romi

Results 1 - 25 of 781Sort Results By: Published Date | Title | Company Name

Endesa se transforma con TIBCO para la era de la energía digital

Published By: TIBCO Software     Published Date: Sep 16, 2019
Endesa es una compañía de energía líder en España y Portugal con alrededor de 10,000 empleados, que provee servicios a más de 11 millones de clientes. La empresa tiene el compromiso de promover una cultura energética más sustentable y busca estar a la vanguardia en la transformación tecnológica de la industria energética. Para cumplir con este objetivo, Endesa se unió al Enel Group en 2009, una firma energética multinacional y el operador líder en los mercados globales de electricidad y gas, con un enfoque particular en los mercados europeos y latinoamericanos.
Tags : 
    
TIBCO Software

Is Your ERP Ready for an Evolution or a Revolution?

Published By: SAP     Published Date: Aug 14, 2018
As legacy ERP data structures and technology begin winding down, they are making way for a whole new generation of technology that brings exponential performance and dramatically new problem-solving capabilities. Download the whitepaper to discover the demands driving this evolution, explore the potential promised by next-gen ERP, and learn why ‘playing it safe’ is no longer an option.
Tags : 
    
SAP

Software Compliance Myths

Published By: CDW     Published Date: Feb 24, 2015
Software asset management (SAM) solutions promise to fix all that. They present a set of tools, practices and processes that take the uncertainty out of software licensing and enable organizations to fully optimize software inventories.
Tags : 
software license, software compliance, software asset management, sam, strategic license management, cloud-based services, virtualization, network security, business intelligence, data protection, database security, cloud computing
    
CDW

10 Questions to Ask When Choosing a Midmarket ERP Solution

Published By: InsideCRM.com     Published Date: Dec 28, 2007
With any technology, the vendor's job is to try to sell you their product, and they may rely on promises, superlative language and sparkling product demos to try to sway you. And with the midmarket ERP landscape crowded with players vying for your business's dollar, the prospect of choosing the right solution can seem even more daunting. But armed with these 10 questions, you'll be able to see through the hype and narrow down a few vendors that can really deliver what you need.
Tags : 
erp, enterprise resource planning, erp solution, erp software, erp vendor, erp provider, vendor selection, erp vendor selection, provider selection, midsize, mid-size, mid-sized, mid-market, midmarket, insidecrm, tippit, enterprise applications, enterprise software
    
InsideCRM.com

10 Tips for Selecting the Best Digital Signature Solution

Published By: ARX (Algorithmic Research)     Published Date: Feb 14, 2008
As the traditional “paper-based” world gives way to digital documentation and transactions, enterprises are demanding innovative solutions for digitally signing and authenticating such documents, files, and forms with iron-clad protection against forgery. Solutions must guarantee non-repudiation and promise the same level of security and trust that exists with conventional documentation. At the same time, such a solution should be simple to use, easy to deploy and offer a rapid ROI.
Tags : 
digital signature, electronic signature, digital signatures, electronic signatures, digital signature, arx, algorithmic research, pki, public key, authentication, document management, secure content management
    
ARX (Algorithmic Research)

10 Top Things to Look For in a Cloud Security Solution Provider

Published By: Akamai Technologies     Published Date: May 05, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cyberattacks, cloud service, security
    
Akamai Technologies

10 Top Things to look for in a Cloud Security Solution Provider

Published By: Akamai Technologies     Published Date: Aug 17, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cloud solutions, data analysis, cyberattacks
    
Akamai Technologies

10 Trends Construction Project Managers Need to Know

Published By: Trimble     Published Date: Apr 26, 2018
It’s a pivotal, yet promising time in the construction industry filled with opportunity, but how do you capitalize on it? Download this eBook, Key Construction Trends Project Managers Need to Know, and learn: • The top 10 trends driving the construction industry—and how project managers can take advantage of them • How advancing technology, an evolving workforce, and lean construction are driving these emerging trends • A perfect solution you can put to work immediately that will pave your way to success in construction project management Download ebook
Tags : 
    
Trimble

10 Ways to Make Money with 5G

Published By: Matrixx Software - Kingpin     Published Date: Nov 07, 2019
Do you have a plan for turning 5G excitement into revenue? Will your 4G pricing strategies still work, or will the market switch to speed tiers, hyper-segmented offers and other new monetization techniques. Download our latest eBook to learn about: The most promising Consumer, Enterprise and IoT use cases The Customer Proposition for each use case How Service Providers can turn new opportunity into revenue
Tags : 
    
Matrixx Software - Kingpin

2014 eProcurement Report

Published By: Coupa Software     Published Date: Nov 04, 2014
Modern eProcurement solutions promise greater efficiency through improved AP integration, tighter controls, standardized processes, and supplier connectivity. This Paystream Advisors survey report focuses on current attitudes toward eProcurement solutions, how they're being used, and why (and how) that usage is changing. The report also includes an overview of eProcurement capabilities, best practices, and selection criteria.
Tags : 
eprocurement solutions, efficiency, integration, tighter controls, standardized process, best practices, procurement, p2p, eprocurement
    
Coupa Software

2015 IT Communications Buyers Guide: What to Look (out) for from an Enterprise-Grade Solution

Published By: xMatters     Published Date: Jan 26, 2015
Unsanctioned apps have become the norm, even in large enterprises with tight IT oversight. But when it comes to IT communication solutions, which frequently involve sensitive data, you simply cannot compromise. Read The 2015 IT Communications Buyers Guide and learn why you cannot afford to settle for a non-proven IT communications solution. This report details exactly what to look for, and also look out for, in an enterprise-grade vendor. Dive deep into topics such as: • Security and compliance • Enterprise specific capabilities • What constitutes a real mobile solution • Selecting a trustworthy partner • Breadth and depth of integrations • Global support • And much more...
Tags : 
security, compliance, enterprise, mobile solution, networking
    
xMatters

2017 Annual Regional Employment Report: Positive Outlook for the Tech Industry

Published By: Adecco     Published Date: Sep 27, 2017
With the unemployment average decreasing across the nation and new jobs continually evolving, long-term growth projections are promising for the IT industry. As the tech industry booms, so does the tech job market. We took a deep dive into the latest annual job market data from Bureau of Labor Statistics to better understand how both the nation and the IT sector advanced and what this means for the future of tech.
Tags : 
    
Adecco

2018 Cyberthreat Defense Report Executive Summary

Published By: Great Bay Software     Published Date: Apr 12, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software

2018 Cyberthreat Defense Report Executive Summary

Published By: Great Bay Software     Published Date: Jul 16, 2018
"CyberEdge Group’s fifth-annual Cyberthreat Defense Report is a comprehensive review of the perceptions of 1,200 IT security professionals representing 17 countries and 19 industries. The new 2018 report provides the most geographically comprehensive view of IT security perceptions in our industry. With a 360-degree view of organizations’ security threats, security professionals can identify issues facing the market and know how their peers are reacting. Key insights from this year’s report include: • ‘Lack of skilled personnel’ is the greatest inhibitor to IT security’s success • 77% of networks were breached last year – the first decline in five years! • 12% of a typical enterprise IT budget is spent on security • 55% of organizations were compromised by ransomware last year Download the Cyberthreat Defense Report Executive Summary today!"
Tags : 
    
Great Bay Software

2019 Annual IBM X-Force Threat Intelligence Index.

Published By: IBM APAC     Published Date: Mar 06, 2019
The 2019 IBM X-Force Threat Intelligence Index looks back at the threats, tactics, and trends that emerged in 2018 based on insights from IBM X-Force Security Research Team. Deriving data and insights from security clients, incident response services and penetration testing engagements, the IBM X-Force Threat Intelligence Index 2019 report outlines the most prominent threats and provides key insights into various industries, attack tactics, and major vulnerabilities that emerged during the year.
Tags : 
    
IBM APAC

2019 Gartner Market Guide for User & Entity Behavior Analytics

Published By: Forcepoint     Published Date: Oct 02, 2019
If you want greater—and earlier—visibility into indicators of security threats like intellectual property theft, compromised accounts, and insider risk, behavioral analytics may be the answer. Download this Gartner Market Guide if you’re considering or planning to integrate User and Entity Behavior Analytics (UEBA) to augment other security solutions or achieve risk-adaptive protection.
Tags : 
    
Forcepoint

24/7 Uptime for Electronic Health Records

Published By: Stratus Technologies     Published Date: Apr 17, 2009
The long migration to electronic health records (EHRs) in the U.S. is set to speed up with the funding authorized by the American Reinvestment and Recovery Act of 2009.  But what are the specific risks when clinicians can’t access electronic health records? How far-reaching are the consequences when EHR data is lost, or its integrity is compromised?  This paper looks at the mission-critical role of EHR systems, and introduces availability solutions that build in uptime protection to ensure the continuity of operation that both caregivers and patients can depend on.
Tags : 
stratus, electronic health records, ehrs, american reinvestment and recovery act, health, records, availability solutions, mission-critical, medical grade servers, electronic medical records, emr, patient health records, phrs, computerized health record system, community health record (chr), diagnostic records, lab results, prescribed medication, downtime risk, stratus ftserver
    
Stratus Technologies

3 Red Flags You're Not Getting the Security You Were Promised

Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Some solutions promise to check all the boxes on network security. But it turns out, they’re checking all the wrong ones. Experiencing these frustrations? Cisco Umbrella can help.
Tags : 
    
Cisco Umbrella EMEA

3 Red Flags You're Not Getting the Security You Were Promised

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Some solutions promise to check all the boxes on network security. But it turns out, they're checking all the wrong ones. Don't get frustrated. Cisco Umbrella can help, and you can be up and running before your next coffee break. Check out our simple security checklist to learn how to identify red flags and put an end to empty security promises. "
Tags : 
    
Cisco Umbrella EMEA

3 Red Flags You're Not Getting the Security You Were Promised

Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
Some solutions promise to check all the boxes on network security. But it turns out, they're checking all the wrong ones. Don't get frustrated. Cisco Umbrella can help, and you can be up and running before your next coffee break. Check out our simple security checklist to learn how to identify red flags and put an end to empty security promises.
Tags : 
    
Cisco Umbrella EMEA

3 Ways EFSS Enables Secure Content Collaboration for the Modern Mobile Workforce

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
workforce, security, task automation, content security, employee collaboration
    
Citrix ShareFile

3 Ways EFSS Enables Secure Content Collaboration for the Modern Mobile Workforce

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
data security, mobility, content collaboration, security efficiency, productivity
    
Citrix ShareFile

30 minutes to a more secure enterprise

Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
    
Cisco Umbrella EMEA

30 minutes to a more secure enterprise

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
security, opendns, cisco
    
Cisco Umbrella EMEA

4 Essentials for Turning the IOT into Actionable Intelligence

Published By: Dell Server     Published Date: Aug 24, 2018
Edge computing will soon become the new norm as we enter the era of zettabytes and billions of connected devices. Dell EMC PowerEdge servers are uniquely designed to meet the demands of edge computing with integrated security, no-compromise scalability and intelligent automation.
Tags : 
    
Dell Server
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.