third party

Results 201 - 225 of 288Sort Results By: Published Date | Title | Company Name

ForgeRock Identity Platform Customer-driven, Internet-scale Identity Relationship Management

Published By: ForgeRock     Published Date: May 05, 2015
The goal of ESG Lab reports is to educate IT professionals about data center technology products for companies of all types and sizes. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by ForgeRock.
Tags : 
esg, forgerock, identity platform, self-service, third-party authentication, it management
    
ForgeRock

The Risk of "Free" Endpoint Security

Published By: Intel Security     Published Date: Jan 12, 2016
Research by third-party analyst Aberdeen Group reveals the true cost of "Free" endpoint security solutions.
Tags : 
aberdeen, free av, endpoint security, security, it management
    
Intel Security

Managing Vulnerabilities & Updates for Third Party Software

Published By: Secunia     Published Date: Sep 30, 2015
In 2014, the world saw an increased number of security breaches in high profile companies. We will take a look back at some of these cases, and why it’s not only the high profile companies that were breached. Plus we will show you steps you can take to prevent yourself from being hacked in 2015. We will focus on “getting back to the basics” going into detail on why complete patch management means a safer year for any organization.
Tags : 
managing vulnerability, security breaches, security threats, hack prevention, third party software, security
    
Secunia

Survey Results: Current and Future States of Corporate IT

Published By: Rackspace     Published Date: Nov 24, 2015
View the third party research results of corporate IT directors as they indicate their current IT states and future ventures for their IT organizations.
Tags : 
market findings, it states, future of it, it innovation, it innovations, hosting providers, hosting, it management, enterprise applications, business technology
    
Rackspace

How to Focus on Innovations that Support Business Growth when your Internal Resources are Limited

Published By: Rackspace     Published Date: Jan 19, 2016
Keeping up with innovation and contributing to the business’s core objectives seems like the impossible task for an IT leader when having to maintain current systems. How does a business best leverage third party services to maximize resources and impact to the business?
Tags : 
outsourcing, it growth, it spend, it operations, it maintenance, it innovation, big data, data security, cloud, hybrid cloud, hosting, hosting providers, it management, enterprise applications, data management, business technology
    
Rackspace

Omnichannel: 5 Roadblocks to Avoid on the Journey to Omnichannel Retail Success

Published By: IBM     Published Date: Sep 08, 2016
Third party white paper from FitforCommerce and IBM on the 5 roadblocks to avoid on the journey to omnichannel retail success.
Tags : 
ibm, commerce, b2c, b2c ecommerce, ecommerce, omnichannel, retail success, enterprise applications, business technology
    
IBM

Using the cloud to improve business resilience

Published By: IBM     Published Date: Feb 26, 2016
Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.
Tags : 
cloud hosting, ibm, integration, cloud computing, data centers, application integration, best practices, business analytics, content integration, content management system
    
IBM

3 Ways to Turn Your Digital Workplace from a Beast into a Beauty

Published By: IBM     Published Date: Jul 20, 2016
New research from IBM found that one-third of employees surveyed at Fortune 1000 companies are sharing and uploading corporate data on third-party cloud apps. Why? They’re tired of workplace apps that don’t perform like their personal apps: intuitively, on the go, and with some intelligence. Saying “yes” might feel good to your teams, but it can also turn your infrastructure into a Beast. You don’t know all the different apps being used, like file sharing or online meetings. Or how much they cost. Or if your content is safe and manageable. Can you give your teams what they want without getting trampled by the Beast? Yes you can. You can transform the Beast into a Beauty. But you need to consider three critical ways to make that happen.
Tags : 
ibm, enterprise social solutions, enterprise solutions, business operations, business technology, third-party cloud apps, workplace apps, enterprise applications
    
IBM

Get smart to shut down insider threats: Reduce the risk of insider-related data loss

Published By: IBM     Published Date: Sep 30, 2016
Read this white paper to learn about how to get smart about insider threat prevention, including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third party collaboration.
Tags : 
ibm, data, big data, security, data loss, data protection, threat provention, knowledge management, enterprise applications, data management
    
IBM

Prepare And Maintain Your Data - Data Quality And Master Data Management In A Hybrid Environment

Published By: IBM     Published Date: Apr 14, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain a competitive advantage in their industry. However, most organizations will be confronted with the challenging task of reconciling their legacy on-premises data with new, third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
cloud-based data, data quality, data management, hybrid environment, decision making
    
IBM

Reduce The Risk Of Insider-Related Data Loss With Intelligent, Integrated Security From IBM

Published By: IBM     Published Date: Apr 20, 2017
An interactive white paper describing how to get smart about insider threat prevention - including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third-party collaboration. Security breaches are all over the news, and it can be easy to think that all the enemies are outside your organization. But the harsh reality is that more than half of all attacks are caused by either malicious insiders or inadvertent actors.1 In other words, the attacks are instigated by people you’d be likely to trust. And the threats can result in significant financial or reputational losses.
Tags : 
insider threats, data management, organization management, data analytics, threat detection, risk management, fraud discovery, forensics investigation, incident response
    
IBM

IDaaS Demonstration: Take a personalized tour of IBM Cloud Identity Service

Published By: IBM     Published Date: Apr 23, 2018
IBM Cloud Identity Service is helping businesses simplify Identity and Access Management (IAM) through a cloud-delivered service (IDaaS). IBM Cloud Identity Service combines the full spectrum of IAM, including federation, web access management, and identity governance with the speed, agility, and lower cost of the cloud. This video demonstrates how to rapidly integrate SaaS and other third-party applications using the "Quick Connect" feature within the IBM Cloud Identity Service and securely connect people and applications to the cloud.
Tags : 
idaas, ibm cloud identity service
    
IBM

Is Your Outsourcing Secure?

Published By: Utimaco     Published Date: Aug 18, 2008
Better safe than sorry! When outsourcing, keeping an eye on data security right from the planning stage can save your company from nasty surprises. Readers should learn how to protect their confidential data when they exchange information with external partners.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security, outsourcing, outsource, third party, 3rd party, security
    
Utimaco

Internet Trust Marks: Building Confidence and Profit Online

Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
A trust mark posted on the site tells online shoppers that a creditable third party, such as VeriSign, has found the site to be trustworthy.
Tags : 
verisign, internet trust marks, internet security, extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority
    
VeriSign Incorp.

Cloud-based data backup: A buyer's guide - How to choose a third-party provider for development, man

Published By: IBM     Published Date: Oct 10, 2013
Many IT executive view cloud computing as an attractive platform for data backup. They know cloud can help protect business-critical data and provide near-ubiquitous information access. But while having a cloud-based solution is valuable, developing one in-house is tricky. That's why many organizations want to contract with a third-party cloud provider for cloud-based data backup. Read this buyer's guide to learn how to choose a provider to suit your business needs.
Tags : 
cloud based, data backup, cloud based data, buyers guide, third-party provider, business development, cloud computing, information access, cloud-based colution, choose a provider, business needs, backup and recovery, disaster recovery, wireless service providers, database security, document management, data loss prevention
    
IBM

Requirements When Considering a Next-Generation Firewall (WP)

Published By: Cisco     Published Date: Apr 08, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise. An NGFW must be able to: • Integrate security functions tightly to provide highly effective threat and advanced malware protection • Provide actionable indications of compromise to identify malware activity • Offer comprehensive network visibility • Help reduce complexity and costs • Integrate and interface smoothly and transparently with third-party security solutions • Provide investment protection
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution, security, data management
    
Cisco

Evaluation of the Cisco TelePresence SX10 Quick Set Group Video Conferencing System

Published By: Cisco     Published Date: Dec 21, 2016
In the last few months, WR has observed that the SX10 has found its way into offices and small meeting rooms of many of our enterprise consulting clients. In some cases, the SX10 was the first Cisco video product ever installed in those environments. This prompted us to take a closer look at this system. This document contains the results of WR’s independent, third-party testing, and our overall opinions of the Cisco TelePresence SX10 Quick Set group video conferencing system.1
Tags : 
    
Cisco

How to Use Push Notifications for Application Monetization

Published By: Phunware     Published Date: Oct 27, 2014
Learn how to use push notifications for application monetization and see the positive results of providing the right messages, at the right time, to the right users.
Tags : 
push notifications, geo fence, location marketing, location based alerts, imessage, cloud messaging, third party app notifications, local notifications
    
Phunware

Evaluation of Polycom Pano: Hands - On Testing of a Feature - Rich Wireless Presentation Solution

Published By: Polycom     Published Date: Nov 30, 2017
Polycom Pano, a wireless and wired presentation solution, is designed to make it quick and easy for meeting participants to present and share various types of content. Polycom commissioned the Wainhouse Research test team to perform a third-party assessment of Pano. To facilitate this effort, Polycom provided a pre-release version of the Pano device, and a Sharp PN-L703B 1080p touch-capable 70” display. This report contains the results of our hands-on testing.
Tags : 
pano, wireless presentation solution, content sharing, blackboarding, annotation, polycom
    
Polycom

5 Tips for Choosing a Next-Generation Endpoint Security Solution

Published By: Cisco     Published Date: Dec 19, 2016
Prevention is your first line of defense. Make sure your Next-Gen Endpoint Security includes: Global Threat Intelligence – a team of threat hunters detecting the newest threats and uncovering zero-days to keep you protected 24/7 Signature-based AV Detection – let your Next-Gen Endpoint Security solution do all the AV heavy lifting and consolidate protection onto one agent Built-in Sandboxing – get static and dynamic analysis of suspicious threats, without having to deploy a third-party sandbox Proactive Protection – identify and patch vulnerabilities, and analyze and stop suspicious low-prevalence executables before they become real problems
Tags : 
    
Cisco

Walking the line: Unlock higher performance through value stream analysis on your packaging line

Published By: Domino     Published Date: Feb 25, 2019
Food and beverage manufacturers today face a host of challenges— SKU proliferation, more frequent line changeovers, finding and retaining skilled employees — all while handling the day-to-day challenges of keeping the line running smoothly in the first place. This demand for continuous improvement has plant managers and line engineers examining every aspect of the production and packaging line for ways to squeeze every bit of performance from every machine, every process, and every employee This white paper from Domino takes a look at how conducting a value stream analysis with a third-party provider can uncover a wide array of opportunities to improve productivity and efficiency. From freeing up labor and reducing errors to shortening changeover time and sharing critical operational knowledge among all stakeholders, a value stream analysis provides a collaborative opportunity to learn and discover new ways to boost productivity without major equipment investments.
Tags : 
    
Domino

Choosing the Right Security Solution

Published By: Symantec     Published Date: Jun 29, 2012
Choosing the Right Security Solution. Moving Beyond SSL to Establish Trust
Tags : 
ssl, symantec, safeguard customers, third-party solutions, security, business technology
    
Symantec

Four Key Trends Impacting Mobile Infrastructure Strategy

Published By: IBM     Published Date: Jan 09, 2015
As mobile technology evolves, it’s bringing rapid change to enterprises everywhere, so it’s essential to know the latest trends and how to build on them to create real business benefits. IDC believes third-party mobility service providers will play a key role in helping you do just that. Read the analyst report to get expert insight into how you can benefit from key mobile trends; building blocks and best practices for successful deployment and adoption of any mobility initiative; critical factors to consider when evaluating an IT services provider; and details on how IBM MobileFirst services can help you achieve a sustainable competitive advantage
Tags : 
ibm, mobile, network, capabilities, solutions, strategy, cisco, challenges, iot, byod, infrastructure, trends, analytics, networking, security, it management, wireless
    
IBM

Gartner Magic Quadrant

Published By: Jive     Published Date: Feb 12, 2015
With its in-depth guidance and independent third-party vendor evaluations, Gartner’s Magic Quadrant market assessment can assist your organization in implementing an effective communication and collaboration solution. The full report covers 17 vendors, with specific information on their ability to execute and completeness of vision.
Tags : 
enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication, collaboration, market assessment
    
Jive
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.