inel

Results 1 - 25 of 44Sort Results By: Published Date | Title | Company Name

ERP System Acquisition & Implementation Viewed as a Single Project

Published By: Adaptive Growth     Published Date: Mar 12, 2008
It is a truism that in any complex activity, the critical, defining decisions should be made as early in the process as possible.  In ERP implementation projects this principle is routinely undermined by the nearly universal practice of separating acquisition and implementation activities into separate projects, performed by separate teams operating under separate control.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth

Wie Sie Sicherheit und Frontend-Performance unter einen Hut bringen

Published By: Akamai Technologies     Published Date: May 24, 2017
Sicherheit und Performance wurden einst als separate Aspekte angesehen, für die ganz unterschiedliche Lösungen erforderlich sein sollten. Cyberkriminelle haben jedoch neue und überaus effektive Möglichkeiten gefunden, die Ihre Website in beiderlei Hinsicht gefährden. Erfolgreiche Lösungen müssen daher Sicherheitslöcher stopfen und parallel die Performance am Frontend optimieren. Wie ist das möglich? In diesem Bericht gehen wir auf browserbasierte Lösungen ein, welche gleichzeitig die Sicherheit optimieren und die Performance für den Endnutzer verbessern. Wir untersuchen verschiedene Techniken für den Umgang mit inhaltsbezogenen Browserproblemen, wie z. B. HSTS, Inlineframe und Prefetching. Der Bericht behandelt zudem Service-Worker- und browserbasierte Skripts, die viele Sicherheits- und Performanceoptionen bieten. Laden Sie den Bericht jetzt herunter und erfahren Sie, wie Sie Sicherheit und Performance gleichermaßen verbessern können.
Tags : 
    
Akamai Technologies

RGPD : Impact sur votre gestion des données

Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
D’ici à 2021, le coût de la cybercriminalité pour l’économie mondiale devrait atteindre les 6 000 milliards de dollars, soit deux fois plus que les 3 000 milliards de dollars de 2016. En parallèle à ce que certains qualifient de « pire menace pour les entreprises du monde entier », les gens s'inquiètent de plus en plus de la sécurité de leurs données – non seulement des capacités des cybercriminels à utiliser des données volées pour usurper leur identité, mais aussi de l’utilisation de leurs données personnelles par les entreprises avec lesquelles ils interagissent.
Tags : 
rgpd, impact, sur, votre, gestion, donnees
    
AstuteIT_ABM_EMEA

GDPR: Die Folgen für Ihre Datenverwaltung

Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
Schätzungen zufolge wird die Cyber-Kriminalität die Weltwirtschaft bis 2021 6 Billionen USD kosten. Das entspricht einer Steigerung von 3 Billionen USD gegenüber 2016. Manche Analysten bezeichnen dies bereits als die „größte Bedrohung für alle Unternehmen weltweit“. Auch das öffentliche Bewusstsein für die Datensicherheit nimmt zu. Dabei geht es nicht allein darum, wie Kriminelle gestohlene Daten in betrügerischer Weise missbrauchen könnten, sondern auch darum, wie Unternehmen und Institutionen die personenbezogenen Daten nutzen, die wir ihnen zur Verfügung stellen.
Tags : 
    
AstuteIT_ABM_EMEA

EVALUATING BACKGROUND CHECKS: An Individualized Approach

Published By: Asurint     Published Date: Dec 21, 2018
Employers may ask a consumer reporting agency (CRA) to implement internal systems to evaluate background checks as part of the hiring process. An adjudication matrix (also known as a hiring matrix) is commonly used by employers to designate what types of crimes over certain time periods may make an individual ineligible for employment. An adjudication matrix will typically contain labels such as “clear” or “ineligible” that designate how the individual’s background check results lined up with the matrix.
Tags : 
    
Asurint

Harness the power of analytics and AI to predict what’s next.

Published By: Avanade DACH     Published Date: Aug 01, 2018
Je besser die Daten, desto besser die Künstliche Intelligenz Sie möchten Ihre Kunden und deren Verhalten besser verstehen? Ihnen eine maßgeschneiderte Customer Experience bieten? Oder neue Geschäftsfelder identifizieren? Es ist vielleicht nicht immer offensichtlich: Aber die Grundlage jeder gut funktionierenden KI sind Daten. In unserem Leitfaden zeigen wir Ihnen in sechs Schritten, wie Sie Ihre Daten auf innovative Weise organisieren. So schaffen Sie eine optimale Grundlage, um künftig das Beste aus künstlicher Intelligenz, Cognitive Computing und maschinellem Lernen herausholen zu können.
Tags : 
    
Avanade  DACH

End Point Control: Secure Remote Access with Reduced Risk and Increased IT Control

Published By: Aventail     Published Date: Aug 21, 2009
This white paper summarizes the capabilities of Aventail End Point Control and explains the range of features that increase IT control and data protection by giving users access that's finely tuned to the risks of their environment.
Tags : 
vpn, access control, ssl, network security, data protection, wireless security, aventail, remote access
    
Aventail

Enterprise Information Management Security Options

Published By: Brainloop     Published Date: Nov 09, 2011
This paper advocates that for any document sharing application to genuinely add value, it must augment or complement the organization's existing document security infrastructure.
Tags : 
brainloop, enterprise, information management, security options, technology, business, access control, authentication
    
Brainloop

BROTHER SECURITY: White Paper November 2017

Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother

DevOps for Digital Leaders

Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
In a world where customers and citizens expect so much more from technology, the race is on to develop a finely tuned high performance IT function. Hopefully by reading this book you're in a better position to see how DevOps supports this imperative and can develop the strategies needed to reignite your business.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies
    
CA Technologies EMEA

Four Ways to Satisfy the Modern User – Without Losing Your Sanity

Published By: Cherwell Software     Published Date: Sep 22, 2015
The next generation user expects more do-it-yourself IT offerings. Whether it’s self-service portals with interfaces to rival Amazon or personal mobile devices with 24/7 business access, users are requesting more self-service functions and capability. To the modern user of technology “consumer-grade” has become a standard, and it’s ITs’ job to not only appease but genuinely satisfy contemporary users. This research highlights four ways to satisfy the modern user who brings their own knowledge, devices, applications and technical expectations to the workplace.
Tags : 
business enablement, cloud applications, cloud computing, cloud infrastructure, cloud strategy, customer relationship management, customer satisfaction, business intelligence
    
Cherwell Software

Mobility Customer Success Stories

Published By: Cisco     Published Date: Jan 05, 2015
Be inspired by these mobility success stories by downloading these case studies: • Pinellas County Integrates Wired and Wireless Networks • Cisco Meraki Architecture Construction - C&S Companies • Hospital Pioneers Wi-Fi Patient Apps with Cisco BYOD Solution • Cisco CMX Connects Evergreen Brickworks Video
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco

Mobility Customer Success Stories

Published By: Cisco     Published Date: Apr 10, 2015
Let these case studies show how you can succeed with mobility, too. Pinellas County Integrates Wired and Wireless Networks Cisco Meraki Architecture Construction - C&S Companies Hospital Pioneers Wi-Fi Patient Apps with Cisco BYOD Solution Cisco CMX Connects Evergreen Brickworks Video
Tags : 
cisco, case study, byod, wireless, wifi, network integration, cmx, bandwidth management
    
Cisco

Pinellas County Integrates Wired and Wireless Networks

Published By: Cisco     Published Date: Aug 03, 2015
County Integrates Wired and Wireless Networks.
Tags : 
    
Cisco

Essentiële beveiligingsinformatie voor MKB-bedrijven

Published By: Cisco EMEA     Published Date: Oct 01, 2019
Leer hoe het huidige MKB-landschap van cyberbedreigingen eruitziet, zodat uw bedrijf kan overleven, operationele kosten kan terugdringen en beveiligd kan groeien. Maak van beveiliging een prioriteit van iedereen en bescherm uw bedrijf met Cisco. Naarmate uw bedrijf groeit, trekt het de aandacht. Maar niet alle aandacht is welkom. Steeds meer geraffineerde criminele bendes hebben hun pijlen gericht op MKB-bedrijven.
Tags : 
    
Cisco EMEA

Industry Leading Security Strategy – How DocuSign Does It

Published By: DocuSign     Published Date: May 29, 2014
Few business processes are as security sensitive as those involving electronic signatures. eSignature transactions routinely contain information that is critical to you, your business, and your customers. This information may include personally identifiable Information (PII), pricing details, proprietary business terms, intellectual property, and more. That is why DocuSign’s number one priority is customer security. DocuSign leads the industry in designing and delivering the most secure digital transaction solution available.
Tags : 
docusign, security, esignatures, personally identifiable information, pii, customer security, digital transactions, enterprise applications
    
DocuSign

Turning the Tide: Why New Strategies are Urgently Needed to Counter the Surge in Online Video Piracy

Published By: Envisional     Published Date: Dec 21, 2006
Now that millions of ordinary, non-geeky families are routinely downloading TV shows and movies without a second thought, digital piracy has clearly gone mainstream.  Download this paper to learn methods for preventing video piracy.
Tags : 
piracy, copyright, copyright infringement, digital piracy, fcc, envisional, application security, secure content management
    
Envisional

F5 and WhiteHat Integrate Web Application Assessment and Defense Technologies

Published By: F5 Networks Inc     Published Date: Jan 22, 2009
On March 10, 2008, F5, a leader in application delivery, and WhiteHat Security, an innovator in application security assessment, announced they would be partnering to create an integrated Web application assessment and firewall technology. This product integration will incorporate WhiteHat’s Sentinel assessment technology and F5’s ASM attack blocking technology into a single solution.
Tags : 
web application assessment, defense technologies, whitehat security, web application vulnerabilities, security, enterprise applications, internet security
    
F5 Networks Inc

Increase growth through better customer connections

Published By: Hewlett Packard Enterprise     Published Date: Jul 13, 2016
Download this asset to learn CRM and BI solutions can help you deliver insights to meet those expectations. They’re not just for the enterprise anymore – but to make the most of them, you’ll need plenty of compute power and scalable data storage. Sponsored by: HPE and Intel®
Tags : 
best practices, inel, hpe, bi solutions, enterprise, data storage, backup, recovery
    
Hewlett Packard Enterprise

Maschinelles Lernen liefert bessere IT-Einblicke

Published By: Hewlett Packard Enterprise     Published Date: May 10, 2019
Die Leistung von Unternehmensanwendungen hat unmittelbaren Einfluss auf die geschäftlichen Aktivitäten und Ergebnisse. Die Qualität der Anwendungsbereitstellung hängt davon ab, wie reibungslos die zugrunde liegende Dateninfrastruktur betrieben werden kann. Die optimale Anwendungsleistung und -bereitstellung lässt sich in komplexen Umgebungen nur schwer erreichen. Viele IT-Infrastruktur- und Betriebsteams haben ihre Belastungsgrenze bereits erreicht. Vorausschauende Analysen und maschinelles Lernen können in diesem Zusammenhang viel bewirken
Tags : 
    
Hewlett Packard Enterprise

Whitepaper: IBM Cognos Mobile: Intelligence In The Go

Published By: IBM     Published Date: Dec 21, 2012
Interact with trusted BI content and enjoy the same user experience whether you are online at the office, using a smart phone or tablet computers on the road or offline.
Tags : 
ibm, cognos, mobile, inelligence, business intelligence
    
IBM

Ventana - How to Get Business Users to Switch from Spreadsheets

Published By: IBM     Published Date: Feb 17, 2016
In our benchmark research, at least half of participants that use spreadsheets to support a business process routinely say that these tools make it difficult for them to do their job. Yet spreadsheets continue to dominate in a range of business functions and processes. At the heart of the problem is a disconnect between what spreadsheets were originally designed to do, and how they are actually used today in corporations.
Tags : 
ibm, spreadsheets, ventana research, switch, spreadsheets, software development, it management, convergence
    
IBM

Best-of-Breed Enterprise Mac Management

Published By: Jamf     Published Date: Jun 07, 2018
A decade ago, Mac was an uncommon sight in many businesses and routinely ignored by corporate IT — but times have changed. Today, employee-choice programs are driving Mac growth in enterprises with 72 percent of employees choosing Mac over PC when given the chance. Now, the need to properly deploy, manage and secure Apple is at an all-time high. This white paper examines how purpose-built management solutions are essential to a successful Apple strategy, and walks you through: • The current state of enterprise management solutions • Features required for best-of-breed Apple management • How Jamf and Microsoft are delivering co-management to the enterprise
Tags : 
    
Jamf

Best-of-Breed Enterprise Mac Management

Published By: Jamf     Published Date: Jun 07, 2018
A decade ago, Mac was an uncommon sight in many businesses and routinely ignored by corporate IT — but times have changed.
Tags : 
    
Jamf

Outsmarting Malware: Why Machine Learning Bests Traditional AV

Published By: Juniper Networks     Published Date: Aug 07, 2017
Warum maschinelles Lernen entscheidend zur Cybersicherheit beiträgt
Tags : 
    
Juniper Networks
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.