate change and keep your ERP current.
Tags : 
panaya, erp, enterprise resource planning, digital, digital ready, erp systems, digitalization, digital transformation, knowledge management, enterprise applications, business technology
    
Panaya

Three Critical Decisions You Need to Make at the First Sign of a Security Breach

Published By: Dell SecureWorks     Published Date: May 28, 2013
The Dell SecureWorks Incident Response and Digital Forensics team helps organizations of all sizes and across all industries prepare for, respond to and recover from even the most complex and large-scale security incidents.
Tags : 
security, security breach, incident response, digital forensics, hacker detection, internet security, intrusion detection, security management
    
Dell SecureWorks

To PostgreSQL and Beyond: Stratoscaleís Definitive Guide to Large-Scale PostgreSQL Deployments

Published By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to ďDay TwoĒ challenges of accelerating large-scale PostgreSQL deployments. With the ongoing shift towards open-source database solutions, itís no surprise that PostgreSQL is the fastest growing database. While itís tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. After a PostgreSQL deployment is live, there are a variety of day-two scenarios that require planning and strategizing. The third section of this eBook provides a detailed analysis of all aspects accelerating large-scale PostgreSQL deployments: ? Backups and Availability: strategies, point-in-time recovery, availability and scalability ? Upgrades and DevOps: PostgreSQL upgrade process, application upgrades and CI/CD
Tags : 
    
Stratoscale

Transforming Traditional Security Strategies into an Early Warning System for Advanced Threats

Published By: EMC Corporation     Published Date: Mar 20, 2014
To develop the visibility, agility and speed to deal with advanced threats, security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics.
Tags : 
emc, siem, security transformation, malware detection, malware threats, big data security platform, incident detection, advanced security analysis, security, enterprise software
    
EMC Corporation
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.