pto

Results 176 - 200 of 436Sort Results By: Published Date | Title | Company Name

Datastax Enterprise and Microsoft Azure

Published By: Datastax     Published Date: Mar 06, 2018
Digital disruptors are giving customers the information they want, when, where, and how they want it, resulting in a fundamental shift in customer expectations and how enterprises deliver value. Enterprises are in a race to set themselves apart from the competition and meet soaring customer demands, resulting in the rise of modern applications. Whether it痴 for purchasing clothes, groceries, or software, companies and customers alike expect these applications to perform at a certain standard all the time.
Tags : 
    
Datastax

The Hybrid Cloud Data Layer Built for Disruptors

Published By: Datastax     Published Date: Jun 26, 2018
In this eBook, we値l take a look at why DataStax and Azure combine to make the ideal hybrid operational cloud database for the modern application needs of many of our large enterprise customers. The eBook explains how digital disruptors like Microsoft, Komatsu, and IHS Markit are leveraging the DSE+Azure hybrid cloud database to build game-changing applications built for the Right-Now Economy.
Tags : 
    
Datastax

DataStax Enterprise: The Hybrid Cloud Data Layer Built for Disruptors

Published By: Datastax     Published Date: Aug 27, 2018
In this eBook, we値l take a look at why DataStax and Azure combine to make the ideal hybrid operational cloud database for the modern application needs of many of our large enterprise customers. The eBook explains how digital disruptors like Microsoft, Komatsu, and IHS Markit are leveraging the DSE+Azure hybrid cloud database to build game-changing applications built for the Right-Now Economy.
Tags : 
    
Datastax

DataStax Enterprise: The Hybrid Cloud Data Layer Built for Disruptors

Published By: Datastax     Published Date: Aug 28, 2018
In this eBook, we値l take a look at why DataStax and Azure combine to make the ideal hybrid operational cloud database for the modern application needs of many of our large enterprise customers. The eBook explains how digital disruptors like Microsoft, Komatsu, and IHS Markit are leveraging the DSE+Azure hybrid cloud database to build game-changing applications built for the Right-Now Economy.
Tags : 
    
Datastax

DataStax Enterprise and Microsoft Azure: The Hybrid Cloud Data Layer Built for Disruptors

Published By: Datastax     Published Date: Nov 02, 2018
In this eBook, we値l take a look at why DataStax and Azure combine to make the ideal hybrid operational cloud database for the modern application needs of many of our large enterprise customers. The eBook explains how digital disruptors like Microsoft, Komatsu, and IHS Markit are leveraging the DSE+Azure hybrid cloud database to build game-changing applications built for the Right-Now Economy.
Tags : 
    
Datastax

The Hybrid Cloud Data Layer Built for Disruptors

Published By: Datastax     Published Date: Jan 07, 2019
Digital disruptors are giving customers the information they want, when, where, and how they want it, resulting in a fundamental shift in customer expectations and how enterprises deliver value. As enterprises move towards adopting these modern applications and achieving data autonomy, the data layer and cloud infrastructure they run on can make a huge impact. In this eBook, we値l take a look at why DataStax and Azure combine to make the ideal data layer for contextual, always on, real-time, distributed, and scalable applications.
Tags : 
    
Datastax

Endpoint Security for the Enterprise

Published By: Symantec     Published Date: Dec 13, 2017
Today痴 workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. SymantecTM provides a complete endpoint solution powered by the world痴 largest civilian Global Intelligence Network (GIN) to help organizations secure their enterprise and mobile workforce across traditional and modern OS devices used over any network and from any location. Read this white paper to find out more.
Tags : 
security, defense, cloud, threats, attack, symantec, enterprise, endpoint, solutions, global, intelligence, network, devices, mobile, workforce
    
Symantec

Prevent Laptop Security Breaches

Published By: OneLogin     Published Date: Oct 24, 2017
Corporate data spreads across an ever-growing number of applications. Users (employees, contractors, partners, and customers) access those applications over a wide range of devices. Those devices take different forms: desktops, laptops, tablets, smartphones, smartwatches. Each device may use a different operating system. The locations from where people access your data can be on-premises or off, and in any number of places around the globe. Data, users, apps, devices, locations葉he sheer number of permutations and combinations is mind-boggling. This complex nature of today痴 IT environment opens security gaps and exposes your business to undue risk. To illustrate, try to envision all the permutations and possible entry points for risk in your organization. Imagine that you have 400 users, each using 25 apps. When you multiply those together, that痴 10,000 potential access permissions to manage. Access permissions change as users come and go, roles change, new apps are added, and
Tags : 
    
OneLogin

A New Breed of Servers for Digital Transformation

Published By: IBM     Published Date: Jul 02, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does. From an IT perspective, there is a fairly straightforward sequence of applications that businesses can adopt over time that will help put direction into this journey. IDC outlines this sequence to e
Tags : 
    
IBM

A new Breed of Servers for Digital Transformation

Published By: Group M_IBM Q418     Published Date: Dec 18, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does.
Tags : 
    
Group M_IBM Q418

State of Grocery

Published By: 1010data     Published Date: Nov 28, 2018
This report analyzes the changes within the grocery industry during July 2017 June 2018 (the year following Amazon痴 acquisition of Whole Foods) and delivers a view of grocery痴 biggest disruptors and unforeseen consumer trends.
Tags : 
    
1010data

TOSS OUT THE RULERS, BRING IN THE (CLOUD) WI-FI

Published By: Ruckus Wireless     Published Date: Jul 16, 2018
Students and teachers at Belleville Township High School District now rely on Ruckus Networks to stay connected to laptops, tablets, and smartphones. With Ruckus Cloud Wi-Fi, the IT team at Belleville Township High School District is able to access and manage WLANs with a click of a button. Read this case study to learn why they chose Ruckus Cloud Wi-Fi, allowing Belleville to take classroom learning to the next level.
Tags : 
    
Ruckus Wireless

Cryptomining

Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
If you池e not protected, it can cost you in all kinds of ways. Find out how to protect your network and your valuable resources in this e-book.
Tags : 
    
Cisco Umbrella EMEA

Protect Your Organization From Unwanted Cryptomining

Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Learn about how malicious cryptomining works and how Cisco Umbrella can protect your organization.
Tags : 
    
Cisco Umbrella EMEA

Malicious Cryptominers are Eying Your Resources

Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Malicious cryptomining has consistently been one of the top threats across all internet activity in 2018. Cryptocurrency痴 market volatility could make it much more lucrative than ransomware. Find out who they池e targeting and how to protect your network.
Tags : 
    
Cisco Umbrella EMEA

Defending Your Network from Cryptomining

Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Learn how to defend your organization from illicit cryptomining with the Cisco security portfolio.
Tags : 
    
Cisco Umbrella EMEA

Your Users Have Left the Perimeter. Are You Ready?

Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
To gain better insight into today痴 work practices and risks, IDG Research Services surveyed IT security decision-makers (ITSDMs) as well as end users to gauge VPN usage. Download the white paper to learn several security capabilities identified by IDG that, if available, could prove extremely valuable in reducing the risk of off-network laptop usage.
Tags : 
    
Cisco Umbrella EMEA

A new Breed of Servers for Digital Transformation

Published By: Group M_IBM Q119     Published Date: Dec 18, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does.
Tags : 
    
Group M_IBM Q119

UEM Datasheet: IBM MaaS360 with Watson

Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
While it might be desirable to standardize end users on one or two types of devices that all run the same operating system, most organizations don稚 have that luxury. Today痴 users demand an extraordinary level of flexibility and convenience謡hich means most organizations support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even wearables and IoT devices.
Tags : 
    
Group M_IBM Q119

A CIO痴 guide to building a bank that thrives on change

Published By: Group M_IBM Q2'19     Published Date: Apr 04, 2019
It痴 probably no surprise to you that the financial services industry is changing rapidly. Digital technology is redefining the possibilities with automated processes, AI insights, customized experiences, new operating models and next-generation applications yet global industry profits are stagnating. As the number of disruptors in the space rises, many banks are being asked to innovate while lowering structural costs and improving capital returns and many traditional banks are falling behind.
Tags : 
    
Group M_IBM Q2'19

UEM Datasheet: IBM MaaS360 with Watson

Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Your workers demand an extraordinary level of flexibility and convenience in how they use their devices ... Meaning it痴 up to you to support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even the Internet of Things (IoT). And not only do your users expect support for a wide variety of form factors, but they also require cross-platform support for all major platforms, including iOS and macOS, Android, and Windows. To complicate the situation further, they run different versions of those platforms庸or example, they may run Windows XP SP3, Windows 10, or anything in between. Read onward and learn how the industry痴 first cognitive UEM platform, MaaS360 with Watson, delivers a single, strategic management and security solution to drive your organization痴 digital business transformation溶o matter what endpoints your enterprise is putting to work."
Tags : 
    
Group M_IBM Q2'19

Boost your mobile ROI with powerful Cognitive Insights from IBM MaaS360

Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Managing and securing endpoints with conventional mobile device management (MDM) or enterprise mobile management (EMM) solutions is time-consuming and ineffective. For this reason, global IT leaders are turning towards unified endpoint management (UEM) solutions to consolidate their management of smartphones, tablets, laptops and IoT devices into a single management console. To increase operational efficiency, maximize data security and deliver on their digital transformation goals, they値l need a UEM platform that does more than just promise success. The answer is a smarter solution, built for today, that brings new opportunities, threats, and efficiency improvements to the forefront. With Watson, IBMョ MaaS360ョ UEM features cognitive insights, contextual analytics, and cloud-sourced benchmarking capabilities. It helps you make sense of daily mobile details while managing your endpoints, users, apps, document, and data from one platform."
Tags : 
    
Group M_IBM Q2'19

The Practical Guide to Managing Data Science at Scale

Published By: Domino Data Lab     Published Date: May 23, 2019
Lessons from the field on managing data science projects and portfolios The ability to manage, scale, and accelerate an entire data science discipline increasingly separates successful organizations from those falling victim to hype and disillusionment. Data science managers have the most important and least understood job of the 21st century. This paper demystifies and elevates the current state of data science management. It identifies best practices to address common struggles around stakeholder alignment, the pace of model delivery, and the measurement of impact. There are seven chapters and 25 pages of insights based on 4+ years of working with leaders in data science such as Allstate, Bayer, and Moody痴 Analytics: Chapters: Introduction: Where we are today and where we came from Goals: What are the measures of a high-performing data science organization? Challenges: The symptoms leading to the dark art myth of data science Diagnosis: The true root-causes behind the dark art m
Tags : 
    
Domino Data Lab

Defending Your Network from Cryptomining

Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Threat actors increasingly look toward illicit cryptomining as an easy source of income. Cryptomining is the production of virtual currency, also known as cryptocurrency, such as Bitcoin and Monero. It comes at the expense of system performance and power consumption. Moreover, threat actors are infiltrating networks to use their victims computer resources to do this work for them. In this white paper, you will learn how to defend your organization from illicit cryptomining with the Ciscoョ security portfolio.
Tags : 
    
Cisco Umbrella EMEA

State of The Internet/Security

Published By: Akamai Technologies     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend won稚 continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : 
internet, security, cryptocurrency, data, breaches, botnet
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.