via

Results 326 - 350 of 760Sort Results By: Published Date | Title | Company Name

Securing Your AWS Global Transit Network: Are You Asking the Right Questions?

Published By: Aviatrix     Published Date: Jun 11, 2018
In evaluating the security posture for your Global Transit Network, your first question might be: Why do I even need additional security? Isn’t what Amazon provides “out of the box” adequate? This is not the right question to ask first. It’s important to appreciate that, while Amazon says it has a shared security model, your Amazon EC2 instance may not meet your security requirements “by default.” Though Amazon makes specific security features available to you, it’s still up to you to choose judiciously among the many native and third-party options. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, walk through five use cases and examine what Amazon provides, and the questions you need to be asking to implement Amazon services – or add additional ones – that are appropriate for your business. After examining each use case, we’ll show you how we handle it for our own business. Who Should Watch? Anyone responsi
Tags : 
aws, aws vpc, aws transit vpc, secure transit vpc, vpc egress filter
    
Aviatrix

What You Need to Know About Operationalizing Your AWS Transit Hub

Published By: Aviatrix     Published Date: Jun 11, 2018
Once you've designed and secured your Global Transit Network, are you done? Are you ready to hand day-to-day responsibility over to an operations team? Or, are there other elements you need to ensure that the day-to-day operation of your transit hub is efficient and effective? As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, demonstrate the best practices they've gleaned from working with operations teams, all who require: • Visibility: Do you have a way to centrally view your network, see performance bottlenecks, control security policies, and set other configuration details? • Deep Analytics: Can you easily gather performance and audit data and export it to Splunk, DataDog, or other advanced reporting tools? • Monitoring and Troubleshooting: Do you have a real-time view of network health, and how easily can you access the data needed to locate and fix issues? • Alert Management: When issues do occur, what r
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix

Three Innovations that Define a “Next-Generation Global Transit Hub"

Published By: Aviatrix     Published Date: Jun 11, 2018
Join Aviatrix for a discussion of next-generation transit hubs that are purpose-built to treat the network as code, rather than as a virtualized instance of a data center router. Learn how a software-defined approach can transform your AWS transit hub design from a legacy architecture exercise into a strategic infrastructure initiative that doesn’t require you to descend into the command-line interface and BGP of the IT networking world. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix share the requirements that our most successful customers have insisted upon for their Global Transit Networks, and demonstrate the key features that deliver on those requirements. Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud infrastructure managers, cloud engineers, and networking staff.
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix

Secure Remote Access to AWS: Why OpenVPN & Jump Hosts Aren’t Enough

Published By: Aviatrix     Published Date: Jun 11, 2018
OpenVPN is a popular and respected solution for enabling remote access to AWS VPCs for IT personnel, cloud developers, and a wide variety of end-user roles. While OpenVPN may be all that is needed to enable cloud access for a few users, it alone cannot meet the needs of growing organizations – particularly those that have security or compliance requirements. Similarly, Bastion hosts or jump hosts are often used when AWS is primarily focused on developers, but these tools likewise have scaling and security limitations. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, review key requirements and compare the remote user VPN options available for managing and securing access to AWS VPC resources. They also demonstrate features that ensure your remote access tools and methodology are “enterprise cloud-ready.” Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud
Tags : 
aws, aws vpc, aws openvpn, aws bastion, aws remote access
    
Aviatrix

Maximizing the Business Value of Digital Assets Through API Monetization

Published By: Google Apigee     Published Date: Mar 05, 2019
API monetization is a key way to unlock value from your API programs and increase API adoption. Monetization enables API providers to reach beyond current business models, scale API programs, and open new opportunities with customers, developers, and partners. Google Cloud’s new eBook, Maximizing the Business Value of Digital Assets Through API Monetization, maximizing the business value of digital assets via API monetization. Read the real-use cases and learn about best practices to realize additional value from your API products. Explore how to generate revenue from API products and grow API programs with field-tested best practices, real-world use cases and a checklist to help your team get started. What's Inside? ? Field-tested best practices ? Real-world use case: Telstra ? API monetization checklist
Tags : 
    
Google Apigee

Making Technology Part of the Team

Published By: Global Software     Published Date: Aug 13, 2018
Humans excel at tasks that require creativity, the opportunity to respond to the unexpected, and general attentiveness to the surrounding environment. Technology and machines, on the other hand, are built to process a lot of information quickly without getting bored; technology reliably completes the task it is assigned without deviation. The most powerful approach to adding technology to a team takes the strengths of both humans and technology into account and from that, creates a superior, collaborative system. For example, reporting software such as Spreadsheet Server and Atlas for Dynamics AX/365 by Global Software, Inc. both serve as machine learning intelligence that uses automation to reduce errors, while at the same time preserving humans’ ability to create reports and outcomes from the data the way they need to see it.
Tags : 
technology, machines, dynamics, global, software
    
Global Software

Blockchain & Manufacturing

Published By: TIBCO Software     Published Date: Sep 03, 2019
For years, manufacturers have been trying to streamline processes and associated supply chains by building marketplaces, standardized exchanges, and monolithic systems. In many cases, these solutions missed the mark, resulting in fragmented and brittle processes without easy data sharing. Blockchain, the underlying technology behind Bitcoin and other cryptocurrencies, can potentially solve these problems. Sharing information via a trusted distributed network with embedded business logic offers many benefits for manufacturing, especially when combined with the IoT and AI communities. Watch this webinar: Blockchain & Manufacturing: A Smarter Way to Drive Efficiency in the Semiconductor and Electronics Supply Chains, with speaker Nelson Petracek, chief technology officer, TIBCO Software.
Tags : 
    
TIBCO Software

Creating a Public Safety Ecosystem

Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting — a new, frictionless collaboration among agencies, departments, and vendor partners.1 Ideally, public safety professionals are already fitted with the latest smartphones, laptops, and tablets to receive targeted information about situations, individuals, and locations before they respond. However, when police, fire, EMT, first responders, and even utility companies can communicate and share data via secure channels, the severity and length of incidents may be lessened, and lives can be saved. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize
Tags : 
    
Fujitsu America, Inc.

4 Reasons Now is the Time for Your Manufacturing Firm to Adopt Epicor Cloud ERP

Published By: Epicor     Published Date: Jan 09, 2019
Over the last several years, manufacturers have embraced cloud applications. According to one estimate, between 2013 and 2023 the percentage of manufacturing and distribution software delivered via software as a service (SaaS) will increase from 22% to 45%.1
Tags : 
    
Epicor

Innovation: the Global Report Card

Published By: Oracle     Published Date: Mar 13, 2019
Innovation is backed by 84% of boards – and finance’s role as an innovation partner is growing. This 2,000-exec global study shows that innovation and growth are as closely linked as ever. It also shows, that for CFOs: Customer satisfaction has become a key KPI for innovation Having too many innovation projects is their biggest hurdle Establishing business case viability and go/no-go decisions are a key challenge Read the report now.
Tags : 
    
Oracle

Innovation: the Global Report Card

Published By: Oracle     Published Date: Mar 13, 2019
Innovation is backed by 84% of boards – and finance’s role as an innovation partner is growing. This 2,000-exec global study shows that innovation and growth are as closely linked as ever. It also shows, that for CFOs: • Customer satisfaction has become a key KPI for innovation • Having too many innovation projects is their biggest hurdle • Establishing business case viability and go/no-go decisions are a key challenge Read the report
Tags : 
    
Oracle

Five Ways to Exceed Client Expectations for Your Consulting Firm

Published By: Deltek     Published Date: Jul 10, 2019
Having real-time access to engagement information via a cloud-based, integrated, information infrastructure is critical in delivering high-value, on time engagements that always delight clients. So why do so many consulting firms fail in this area, that they constantly advise clients on? Enjoy a complimentary copy of ProjectManagement.com’s new white paper on how an effective information infrastructure will ensure client excellence. Author Andy Jordan, consulting firm owner and industry expert, reveals the 5 ways to exceed client expectations and how consulting firms can leverage technology to achieve client excellence. Download the white paper today!
Tags : 
    
Deltek

Take Your Firm from Transactional to Transformational

Published By: Right Networks     Published Date: Aug 13, 2019
Transforming your firm doesn’t happen overnight. It takes time, patience and planning. However, the value of moving away from the old, transaction-based way of doing business and into a more modern model is immense. Consider getting to a place where you’ve built a cloud technology infrastructure that allows staff and clients to collaborate via access to real-time data and documents. Where you are running at peak efficiency. Build a business that’s modern. One that allows you to be a leader, not mired down in transactional work. It can be a reality. Our 3-step guide, courtesy of our friends at Rootworks, can help you transform your firm into one that will last well into the future and secure your legacy.
Tags : 
    
Right Networks

Move to the Cloud Securely (Italy)

Published By: Zscaler     Published Date: Jun 19, 2019
Le applicazioni, come ormai anche gli utenti, stanno abbandonando la rete corporate. Tuttavia i sistemi di sicurezza spesso si trovano ancora all’interno del DC. E’ ormai arrivato il momento di ripensare questa architettura e offrire un’esperienza sicura ed ottimale ai proprio utenti senza badare a dove si trovino. La sicurezza offerta dalla piattaforma cloud di Zscaler vi permette di trasformare la vostra rete per sfruttare i vantaggi di un mondo orientato verso il cloud e alla mobilita’ degli utenti. Scoprite di piu’ con questo rapporto.
Tags : 
    
Zscaler

Zscaler Cloud Security Insights : an analysis of SSL/TLS Based Threats (Italy)

Published By: Zscaler     Published Date: Jun 19, 2019
Scoprite il nostro rapport semestrale Cloud Security Insights Threat Report 2019 – Uno studio delle minacce basate sui protocolli SSL/TLS, che analizza il traffico criptato nel cloud Zscaler tra luglio e dicembre 2018. Il rapporto, stilato dal nostro team di ricerca ThreatLabZ, si focalizza sulla varieta’ di attacchi via SSL e bloccati da Zscaler, tra cui gli attacchi di phishing, i botnet, malware, etc.
Tags : 
    
Zscaler

Secure Enterprise SD-WAN (Italy)

Published By: Zscaler     Published Date: Jun 19, 2019
Il concetto di backhaul verso un data center sembra interessante in un contesto in cui sia gli utenti che le applicazioni risiedono al suo interno. Tuttavia con i dipendenti nelle diverse filiali e le applicazioni che migrano verso il cloud, ridirigere il traffico su una rete a stella offre una pessima esperienza all’utente oltre ad essere costoso e introduce rischi non necessari. La rete SD-WAN rappresenta una soluzione a questo problema. Facilita le connessioni locali all’internet. Zscaler le mette in sicurezza. Scoprite come con questo rapporto.
Tags : 
    
Zscaler

Zscaler Cloud Security Insights : an analysis of SSL/TLS Based Threats (FR)

Published By: Zscaler     Published Date: Jun 20, 2019
Découvrez notre rapport semestriel Cloud Security Insights Threat Report 2019 - une étude des menaces basées sur les protocoles SSL/TLS, qui examine le trafic chiffré sur le cloud Zscaler™ entre juillet et décembre 2018. Le rapport, compilé par notre équipe de recherche du ThreatLabZ, se penche sur une variété d’attaques exécutées via SSL et bloquées par Zscaler, parmi lesquelles les attaques de phishing, les botnets, l’exploitation du navigateur et le contenu malveillant.
Tags : 
    
Zscaler

Enabling the Agile Enterprise: Driving Digital Transformation via Data Governance

Published By: Oracle EPM     Published Date: Jul 28, 2015
Enterprise Data Governance is the future key to enabling both business and IT to manage change effectively as enterprises strive to adapt to the networked economy and become data-driven businesses.
Tags : 
enterprise, data, governance, agile, best practices, business analytics, business intelligence, database development, data integration
    
Oracle EPM

Les 5 indispensables d’un système de gestion financière dans le Cloud

Published By: Workday France     Published Date: Apr 30, 2018
Un système Cloud libère votre équipe Finance qui peut ainsi davantage se consacrer à la gestion des contrôles et des transactions. Mais choisir un système en adéquation avec vos objectifs d'aujourd'hui et de demain peut s'avérer difficile. Grâce à ce livre blanc, vous pourrez déterminer la viabilité de votre système de gestion financière actuel tout en découvrant ce que vous devez rechercher dans une solution basée dans le Cloud :
Tags : 
    
Workday France

Ensuring SOX Compliance via Enhanced Change Management

Published By: Solidcore     Published Date: Jan 15, 2008
Assure SOX compliance and address key questions asked by SOX auditors with simple change management enhancement.
Tags : 
auditing, compliance, change management, sarbanes oxley compliance
    
Solidcore

Study CIOs say Application Performance is Top Priority, End User is King

Published By: CA Service Assurance     Published Date: May 23, 2011
IDG Research Services recently conducted a study via the CIO Forum on LinkedIn. The results found that CIOs and IT leaders recognize the business impact of web application performance. It's all about the end user: ensuring customer satisfaction, increasing employee productivity, and lowering IT costs.
Tags : 
web application performance, cio, end user, idg research services, linkedin, it leaders, ca technologies, customer satisfaction, employee productivity, it cost, application performance management, customer experience management, productivity
    
CA Service Assurance

The Commerce Marketer's Guide to Turning Shoppers into Buyers

Published By: Bronto     Published Date: Jul 19, 2017
With the exponential growth of internet marketing and online advertising, the customer's journey to making a purchase has grown longer, often including a mrylad of touch points along the way. Whether they begin with a direct search or visit a website via a paid advertisement, the modern shopper takes far more time to explore their options and do their research before buying. Lets take a closer look at three common stages of today's buying journey and solutions for effectively managing each one.
Tags : 
online advertising, internet marketing, online shopping, mobile shopping, customer loyalty, brand loyalty, loyalty program, shopping incentive, consumer behavior, retail
    
Bronto

How to Build Brand Loyalty in the Age of E-Commerce

Published By: Bronto     Published Date: Jul 19, 2017
In the age of the consumer, relationships determine success, as they are the last remaining source of competitive advantage. Create relevant marketing messages to connect with your consumer in meaningful ways via highly personalized campaigns. This info gram discusses different ways to influence and build positive consumer behaviors and relationships.
Tags : 
brand loyalty, ecommerce, consumer behaviors, loyalty programs, mobile engagement, customer loyalty, building brands, competitive advantage
    
Bronto

Software Assurance - An Executive Discussion on Securing the Enterprise

Published By: HP - Enterprise     Published Date: Nov 19, 2008
While investments to secure the enterprise continue to rise, breaches into company systems and data are skyrocketing. These cyber crimes are consistently debilitating organizations operations, reputations and ultimately, viability. Today’s CEOs are demanding aggressive strategies to protect their business. CIOs and CSOs are working together to employ proven Business Software Assurance approaches across the enterprise to stay ahead of constant threats.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, ciso, cyber crime, breaches, information technology, c-level, auditing
    
HP - Enterprise

Big Security for Big Data

Published By: HP - Enterprise     Published Date: Feb 06, 2013
We are children of the information generation. No longer tied to large mainframe computers, we now access information via applications, mobile devices, and laptops to make decisions based on real-time data.
Tags : 
big security, big data, secure data, business technology
    
HP - Enterprise
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.