romi

Results 201 - 225 of 745Sort Results By: Published Date | Title | Company Name

Want to put robotic process automation to work in your business?

Published By: KPMG     Published Date: Jul 10, 2018
Robotic process automation (RPA) promises huge gains for business services, including lower costs, better market insight and an improved customer experience. But implementing RPA requires a clear plan of action. Download this guide to: • understand the different types of automation • rethink myths around automation that could be holding you back • plan the first 100 days of your RPA journey • understand how to manage change as you integrate ‘bots’ into your workforce • get key insights from more than 50 automation projects worldwide.
Tags : 
    
KPMG

A Guide to DDoS Protection

Published By: F5 Networks Inc     Published Date: Mar 30, 2018
Until recently, security teams for organizations in many industries believed they didn’t need to worry about DDoS attacks, but the latest data from the Verizon 2017 Data Breach Investigations Report indicates that businesses of all sizes in nearly every industry run the risk of being attacked.¹ IoT devices are increasingly compromised, recruited into botnets, and offered up by their creators as for-hire DDoS services. Additionally, there are numerous DDoS tools and services that are easily accessible and easy to use, even for the untechnical novice.
Tags : 
protection, ddos, security, reporting, organization, device
    
F5 Networks Inc

Virtualizing disaster recovery using cloud computing

Published By: IBM     Published Date: Jul 13, 2012
Read through this essential resource to uncover the benefits of a cloud-based approach to disaster recovery. Don't put your enterprise at risk by practicing DR methods that require you to compromise.
Tags : 
ibm, technology, cloud computing, organizations, virtualizing, recovery, cloud, storage virtualization, web service management, business technology, virtualization
    
IBM

Superstorm Sandy – Learn How Two IT Departments Maintained IT Availability In Spite of the Odds

Published By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn how an East Coast University and a prominent healthcare provider were able to maintain their IT availability during Hurricane Sandy with a comprehensive Disaster Recovery Program.
Tags : 
sungard, sungard availability service, enterprise resilency, application recovery, disaster recovery, productivity, it management, recovery, storage, storage management, network security, backup and recovery, enterprise resource planning, data protection, records management
    
SunGard Availability Services

Top 10 Criteria for Data Management and Virtualization

Published By: Delphix     Published Date: Mar 24, 2015
Data virtualization is becoming more important as industry-leading companies learn that it delivers accelerated IT projects at reduced cost. With such a dynamic space, one must make sure that vendors will deliver on their promises. This white paper outlines the top 10 qualification questions to ask before and during the proof of concept.
Tags : 
    
Delphix

Beyond Relational: Reimagine Your Data with Enterprise NoSQL

Published By: MarkLogic     Published Date: Mar 13, 2015
Big Data has been in the spotlight recently, as businesses seek to leverage their untapped information resources and win big on the promise of big data. However, the problem with big data initiatives are that organizations try using existing information management practices and legacy relational database technologies, which often collapse under the sheer weight of the data. In this paper, MarkLogic explains how a new approach is needed to handle the volume, velocity, and variety of big data because the current relational model that has been the status quo is not working. Learn about the NoSQL paradigm shift, and why NoSQL is gaining significant market traction because it solves the fundamental challenges of big data, achieving better performance, scalability, and flexibility. Learn how MarkLogic’s customers are reimagining their data to: - Make the world more secure - Provide access to valuable information - Create new revenue streams - Gain insights to increase market share - Reduce b
Tags : 
enterprise, nosql, relational, databases, data storage, management system, application, scalable, enterprise applications, data management
    
MarkLogic

Do More with Complete Mobile-Cloud Security from MobileIron Access

Published By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
    
MobileIron

A Commerce Team’s Guide to Accelerating Changes in the Age of Agility

Published By: Oracle     Published Date: Jun 01, 2016
With a powerful, modern cloud commerce solution, e-commerce sites don’t need to sacrifice functionality, customization, or site experience to gain agility. Download this whitepaper to learn four key considerations to keep in mind when evaluating SaaS commerce solutions to achieve agility without compromise.
Tags : 
    
Oracle

Increase agility at the speed of disruption

Published By: IBM     Published Date: Nov 10, 2016
Today’s Digital Business needs a strategy for business content – one that spans the creation, capture, activation and analysis of it – which assures security, compliance with regulations, and minimizes risk. This session will confront content chaos and its impact on business agility. We will share stories from IBM customers who are using business content solutions to deliver on the promise of the Digital Business today. Many are using ECM Centers of Competency to bring together all stakeholders in the business to create a unified vision for information management across all departments and all forms of data and content, whether on-premises, mobile, or in the cloud.
Tags : 
ibm, analytics, ecm, digital business, enterprise applications, business technology
    
IBM

Extracting value from the Internet of Things

Published By: IBM     Published Date: Dec 05, 2016
The promise of the Internet of Things is huge, but how can leaders extract real value from it? Four key areas can provide easy entry points to tap into the IoT, and quickly begin to realize value with IoT technologies.
Tags : 
ibm, watson, leadership, internet of things, iot, knowledge management, enterprise applications, business technology
    
IBM

Architecture Matters: Beyond Layered Security Approaches

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Every year, record levels of money are spent on new IT security technology yet major breaches and compromises are more prevalent than ever. The concept of “layered security” in which an organization supports a wide variety of security technologies in order to discourage attackers doesn’t seem to be working. It’s time to rethink IT security not just the technology, but the way it’s approached from a strategic, architectural perspective.
Tags : 
palo alto, security, security architecture, saas, applications
    
Palo Alto Networks

Securing the Unpatchable: How to Prevent Security Breaches on Endpoints Is Not an Option

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue vulnerability patches to remediate those flaws, many organizations do not apply all available patches to their production environments.
Tags : 
palo alto, systems, software, security
    
Palo Alto Networks

News Flash: The Era of Legacy PCIe SSDs is Over

Published By: Micron     Published Date: Jan 12, 2017
Micron’s 9100MAX delivers on the NVMe promise with 69% better throughput and transaction rates plus much lower latency in PostgreSQL OLTP. Download this technical marketing brief to learn more.
Tags : 
    
Micron

OTT Success Series - Security Paper

Published By: IBM     Published Date: Mar 20, 2017
"Is your premium video content really secure? Don’t let security blind spots compromise your content – or business. Download the latest installment in IBM Cloud Video’s OTT Success Series and discover insights around: -Business logic security and why it matters more than ever -The importance of matching the proper level of security with your intended content use case -New security considerations – and solutions – associated with migration to the cloud"
Tags : 
ott. security, ibm, content security, cloud, cloud migration
    
IBM

OTT Success Series - Security Paper

Published By: IBM     Published Date: Apr 10, 2017
"Is your premium video content really secure? Don’t let security blind spots compromise your content – or business. Download the latest installment in IBM Cloud Video’s OTT Success Series and discover insights around: -Business logic security and why it matters more than ever -The importance of matching the proper level of security with your intended content use case -New security considerations – and solutions – associated with migration to the cloud"
Tags : 
ibm cloud video, premium content, cloud migration, security, content
    
IBM

The future of energy and utilities - An IBM POV

Published By: IBM     Published Date: May 17, 2017
Making predictions is a risky activity. Making predictions in the utility industry can be perilous. History is filled with missed or prematurely exuberant pronouncements of the future of utilities and energy. For example, in the late 20th century, many predicted that the world’s oil supply had reached peak production and would become scarce. Instead, shale gas and oil are in abundance. In the 1990s, people predicted that fuel cells and hydrogen would dominate the landscape by 2010, another illustration that predictions can fail to reach their promise. Learn more. Download now
Tags : 
energy, utilities, ibm, pov
    
IBM

Keeping Financial Institutions Safe in a Cyber-Threatened World

Published By: Comcast Business     Published Date: Apr 13, 2017
Of all the industries targeted by cyber-attackers, financial services is one of the most attractive. As noted bank robber Willie Sutton once said, “Go where the money is … and go there often.” That, it seems, is what cybercriminals are doing, launching malware, Trojans, spear phishing and ransomware attacks at banks and institutions to compromise networks and gain access to valuable data. Download now!
Tags : 
    
Comcast Business

Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security

Published By: CrowdStrike     Published Date: Aug 01, 2017
Download this white paper to learn:?The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence?How fileless attacks exploit trusted systems —the types of processes compromised, the specific exploit tactics used to gain a foothold, and more?Why traditional technologies fail to protect against fileless attacks and what you can do to better defend your organization against them
Tags : 
    
CrowdStrike

How to Simplify Your Back Office & Innovate for The Future

Published By: HotSchedules     Published Date: Jan 26, 2018
Restaurants are complex businesses with a simple aim: great guest experiences that keep customers coming back for more. In order to achieve this goal, stores must deliver on the promise of a great product and exceptional service. There are a lot of ways to make the equation work and each brand has its own unique mix of ingredients that bring the whole operation together to create a recipe for profitability. There are also elements of a successful restaurant that are consistent across any operation. Restaurant executives have long been on the hunt for this elusive lever (or combination of levers) that systematically drive performance regardless of conditions.
Tags : 
cio, office, innovation, restaurant, data, software, workflow, hotschedules
    
HotSchedules

Argyle Webcast: Unlocking the Power of AI and Machine Learning in Financial Services

Published By: Oracle     Published Date: Mar 22, 2019
Argyle CIO Webcasts, in partnership with Oracle, brings together top IT executives for an innovative, discussion-based webcast exploring the promises and perils of transformational technologies on the financial services industry.
Tags : 
    
Oracle

The Best Distribution of Apache Cassandra

Published By: Datastax     Published Date: Aug 23, 2017
Enterprises today continue to differentiate themselves with cloud applications – any application that needs to be always-on, distributed, scalable, real-time, and contextual. With DataStax Enterprise, DataStax delivers comprehensive data management with a unique always-on architecture that accelerates the ability of enterprises, government agencies, and systems integrators to power the exploding number of cloud applications. DataStax Enterprise (DSE) powers these cloud applications that require data distribution across data centers and clouds, by using a secure, operationally simple platform. At its core, DSE offers the industry’s best distribution of Apache Cassandra™. This paper provides a summary of the features and functionality of DataStax Enterprise that make it the best choice for companies that are looking to leverage the promise of Apache Cassandra™ for production environments.
Tags : 
cloud, adoption, application, migration, performance
    
Datastax

Big Data vs. Real-Time Data

Published By: Datastax     Published Date: Aug 23, 2017
About 10 years ago big data was quickly becoming the next big thing. It surged in popularity, swooning into the tech world's collective consciousness and spawning endless start-ups, thought pieces, and investment funding, and big data's rise in the startup world does not seem to be slowing down. But something's been happening lately: big data projects have been failing, or have been sitting on a shelf somewhere and not delivering on their promises. Why? To answer this question, we need to look at big data's defining characteristic - or make that characteristics, plural - or what is commonly known as 'the 3Vs": volume, variety and velocity.
Tags : 
datastax, big data, funding
    
Datastax

The Ultimate Guide to PSA

Published By: FinancialForce     Published Date: Aug 20, 2019
Manage your People, Customers & Projects on Salesforce Cloud Professional Services Automation (PSA) gives you the visibility and power to drive revenue growth, improve margins and deliver on your promises. Harness the power and ease of Salesforce, the #1 cloud platform Experience enterprise class scalability A window to connect your resources and projects Schedule the right people onto the right projects at the right time Connect Sales and Services for better resource management and customer satisfaction
Tags : 
    
FinancialForce

The Top 5 Mistakes Professional Services Teams Make and How To Avoid Them

Published By: FinancialForce     Published Date: Aug 20, 2019
Removing Barriers to Growth The Professional Services industry is growing rapidly with technology playing an increasingly important role in maintaining that trend. However with growth comes challenges ranging from increased competition, maintaining and improving utilisation rates, forecasting profitability and the lack of available, skilled resources, all within decreasing project timeframes. To help navigate this promising but challenging environment, we've identified five common mistakes seen within Professional Services teams, as well as practical strategies for avoiding them. Find out how you can overcome these challenges and take full advantage of sector growth. Download this eBook and learn:
Tags : 
    
FinancialForce

A Look at Deception

Published By: Symantec     Published Date: Dec 13, 2017
By 2021, cyber attacks are expected to cause $6 trillion in damages worldwide. To combat, spending is predicted to hit $1 trillion between 2017 and 2021. Attackers benefit from an infinite amount of time and tactics at their disposal, as they work to get around the typical static network and endpoint defenses organizations put in place. Deception can complement endpoint and network defenses, adding dynamic security mechanisms that can be customized for every environment to take the attacker’s advantage away. While endpoint and network security protects you from being compromised, deception mitigates the effects of a compromise by detecting it early and identifying the attacker intent which helps coordinate a faster and better response. Read this white paper to find out more.
Tags : 
deception, endpoint, network, security, protection, breach, attack, symantec
    
Symantec
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.