romi

Results 101 - 125 of 778Sort Results By: Published Date | Title | Company Name

Applying an Economic Model to IT Management

Published By: VMTurbo     Published Date: Mar 25, 2015
Virtualization 1.0 vs. Virtualization 2.0: Where Are You? Virtualization 1.0 is marked by the ability to virtualize, monitor, and react to problems across the environment as they occur. Ever cognizant of the performance limitations that typify higher workload densities, Virtualization 1.0 hesitates to virtualize the critical applications that would be most beneficial. Virtualization 1.0 is limited by the inherent complexities of virtualization. Virtualization 2.0 is marked by complete, proactive control over the virtual environment. Virtualization 2.0 virtualizes up to 100% of its applications, guided by an intelligent abstraction that continually drives the environment to its desired state. Virtualization 2.0 is the promise of virtualization brought to fruition.
Tags : 
vmturbo, virtualization, it economic model, virtual environment, it management solutions, it management, knowledge management, enterprise applications, data center
    
VMTurbo

Architecting the Virtual Data Center for Availability, Data Protection, and Disaster Recovery

Published By: VMware Dell     Published Date: Sep 29, 2008
Virtualization offers the promise of simplifying your IT infrastructure from the desktop to the data center. But can your virtual environment maintain the level of availability you need to keep your business running or to recover from a disaster?
Tags : 
vmware, dell, virtual data center, data protection, disaster recovery, network architecture, high availability, server virtualization
    
VMware Dell

Architecture Matters: Beyond Layered Security Approaches

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Every year, record levels of money are spent on new IT security technology yet major breaches and compromises are more prevalent than ever. The concept of “layered security” in which an organization supports a wide variety of security technologies in order to discourage attackers doesn’t seem to be working. It’s time to rethink IT security not just the technology, but the way it’s approached from a strategic, architectural perspective.
Tags : 
palo alto, security, security architecture, saas, applications
    
Palo Alto Networks

Argyle ABM Survey

Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
A recent Argyle survey found that nearly 60% of marketing organizations currently use some form of Account-Based Marketing (ABM), while 28% plan to use it in the near future. This shows the rising importance of ABM in the marketing mix. However, ABM does have its challenges. Almost 30% of the same respondents claimed that maintaining personalized, but consistent interactions with prospects was the most prominent challenge in ABM. For more insight on how marketing executives are optimizing ABM, download this survey.
Tags : 
    
Oracle Marketing Cloud

Argyle Webcast: Unlocking the Power of AI and Machine Learning in Financial Services

Published By: Oracle     Published Date: Mar 22, 2019
Argyle CIO Webcasts, in partnership with Oracle, brings together top IT executives for an innovative, discussion-based webcast exploring the promises and perils of transformational technologies on the financial services industry.
Tags : 
    
Oracle

Argyle Webcast: Unlocking the Power of AI and Machine Learning in Financial Services

Published By: Oracle     Published Date: Mar 22, 2019
Argyle CIO Webcasts, in partnership with Oracle, brings together top IT executives for an innovative, discussion-based webcast exploring the promises and perils of transformational technologies on the financial services industry.
Tags : 
    
Oracle

Artificial Intelligence for Executives: Integrating AI into your analytical strategy

Published By: SAS     Published Date: Mar 06, 2018
Information on artificial intelligence (AI) is flooding the market, media and social channels. Without doubt, it’s certainly a topic worth the attention. But, it can be difficult to sift through market hype and grandiose promises to understand exactly how AI can be applied in practical and reliable solutions. Like most technological advances, incorporating new technology into business processes requires significant leadership and effective direction that all stakeholders can easily understand.
Tags : 
    
SAS

Artificial Intelligence for Executives: Integrating AI into your analytical strategy

Published By: SAS     Published Date: May 24, 2018
Information on artificial intelligence (AI) is flooding the market, media and social channels. Without doubt, it’s certainly a topic worth the attention. But, it can be difficult to sift through market hype and grandiose promises to understand exactly how AI can be applied in practical and reliable solutions. Like most technological advances, incorporating new technology into business processes requires significant leadership and effective direction that all stakeholders can easily understand. Great leaders become great by balancing strategy with tactics, future vision with current reality and strengths with weaknesses – all with the goal of accomplishing a clearly defined objective. Great leaders also understand that people are the most valuable resources within their organization. To drive and inspire their success, you must optimize strengths while recognizing inherent weaknesses. Many of our daily human experiences and interactions involve machines or devices of some sort. Technolo
Tags : 
    
SAS

At Last - An AV That Makes Virtualization Security Easy

Published By: Webroot UK     Published Date: Aug 07, 2013
Whether you are using virtual desktops or virtual servers it's essential that you consider protecting them from malware. Unfortunately, until now, that protection has often meant making some serious compromises.
Tags : 
virtualization, security, virtual desktop, virtual servers, protection
    
Webroot UK

Automate Your Cloud Compliance Journey in 6 Steps

Published By: AWS     Published Date: Oct 07, 2019
Securing cloud environments is different from securing traditional data centers and endpoints. The dynamic nature of the cloud requires continuous assessment and automation to avoid misconfigurations, compromises, and breaches. It can also be difficult to gain complete visibility across dynamic and rapidly changing cloud environments — limiting your ability to enforce security at scale. On top of these challenges, cloud governance is critical to maintain compliance with regulatory requirements and security policies as they evolve. Because cloud deployments are not just implemented once and left untouched, organizations need to consider how to integrate security into their CI/CD pipeline and software development lifecycle. Implementing a security solution that addresses cloud challenges requires deep security and cloud expertise that organizations often do not have. Once in the cloud, organizations manage and create environments via automation, adapt their workloads to changes by automa
Tags : 
    
AWS

Automating Data Masking and Reduction for SAP System Copy

Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Challenge It is not uncommon for SAP system copies, including any post-editing, to take several days to complete. Meanwhile, testing, development and training activities come to a standstill, and the large number of manual tasks in the entire process ties up highly skilled SAP BASIS staff. Opportunity Enterprises are looking to automation as a way to accelerate SAP system copies and free up staff. However, this is only one part of the problem: What further complicates the system copy process is the need to safeguard sensitive data and manage huge data volumes while also ensuring that the data used in non-production systems adequately reflects the data in production systems so the quality of development, testing and training activities is not compromised. Benefits This white paper explains how a considerable portion of the SAP system copy process can be automated using the CA Automic Automated System Copy for SAP solution and SNP T-Bone, helping enterprises become more agile.
Tags : 
    
CA Technologies_Business_Automation

Avoiding the Cost of a Bad App and Delivering on the Promise of Mobility

Published By: IBM     Published Date: Jan 29, 2015
Mobility is no longer an IT trend: It is the new reality for how technology is deployed for business benefit. Research and consulting firm Forrester refers to this tidal wave of change as the “mobile mind shift” and emphasizes that it is more important than ever for enterprises to get it right the first time. But getting it right means more than just launching a customer app, implementing enterprise mobile policies, improving mobile device security or creating campus-wide hot spots. It means developing and continuously delivering mobile applications that truly make a difference for employees, business partners and customers. Increasingly, that means adopting new ways of thinking about how best to develop and manage mobile applications.
Tags : 
mobile mind shift, it trends, mobility policies, mobile device security, security, it management, knowledge management, enterprise applications
    
IBM

Avoiding the Stall: Riding the Momentum of the Next Levels of Datacenter Virtualization — A Business

Published By: HP and Intel ®     Published Date: May 27, 2014
This document from IDC discusses the results that more comprehensive datacenter virtualization delivers, and it lays out both the promises and the potential pitfalls of the journey through successive stages of datacenter virtualization.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
    
HP and Intel ®

Avoiding the Stall: Riding the Momentum of the Next Levels of Datacenter Virtualization — A Business

Published By: HP     Published Date: May 27, 2014
This document discusses the results that more comprehensive datacenter virtualization delivers, and it lays out both the promises and the potential pitfalls of the journey through successive stages of datacenter virtualization.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
    
HP

Best practices for implementing 2048-bit SSL

Published By: Citrix Systems     Published Date: Feb 18, 2012
Ready for 2048-bit SSL? The Iron Age is officially over. The Cloud Age is here. Don't let stronger security compromise performance. Download the Citrix and Verisign White Paper and the NetScaler Performance Comparison now.
Tags : 
2048-bit ssl, security, ssl, performance, citrix, verisign, netscaler, cloud, protection, hacking, ecommerce, traffic, ssl everywhere always-on, encryption, application, application performance management, best practices, business activity monitoring, risk management, database security
    
Citrix Systems

Best Practices for Leveraging Security Threat Intelligence

Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault

Best Practices for Planning and Budgeting

Published By: Prophix     Published Date: May 31, 2016
The continual changes in the business climate constantly challenge companies to find more effective business practices. However, common budgeting limitations are preventing companies from moving forward; they have become so universal and accepted in the marketplace that it is becoming more difficult to move ahead and progress the business. Flexibility, accuracy and control over the budgeting process are three prominent factors slowing this progression.
Tags : 
best practices, budgeting, business efficiency, productivity, competitive advantage, business analytics, business integration, business intelligence, business management
    
Prophix

Better IT Decisions

Published By: HP - Enterprise     Published Date: Jun 04, 2013
Businesses are overwhelmed with data; it’s a blessing and a curse. A curse because it can overwhelm traditional approaches to storing and processing it. A blessing because the data promises business insight that never existed earlier. The industry has spawned a new term, “big data,” to describe it. Now, IT itself is overwhelmed with its own big data. In the press to roll out new services and technologies—mobility, cloud, virtualization—applications, networks, and physical and virtual servers grow in a sprawl. With them comes an unprecedented volume of data such as logs, events, and flows. It takes too much time and resources to sift through it, so most of it lies unexplored and unexploited. Yet like business data, it contains insight that can help us solve problems, make decisions, and plan for the future.
Tags : 
data research, big data, virtualization, applications, networks, productivity, project management, service management
    
HP - Enterprise

Beyond Prevention: Cisco’s Next Generation Endpoint Security

Published By: Cisco     Published Date: Dec 19, 2016
Today’s threat landscape has forced us, once again, to evolve how we think about and deliver effective security to protect endpoints (PCs, Macs, Linux, mobile devices, etc). Malware today is either on an endpoint or it’s headed there. Advanced malware is dynamic, can compromise environments from an array of attack vectors, take endless form factors, launch attacks over time, and can quickly exfiltrate data from endpoints. Such malware, including polymorphic and environmentally aware malware, is very good at masking itself and evading traditional security tools, which can lead to a breach. As a result, it’s no longer a question of “if” malware can penetrate defenses and get onto endpoints, it’s a question of “when”.
Tags : 
    
Cisco

Beyond Relational: Reimagine Your Data with Enterprise NoSQL

Published By: MarkLogic     Published Date: Mar 13, 2015
Big Data has been in the spotlight recently, as businesses seek to leverage their untapped information resources and win big on the promise of big data. However, the problem with big data initiatives are that organizations try using existing information management practices and legacy relational database technologies, which often collapse under the sheer weight of the data. In this paper, MarkLogic explains how a new approach is needed to handle the volume, velocity, and variety of big data because the current relational model that has been the status quo is not working. Learn about the NoSQL paradigm shift, and why NoSQL is gaining significant market traction because it solves the fundamental challenges of big data, achieving better performance, scalability, and flexibility. Learn how MarkLogic’s customers are reimagining their data to: - Make the world more secure - Provide access to valuable information - Create new revenue streams - Gain insights to increase market share - Reduce b
Tags : 
enterprise, nosql, relational, databases, data storage, management system, application, scalable, enterprise applications, data management
    
MarkLogic

Big Data vs. Real-Time Data

Published By: Datastax     Published Date: Aug 23, 2017
About 10 years ago big data was quickly becoming the next big thing. It surged in popularity, swooning into the tech world's collective consciousness and spawning endless start-ups, thought pieces, and investment funding, and big data's rise in the startup world does not seem to be slowing down. But something's been happening lately: big data projects have been failing, or have been sitting on a shelf somewhere and not delivering on their promises. Why? To answer this question, we need to look at big data's defining characteristic - or make that characteristics, plural - or what is commonly known as 'the 3Vs": volume, variety and velocity.
Tags : 
datastax, big data, funding
    
Datastax

Boost your mobile ROI with powerful Cognitive Insights from IBM MaaS360

Published By: Group M_IBM Q2'19     Published Date: May 03, 2019
"Managing and securing endpoints with conventional mobile device management (MDM) or enterprise mobile management (EMM) solutions is time-consuming and ineffective. For this reason, global IT leaders are turning towards unified endpoint management (UEM) solutions to consolidate their management of smartphones, tablets, laptops and IoT devices into a single management console. To increase operational efficiency, maximize data security and deliver on their digital transformation goals, they’ll need a UEM platform that does more than just promise success. The answer is a smarter solution, built for today, that brings new opportunities, threats, and efficiency improvements to the forefront. With Watson™, IBM® MaaS360® UEM features cognitive insights, contextual analytics, and cloud-sourced benchmarking capabilities. It helps you make sense of daily mobile details while managing your endpoints, users, apps, document, and data from one platform."
Tags : 
    
Group M_IBM Q2'19

Branchenexperten klären auf: Der Kompromiss zwischen Netzwerkleistung und -sicherheit

Published By: McAfee     Published Date: Feb 25, 2015
This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.
Tags : 
network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security, anti spam, anti spyware, anti virus
    
McAfee

Breach Response Best Practices

Published By: LifeLock     Published Date: Sep 12, 2016
It only takes one stolen laptop, one employee’s USB stick, one hacker, one virus, or one careless error to compromise your company’s reputation and revenue. The threat of data breach is real and it’s critical that your company is prepared. A thorough plan that can be executed quickly is essential to comply with relevant regulations, maintain customer loyalty, protect your brand and get back to business as soon as possible.
Tags : 
est practices, identity theft, security, protection, authentication
    
LifeLock

Bringing it All Together Achieving ERP Agility Within the Enterprise

Published By: Insight Software     Published Date: May 22, 2018
Don’t settle. Forward-thinking finance professionals know that there is a better way. Though BI tools have provided visibility to data, they have in fact failed to provide direct access to enterprise information. However, evolution does not stop there: Next-gen corporate performance management solutions are among us and promise to deliver interconnected, flexible, and realtime data access. Agility achieved.
Tags : 
erp, enterprise, finance, evolution, performance
    
Insight Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.