romi

Results 176 - 200 of 765Sort Results By: Published Date | Title | Company Name

You Can’t Have Cybersecurity Success Without Effective Endpoint Management

Published By: IBM     Published Date: Jun 06, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises. Research
Tags : 
    
IBM

You Can’t Have Cybersecurity Success Without Effective Endpoint Management

Published By: IBM     Published Date: Jun 05, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises.
Tags : 
    
IBM

Continuous Delivery, Deployment, Integration and Testing: Deciphering DevOps Terminology

Published By: Tricentis     Published Date: Jun 05, 2018
Understanding the terms and techniques that promise to help you build, test, and deploy applications more efficiently. This guide reviews each of these strategies, how they relate to one another, and how incorporating them into your application lifecycle can transform your software development and release practices.
Tags : 
    
Tricentis

The Essential Guide to Continuous Testing

Published By: Sauce Labs     Published Date: Jun 04, 2018
No matter the industry, every company is now in the business of developing applications and online experiences. To keep up with the competition, you need to stand out in all of the digital noise. For your app to succeed, it is critical that it delight your customers with a flawless experience, regardless of what device they use to access it. New features and updates need to be delivered quickly and frequently, but without compromising quality. While development practices have dramatically changed to meet the high speed demands of today’s digital economy, testing has often been left behind as an afterthought. However, this attitude is changing as organizations discover the power of positive experience, and the business impacts of negative reviews. Businesses of all sizes are moving towards Continuous Testing practices and as a result are seeing accelerated software delivery cycles, high quality digital experiences across all platforms, and most importantly happy and loyal customers. T
Tags : 
    
Sauce Labs

Innovation Insight for Remote Browser Isolation

Published By: Menlo Security     Published Date: Jun 01, 2018
"According to Gartner, ""by 2022, 25% of enterprises will adopt browser isolation techniques for some high-risk users and use cases, up from less than 1% in 2017.” ""By effectively isolating endpoints from browser-executable code, attacks that compromise end-user systems will be reduced by 70%, while eliminating the need to detect or identify malware."" -Gartner What do these organizations know that you don’t? Learn more about why Gartner believes this to be true in this report."
Tags : 
    
Menlo Security

Isolation Best Practices for Financial Services Institutions

Published By: Menlo Security     Published Date: Jun 01, 2018
"Financial services institutions are high-value targets for cyberattacks because of the capital they control, the personal information on customers they maintain, and the fear an attack on a bank generates in the public. Phishing attacks on FSIs have risen steadily, especially employee credential theft - because once an employee’s credentials are stolen, cyberattackers can access customer information, employee data, even finances. While legacy security solutions claim to block up to 99.9 percent of cyberattacks, all it takes is one employee or contractor to open an email from an unknown source, download a file from a compromised website, or in any other way fall victim to a cyberattack. So, it’s time for a new approach: Isolation, also known as, remote browsing. Download this Financial Services Best Practices Guide to Isolation to learn how to best eliminate phishing attacks and web malware. "
Tags : 
    
Menlo Security

The Journey to SAP Agility – Transitioning Tips to SAP S/4HANA

Published By: Panaya     Published Date: May 31, 2018
When it comes to investing in ERP systems, improving the efficiency and responsiveness of business processes is a top concern for SAP customers. However, among IT professionals, safe delivery is of higher priority than ERP digitalization or starting an IT agility transformation. With SAP S/4HANA, this no longer needs to be a compromise. When moving to SAP S/4HANA, IT professionals need to implement not only the technical upgrade of SAP S/4HANA but also the required customizations, which necessitate an intensive amount of business collaboration and software delivery. And for that to happen, IT needs an enterprise agile delivery solution to gather and implement the business requirements to SAP S/4HANA as quickly as possible without business disruption. Read this white paper to discover how you can transition to SAP S/4HANA and achieve true enterprise agile delivery — a new standard to deliver changes to your SAP environment. Topics include: › Sync business and IT to ensure your ERP solu
Tags : 
    
Panaya

Stopping Email Fraud

Published By: Proofpoint     Published Date: May 30, 2018
Email fraud is rife – business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email attacks are also preventable. Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains. Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block fraudulent emails before they reach your employees, customers and business partners. Protect your email ecosystem from today’s advanced email threats including business email compromise (BEC) and consumer phishing. Proofpoint Email Fraud Defence gives you the visibility, toolset and services needed to authorise legitimate email senders and block fraudulent messages before they reach the inbox.
Tags : 
    
Proofpoint

Artificial Intelligence for Executives: Integrating AI into your analytical strategy

Published By: SAS     Published Date: May 24, 2018
Information on artificial intelligence (AI) is flooding the market, media and social channels. Without doubt, it’s certainly a topic worth the attention. But, it can be difficult to sift through market hype and grandiose promises to understand exactly how AI can be applied in practical and reliable solutions. Like most technological advances, incorporating new technology into business processes requires significant leadership and effective direction that all stakeholders can easily understand. Great leaders become great by balancing strategy with tactics, future vision with current reality and strengths with weaknesses – all with the goal of accomplishing a clearly defined objective. Great leaders also understand that people are the most valuable resources within their organization. To drive and inspire their success, you must optimize strengths while recognizing inherent weaknesses. Many of our daily human experiences and interactions involve machines or devices of some sort. Technolo
Tags : 
    
SAS

API360: The Complete API Strategy Model for the Enterprise

Published By: CA Technologies EMEA     Published Date: May 23, 2018
Growing your enterprise is an ongoing priority. And, as the application economy continues to expand, it’s likely that you’re looking at digital business initiatives to fuel a significant portion of that growth. Among the most promising objectives of such a strategy are: • Providing superior digital experiences for consumers though mobile • Expanding markets and revenue streams through multiple channels • Connecting employees and partners to enterprise data anywhere, anytime • Launching innovative new services for the Internet of Things (IoT) Successfully executing a digital strategy requires the ability to launch new apps and coordinate your digital presence with partners. Application Programming Interfaces (APIs) create the connectivity required to share enterprise data and digital content with those apps and partners over the Internet. APIs are a critical component of digital business—empowering developers to build apps across any channel and enabling partners to incorporate your dat
Tags : 
    
CA Technologies EMEA

The API Management Playbook

Published By: CA Technologies EMEA     Published Date: May 23, 2018
In the digital economy, application programming interfaces (APIs) are essential for executing ideas quickly and seizing new business opportunities. They are the building blocks of digital transformation, enabling organizations to deliver exceptional customer experiences, create new revenue streams and connect employees, partners, apps and devices to data—anytime, anywhere. APIs are not necessarily a new technology, but in today’s digital world, they have risen in prominence and become important to every facet of the enterprise. This in turn has increased the demand for effective API management. But what does an effective solution look like? The API Management Playbook will help you understand: • Why digital transformation is crucial in the application economy • How APIs are the building blocks of digital transformation • Which key stakeholders in your organization are impacted by APIs • What the API lifecycle is and how it relates to API management
Tags : 
    
CA Technologies EMEA

Bringing it All Together Achieving ERP Agility Within the Enterprise

Published By: Insight Software     Published Date: May 22, 2018
Don’t settle. Forward-thinking finance professionals know that there is a better way. Though BI tools have provided visibility to data, they have in fact failed to provide direct access to enterprise information. However, evolution does not stop there: Next-gen corporate performance management solutions are among us and promise to deliver interconnected, flexible, and realtime data access. Agility achieved.
Tags : 
erp, enterprise, finance, evolution, performance
    
Insight Software

Graduate Recruiting Playbook 2.0

Published By: HireVue     Published Date: May 16, 2018
The field has shifted. Today’s graduate expects to be engaged in a new way: on their time, on their terms, and in a medium they feel comfortable in. If you’re not engaging students in the way they expect before you get to campus, the top talent will be gone by the time you arrive. Today’s innovative companies aren’t just meeting students on campus. They’re making offers there. The process that worked before - sending recruiters to campus, meeting students, interviewing the best, and directing the most promising to your online application - is not enough. It cannot scale beyond a limited number of universities, and does not engage students where they are.
Tags : 
    
HireVue

Reduce Data Center Costs with High-Capacity 3-Phase Rack ATS

Published By: Tripp Lite     Published Date: May 15, 2018
As wattages increase in high-density server racks, providing redundant power becomes more challenging and costly. Traditionally, the most practical solution for distributing redundant power in 208V server racks above 5 kW has been to connect dual 3-phase rack PDUs to dual power supplies in each server. Although this approach is reliable, it negates a rewarding system design opportunity for clustered server applications. With their inherent resilience and automated failover, high-availability server clusters will still operate reliably with a single power supply in each server instead of dual power supplies. This streamlined system design promises to reduce both capital expenditures and operating costs, potentially saving thousands of dollars per rack. The problem is that dual rack PDUs can’t distribute redundant power to a single power supply. An alternative approach is to replace the dual PDUs with an automatic transfer switch (ATS) connected to a single PDU, but perfecting an ATS tha
Tags : 
    
Tripp Lite

Providing Reliable, Manageable Power for VoIP Network Wiring Closets

Published By: Tripp Lite     Published Date: May 15, 2018
A Practical Guide to IDF/MDF Infrastructure Implementation Once relegated to early adopters and casual home users, VoIP (voice over Internet protocol) has matured. An essential element of any unified communications (UC) system, it is now the standard method of voice communication in business, education, government and healthcare. If your organization has not already migrated to VoIP, the question is not so much if it will, but when. Cost is the primary driver, since the data network performs double duty by carrying voice traffic as well. VoIP also offers capabilities that far exceed traditional phone systems, with unified communication platforms promising to integrate messaging, mobility, collaboration, relationship management, zoned security, intelligent call routing, disaster recovery, video, teleconferencing, status updates and other advanced features. The transition to VoIP presents a number of challenges, including assessing the ability of your network to handle not only additio
Tags : 
    
Tripp Lite

Top 10 Reasons to Partner with Dell EMC for Windows Server 2016

Published By: Dell PC Lifecycle     Published Date: May 15, 2018
Windows Server 2016 is an important release in enabling IT to deliver on the promise of the third platform. It provides a path to a seamless, integrated cloud environment—incorporating public, private and hybrid models—with the software-defined data center as the hub. In migrating to this next-generation data center model, it is essential that IT leaders choose the right partner for the compute platform, as well as storage, networking and systems management
Tags : 
    
Dell PC Lifecycle

Embrace no- compromise, next generation enterprise client PCs

Published By: Intel Corp.     Published Date: May 15, 2018
Organizations today are undertaking tremendous digital transformations. They are adopting new technologies to identify new marketplace opportunities, enhance the customer experience, increase internal efficiencies and more. Meet end- user expectations and enterprise IT requirements using PCs equipped with next- generation Intel Core vPro processors.
Tags : 
    
Intel Corp.

Hybrid IT Helps Businesses Navigate Through Digital Transformation

Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
In this era of digital disruption, businesses must be more agile to capture opportunities. Many viewed cloud computing technology as the way to do this, promising to address agility, scalability, and cost. But in moving to the cloud, many found that its security, compliance, and performance did not fully meet their needs. Additionally, previous common thought was public cloud is less expensive than private cloud. We now know that is not true in all cases. Savvy businesses realise hybrid IT, which includes both offpremises and on-premises services, enables better agility. After initial experience with public cloud offerings, businesses learned that many workloads are best hosted onpremises, primarily due to security, compliance, performance, control, and cost issues.
Tags : 
    
Hewlett Packard Enterprise

Forrester: Rethink Enterprise Endpoint Security In The Cloud Era

Published By: Google Chrome Enterprise     Published Date: May 07, 2018
In the year 2016 alone, the world learned about security breaches that compromised nearly 2 billion records.1 Employee endpoints are increasingly targeted: Nearly two-thirds (64%) of external attacks last year targeted a corporate-owned, employee-owned, or mobile device.2 Data breaches cost companies time and money, weaken brand reputation, and jeopardize customer and employee trust.
Tags : 
    
Google Chrome Enterprise

Paradigm Shifts: Trend Micro Security Predictions for 2018

Published By: Trend Micro     Published Date: May 03, 2018
Skills and resources — these are the two elements that make up an attacker’s arsenal. An attacker, however, cannot set out to break security or even perform sophisticated attacks without finding weak points in a system first. Massive malware attacks, email-borne heists, hacked devices, and disrupted services — all of these require a vulnerability in the network, whether in the form of technology or people, in order to be pulled off. Trend Micro has looked into the current and emerging threats, as well as the security approaches tailored for the landscape. Read on to find out how to make informed decisions with regard to the security focus areas that will figure prominently in 2018.
Tags : 
    
Trend Micro

10 Trends Construction Project Managers Need to Know

Published By: Trimble     Published Date: Apr 26, 2018
It’s a pivotal, yet promising time in the construction industry filled with opportunity, but how do you capitalize on it? Download this eBook, Key Construction Trends Project Managers Need to Know, and learn: • The top 10 trends driving the construction industry—and how project managers can take advantage of them • How advancing technology, an evolving workforce, and lean construction are driving these emerging trends • A perfect solution you can put to work immediately that will pave your way to success in construction project management Download ebook
Tags : 
    
Trimble

AI Analytics and the Future of Your Enterprise

Published By: Pure Storage     Published Date: Apr 18, 2018
Everybody’s talking about big data. Huge promises have been made about its role in driving enterprises forward. But few organizations are realizing its true benefits. For those able to put data to good use, there’s much to be excited about. Data is transforming not only businesses, but entire industries, and the world as we know it. Today organizations are harnessing big data to do things like transform healthcare, provide eyesight for the visually impaired, and bringing us closer to autonomous cars
Tags : 
    
Pure Storage

Pure Primer AI Analytics and the Future of Your Enterprise

Published By: Pure Storage     Published Date: Apr 18, 2018
Everybody’s talking about big data. Huge promises have been made about its role in driving enterprises forward. But few organizations are realizing its true benefits. For those able to put data to good use, there’s much to be excited about. Data is transforming not only businesses, but entire industries, and the world as we know it. Today organizations are harnessing big data to do things like transform healthcare, provide eyesight for the visually impaired, and bringing us closer to autonomous cars
Tags : 
    
Pure Storage

Security's Privilege Crisis

Published By: Centrify Corporation     Published Date: Apr 13, 2018
With compromised credentials as today’s #1 threat vector, and the premium hackers place on privileged access, status quo is a treacherous security path to remain on. This eBook looks at what’s behind the privilege crisis, helps you assess how your privileged access management strategy stacks up and proposes a rethink in your approach — one that better addresses the needs of the hybrid enterprise. It explores ways to strengthen your company’s identity maturity with a Zero Trust approach and proven best practices that reduce your risk of a security breach.
Tags : 
    
Centrify Corporation

Database Security : KuppingerCole Leadership Compass

Published By: IBM     Published Date: Apr 13, 2018
Database security protects databases against compromises of their integrity, confidentiality and availability.
Tags : 
database, security, guardium, confidentiality
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.