purpose

Results 251 - 275 of 397Sort Results By: Published Date | Title | Company Name

The Evolution and Value of Purpose-Built Backup Appliances

Published By: Symantec     Published Date: Nov 19, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : 
purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage management, disaster recovery, security policies, database security, data loss prevention
    
Symantec

The Total Economic Impact of the Emerson DCIM Solution

Published By: Emerson     Published Date: Nov 17, 2014
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Emerson's DCIM Solution on their organizations.
Tags : 
emerson, data center, data center management, dcim, infrastructure management, infrastructure, network architecture, servers, blade servers, storage management, total cost of ownership, cloud computing, data center design and management
    
Emerson

You Can't Manage What You Don't Measure

Published By: Sage     Published Date: Oct 29, 2014
Accountants typically spend a great deal of time in the compilation of ?nancial statements for compliance purposes and for measuring the historical performance of a company. However, all of the data in the balance sheet and income statement is generated from historical information in the accounting system. To be useful in helping to improve the ?nancial performance of a company, the raw ?nancial data needs to be distilled into useful information so that it can be used in making strategic decisions.
Tags : 
financial statements, historical performance, compliance, income statement, accounting system, financial performance
    
Sage

Going Beyond Email Compliance: 7 Surprising Use Cases for Email Suppression

Published By: UnsubCentral     Published Date: Oct 17, 2014
Email suppression lists are often created and maintained for one purpose: honoring the consumer’s opt out request and remaining CAN-SPAM compliant. While those are incredibly important, there are so many other ways that a suppression list can and should include. Take a look at our e-book to find out how you can use your suppression lists to increase your ROI.
Tags : 
mail marketing compliance, email list scrubbing, suppression list, email suppression list, suppression list management, suppression file management, email suppression file scrubbing, affiliate email marketing, email opt out management, email acquisition, affiliate email marketing, b2b scrubbing, can spam compliance
    
UnsubCentral

STAR Report: Dragonfly Cyberespionage Attacks

Published By: Symantec     Published Date: Oct 07, 2014
An ongoing cyberespionage campaign against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims. The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to energy supplies in affected countries. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
cyberespionage attacks, range of targets, security, spying, damage or disruption
    
Symantec

Ovum Decision Matrix: Selecting a Virtualization and Cloud Management Solution, 2013–14

Published By: HP     Published Date: Oct 01, 2014
The role and purpose of IT in an organization is undergoing significant change, driven by the need for businesses to become more agile and have greater control over cost levers when using technology. This transformation of IT involves many different aspects, not all of which are technology-related, but the one thing they all share is that IT modernization is about making changes to meet the current and future demands of business. This report provides a side-by-side comparison of leading virtualization and cloud management solutions, looking at IT modernization from a data center infrastructure perspective, with the findings delivered as the Ovum Decision Matrix (ODM). It considers the significance of management in the virtualization and cloud environments and how this influences the way in which technology is deployed, used, and controlled.
Tags : 
decision, matrix, virtualization, cloud, management, businesses, technology, modernization, cost, levers, transformation, environments, data center, deployed, infrastructure, it management, cloud computing
    
HP

State of the Art Practice with Visual Analytics

Published By: SAS     Published Date: Sep 30, 2014
As analytics and Big Data have been embraced, analysts are working to become better at communicating the insights from complex analysis. This makes the use of visual analytics increasingly important as a tool to tell compelling stories and to engage decision makers in dialogue. Importantly, the best visual analytics are not necessarily the coolest, most sophisticated, or most complex. Visual analytics are most effective when there is a clear purpose and when data can be visualized and communicated in a way that is easily understandable.
Tags : 
sas, big data, visual analytics
    
SAS

Forrester TEI Study: Economic Impact of Lync Enterprise Voice and Polycom Working Together

Published By: Polycom     Published Date: Sep 24, 2014
Polycom and Microsoft commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Polycom voice solutions for Microsoft Lync. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Polycom voice solutions for Microsoft Lync within their organizations.
Tags : 
economic, enterprise, impact, readers, framework, voice, solutions, lync, organizations, consulting, commissioned, evaluate, study, financial, roi, potential, software development, enterprise applications
    
Polycom

Security for the Mobile First Era: Mobile Operating Systems are Inherently Secure

Published By: MobileIron     Published Date: Sep 22, 2014
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile security, mobile first era, mobile operating systems, agent-based security, emm platforms, user productivity, wireless, enterprise applications
    
MobileIron

Analyse von Frost&Sullivan des weltweiten Markts zum Schutz vor Distributed Denial of Service(DDoS)

Published By: Arbor     Published Date: Sep 15, 2014
Die Erhöhung von DDoS-Angriffen kurbelt die Nachfrage an umfassenden Lösungen an “This market engineering study comes at a time when DDoS attacks are accelerating in purpose, sophistication, complexity, scale, and frequency. Businesses of all size have proven to be susceptible to these attacks, and though DDoS is not a new concern, the risk of DDoS attack probability and potential for damages is at an all-time high. As a result, DDoS mitigation is a top-of-mind consideration for IT and security organizations around the world, and demand for DDoS mitigation solutions is growing rapidly.”
Tags : 
market engineering, ddos attacks, it security, application security, ddos, firewalls, hacker detection, security management
    
Arbor

Eight Central Management Features to Ensure Network Survival

Published By: McAfee     Published Date: Sep 15, 2014
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : 
network survival, network security management, best practices, firewalls, hacker detection
    
McAfee

The Business Value of Data Domain Boost

Published By: EMC     Published Date: Sep 11, 2014
This paper focuses on Data Domain Boost and the many benefits it provides compared to doing traditional backups. Its purpose is to explain the technical and business reasons why DD Boost will change the way you do backups.
Tags : 
data domain boost, ddb, backups, data protection, data backup, benefits of ddb, emc, backup and recovery, storage management, storage virtualization, database security
    
EMC

The Business Value of Data Domain

Published By: EMC     Published Date: Sep 11, 2014
This paper focuses on Data Domain technology leadership and differentiation and why it matters to you. The purpose of this paper is to explore the technical and financial reasons why Data Domain systems are ideal for backup and archiving in your environment.
Tags : 
data domain technology, benefits of data domain, backup and archiving emc, backup and recovery, storage management, storage virtualization, data protection, database security
    
EMC

Grow your business with a scalable network

Published By: HP     Published Date: Aug 26, 2014
SMBs need a robust, scalable network capable of handling any workload securely and reliably. It's critical to select network switches, routers, and wireless access points with the capabilities needed for today's traffic and tomorrow's growth, including mobile and BYOD computing. As part of HP’s Just Right IT program for SMBs, HP Networking solutions are purpose-built for growing businesses. Learn what to look for in networking technology, and how HP can help you create a network that will keep pace with your business growth.
Tags : 
data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection, robust, scalable, byod, networking, knowledge management
    
HP

Intel® Cloud Edition for Lustre* software

Published By: Intel     Published Date: Aug 19, 2014
Purpose-built for use with the dynamic computing resources available from Amazon Web Services ™ the Intel Lustre* solution provides the fast, massively scalable storage software needed to accelerate performance, even on complex workloads. Download now to learn more.
Tags : 
intel, cloud, cloud computing, data center, virtualization, infrastructure, storage virtualization, server virtualization, data center design and management
    
Intel

Security in Fax: Minimizing Breaches and Compliance Risks

Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management, enterprise applications
    
OpenText

Security in Fax: Minimizing Breaches and Compliance Risks

Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management, enterprise applications
    
OpenText

IDC: Driving Business Optimization with End-to-End Performance Testing Paper

Published By: HP     Published Date: Jul 28, 2014
The purpose of this IDC White Paper is to lay out the role that performance testing can play in the context of overall application lifecycle management (ALM), security, resource, and demand management. As part of that objective, the document defines an application performance testing framework and discusses a performance test evolution path and the relationship between a successful approach to performance testing and related IT elements such as monitoring, security, ALM, and project and portfolio management (PPM).
Tags : 
agile performance testing, continuous performance test, load testing, loadrunner, mobile performance testing, mobile testing, performance center, performance testing, idc, security
    
HP

The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings

Published By: Polycom     Published Date: Jul 24, 2014
Organizations today are using video conferencing and collaboration in many ways that were not imaginable just a few years ago. These implementations and use cases are delivering hard and soft benefits far beyond the cost savings associated with business travel and general purpose meetings.
Tags : 
polycom, video conferencing, collaboration, cost savings, it management, wireless, business technology
    
Polycom

HP 3PAR StoreServ Storage Total Quality Commitment

Published By: HP     Published Date: Jul 22, 2014
HP offers an approach to the modern data center that addresses systemic limitations in storage by offering Tier-1 solutions designed to deliver the highest levels of flexibility, scalability, performance, and quality—including purpose-built, all-flash arrays that are flash-optimized without being flash-limited. This white paper describes how, through the incorporation of total quality management throughout each process and stage of development, HP delivers solutions that exceed customer quality expectations, using HP 3PAR StoreServ Storage as an example.
Tags : 
3par, storeserv, storage, data, solutions, flash, data management, business technology
    
HP

Entrust IdentityGuard Cloud Services Smart Credentials: Multiuse Smartcards, USB Tokens & Mobile

Published By: Entrust Datacard     Published Date: Jul 21, 2014
One of the most secure and simple-to-use methods for strong authentication is achieved via multipurpose smartcards. Unfortunately, many smartcard solutions require too many point products, are complex and place a heavy burden on IT.
Tags : 
identity guard, cloud service, smart credentials, authentication, multipurpose, technology, usb token, mobile, security
    
Entrust Datacard

Entrust IdentityGuard Cloud Services SSL: Centralized Management of Digital Certificates

Published By: Entrust Datacard     Published Date: Jul 21, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly.
Tags : 
identity guard, cloud service, ssl, management, digital certification, multiple web servers, self-service, security
    
Entrust Datacard

Big Data Comes of Age: Shifting to a Real-time Data Platform

Published By: SAP     Published Date: May 18, 2014
New data sources are fueling innovation while stretching the limitations of traditional data management strategies and structures. Data warehouses are giving way to purpose built platforms more capable of meeting the real-time needs of a more demanding end user and the opportunities presented by Big Data. Significant strategy shifts are under way to transform traditional data ecosystems by creating a unified view of the data terrain necessary to support Big Data and real-time needs of innovative enterprises companies.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools, analytical applications
    
SAP

Entrust IdentityGuard Cloud Services Smart Credentials

Published By: Entrust Datacard     Published Date: May 15, 2014
Multipurpose Smartcards, USB Tokens & Mobile Smart Credentials
Tags : 
entrust, identityguard, smart credentials, certificate based security, security, pki software, cloud, networking, it management
    
Entrust Datacard

Entrust IdentityGuard Cloud Services SSL: Centralized Management of Digital Certificates

Published By: Entrust Datacard     Published Date: May 15, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly. Entrust IdentityGuard Cloud Services SSL is a self-service application designed to streamline certificate management while providing secure certificates from a trusted brand in online security.
Tags : 
entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud, networking, it management
    
Entrust Datacard
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.