sets

Results 126 - 150 of 845Sort Results By: Published Date | Title | Company Name

Mobile Security and Risk Review, Second Edition

Published By: MobileIron     Published Date: Aug 03, 2016
In this edition we discuss emerging risks, report OS enterprise share, and list the top blacklisted consumer apps. We conclude with our recommendations for enterprises to protect their assets against mobile risks and threats. Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepperís use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. When attacks against users are successful, they can result in the loss of both personal and business data.
Tags : 
    
MobileIron

Three ways certificates save wi-fi

Published By: Ruckus Wireless     Published Date: May 05, 2016
Passwords kick Wi-Fiís @ss. About 40% of Help Desk tickets are password related, and some estimates are $118/student/year in password resets. Donít blame the Wi-Fi, fix the problem.
Tags : 
ruckus wireless, wifi, certificate wifi, passwords, help desk, education, higher ed, networking, wireless, enterprise applications, business technology
    
Ruckus Wireless

The Art of DevOps: Your Strategic Advantage

Published By: Dynatrace     Published Date: Dec 16, 2015
This eBook is inspired by the famous 6th century Chinese manuscript: The Art of War. Today, we will embark on a mission to continuously deliver assets to the operational battlegrounds safely, securely, and quickly.
Tags : 
dynatrace, devops, application development, automated testing, performance monitoring, software development, knowledge management, enterprise applications
    
Dynatrace

5 Reasons Why a White-Labeled Cloud Offering Makes Good Sense

Published By: Concerto Cloud Services     Published Date: Dec 18, 2015
Download this whitepaper to learn 5 reasons why a white-labeled cloud partnership makes sense. 1) Maintain and evolve your brand 2) Gain all of the skill sets and infrastructure of a cloud organization, without building them from the ground up 3) Be the trusted advisor to your customers 4) Wrap unique services around the cloud platform and drive additional value to your customers 5) Launch into the world of consumption-based revenue and drive a long-term run rate
Tags : 
    
Concerto Cloud Services

5 Pillars of API Management

Published By: CA Technologies     Published Date: Aug 22, 2017
Across industry sectors, the boundaries of the traditional enterprise are blurring, as organizations open up their on-premise data and application functionality to partner organizations, the Web, mobile apps, smart devices and the cloud. APIs (application programming interfaces) form the foundation of this new open enterprise, allowing enterprises to reuse their existing information assets across organizational boundaries.
Tags : 
    
CA Technologies

Pro tips for backing up large datasets

Published By: Carbonite     Published Date: Apr 09, 2018
IT admins tasked with restoring servers or lost data during a disruption are consumed with a single-minded purpose: successful recovery. But it shouldnít take an adverse event to underscore the importance of recovery as part of an overall backup strategy. This is especially true with large datasets. Before you consider how youíre going to back up large datasets, first consider how you may need to recover the data. Variables abound. Is it critical or non-critical data? A simple file deletion or a system-wide outage? A physical server running onsite or a virtual one hosted offsite? These and a handful of other criteria will determine your backup and disaster recovery (BDR) deployment. What do we mean by large? A simple question with a not-so-simple answer. If your total data footprint is 5 TB or more, thatís considered large. But what kind of data is it? How many actual files are there? How frequently do they change? How much can they be compressed? Itís likely that two different 5 TB en
Tags : 
    
Carbonite

Banks and Fintechs Reimagine Digital Financial Services

Published By: Juniper Networks     Published Date: Aug 10, 2017
Resistance to change is futile. Financial services are becoming more embedded in the banking customerís everyday life, driving unprecedented levels of change across the industry. The unfolding digital economy is ushering a new era of technology adoption in banking. From cloud to open banking APIs, these play a defining role in enabling banks to create new digital products and services, refresh the bank branch, find new customer segments, and monetize underutilized data and information assets.
Tags : 
opening banking, api, data, currency, cloud transformation, frictionless banking, business model disruption
    
Juniper Networks

Bloor Report: Test Data Management

Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
There are five ways to provision test data. You can copy or take a snapshot of your production database or databases. You can provision data manually or via a spreadsheet. You can derive virtual copies of your production database(s). You can generate subsets of your production database(s). And you can generate synthetic data that is representative of your production data but is not actually real. Of course, the first four examples assume that the data you need for testing purposes is available to you from your production databases. If this is not the case, then only manual or synthetic data provision is a viable option. Download this whitepaper to find out more about how CA Technologies can help your business and its Test Data problems.
Tags : 
    
CA Technologies EMEA

CA Project & Portfolio Management Resource Management

Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
At a Glance To excel as resource manager, you need to quickly find the right talent to solve the right problems at the right time. CA Project & Portfolio Management (CA PPM) provides you with the modern resource management functions you need to maximize your companyís most valuable assets: the people. Modern, simple and powerful, CA PPM helps you work smarter by region, department, project, role and skill set.
Tags : 
    
CA Technologies EMEA

The Practical Blueprint to Continuous Delivery

Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Do you want to bring continuous delivery to your organization? Or would you simply like to begin your automation Journey? CA Technologies Automation Solutions (formerly Automic) proposes a fourstage blueprint to continuous delivery to assist enterprises at any stage of their DevOps journey. This e-book sets out a plan that can take a company of any maturity level all the way up to enterprise-scale continuous delivery using a combination of CA Continuous Delivery Automation, 40-plus years of business automation experience, and the proven tools and practices the company is already leveraging.
Tags : 
    
CA Technologies_Business_Automation

How Digital 2.0 Is Driving Bankingís Next Wave of Change

Published By: Cognizant     Published Date: Oct 23, 2018
In the last few years, a wave of digital technologies changed the banking landscape - social/ mobile altered the way banks engage with customers, analytics enabled hyper personalized offerings by making sense of large datasets, Cloud technologies shifted the computing paradigm from CapEx to OpEx, enabling delivery of business processes as services from third-party platforms. Now, a second wave of disruption is set to drive even more profound changes - including robotic process automation (RPA), AI, IOT instrumentation, blockchain distributed ledger and shared infrastructure, and open banking platforms controlled by application programming interfaces (API). As these technologies become commercialized, and demand increases for digitally-enabled services, we will see unprecedented disruption, as non-traditional banks and fintechs rush into all segments of the banking space. This whitepaper examines key considerations for banks as they explore value in the emerging Digital 2.0 world.
Tags : 
cognizant, banking, digital
    
Cognizant

Gain a Decisive Advantage in Cyber

Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
When it comes to cybersecurity, you can only defend what you can see. Organizations continue to suffer breaches, oftentimes because they do not have continuous, real-time visibility of all their critical assets. With more data and applications moving to the cloud, IoT and other emerging technologies, the attack surface continues to expand, giving adversaries more blind spots to leverage. Watch a webinar with SANS where we examine how to: Discover, classify and profile assets and network communications Detect threats and decode content in real-time at wire speed Hunt for unknown threats via rich, indexable metadata Alter your terrain and attack surface with deception to slow down attackers By knowing your cyber terrain and increasing the risk of detection and cost to the adversary, you can gain a decisive advantage.
Tags : 
    
Fidelis Cybersecurity

Game Changing Cyber Defense Strategies

Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
    
Fidelis Cybersecurity

Accelerate: State of DevOps

Published By: Google     Published Date: Oct 26, 2018
According to the new Accelerate: State of DevOps 2018: Strategies for a New Economy report, elite DevOps performers have more frequent code deployments, faster lead times, lower change failure rates, and far quicker incident recovery times. Download the sponsored report from DORA, and find out what nearly 1,900 professionals said about the role of DevOps in their business, what sets top-performing DevOps teams apart, and how this gives them a competitive edge.
Tags : 
    
Google

ECG: BUSINESSíS MOST VITAL VITAL SIGN

Published By: Capita     Published Date: Jun 25, 2019
Introducing ECG: Enterprise Connectivity Grading. The key metrics of organisational well-being have changed. While indicators like strategy, sales, margins, and profitability remain crucial, these now hinge on other vital factors. The organisationís ability to leverage key assets like its people and data. Its agility, mobility, and adaptability. Its capacity to transform, evolve, and grow over time. And these factors in turn are now fundamentally contingent on something else. Connectivity. Download the eBook and learn more>>
Tags : 
    
Capita

Creating the next-generation digital business, where "everything is a service"

Published By: IBM     Published Date: Apr 12, 2016
The digital transformation that organizations are striving for today requires a mindset of "no limits" in terms of securely exposing critical business assets for internal and external consumption. In order to be an agile, digital business, enterprises need to seamlessly connect across hybrid environments, applications, data and processes, keeping a keen eye on an open cloud strategy. They also need a secure integration framework to provide controlled access, a single dashboard providing performance insights, and easy access to digital assets for your developers. This webcast will explore all of these areas in depth, to support your enterprise's quest to become a next-generation digital business.
Tags : 
ibm, digital business, api economy, api management, apim, api, enterprise applications, infrastructure, cloud computing, business technology
    
IBM

A Secure Path to the Cloud

Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"Since a decade the market has seen an outburst of data. With Managing and Securing Data is Crucial. With 3.8 Billion mobile users and 24 Zetta bytes of data created, and 100% attacks that target username and password credentials, managing and securing data has become a crucial and the most critical aspect for almost every Business. Oracleís SPARC M7 processor, with Oracleís Software in Silicon technology, is the industryís most advanced multi thread, multi-core processor with unique capabilities for information security. It sets the foundation for mission-critical cloud based server infrastructure with unprecedented levels of security, efficiency, and performance.
Tags : 
    
Oracle PaaS/IaaS/Hardware

Real-Time Analytics

Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"With the introduction of Oracle Database In-Memory and servers with the SPARC S7 and SPARC M7 processors Oracle delivers an architecture where analytics are run on live operational databases and not on data subsets in data warehouses. Decision-making is much faster and more accurate because the data is not a stale subset. And for those moving enterprise applications to the cloud, Real-time analytics of the SPARC S7 and SPARC M7 processors are available both in a private cloud on SPARC servers or in Oracleís Public cloud in the SPARC cloud compute service. Moving to the Oracle Public Cloud does not compromise the benefits of SPARC solutions. Some examples of utilizing real time data for business decisions include: analysis of supply chain data for order fulfillment and supply optimization, analysis of customer purchase history for real time recommendations to customers using online purchasing systems, etc. "
Tags : 
    
Oracle PaaS/IaaS/Hardware

Next Generation Finance: Creating value in a digital age

Published By: Oracle     Published Date: Sep 08, 2016
This Webcast explores what the next generation of Finance function looks like. Watch this webcast now to find out: How companies are monitoring and measuring intangibles within their business. How the CFO role is evolving in this increasingly digital economy that we are all living.
Tags : 
digital technologies, digital landscape, finance, business models, next generation finance, finance function, cloud, big data, intagible assets, virtualization, cloud computing, infrastructure
    
Oracle

Identity-Centric Security: Enabling and Protecting the Business

Published By: CA Technologies     Published Date: Jan 08, 2014
Todayís trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies

Identity-Centric Security: Enabling and Protecting the Business

Published By: CA Technologies     Published Date: Jan 08, 2014
Todayís trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, authentication, security management, cloud computing
    
CA Technologies

Performance Testing And APM In The Aws Cloud

Published By: AppDynamics     Published Date: Sep 20, 2017
Performance testing has always been about ensuring the scalability of a software application. Until the arrival of the first performance test automation solutions in the late 90ís, performance testing was a manual process that was difficult, if not impossible, to test in a consistent and reliable fashion. The arrival of these new tool sets suddenly allowed software testers to turn discrete user actions into scripts that could be combined and replayed as test scenarios. Solving the consistency and reliability challenge, software testers could now repeat the same test on demand while reinforcing and imposing some new requirements.
Tags : 
cloud, apm, performance testing, support, integration, aws
    
AppDynamics

Whatís the real value of IoT for manufacturers?

Published By: Schneider Electric     Published Date: Apr 23, 2019
Manufacturing presents one of the largest opportunities for seizing the value of IoT integration ó and among the fastest to adopt IoT solutions. Manufacturers see IoT as an improvement to help manage the large number of assets involved in manufacturing and to reduce the time it takes to make products. Still, many wonder what value IoT can actually bring their business. This interactive eBook from IDC and Schneider Electric identifies the top reasons to invest in IoT, and how to ensure manufacturers get the most out of their investments.
Tags : 
smart manufacturing, iot, digital
    
Schneider Electric

Realigning Water Industry Assets in Digitally-Enhanced Operations

Published By: Schneider Electric     Published Date: Jul 01, 2019
How digital transformation is blending information and operational technology for asset performance improvements that will reduce costs, optimize efficiency, and improve conservation.
Tags : 
asset performance, water, augmented reality, pumps
    
Schneider Electric

Managing pump station assets for lowest TCO and maximum effectiveness

Published By: Schneider Electric     Published Date: Jul 01, 2019
This eGuide examines how digital technology is integrating real-time monitoring of pump energy usage, maintenance, and operations for maximum payback.
Tags : 
pump, tco, water
    
Schneider Electric
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.