cio

Results 301 - 325 of 1383Sort Results By: Published Date | Title | Company Name

Cloud Management: Why Adoption is Growing

Published By: VMware     Published Date: Nov 07, 2016
This 3-page trend brief discusses the IT challenges of digital business, and how CIOs need to improve the delivery of IT to meet business needs. The brief defines cloud management platform, including Day 1/Day 2 capabilities for an advanced platform.
Tags : 
    
VMware

Cloud Security Myths and Strategies Uncovered

Published By: VMware     Published Date: Aug 18, 2011
This executive level paper highlights trends and findings from CIO's 2011 Global Cloud Computing Adoption survey as it relates to Security and Compliance in the virtualized datacenter.
Tags : 
vmware, cloud security, trends, virtualized datacenter, compliance, cloud environments, cso, strategies
    
VMware

Cloud-based Communications Can Give You the Inside Track

Published By: 8x8 Inc.     Published Date: Aug 09, 2017
Bicycle companies know a thing or two about agility. So when the U.S. division of the legendary Japanese bicycle manufacturer, Shimano, decided to assess its operations, their next move was an easy decision. Management realized it had to improve the speed and dexterity of its communications to remain competitive. After considering their options, they opted for a cloud communications solution that checked off all their requirements for speed, agility and cost consciousness and more. Read more about their results.
Tags : 
shimano, 8x8, communications, management, operations, cloud
    
8x8 Inc.

Cloud-based Predictive Analytics Becoming a Critical Source of Vendor Differentiation for Customers

Published By: Hewlett Packard Enterprise     Published Date: Apr 26, 2019
With the maturing of the all-flash array (AFA) market, the established market leaders in this space are turning their attention to other ways to differentiate themselves from their competition besides just product functionality. Consciously designing and driving a better customer experience (CX) is a strategy being pursued by many of these vendors.This white paper defines cloud-based predictive analytics and discusses evolving storage requirements that are driving their use and takes a look at how these platforms are being used to drive incremental value for public sector organizations in the areas of performance, availability, management, recovery, and information technology (IT) infrastructure planning.
Tags : 
    
Hewlett Packard Enterprise

CMO und CIO müssen ihre Zusammenarbeit schnell verbessern

Published By: Adobe     Published Date: May 13, 2015
Forbes and Forrester conducted a joint survey of 303 marketing and IT leaders that assesses the maturity of marketing and IT partnerships and how those relationships have evolved since our first version of this study in 2011. The results show some progress in taking action on items that require joint attention,but the devil is in the details, particularly around leadership and domain expertise.
Tags : 
cmo and cio relationship, marketing technology in practice, marketing partnerships survey, marketing collaboration
    
Adobe

Code Signing (ES)

Published By: Symantec     Published Date: Nov 30, 2015
La proliferación de malware y el boom de las aplicaciones de consumidor para dispositivos móviles y de escritorio hacen que la firma de código sea más importante que nunca.
Tags : 
    
Symantec

Cognitive Unified Endpoint Management with IBM MaaS360

Published By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM

Collaborative Efforts: Survey Reveals Clear Business Acceleration Using On-Demand Collaboration Tech

Published By: WebEx     Published Date: Apr 02, 2009
IDG Research Services recently queried 144 CIO Magazine subscribers to gain insight into how and why collaboration technology is creating competitive advantage. This summary report explores different market trends with commentary from key respondents as well as WebEx's Knight, an industry expert. Learn more today!
Tags : 
webex, collaborative efforts, on-demand, collaboration technology, competitive advantage, webex knight, firewall, external audiences
    
WebEx

Combata ataques furtivos com visibilidade integrada aos sistemas de proteção e reação

Published By: McAfee     Published Date: Nov 07, 2014
Usando técnicas sofisticadas para ocultar sua presença, um ataque furtivo pode operar fora do sistema operacional ou mover-se dinamicamente entre terminais (endpoints) para camuflar as ações dos hackers. O risco para as empresas é real e ataques de grande escala como a “Operação High Roller” prejudicam empresas em todo o mundo. Os antivírus e sistemas de prevenção de intrusões tradicionais não dão conta desse novo tipo de ataque: em vez disso, as empresas precisam de controles de segurança em camadas que funcionam em conjunto para detectar a presença e as ações de hackers e malwares furtivos.
Tags : 
ataques furtivos, malware, sistema de prevenção de intrusões, siem, controles de segurança em camadas, security
    
McAfee

Combating Malware: Leveraging the Power of a Planet

Published By: Panda Security     Published Date: Jan 16, 2008
A new white paper from Panda Security discusses the new breed of silent online threats that can bypass traditional antivirus programs and penetrate even the most highly 'protected' networks.  Additionally, the sheer volume of malware has overwhelmed the antivirus industry as a whole. Collective Intelligence is a new global security model specifically designed to combat the next evolution of malicious code.
Tags : 
malware, virus, anti-virus, spyware, anti-spyware, anti-malware, bot, botnet
    
Panda Security

Come la nostra tecnologia risolve i tuoi problemi quotidiani

Published By: Workday Italy     Published Date: Feb 04, 2019
Quando i CIO e i responsabili IT si trovano a dover aggiornare costantemente sistemi diversi e collegare fra loro i vari dati, la loro funzione di supporto al business è limitata. Ascolta e scoprirai, direttamente dalla voce dei colleghi, come l'architettura Workday risolve questo problema e migliora il lavoro quotidiano dei CIO e dei loro team.
Tags : 
workday, workforce technology, digital strategy
    
Workday Italy

Comercio diferenciado: El imperativo Omnicommerce

Published By: SAP SME     Published Date: Jul 31, 2015
Descubra cómo la convergencia del comercio digital y físico impulsa el futuro del comercio. Y el éxito del comercio depende ahora de la capacidad de visualizar en tiempo real tanto al cliente como al inventario y los datos, a fin de comprender su comportamiento comercial. Aplicados correctamente, un modelo de negocio y una plataforma OmniComercio.
Tags : 
comercio omnicanal, omnicommerce, omnichannel, comercio electrónico, customer experience, experiencia del cliente, plataforma de comercio
    
SAP SME

Como conversar com seu público em diferentes canais de marketing?

Published By: Oracle     Published Date: Apr 16, 2018
Embora 89% dos líderes de marketing acreditem que devam fornecer uma experiência ideal aos clientes e, assim, criar um diferencial para seus produtos e serviços na era digital, apenas 20% acreditam cumprir com êxito esta premissa. Isso significa que existe uma dificuldade por meio dos profissionais de marketing em alcançar seu público em canais diferentes, o que resulta em taxas de conversão baixas, relacionamentos curtos com clientes e perda de receita. Veja como O Oracle Marketing Cloud oferece simplicidade para as equipes de marketing, voltado para os públicos relevantes e uma solução escalonável de TI
Tags : 
como, conversar, publico, diferentes, canais, marketing
    
Oracle

Como desenvolver uma estratégia na nuvem?

Published By: Oracle     Published Date: Apr 16, 2018
À medida que a popularidade da nuvem aumentou, cresceu também o número de soluções e fornecedores. No entanto, muitas organizações não têm uma estratégia coerente para inserir o modelo de nuvem em seus data centers. Com tantas opções de nuvem para escolher, como os líderes de TI podem decidir qual é o melhor caminho a seguir para sua organização – especialmente quando há prioridades conflitantes entre os diferentes usuários de negócios?
Tags : 
como, desenvolver, estrategia, nuvem
    
Oracle

Como revolucionar as suas finanças?

Published By: Oracle     Published Date: Apr 16, 2018
Hoje em dia enfrentamos muitos desafios nas áreas de finanças e no processo de gestão empresarial. Entre eles estão sistemas internos obsoletos, infraestrutra e pessoas caras para manutenção, dificuldade em acompanhar a legislação, entre outros. Saiba como o Oracle Cloud permite e habilita que empresas de qualquer tamanho tenham acesso às finanças ágeis, atualmente, praticadas nas melhores empresas globais.
Tags : 
como, revolucionar, suas, financas
    
Oracle

Como satisfazer as demandas de mercado para a entrega de aplicativos novos e inovadores

Published By: CA Technologies     Published Date: Aug 10, 2015
No atual cenáriode negócios, variável e ultra-competitivo, acabaram os dias em que as empresas gastavam meses, ou mesmo anos, criando, testando e implementando um aplicativo, serviço ou novas ferramentas para o mercado. Os clientes, usuários de tecnologia e o mercado como um todo, são mais ágeis do que nunca, e suas exigências de uma nova funcionalidade inovadora têm crescido em consequência disso. Em outras palavras, os clientes não se contentam em esperar pelo próximo grande lançamento e não estão dispostos a lidar com falhas e deficiências quando ele chega. Neste documento você aprenderá como uma solução de Release Automation pode ajudar sua organização a simplificar e acelerar seus processos de entrega de aplicativos.
Tags : 
    
CA Technologies

Como você se compara com os líderes mobile?

Published By: Adobe     Published Date: Jul 09, 2015
Com o crescimento explosivo no uso de smartphones e tablets nos últimos cinco anos, a maioria dos profissionais de marketing desenvolveu estratégias para atrair clientes através de canais mobile. Nessa pesquisa, descobrimos que esses profissionais aprenderam a atingir os clientes por meio de dispositivos e plataformas, além de adaptar seus investimentos mobile à medida que eles se desenvolvem. Também analisamos e avaliamos as melhores práticas desses profissionais, de setores como: mídia e entretenimento, varejo e comércio, serviços financeiros, B2B e alta tecnologia. A pesquisa oferece uma visão geral dos investimentos em mobilidade pelos principais pro ssionais de marketing e o que é preciso para manter a liderança.
Tags : 
adobe, líderes, mobilidade, estratégia, web, tecnologia
    
Adobe

Comparación del portafolio de infraestructura convergente

Published By: Dell EMC & Intel     Published Date: Aug 03, 2018
La transformación digital se ha convertido en una imperativa comercial, ya que la mayoría de los aspectos de la participación económica se han vuelto digitales. En todo el mundo, las empresas y los organismos gubernamentales están rediseñando sus infraestructuras de tecnología para mantenerse a la par de las exigencias de los clientes, impulsar la innovación y seguir siendo competitivos en una economía digital en constante evolución. Una encuesta reciente de PwC destacó que el 45 % de los ejecutivos del negocio y de TI de 51 países identifica como una prioridad máxima el aumento de los ingresos por medio de la transformación digital1. El éxito en este panorama digital acelerado requiere que las empresas transformen sus infraestructuras de TI para alcanzar nuevos niveles de flexibilidad y de capacidad de respuesta. Al mismo tiempo, los equipos de TI deben lograr un equilibrio entre mantener los aspectos principales del negocio mientras invierten en nuevas innovaciones de negocios y de
Tags : 
    
Dell EMC & Intel

Competitive Testing of Web Security Devices

Published By: Websense     Published Date: Jul 08, 2014
This paper reports on a independent third party test of Websense Triton Web Security Gateway Anywhere against four competing products.
Tags : 
websense, wsga, web security, testing of web security, web security products compared, phising, malicious redirects, access control
    
Websense

Compliance and Social Media: Ensuring Your Company’s Online Activity Adheres to Security Standards

Published By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint discusses how companies can address these risks through the development of a comprehensive risk management framework that incorporates both company policy to enforce standards for safe social media and technology use and technical controls to monitor activity. Although no single blueprint exists, the framework should be sufficiently robust to prevent most employees from clicking on suspicious links and posting confidential information— and contain damage caused by inevitable human error, before the story ends up in The New York Times.
Tags : 
skillsoft, compliance, social media, online activity, security standards, awareness, risk management, malware
    
Skillsoft

Comprender el impacto de la seguridad integral de datos

Published By: Infinidat EMEA     Published Date: Oct 10, 2019
2017 no fue un año fácil para los CIO/CISO, y 2018 tampoco da muestras de serlo. Con tantas brechas en los datos acaecidas tan solo en 2017 y capaces de acabar con la carrera de cualquiera, (Equifax, Uber, Yahoo son algunos ejemplos), y los requisitos normativos reforzados a nivel mundial, los CIO/ CISO tienen la responsabilidad corporativa de replantearse su enfoque sobre la seguridad de los datos.
Tags : 
    
Infinidat EMEA

Conquering the Top 5 Enterprise Data Protection Challenges

Published By: Symantec     Published Date: May 02, 2014
How are savvy CIO's conquering these types of challenges? Find out how in this white paper by vExpert, David Davis
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data
    
Symantec

Conquering the Top 5 Enterprise Data Protection Challenges

Published By: Symantec     Published Date: Jul 11, 2014
Today's datacenters face a gauntlet of challenges including protection of physical and virtual environments, fast recovery of data, reducing backup times and storage requirements, server consolidation, and disaster recovery. How are savvy CIO's conquering these types of challenges? Find out how in this white paper by Expert, David Davis.
Tags : 
data, protection, physical and virtual environment, recovery, storage, consolidation, cio's, networking
    
Symantec

Content Aware Protection for Your Most Sensitive Data

Published By: Intel Security     Published Date: Oct 20, 2015
Microsoft Office 365 is being rapidly adopted by organizations of all sizes to give users greater flexibility and access to applications anytime, anywhere, and on virtually any device. Despite built-in data protection, additional capabilities are needed to protect precious data from advanced threats and malicious insiders. McAfee Data Loss Prevention offers comprehensive protection for your most sensitive data regardless of where it resides or where it travels—in the cloud or on premises.
Tags : 
data loss prevention, dlp, office 365, security, it management, knowledge management
    
Intel Security

Controlling the Uncontrollable

Published By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : 
mobile devices, enterprise, best practices, management, business intelligence, business management, productivity
    
Microsoft
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.