romi

Results 151 - 175 of 779Sort Results By: Published Date | Title | Company Name

Consolidation without Compromise

Published By: Citrix Systems     Published Date: Feb 18, 2012
This paper outlines the compelling benefits of consolidating networking services, and details why competing efforts pursued by F5 technology come up short for critical ADC consolidation projects.
Tags : 
virtualization, data center, datacenters, consolidate, network, network resources, citrix, netscaler
    
Citrix Systems

Why choose NetScaler over F5

Published By: Citrix Systems     Published Date: Nov 10, 2014
Today’s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce costs and datacenter sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions
    
Citrix Systems

Drive Intelligence into Next Generation Networks

Published By: Citrix Systems     Published Date: Nov 10, 2014
Virtualization has made compute infrastructure and storage infrastructure an order of magnitude more flexible, yielding huge gains in IT efficiency. However, the network has not achieved the same efficiency gains. Unlike the advancements in compute and storage virtualization, networking has not kept pace, and has become a barrier to achieving the promise of enterprise cloud computing. As enterprise IT continues its transition to the Cloud Era, the data center network is once again taking center stage.
Tags : 
application, deployment, research, enterprise, data center, controller, network, security
    
Citrix Systems

Virtual desktop acquisition cost analysis

Published By: Citrix Systems     Published Date: Apr 15, 2015
App and desktop virtualization is much more than a technology solution. It is transforming the way organizations of all sizes are enabling their workforces while simplifying the desktop management process for IT administrators. With app and desktop virtualization, IT organizations can provide every user with a workspace environment completely unrestricted by physical location. This paper addresses many common business challenges facing IT organizations, such as enabling mobile workstyles without compromising security, streamlining desktop management efforts as the number of employees in remote offices and offshore locations increases and making the user experience personal through self-service access to applications and desktops.
Tags : 
citrix, desktop virtualization, efficiency, virtualization, mobile computing, network security, vpn, application integration
    
Citrix Systems

Ransomware - 4 ways to protect data now

Published By: Citrix Systems     Published Date: Feb 14, 2019
"Ransomware is one of the biggest nightmares facing IT today. Hackers are targeting organizations of all kinds with malware designed to encrypt crucial data—and hold it hostage until payment is made. This white paper reveals four highly effective measures for reducing your exposure to ransomware and keeping your apps and data accessible to authorized users—not hackers and their clients. Download this white paper to learn how to: - Shield users of web apps from infection and keep sensitive data off the endpoint - Prevent email-born ransomware from compromising the endpoint - Protect mobile devices against attack - Ensure the rapid recovery of ransomware-encrypted data"
Tags : 
    
Citrix Systems

Defend web properties from modern threats with Citrix NetScaler

Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Customers, employees and partners are more frequently accessing web-delivered services from their mobile devices. At the same time, attackers are constantly discovering new ways to compromise security, including advanced malware and application layer attacks. Without the right tools, you are vulnerable. NetScaler gives you the visibility and control to manage, accelerate, and secure all your web properties, so you can deliver both the service and security your users demand. To learn more about web security and NetScaler, read the full report: Defend Web Properties from Modern Threats with Citrix NetScaler
Tags : 
citrix, security, netscaler, web, hacker detection, web service security, web services, data protection
    
Citrix Systems, Inc.

Deep Dive into Security and Privacy

Published By: Cloud Sherpas     Published Date: Nov 06, 2015
Watch this webinar replay to explore the principles that guide Google’s security and privacy policies in order to understand how going Google can transform your organisation without compromising security.
Tags : 
security, cloud, cloud computing, security cloud computing, security and privacy, google, google apps, application security
    
Cloud Sherpas

Leverage the cloud for your disaster recovery strategy

Published By: CloudEndure     Published Date: Oct 12, 2018
Maintaining business continuity is your highest priority. In today’s commercial landscape, business continuity depends on the efficient, uninterrupted flow of data across the organization – from operations to sales to fulfillment. Even a brief lapse in workload continuity can mean thousands of lost sales opportunities, disruption to production, and compromised customer trust. The causes of those lapses can range from natural disasters to mechanical failure or human error. You need a data platform and a proactive disaster recovery (DR) strategy that will help you stay up and running in the event that your physical infrastructure is unavailable for any length of time. BUSINESS CONTINUITY Fulfilling orders, providing a high level of customer service, and keeping consumers engaged all depend on the efficient, uninterrupted flow of data throughout your organization. CUSTOMER TRUST Above all, protecting customer data—especially personally identifiable information (PII) —is critical
Tags : 
    
CloudEndure

TCO Report: The Economic Advantages of File Services Utilizing an Object Storage Platform

Published By: Cloudian     Published Date: Feb 15, 2018
A new class of storage promises to revolutionize file data management with scalability, simplicity and cost benefits that together represent a step function improvement from traditional NAS. Cloudian HyperFile offers a new approach that addresses both the scalability and cost concerns. It is the first to combine traditional NAS features with a limitlessly scalable, fully modular storage environment that reduces CAPEX costs by 2 /3 while simplifying management and eliminating storage silos. At CAPEX costs down to ˝ cent per GB/month, and with scalability and storage density that minimize management and data center space costs, Cloudian HyperFile offers economics that radically transform the landscape for enterprise file storage.
Tags : 
    
Cloudian

TCO Report: The Economic Advantages of File Services Utilizing an Object Storage Platform

Published By: Cloudian     Published Date: Feb 26, 2018
A new class of storage promises to revolutionize file data management with scalability, simplicity and cost benefits that together represent a step function improvement from traditional NAS. Cloudian HyperFile offers a new approach that addresses both the scalability and cost concerns. It is the first to combine traditional NAS features with a limitlessly scalable, fully modular storage environment that reduces CAPEX costs by 2 /3 while simplifying management and eliminating storage silos. At CAPEX costs down to ˝ cent per GB/month, and with scalability and storage density that minimize management and data center space costs, Cloudian HyperFile offers economics that radically transform the landscape for enterprise file storage
Tags : 
    
Cloudian

How To Transform Your School: A Guide for Application-Enabled Learning for K-12 School Districts

Published By: Comcast Business     Published Date: Mar 24, 2015
The introduction of bandwidth-intensive learning applications, including video and peer-to-peer applications in teaching has fundamentally transformed the way teachers teach and students learn. The federal E-rate program has forever changed the technology landscape of school districts and libraries in the United States. Receiving funding is not guaranteed, and following the E-rate process and procedures is critical – especially when thousands, even millions, of dollars are at stake for your district. The rewards that new, education-specific cutting edge education applications deliver to the classroom far outweigh the effort required to participate in the program. This paper briefly examines the promise of new, education-specific applications, the advanced network services that enable them, and the role of the E-rate program.
Tags : 
application-enabled learning, education, funding, bandwith, education applications, e-rate program, networking, it management
    
Comcast Business

Keeping Financial Institutions Safe in a Cyber-Threatened World

Published By: Comcast Business     Published Date: Apr 13, 2017
Of all the industries targeted by cyber-attackers, financial services is one of the most attractive. As noted bank robber Willie Sutton once said, “Go where the money is … and go there often.” That, it seems, is what cybercriminals are doing, launching malware, Trojans, spear phishing and ransomware attacks at banks and institutions to compromise networks and gain access to valuable data. Download now!
Tags : 
    
Comcast Business

In-House or Outsourced: The modern SEM debate

Published By: ComCorp     Published Date: Oct 08, 2009
In earlier years, most companies didn't know the first thing about search engine marketing, and as a result, almost all of them outsourced their Internet marketing campaigns to dedicated firms. However, as search engine marketing has grown in prominence in the business community -- and more information about search engine marketing has become available online -- more people have become knowledgeable about the basic SEM principles and strategies, and more companies are attempting to run their own Internet marketing campaigns in-house.
Tags : 
seo, search engine, sem, search marketing, search engine marketing, meta, meta tags, natural search
    
ComCorp

Scale-Out Data Protection; How it promises to revolutionize recovery capabilities for enterprises

Published By: Commvault ABM Oct     Published Date: Nov 13, 2017
It appears that agility and efficiency are coveted by basically everyone involved in protecting and managing data- especially those people struggling to simultaneously keep up with sprawl and meet ever-heightening expectations. One answer to these storage-related challenges centers on introducing a software-defined layer that abstracts and normalizes underlying storage repositories while still enabling already-deployed best of breed componentry to do what it does best.
Tags : 
data protection, scaling, recovery capabilities, enterprise management, storage, organization, commvault
    
Commvault ABM Oct

Expense Management for a New Decade (Aberdeen Report)

Published By: Concur     Published Date: Dec 27, 2012
Reaching a pinnacle of strategic importance, expense management has found high prominence within today’s organizations. Discover Aberdeen’s latest best practices for effectively managing T&E expenses.
Tags : 
business expense, cloud expense management, cloud expense reporting, expense best practices, expense management, expense management best practices, expense management report, expense management research
    
Concur

How-to-Guide: Ten Steps to Jump-Start Your SEO Plan

Published By: Conductor     Published Date: Apr 09, 2013
It’s no secret that natural search is now one of the most promising customer acquisition channels for organizations. Yet, it's often hard to develop a strategy from scratch. In this how-to guide, we'll walk you through every step of the process to getting your SEO program set up, including: •Making the case for natural search •Getting buy-in from managers •Starting to measure ROI from SEO Download this how-to guide to build a successful strategy, whether you're starting from scratch or have had a program in place for years.
Tags : 
how to, seo, seo software, automation, optimization, search engine optimization, natural search, organic search
    
Conductor

4 FM Leaks that Wreak Havoc

Published By: Corrigo     Published Date: Nov 01, 2019
PropTech is disrupting the facilities management and real estate industries – from big data and IoT to artificial intelligence and augmented reality. The latest advances in PropTech are accelerating change in facilities management like never before, driving bottom line value and helping future-proof FM operations. The promise of PropTech is why our Corrigo team is investing so heavily in frictionless, self-learning platforms to help our clients use technology to truly transform their businesses. But as we amplify FM ops with new technology, we are just as passionate about helping our clients optimize their current processes. Why? Because making even small changes today can mean huge savings for their bottom line. In fact, 80% of organizations are leaking more FM value right now than they could immediately gain with new, emerging tech strategies. That’s no small leak – it’s a staggering loss for organizations of all sizes. After analyzing 700 million facilities management transactions a
Tags : 
    
Corrigo

2014 eProcurement Report

Published By: Coupa Software     Published Date: Nov 04, 2014
Modern eProcurement solutions promise greater efficiency through improved AP integration, tighter controls, standardized processes, and supplier connectivity. This Paystream Advisors survey report focuses on current attitudes toward eProcurement solutions, how they're being used, and why (and how) that usage is changing. The report also includes an overview of eProcurement capabilities, best practices, and selection criteria.
Tags : 
eprocurement solutions, efficiency, integration, tighter controls, standardized process, best practices, procurement, p2p
    
Coupa Software

Mitigating Security Risks at the Network’s Edge

Published By: CradlePoint     Published Date: Sep 04, 2014
Every year, the public relations specialists from at least one bluechip company invariably find themselves working around the clock on a crisis communications effort, attempting to explain to an angry and justifiably fearful public what led to their company compromising customer data. There’s always an immediate hit to the company’s reputation, resulting in a loss of brand loyalty, as customers take their business elsewhere. This white paper provides strategies and best practices for distributed enterprises to protect their networks against vulnerabilities, threats, and malicious attacks.
Tags : 
security risks, crisis communications, security breaches, compromising customer data, security
    
CradlePoint

4G Failover for Business Continuity: Maximizing Revenue and Minimizing Business Risk to Your Brand

Published By: CradlePoint     Published Date: Sep 30, 2014
While short outages are common, longer service disruptions – due to weather, human error or even squirrels – can be catastrophic, paralyzing business operations. Your organization can feel the consequences long after the connection has been repaired. This white paper explores the benefits of using 4G LTE as a back up solution to maximize revenue and minimize business risk downtime can have on your brand. You’ll learn how a 4G wireless solution has benefits over wired backup solutions for business continuity. Please download the whitepaper to learn more!
Tags : 
failover, security risks, crisis communications, security breaches, compromising customer data, security
    
CradlePoint

4G LTE M2M Solutions for Healthcare

Published By: CradlePoint     Published Date: May 17, 2016
The “consumerization” of healthcare and sweeping policy changes will require that healthcare providers become more competitive or risk being left behind. Gaining the competitive edge means finding scalable efficiencies, leveraging the wealth of available patient data for improved care, and figuring out how to meet (or sometimes treat) patients where they already are—whether that happens to be at work, at the mall, or on the street. While Machine to Machine (M2M) and Internet of Healthcare Things (IoHT) technologies promise to create massive efficiencies and a transformed patient experience, traditional wired connectivity solutions are often costly, difficult to deploy, and don’t offer the flexibility required for effective M2M and IoHT deployments.
Tags : 
    
CradlePoint

Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security

Published By: CrowdStrike     Published Date: Aug 01, 2017
Download this white paper to learn:?The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence?How fileless attacks exploit trusted systems —the types of processes compromised, the specific exploit tactics used to gain a foothold, and more?Why traditional technologies fail to protect against fileless attacks and what you can do to better defend your organization against them
Tags : 
    
CrowdStrike

Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security

Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks will be subsiding anytime soon. Read this white paper to get the important information you need to successfully defend your company against stealthy fileless attacks. Download this white paper to learn: • The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence • How fileless attacks exploit trusted systems — the types of processe
Tags : 
    
CrowdStrike

The Loyalty Evolution: Growing Investment and the Multichannel Promise

Published By: CrowdTwist     Published Date: Jun 06, 2016
Loyalty is in the midst of positive momentum. Brands are increasingly realizing the value loyalty programs offer to boost their bottom line and strengthen customer relationships. While many are successful, there is still work to be done to achieve sophistication. This report provides a deep dive look into the loyalty landscape, the role of multichannel loyalty programs in driving success, and a glimpse at what the future holds for the industry.
Tags : 
crowdtwist, multichannel loyalty pograms, customer relationships, loyalty programs
    
CrowdTwist

Leveraging Customer Lifetime Value to Increase Return on Marketing Investment (ROMI)s

Published By: Customer Chemistry     Published Date: Nov 14, 2006
As part of the ongoing effort to differentiate products and services, best-in-breed organizations are now using a tool called Customer Lifetime Value (CLV). CLV is “a marketing metric that projects the value of a customer over the entire history of that customer's relationship with a company.”
Tags : 
marketing, customer lifetime, customer research, customer intelligence, customer relationship management, crm, customer value, customer chemistry
    
Customer Chemistry
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.