sets

Results 1 - 25 of 844Sort Results By: Published Date | Title | Company Name

How to Survive a Data Breach

Published By: CheckMarx     Published Date: Jun 07, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
    
CheckMarx

"IDC Technology Spotlight: Leveraging the Cloud to Achieve Comprehensive Asset Visibility, Tracking,

Published By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
    
Tenable

10 Best Practices for Reducing Spend in AWS

Published By: CloudHealth by VMware     Published Date: Feb 13, 2019
While cost is often cited as the reason why people move to the cloud, it's not always that simple. Many organizations have noticed cloud bills 2-3x higher than expectations, when not managed properly. Have you achieved the savings you expected? Learn 10 ways you can reduce your spend in AWS, including: -Terminate Zombie Assets -Rightsize EC2 Instances & EBS Volumes -Upgrade instances to the latest generation -Delete Disassociated Elastic IP Addresses Check out this eBook to find out how you can better manage your costs through pro-tips from cloud experts.
Tags : 
cloud management, amazon web services, multicloud management, amazon ec2
    
CloudHealth by VMware

10 best practices for reducing spend in AWS

Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
While cost is often cited as the reason why people move to the cloud, it's not always that simple. Many organisations have noticed cloud bills 2-3x higher than expectations, when not managed properly. Have you achieved the savings you expected? Learn 10 ways you can reduce your spend in AWS, including: Terminate Zombie Assets Rightsize EC2 Instances & EBS Volumes Upgrade instances to the latest generation Delete Disassociated Elastic IP Addresses Check out this eBook to find out how you can better manage your costs through pro-tips from cloud experts.
Tags : 
    
CloudHealth by VMware

10 Best Practices for Reducing Spend in Azure

Published By: CloudHealth by VMware     Published Date: Feb 13, 2019
Choosing Azure revolutionizes your environment's agility, simplicity, and innovation, but have you achieved the cost savings you expected? Discover 10 ways you can reduce your spend in Azure, including: -Terminate Zombie Assets -Delete Aged Snapshots -Rightsize Virtual Machines -Rightsize SQL Databases Read 10 Best Practices for Reducing Spend in Azure, to learn key strategies for optimizing cloud spend and saving 10-20% on your monthly Azure costs.
Tags : 
cloud management, microsoft azure, multicloud management
    
CloudHealth by VMware

10 Best Practices for Reducing Spend in Azure

Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
Choosing Azure revolutionises your environment's agility, simplicity, and innovation, but have you achieved the cost savings you expected? Discover 10 ways you can reduce your spend in Azure, including: Terminate Zombie Assets Delete Aged Snapshots Rightsize Virtual Machines Rightsize SQL Databases Read 10 Best practices for Reducing Spend in Azure, to learn key strategies for optimising cloud spend and saving 10-20?% on your monthly Azure costs.
Tags : 
    
CloudHealth by VMware

10 MINUTE GUIDE: SAM and The Software Catalog

Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW

10 Myths About Cyber Threat Intelligence Separating Fact from Fiction

Published By: Cyveillance     Published Date: Apr 10, 2015
In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.
Tags : 
myths, cyber, threat, intelligence, fact, fiction, big data, cloud
    
Cyveillance

10 Networking Priorities for Digital Transformation

Published By: Cisco     Published Date: Apr 11, 2016
Digital transformation isn’t a technology or a product. Rather, it’s a philosophy for using digital assets to change the way an organization runs. It involves realigning technology and modifying business processes to better engage employees, customers and other constituents of the extended enterprise. Digital transformation significantly improves the performance and reach of an enterprise and has become a top priority for IT and business leaders across the globe.
Tags : 
cisco, digital transformation, best practices, digital assets, digitization, networking, it management, application integration
    
Cisco

10 Networking Priorities for Digital Transformation

Published By: Cisco     Published Date: Dec 21, 2016
Digital transformation isn’t a technology or a product. Rather, it’s a philosophy for using digital assets to change the way an organization runs. It involves realigning technology and modifying business processes to better engage employees, customers and other constituents of the extended enterprise. Digital transformation significantly improves the performance and reach of an enterprise and has become a top priority for IT and business leaders across the globe
Tags : 
    
Cisco

10 Networking Priorities for Digital Transformation

Published By: Cisco     Published Date: Sep 21, 2017
Digital transformation isn’t a technology or a product. Rather, it’s a philosophy for using digital assets to change the way an organization runs. It involves realigning technology and modifying business processes to better engage employees, customers and other constituents of the extended enterprise. Digital transformation significantly improves the performance and reach of an enterprise and has become a top priority for IT and business leaders across the globe. Read on to find out how Cisco's Architecture can enable Digital Transformation.
Tags : 
digital transformation, architecture, business processes, best practices, customer engagement, employee engagement
    
Cisco

10 Reasons Finance Works better on the Salesforce Platform

Published By: FinancialForce     Published Date: Aug 20, 2019
Streamline your Financial Processes on the Salesforce Platform Imagine operating your core financial management functions including general ledger, invoicing, accounts receivable, revenue recognition, fixed assets, spend management and accounts payable on the same Salesforce cloud platform you use to run your sales, marketing, and services operations. FinancialForce Accounting combines the power of the Salesforce App Cloud with a groundbreaking cloud accounting system design. The result is an efficient and cost-effective solution that goes well beyond basic bookkeeping and transaction processing, spawning a new generation of financial management applications. Download this eBook and learn how you can:
Tags : 
    
FinancialForce

10 Reasons to Deploy Intel® Optane™ Technology in the Data Center

Published By: Intel     Published Date: Sep 27, 2019
As the first major memory and storage breakthrough in 25 years, Intel Optane technology combines industry-leading low latency, high endurance, QoS, and high throughput that allows the creation of solutions to remove data bottlenecks, and unleash CPU utilization. With Intel Optane technology, data centers can deploy bigger and more affordable datasets to gain new insights from large memory pools. Here are just ten way Intel Optane technology can make a difference to your business. To find out more download this whitepaper today.
Tags : 
    
Intel

10 Ways to Supercharge Analyst Productivity with Data Preparation

Published By: Datawatch     Published Date: Dec 16, 2015
In this paper, the Top 10 Ways to Supercharge Analyst Productivity with Data Preparation, learn how a self-service data preparation solution saves analysts’ time by allowing them to manipulate, filter, enrich, blend and combine disparate data sets in a matter of minutes.
Tags : 
data preparation, data wrangling, analyst productivity, data analysis, cleaning data, data blending
    
Datawatch

12 Best Practices for Modern Data Ingestion

Published By: StreamSets     Published Date: Sep 24, 2018
Treat data movement as a continuous, ever-changing operation and actively manage its performance. Before big data and fast data, the challenge of data movement was simple: move fields from fairly static databases to an appropriate home in a data warehouse, or move data between databases and apps in a standardized fashion. The process resembled a factory assembly line.
Tags : 
practices, modern, data, performance
    
StreamSets

12 Recommendations for Industrial Cybersecurity

Published By: Schneider Electric     Published Date: Jun 05, 2018
Cybersecurity threats are an unfortunate reality for industry everywhere. How do you protect your business while still embracing new technologies that enable you to grow and deliver the best possible results? Robust cybersecurity protection is a must, as well as rigorous mindset, policies, and methodologies. Download the whitepaper to learn more.
Tags : 
cybersecurity, smart control, empowered operators, optimized assets, future of automation, reliability, safety, operational profitability
    
Schneider Electric

19 Pieces of Content from Every Webinar

Published By: ReadyTalk     Published Date: Sep 19, 2014
59% of marketers are using webinars in their B2B content marketing strategy. While they require a significant level of effort to produce, webinars can provide a great return on investment. Fill your content pipeline by repurposing webinar assets into other pieces of content and extending the topic into other formats. Here are 19 pieces of content that can be created from every webinar.
Tags : 
webinars, qualified, leads, generation, strategy, marketing, investment, time
    
ReadyTalk

2015 Gardner Magic Quadrant: Group Video Systems Offer

Published By: Cisco     Published Date: Feb 12, 2016
Contact center infrastructure vendors continue to expand their solution offerings to include broader feature sets, including omnichannel routing, and alternative delivery models. Companies should evaluate vendors' technology and ability to deliver in relevant regions.
Tags : 
gardner magic quadrant, cisco, contact center, omnichannel routing, best practices, cloud computing, application performance management, business activity monitoring
    
Cisco

2015 Gartner Magic Quadrant for Contact Center Infrastructure

Published By: Cisco     Published Date: Nov 17, 2015
Contact center infrastructure vendors continue to expand their solution offerings to include broader feature sets, including omnichannel routing, and alternative delivery models. Companies should evaluate vendors' technology and ability to deliver in relevant regions.
Tags : 
gartner, cisco, magic quadrant, contact center infrastructure, networking, security, it management, knowledge management
    
Cisco

2015 Gartner Magic Quadrant for Contact Center Infrastructure

Published By: Cisco     Published Date: Feb 12, 2016
Contact center infrastructure vendors continue to expand their solution offerings to include broader feature sets, including omnichannel routing, and alternative delivery models. Companies should evaluate vendors' technology and ability to deliver in relevant regions.
Tags : 
contact center, cisco, omnichannel routing, cloud computing, cloud infrastructure, business activity monitoring, business intelligence, data warehousing
    
Cisco

2018 Global State of Priviledge Access Management

Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
    
Group M_IBM Q2'19

360 Degree Marketing Intelligence: The Ultimate Guide to Integrating CRM and Google Analytics Data

Published By: MoreVisibility     Published Date: Dec 19, 2017
As the approach to strategic business decision making becomes more and more data driven, a method for consolidating our various data sets, which are often spread across multiple systems becomes exceedingly important. Two of the biggest players in data driven decision making are website analytics platforms and customer relationship management systems. The former includes accumulating data on top of the funnel behavior such as site traffic origins, lead generation, content consumption tracking, device usage, and overall site behavior. While the latter has a focus more on bottom of the funnel activity such as lead nurturing, customer status, lifetime value, etc. Lastly, without communication between these two essential platforms, a complete understanding of your customers, from lead to longtime client, may never be possible. A web analytics (Google Analytics) and CRM integration provides you with a 360 degree view of your customer base, so that you can understand not just what PPC efforts
Tags : 
    
MoreVisibility

451 - The Holistic Approach to Multicloud for Digital Operations

Published By: Group M_IBM Q3'19     Published Date: Jun 25, 2019
To become more effective, enterprises must fast-track projects to digitally connect their organizations. Building value and providing compelling customer experiences at lower cost requires more than a quick technology fix; it demands a business and technological commitment to a new target operating model (TOM). This operating model should offer a way of running the organization that combines digital technologies and operational capabilities to achieve improvements in revenue, customer experience and cost. Enabling digital capabilities via the TOM is an ongoing process that requires DevOps skills and agile development techniques. This is easier to achieve with partners that have the requisite capabilities to help with the creation of new digital assets
Tags : 
    
Group M_IBM Q3'19

5 Cyber Security Imperatives For Power Executives

Published By: GE Power     Published Date: Oct 05, 2016
Cyber attacks against utilities and power producers are on the rise. Prudent leaders are taking action now to lock down their control systems and operations assets before a potentially catastrophic event occurs. Download the eBook “5 Security Imperatives for Power Executives” to learn how to prepare and react to threats to your business and the public you serve.
Tags : 
energy cyber security, power plant cyber security, digital security for power plants, dcs security, ics security, power plant cyber risk
    
GE Power

5 Myths of Cloud Computing

Published By: HP     Published Date: Oct 01, 2014
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. At the time this definition was published, “cloud” was already part of industry parlance, and was beginning to take root in the general lexicon. Additionally, global business spending for infrastructure and services related to the cloud had topped $78 billion. This year, enterprise spending on the cloud will reach an estimated $174 billion, and is expected to climb to $235 billion by 2017.2 Inevitably, as both business IT and consumer mindsets evolve toward the cloud in coming years, we will continue to witness dramatic growth in IT products in some areas, and significant reductions in other areas—resulting in a reshaping of the industry as a whole.
Tags : 
cloud, computing, on-demand, management, interaction, network, access, configurable
    
HP
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.