trust

Results 451 - 475 of 1032Sort Results By: Published Date | Title | Company Name

Operational IT Service Management (ITSM)

Published By: HP     Published Date: Jul 29, 2008
This white paper explores the advantages of Operational ITSM- through incremental and continual improvement of service management practices on an ongoing basis. IT organizations must evolve into trusted service providers that adapt quickly, offer cost-effective, reliable, and flexible services to meet today's business initiatives. This evolution is not easy. It requires that the IT organization adopt an IT Service Management (ITSM) framework. Operational ITSM provides an incremental approach for companies that may not have the resources to finance and staff a large ITSM project.
Tags : 
itsm, service management, service level, service-level, itil, mission critical, it management, business process management, sla
    
HP

A Comprehensive Framework for Securing Virtualized Data Centers

Published By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : 
security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security, trust zones, new access layer, high value targets, inspection offload, virtual ips, security management, threat coverage, ips platfrom, r&d servers, virtualized data centers, denial of service (dos), intrusion prevention system
    
HP

HP Haven: See the big picture in Big Data

Published By: HP     Published Date: Jan 20, 2015
HP HAVEn is the industry’s first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data and need a trusted partner to help them. HP HAVEn has two primary components: a platform and an ecosystem. Together, the platform and the ecosystem provide the capability to handle 100 percent of your enterprise data—structured, unstructured, and semi-structured—and securely derive actionable intelligence from that data in real-time.
Tags : 
big data, hp haven, scalable, secure data platform, ecosystem, security
    
HP

Solution brief:  Fast track open source virtualization - HP RA for Red Hat on ConvergedSystem 700x

Published By: HP     Published Date: Aug 25, 2014
Virtualization offers significant agility and efficiency benefits. Pre-tested and optimized solutions from HP and Red Hat® are your fastest—and most cost-effective—path to get there. HP and Red Hat—two trusted business partners—have collaborated to create an answer. HP RA for Red Hat on ConvergedSystem 700x combines proven HP Converged Infrastructure components—to speed virtual server deployments—with open-source Red Hat Enterprise Virtualization software. The result is a compelling, cost-effective platform for consolidating your Linux systems. Read this solution brief to learn more.
Tags : 
virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution, red-hat, agility, efficiency, benefits, deployments, linux, platform, cost-effective, converged-system, storage
    
HP

Technology for Tomorrow's Cloud

Published By: HP & Intel     Published Date: Feb 18, 2012
This guide provides practical information to help you prepare your data center for the cloud with Unified Networking, scaled-out storage, trusted server pools, and intelligent power management.
Tags : 
convergence, infrastructure, network architecture, network provisioning, storage virtualization, configuration management, data integration, data protection, cloud computing, virtualization, design and facilities
    
HP & Intel

Real Usage Scenarios on HP Integrity Servers

Published By: HP and Intel® Xeon® processors     Published Date: Nov 12, 2012
Use the Mission-Critical Converged Infrastructure as the foundation for the next decade of your computing. Combine years of trusted HP Integrity resiliency with HP BladeSystem efficiencies in the newest line of HP Integrity systems.
Tags : 
virtualization, hp integrity server, server, it infrastructure, data management., enterprise applications, data management, business technology
    
HP and Intel® Xeon® processors

Realize New Workload Migration and Consolidation Possibilities

Published By: HP and Intel® Xeon® processors     Published Date: Nov 12, 2012
The Mission-Critical Converged Infrastructure is the foundation for the next decade of computing. The newest line of HP Integrity systems combines years of trusted HP Integrity resiliency with HP BladeSystem efficiencies. Read on to learn more.
Tags : 
migration, workload migration, consolidation, it infrastructure, dynamic optimization, data management, business technology, data center
    
HP and Intel® Xeon® processors

IBM DB2 Anonymous Resolution: Knowledge Discovery without Knowledge Disclosure

Published By: IBM     Published Date: Dec 12, 2006
This white paper will examine the potential of a technological breakthrough to reduce trust-based risks and change the way organizations reach a harmonious balance between consumer privacy and information sharing.
Tags : 
identity management, compliance, knowledge management, contact management, information management, privacy, customer privacy, privacy policy, privacy policies, ibm, security, password management, security management, security policies, best practices, corporate portals
    
IBM

Depository Trust & Clearing Corporation Keeps Up with Growth and Keeps the Markets on Firm Ground

Published By: IBM     Published Date: Mar 28, 2008
The dominant provider of investment processing services in the U.S., DTCC sought to parlay its record of service innovation and cost leadership by expanding globally. DTCC teamed with IBM to re-architect its core processing infrastructure to enable it to push its already world-leading transaction capabilities even further to accommodate DTCC's global growth vision.
Tags : 
infrastructure
    
IBM

The New Information Agenda: Do You Have One?

Published By: IBM     Published Date: May 29, 2008
The lack of trusted information - information that is accurate, timely and relevant - is on the minds of CEOs and senior executives around the world. The cost and complexity of managing increasing volumes of data and content, combined with the need to provide trusted information to every user for every transaction, is driving CIOs to rethink their approach to information delivery.
Tags : 
information management, data management, best practices, ibm, ibm li, li campaign, leveraging information
    
IBM

Align Your Business, Development and Operations Teams for Strategic Advantage

Published By: IBM     Published Date: Aug 21, 2008
One of the biggest hurdles that enterprises face is a lack of trust in IT’s ability to deliver business value. While a Service Oriented Architecture (SOA) can sort things out by making systems more flexible and agile, this is only part of the answer. What’s missing is an effective model for engaging consistently with business teams throughout the whole lifecycle of IT investments.
Tags : 
ibm, ibm mi, ibm grm, service management, service oriented architecture, soa
    
IBM

Enabling Right-Time Insight For Performance Management

Published By: IBM     Published Date: Feb 02, 2009
Learn how IBM’s change data capture technology can be used in conjunction with IBM’s performance management solutions from Cognos to provide access to the trusted information that systems and employees need to make informed decisions at the speed of business.
Tags : 
ibm, information management software, performance management, business intelligence, ibm cognos, bi-ready data, departmental reporting with ibm cognos, in-memory data store, operational data stores, enterprise data warehouse, ibm® infosphere change data capture, cdc, kpi, cognos now!, operational data store, ods, ibm infosphere datastage, enterprise applications, data warehousing
    
IBM

Trust but verify.managing and auditing privileged users

Published By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : 
ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati, application security, auditing, compliance, identity management
    
IBM

Turbulent times call for an agile application foundation.

Published By: IBM     Published Date: Oct 09, 2009
Does your IT change as fast as the market? A service-oriented architecture (SOA) provides a foundation that enables agility and aligns IT to business goals. This interactive presentation from IBM will show you how to provide fast, flexible, reliable access to information, business-wide. It also covers methods to ensure trust, management and security across business applications.
Tags : 
application foundation, ibm, service-oriented architecture, soa, websphere, point-to-point connectivity, esb messaging, esb enrichment, web sphere, application integration, service oriented architecture
    
IBM

Understand and respond to changing consumers in a changing economy.

Published By: IBM     Published Date: Oct 23, 2009
In the white paper, "Shopper Advocacy: Building Consumer Trust in the New Economy," you'll learn the results of a survey of 30,000 U.S. retail consumers, conducted by the IBM Institute for Business Value.
Tags : 
consumer trust, retail business, ibm, business value, customer loyalty, advocacy, customer relationship management, customer satisfaction, customer service
    
IBM

Trust but Verify: How to Manage Risk in Outsourced Applications

Published By: IBM     Published Date: Jun 09, 2010
Download this free IBM white paper to learn best practices for outsourcing application development.
Tags : 
application development, outsourced applications, ibm, it security, application security, internet security, network security appliance, security management, software outsourcing
    
IBM

How SunTrust Bank Wove Event Detection into an Effective Event-based Marketing Program

Published By: IBM     Published Date: Nov 07, 2011
Truly understanding your customer means not just listening to what they tell you explicitly, but also interpreting their interactions and recognizing when something significant happens - or doesn't happen. SunTrust Bank has found that customers' transactional data can be a goldmine of information for use in targeted marketing efforts. Often marketers overlook this data because it's too voluminous to put into a customer database. Leveraging an event detection technology makes this data immediately actionable for you to start communicating with customers.
Tags : 
    
IBM

Trusted Data Delivery

Published By: IBM     Published Date: Sep 22, 2011
Help reduce operational costs and risk while improving accessibility of critical business data.
Tags : 
ibm, data delivery, risk reduction, cdc, soa, mdm, data management, application integration, application performance management, database development, data integration, data protection, data quality
    
IBM

Information Security's Blind Spot: Who Do You Trust?

Published By: IBM     Published Date: Jul 12, 2012
Join EMA Managing Research Director Scott Crawford and IBM Director of Identity & Access Management Ravi Srinivasan for a discussion of the ways that a more expansive concept of identity intelligence is transforming the nature of information security
Tags : 
information security, ema, ibm, business technology
    
IBM

Whitepaper: IBM Cognos Mobile: Intelligence In The Go

Published By: IBM     Published Date: Dec 21, 2012
Interact with trusted BI content and enjoy the same user experience whether you are online at the office, using a smart phone or tablet computers on the road or offline.
Tags : 
ibm, cognos, mobile, inelligence, business intelligence
    
IBM

Rebuilding Customer Trust in Retail Banking

Published By: IBM     Published Date: Jun 20, 2013
The message is simple: Trust has been lost and the digital world is here. Successful relationships with customers in the digital world are high-trust relationships. It is time for bankers to rebuild trust at the same time as developing all the communications and analytical advantages of digital technology. There is no other way. The highly digitalised, non-bank competitors are already taking the best parts of banking. Time is short. Is Apple about to join the fray? Is Amazon? Is Facebook?
Tags : 
customer, trust, banking, retail
    
IBM

Top ten criteria for selecting a managed services provider

Published By: IBM     Published Date: Oct 10, 2013
When you’re faced with growing expectations to create business value with limited resources, where can you turn? Increasingly, IT organizations are looking to trusted IT services providers like IBM to help reduce cost, manage complexity, maintain leading-edge skills and adopt technology innovation. Read the white paper to find out how managed services and cloud computing can help you deliver on the transformation agenda your business requires. Plus get guidance on the top 10 criteria to consider when selecting an external partner.
Tags : 
cloud computing, managed services, it service providers, ibm, cost reduction, complexity mangement, it organization, partnership, managed services provider, business intelligence, business technology
    
IBM

White Paper: Break free from impractical and costly IT solutions

Published By: IBM     Published Date: Jan 09, 2014
Organizations are looking to eliminate data center complexity, sprawl and underutilization. This requires solutions that can boost efficiency and economics, while delivering high-performance capabilities. Read the white paper and see how users and industry analysts alike trust IBM Power Systems to break free from costly and impractical systems.
Tags : 
it solutions, smart analytics, analytics systems, testimonials, it management, data center
    
IBM

Reinventing the rules of engagement: CEO insights from the Global C-suite Study

Published By: IBM     Published Date: Apr 04, 2014
In the face of runaway innovation, there are leaders in every industry and region who are determined to push ahead and be the source of innovations that change our world. They've opened up their organizations to new ways of working, and they're leading from a position of trust.
Tags : 
ibm, c suite, global study, technology, customer engagement, digital experience, innovation, business technology
    
IBM

Top ten criteria for selecting a managed services provider

Published By: IBM     Published Date: Apr 22, 2014
When you’re faced with growing expectations to create business value with limited resources, where can you turn? Increasingly, IT organizations are looking to trusted IT services providers like IBM to help reduce cost, manage complexity, maintain leading-edge skills and adopt technology innovation. Read the white paper to find out how managed services and cloud computing can help you deliver on the transformation agenda your business requires. Plus get guidance on the top 10 criteria to consider when selecting an external partner.
Tags : 
ibm, managed services provider, managed services, it management, it service providers, cloud computing, service management
    
IBM
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.