truste

Results 76 - 100 of 319Sort Results By: Published Date | Title | Company Name

DDoS Is the New Spam: 3 Strategies To Turn Catastrophe Into Annoyance

Published By: F5 Networks Inc     Published Date: Aug 16, 2018
As signaling and scrubbing technology evolve (and as your solutions become more and more adaptable), DDoS attacks will become less effective and less attractive to would-be adversaries. The time will soon come when a 1 Tb attack from an IoT botnet will seem like a mere annoyance, rather than a catastrophic event—if you even notice it at all. So how do you get there faster? Plan ahead by designing a defense in-depth DDoS strategy and partner with a trusted security provider to handle the large attacks. Upfront preparation will pay off when the threat of DDoS attacks no longer keeps you up at night.
Tags : 
strategy, ddos, spam, technology, solutions
    
F5 Networks Inc

8 GREAT REASONS TO UPGRADE TO VERITAS NETBACKUP 8 FOR UNIFIED DATA PROTECTION

Published By: Veritas     Published Date: Dec 08, 2016
The latest version - Veritas NetBackup Platform 8.0 - delivers unified data protection for organizations of all sizes, with proven enterprise-class scale, high performance, extensive workload integration, and self-service. No matter where data resides, NetBackup is trusted today in small to the largest and most complex heterogeneous environments.
Tags : 
cloud, cloud computing, data management
    
Veritas

Driving growth and innovation with a trusted support resource

Published By: IBM     Published Date: Jun 16, 2015
IBM takes a broadly integrated approach to hardware, software and multi-vendor support that can help you find new ways to help simplify IT asset management, enhance quality and control costs.
Tags : 
technology infrastructure, virtualization, it business solutions, software service services, best practices, infrastructure management, technical support relationship, dynamic infrastructure, server virtualization, customer experience management, productivity, service management, data center design and management, infrastructure
    
IBM

Can commerce data talk to you like a trusted business advisor? From Insight to Action to Results

Published By: IBM     Published Date: Jan 27, 2016
Read this white paper to discover how predictive analytics and cognitive commerce make it possible to get instant access to integrated information and actionable insights so you can deliver superior—and profitable—interactions with customers.
Tags : 
ibm, data, insights, results, analytics, cognitive commerce, knowledge management, enterprise applications, data management, business technology
    
IBM

The era of hybrid environments is here: Is your data refined and ready?

Published By: IBM     Published Date: Feb 22, 2016
This e-book describes how a data refinery can make trusted data available quickly and easily to people and systems across your organization.
Tags : 
ibm, data, big data, hybrid, refined data, data refinery, enterprise applications, data management, business technology
    
IBM

The era of hybrid environments is here: Is your data refined and ready?

Published By: IBM     Published Date: Apr 18, 2016
This e-book describes how a data refinery can make trusted data available quickly and easily to people and systems across your organization. It includes simple steps you can take to start exploring - and implementing - this strategy for handling the challenges of hybrid data environments.
Tags : 
ibm, trusted data, data optim, big data, hybrid data environments, data management
    
IBM

Analytics: The upside of disruption

Published By: IBM     Published Date: Apr 22, 2016
The upside of disruption: Reinventing business processes, organizations and industries in the wake of the digital revolution
Tags : 
ibm, ibm big data and analytics, ibm big data, trusted data, big data, data management
    
IBM

Who's afraid of the big (data) bad wolf?

Published By: IBM     Published Date: Jul 06, 2016
Today data volumes are exploding in every facet of our lives. Business leaders are eager to harness the power of big data but before setting out into the big data world it is important to understand that as opportunities increase ensuring that source information is trustworthy and protected becomes exponentially more difficult. This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
Tags : 
ibm, big data, trusted data, data management, data solutions, data center
    
IBM

Developing a data integration and lifecycle management strategy for a hybrid environment

Published By: IBM     Published Date: Jul 06, 2016
How can your organization realize the financial benefits of the cloud while ensuring information culled from cloud sources is secure and trustworthy? The answer is governance. Download to read more.
Tags : 
ibm, big data, trusted data, data management, data solutions, data center
    
IBM

The MDM advantage: Creating insight from big data

Published By: IBM     Published Date: Jul 06, 2016
To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM) with the IBM big data portfolio creates a valuable connection: big data technology can supply insights to MDM, and MDM can supply master data definitions to big data.
Tags : 
ibm, mdm, big data, ibm infosphere, data management, data center
    
IBM

Enhanced 360-degree view of the customer

Published By: IBM     Published Date: Jul 06, 2016
Five high-value uses for big data: IBM has conducted surveys, studied analysts’ findings, talked with more than 300 customers and prospects and implemented hundreds of big data solutions. As a result, it has identified five high-value use cases that enable organizations to gain new value from big data.
Tags : 
ibm, mdm, big data, trusted data, data solutions, data management, data center
    
IBM

The era of hybrid environments is here: Is your data refined and ready?

Published By: IBM     Published Date: Jul 06, 2016
This e-book describes how a data refinery can make trusted data available quickly and easily to people and systems across your organization. It includes simple steps you can take to start exploring - and implementing - this strategy for handling the challenges of hybrid data environments.
Tags : 
ibm, trusted data, data optim, big data, hybrid data environments, data management, data center
    
IBM

The MDM advantage: Creating insight from big data

Published By: IBM     Published Date: Oct 13, 2016
To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM) with the IBM big data portfolio creates a valuable connection: big data technology can supply insights to MDM, and MDM can supply master data definitions to big data.
Tags : 
ibm, mdm, big data, ibm infosphere, mdm advantagw, knowledge management, enterprise applications, business technology
    
IBM

The era of hybrid environments is here: Is your data refined and ready?

Published By: IBM     Published Date: Oct 13, 2016
This e-book describes how a data refinery can make trusted data available quickly and easily to people and systems across your organization. It includes simple steps you can take to start exploring - and implementing - this strategy for handling the challenges of hybrid data environments.
Tags : 
ibm, trusted data, data governance, governance, big data, hybrid data environments, data management, business technology, data center
    
IBM

The truth about information governance and the cloud

Published By: IBM     Published Date: Oct 13, 2016
Cloud-based data and processing services present too much opportunity for organizations to ignore. How can organizations realize the obvious financial benefits of the cloud while ensuring information culled from cloud sources is secure and trustworthy? Good hybrid information governance implies several priorities for IT and the business which are based on these foundational pillars: - Broad agreement on what information means - Clear agreement on how owned information assets will be maintained and monitored - Standard practices for securing strategic information assets - Enterprise data integration strategy
Tags : 
ibm, trusted data, big data, governance, data governance, data management, business technology, data center
    
IBM

Who's afraid of the big (data) bad wolf?

Published By: IBM     Published Date: Oct 13, 2016
Who's afraid of the big (data) bad wolf? Survive the big data storm by getting ahead of integration and governance functional requirements Today data volumes are exploding in every facet of our lives. Business leaders are eager to harness the power of big data but before setting out into the big data world it is important to understand that as opportunities increase ensuring that source information is trustworthy and protected becomes exponentially more difficult. This paper provides a detailed review of the best practices clients should consider before embarking on their big data integration projects.
Tags : 
ibm, big data, trusted data, data management, data solutions, business technology, data center
    
IBM

IBM InfoSphere Information Governance Catalog

Published By: IBM     Published Date: Apr 13, 2018
By leveraging the comprehensive capabilities in Information Governance Catalog, you are better able to align IT with your business goals.
Tags : 
cloud, governance, trusted data
    
IBM

A single solution to govern, manage, and consume all shared data assets

Published By: TIBCO Software     Published Date: Jun 14, 2019
As recognized leader in master data management (MDM), and a pioneer in data asset management, TIBCO EBX™ software is an innovative, single solution for managing, governing, and consuming all your shared data assets. It includes all the enterprise class capabilities you need to create data management applications including user interfaces for authoring and data stewardship, workflow, hierarchy management, and data integration tools. And it provides an accurate, trusted view of business functions, insights, and decisions to empower better decisions and faster, smarter actions. Download this datasheet to learn: What makes EBX™ software unique Various capabilities of EBX software The data it manages
Tags : 
    
TIBCO Software

Guardians of trust: how to build trust in the analytics powering new technologies

Published By: KPMG     Published Date: Jul 10, 2018
As organisations increasingly leverage data, sophisticated analytics, robotics and AI in their operations, we ask who should be responsible for trusted analytics and what good governance looks like. Read this report to discover: • the four key anchors underpinning trust in analytics – and how to measure them • new risks emerging as the use of machine learning and AI increases • how to build governance of AI into core business processes • eight areas of essential controls for trusted data and analytics.
Tags : 
    
KPMG

Guardians of trust: How to build trust in the analytics powering new technologies

Published By: KPMG     Published Date: Jul 11, 2018
As organisations increasingly leverage data, sophisticated analytics, robotics and AI in their operations, we ask who should be responsible for trusted analytics and what good governance look like? Read this report to discover: • the four key anchors underpinning trust in analytics – and how to measure them • new risks emerging as the use of machine learning and AI increases • how to build governance of AI into core business processes • eight areas of essential controls for trusted data and analytics. Download the report now:
Tags : 
    
KPMG

Zero Trust Security: A New Paradigm For a Changing World

Published By: Centrify Corporation     Published Date: May 22, 2018
A significant paradigm shift occurred in the last few years. Much like other technological shifts of the last decade — when cloud computing changed the way we do business, agile changed the way we develop software and Amazon changed the way we shop — Zero Trust presents us with a new paradigm in how we secure our organizations, our data and our employees. While difficult to identify the precise tipping point, one thing is certain: what were once extraordinarily high-profile, damaging breaches are no longer extraordinary. In just the last 18 months, Yahoo, Accenture, HBO, Verizon, Uber, Equifax, Deloitte, the U.S. SEC, the RNC, the DNC, the OPM, HP, Oracle and a profusion of attacks aimed at the SMB market have all proven that every organization — public or private — is susceptible. The epiphany behind the paradigm shift is clear: Widely-accepted security approaches based on bolstering a trusted network do not work. And they never will. Especially when businesses are dealing with skill
Tags : 
    
Centrify Corporation

Standardizing your Operating Environment for IT Efficiency

Published By: Red Hat     Published Date: Sep 26, 2014
What if you could simplify and standardize all your systems? What if you could make the most of what you have, while moving to a trusted and secure platform that gives you the ability to innovate like never before? With Red Hat you can… IT must keep up with the demands of business, but still lead the way to innovation that fuels growth. Eliminate excessive complexity and inefficiency in your datacenter—without leaving behind existing investment. Standardizing on Red Hat doesn't mean ripping and replacing. It means having a well-managed platform AND freeing up resources to innovate with greater efficiency, security, stability, and minimal overhead.
Tags : 
it efficiency, standardized operating environment, it solutions, integration, it management
    
Red Hat

The Criminal Justice Information Services (CJIS) Compliance For Mobile Devices

Published By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : 
criminal, justice, information, services, cjis, compliance
    
MobileIron

From Insight to Action to Results: Can your commerce data talk to you like a trusted advisor?

Published By: IBM     Published Date: Jul 28, 2016
Read this white paper to discover how predictive analytics and cognitive commerce make it possible to get instant access to integrated information and actionable insights so you can deliver superior-and profitable-interactions with customers. You'll learn: What it takes to uncover hidden trends and explore relationships across disparate data sources using natural language queries Ways to use in-depth insight to create highly relevant campaigns and content that's aligned with individual customer behaviors and preferences How to take product recommendations to new levels of accuracy with pinpoint prediction and targeting.
Tags : 
ibm, commerce, analytics, business insight, business analytics, business advisor, commerce data, predictive analytics, enterprise applications, business technology
    
IBM

From Insight to Action to Results: Can your commerce data talk to you like a trusted advisor?

Published By: IBM     Published Date: Oct 11, 2016
Read this white paper to discover how predictive analytics and cognitive commerce make it possible to get instant access to integrated information and actionable insights so you can deliver superior-and profitable-interactions with customers.
Tags : 
ibm, ecommerce, b2c, b2c ecommerce, commerce, data, business advisor, enterprise applications, business technology
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.