extended enterprise

Results 1 - 25 of 31Sort Results By: Published Date | Title | Company Name

Modern Enterprise Migration: Windows 10 or Mac

Published By: Jamf     Published Date: Aug 06, 2019
Today, more than 100-plus million users rely on Windows 7. For these users, a new technology age is coming on January 14, 2020 when Microsoft officially ends extended support for Windows 7. With a change required, this is the ideal time for organizations to determine if they want to migrate to Windows 10 or look to modernize their workplace by following the growing trend of enterprises that have introduced employee choice programs and Mac to their environment. This e-book examines the options organizations have and how they can make the most beneficial and economical decision.
Tags : 
    
Jamf

Enable A Connected Enterprise With Red Hat JBoss Fuse

Published By: Red Hat APAC     Published Date: Jun 27, 2019
Red Hat® JBoss® Fuse is a lightweight integration platform that reduces the pain of connecting applications, services, processes, and devices for comprehensive and efficient solutions. JBoss Fuse includes the popular and versatile Apache Camel project, an implementation of the most commonlyused enterprise integration patterns. With integration patterns and more than 150 connectors ready to use, JBoss Fuse supports integration across the extended enterprise—including applications and services on-premise, on mobile devices, or in the cloud. JBoss Fuse is complemented by Red Hat JBoss Developer Studio for easier development of integration solutions and Red Hat JBoss Operations Networkfor monitoring of deployed solutions.
Tags : 
    
Red Hat APAC

Collaboration for Today's Workforce: 3 Ways Any Team Can Work Better with Box

Published By: Box     Published Date: Jun 22, 2018
• Business is changing faster than ever, and disruptors doing things in digital ways are leading the charge in just about every market. If you're not already managing your content in the cloud, it’s time to make a shift. • With Box, teams are unified, collaboration is sped up and productivity is amplified. This ebook illustrates how real Box customers are using the power of the cloud to get every part of their extended enterprise working together, from mobile productivity to streamlined business processes. o Marketing collaboration is integrated when internal teams and external partners work from one digital hub o Sales teams and workers in the field are empowered across any device with mobile productivity o HR streamlines processes for better team workflow and a stronger onboarding experience • To read how Box customers are using Cloud Content Management to enact practical transformation across teams, and to find out how you too can use Box to benefit every line of business within
Tags : 
    
Box

KuppingerCole Report Leadership Compass: Access Management and Federation

Published By: IBM     Published Date: Oct 26, 2017
With the growing demand of business for tighter communication and collaboration with external parties such as business partners and customers, IT has to provide the technical foundation for such integration. Web Access Management and Identity Federation are key technologies for that evolution. They enable organizations to manage access both from and to external systems, including cloud services, in a consistent way. Organizations have to move forward towards strategic approaches to enabling that integration, in support of the Extended and Connected Enterprise.
Tags : 
access management, identity federation, it strategies, security, infrastructure
    
IBM

OpenText in Manufacturing: Retailer/Distributor Engagement

Published By: OpenText     Published Date: Sep 27, 2017
Today’s fast-moving consumer market is putting pressure on manufacturers to be able to share digital product information seamlessly and quickly across retail and distribution channels. A centralized digital asset management platform helps to simplify the distribution of digital information across the extended enterprise.
Tags : 
openttext, manufacturing, digital, retailer engagement, distributor engagement
    
OpenText

10 Networking Priorities for Digital Transformation

Published By: Cisco     Published Date: Sep 21, 2017
Digital transformation isn’t a technology or a product. Rather, it’s a philosophy for using digital assets to change the way an organization runs. It involves realigning technology and modifying business processes to better engage employees, customers and other constituents of the extended enterprise. Digital transformation significantly improves the performance and reach of an enterprise and has become a top priority for IT and business leaders across the globe. Read on to find out how Cisco's Architecture can enable Digital Transformation.
Tags : 
digital transformation, architecture, business processes, best practices, customer engagement, employee engagement
    
Cisco

OpenText in Manufacturing: Retailer/Distributor Engagement

Published By: OpenText     Published Date: May 26, 2017
Today’s fast-moving consumer market is putting pressure on manufacturers to be able to share digital product information seamlessly and quickly across retail and distribution channels. A centralized digital asset management platform helps to simplify the distribution of digital information across the extended enterprise.
Tags : 
opentext, manufacturing, retailer, distributor
    
OpenText

Enterprise Applications Consulting: From 2-Tier to the N-Tier Enterprise

Published By: SAP     Published Date: Apr 20, 2017
Evolving business processes, technologies, and delivery models require a greater degree of integration between headquarters and its subsidiaries—without sacrificing autonomy. Learn how SAP S/4HANA, which is available both on-premise and in the cloud, enables companies to better run their 2-tier ERP operations and look even further into multi-tier, or n-tier, extended enterprise environments
Tags : 
enterprise, applications, consulting, 2-tier, n-tier
    
SAP

10 Networking Priorities for Digital Transformation

Published By: Cisco     Published Date: Dec 21, 2016
Digital transformation isn’t a technology or a product. Rather, it’s a philosophy for using digital assets to change the way an organization runs. It involves realigning technology and modifying business processes to better engage employees, customers and other constituents of the extended enterprise. Digital transformation significantly improves the performance and reach of an enterprise and has become a top priority for IT and business leaders across the globe
Tags : 
    
Cisco

Enterprise Mobility Best Practices: MDM, Containerization or Both?

Published By: VMware AirWatch     Published Date: May 18, 2016
When selecting an enterprise mobility platform, organizations should not only look at current mobile needs but also consider an extended roadmap that includes any future plans to develop apps, extend more business processes to mobile or expand collaboration with the extended enterprise. To prepare for a mobile-centric world, organizations today need a platform that is flexible, that scales, and that they can grow into as opposed to growing out of.
Tags : 
mobile management, mobile devices, enterprise management, mobile device management, best practices, business optimization, wireless, application integration, business integration, business management, content delivery
    
VMware AirWatch

10 Networking Priorities for Digital Transformation

Published By: Cisco     Published Date: Apr 11, 2016
Digital transformation isn’t a technology or a product. Rather, it’s a philosophy for using digital assets to change the way an organization runs. It involves realigning technology and modifying business processes to better engage employees, customers and other constituents of the extended enterprise. Digital transformation significantly improves the performance and reach of an enterprise and has become a top priority for IT and business leaders across the globe.
Tags : 
cisco, digital transformation, best practices, digital assets, digitization, networking, it management, application integration, application performance management, business analytics, business intelligence
    
Cisco

Mainstreaming of Flash Video 5 (Future of Flash)

Published By: HPE Intel     Published Date: Jan 11, 2016
Want to know where flash storage technology is heading? Watch Part V of our "Mainstreaming of Flash" video series to hear what's next with this exciting technology! HPE 3PAR StoreServ was built to meet the extreme requirements of massively consolidated cloud service providers. Its remarkable speed—3M+ IOPS—and proven system architecture has been extended to transform mainstream midrange and enterprise deployments, with solutions from a few TBs up to 15PB scale.
Tags : 
    
HPE Intel

Mainstreaming of Flash Video 3 (VDI use case)

Published By: HPE Intel     Published Date: Jan 11, 2016
Interested in flash, but not sure how it will work with your existing workloads like VDI? Watch Part III of our "Mainstreaming of Flash" video series to learn more! HPE 3PAR StoreServ was built to meet the extreme requirements of massively consolidated cloud service providers. Its remarkable speed—3M+ IOPS—and proven system architecture has been extended to transform mainstream midrange and enterprise deployments, with solutions from a few TBs up to 15PB scale.
Tags : 
    
HPE Intel

Navigate the Future of Identity and Access Management

Published By: Okta     Published Date: Nov 09, 2015
This Forrester report outlines the future IT environment for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. Read this report to learn more.
Tags : 
okta, forrester, identity and access management, it environment, security and risk, security, it management, data management
    
Okta

Security Essentials for CIOs: Securing the Extended Enterprise

Published By: IBM     Published Date: Sep 30, 2015
Diverse and proliferating data relationships are a source of growing security concern.
Tags : 
enterprise, security organization, compliance, internet security, intrusion prevention, business intelligence, data quality, database security
    
IBM

Forrester Navigate the Future of Identity and Access Management

Published By: Okta     Published Date: Feb 24, 2015
This report outlines the future look of Forrester’s solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. We designed this report to help you understand and navigate the major business and IT trends affecting identity and access management (IAM) during the next five years. IAM in 2015 has become a tool not just for security but also for business agility. Competitive challenges push businesses into the cloud and encourage mobile device use even without full-fledged access controls in place.
Tags : 
identity and access management, security and risk, extended enterprise, it trends, business agility, identity management
    
Okta

Collaborate or be left behind: leading the digital frontier

Published By: IBM     Published Date: Nov 11, 2014
Social and cloud technologies are connecting us to more people and information than we ever could have imagined. The challenge is to get the right information from the right sources in the right context at the right time. IBM has the leading cloud collaboration platform that helps you collaborate with extended networks, focus on the relevant and filter out the rest. Join IBM clients as they share how they drove real outcomes with collaborative processes. See how IBM partners are innovating the leading enterprise software platform. Hear IBM's perspective on these technological shifts and see the latest advancements in action.
Tags : 
digital frontier, social technology, cloud technology, cloud collaboration, it management, knowledge management, enterprise applications, data management
    
IBM

From Chaos to Control: Why Businesses are Moving Towards Managed File Transfer

Published By: Ipswitch     Published Date: May 02, 2014
With fewer resources and an increasing volume and size of file transfers each year, moving files in the extended enterprise has never seemed more complex. In this whitepaper, you’ll learn how to tackle the challenge of higher costs, increasing volume and size of file transfers, and fewer resources with one mature, managed file transfer process.
Tags : 
ftp client, ftp server, sftp client, ftp software, large file transfer, secure email service, ftp program, sftp server, secure file transfer    , ftp download, file transfer software, managed file transfer, enterprise application integration, ftp server software, workflow automation, b2b integration, enterprise file transfer, data transfer software, download ftp server, cloud file transfer
    
Ipswitch

Business Assurance Technology Infographic

Published By: Blue Coat Systems     Published Date: Jul 18, 2013
IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance. With Blue Coat you can deliver business continuity by protecting against threats and data loss, extend protection and policy to users in any location on any device ,safely deploy and consume all types of applications, align IT infrastructure with business priorities to assure and accelerate user experience across the extended enterprise and make risk management tradeoffs and enforce compliance.
Tags : 
technology, bluecoat, infrastructure, business intelligence, infrastructure management
    
Blue Coat Systems

IDC Analysis: Secure, Compliant Collaboration in the Cloud

Published By: Intralinks     Published Date: May 29, 2013
The monolithic corporation we grew up with is being replaced by ecosystems of more specialized business entities, sometimes called “extended enterprises.” With this evolution has come a need for closer inter-enterprise collaboration and information flow – but with it also comes increased security and compliance risks.
Tags : 
secure, collaboration, cloud, inter-enterprise, information, compliance, strategies, security, software development, storage, data management
    
Intralinks

Navigate the Future of Identity and Access Management

Published By: NETIQ     Published Date: Mar 12, 2013
Forrester’s solution for security and risk executives working on building an identity and access management strategy for the extended enterprise that includes BYOD and cloud apps. It will help you understand and navigate the business and IT trends aff
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, identity, identity as a service, authentication, authorization, open web, iam, saml, oauth, opened, scim, spml, xacml
    
NETIQ

Secure, Compliant Collaboration in the Cloud

Published By: Intralinks     Published Date: Jan 24, 2013
In the form of a Q&A with expert IDC analysts, this white paper explores what tools and technologies are being adopted to facilitate Extended Enterprise Collaboration (such as cloud-based solutions).
Tags : 
secure, intralinks, compliant, cloud based, tools, technologies, security, compliance risks, business technology
    
Intralinks

Build Security into your datacenter with Red Hat Enterprise Linux

Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, datacenters, enterprise, linux, security mechanisms, network firewalls
    
Red Hat

Build Security into your Datacenter with Red Hat Enterprise Linux

Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters, virtualization technologies, cloud computing practices, security, data center
    
Red Hat

Navigate the Future of Identity and Access Management

Published By: NetIQ     Published Date: Jun 12, 2012
This report outlines the future look of Forrester's solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise.
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, identity, identity-as-a-service, authentication, authorization, open web, iam, saml, oauth, openid, scim, spml, xacml
    
NetIQ
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.