approach

Results 1 - 25 of 2187Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Jul 23, 2018
New market forces are creating unprecedented pressure for companies to move faster, with greater agility, and change in response to new threats and opportunities. Companies that are embracing a new approach built on Intelligent Cloud ERP are gaining valuable advantages — such as boosting profits, growing faster, entering new markets, and disrupting their industries. Learn how Intelligent Cloud ERP empowers you to leverage the opportunities presented by changes to how we work, collaborate and achieve success in this practical, actionable overview.
Tags : 
    
SAP
Published By: Box     Published Date: Jun 22, 2018
• Moving from legacy to cloud infrastructure is a huge win for business, but the process requires a fundamental shift in organizational culture and business processes both inside and outside IT. In fact, managing this change may be the biggest challenge your company faces when moving to the cloud, unless you're equipped with the resources that make for a simple, successful transition. • Here's our tried-and-true 3-step approach proving that change doesn't have to be hard. Download now to start your easy, secure and efficient move to the cloud.
Tags : 
    
Box
Published By: Akamai Technologies     Published Date: Jun 14, 2018
The moats and castle approach is an antiquated, yet a common way, of protecting the enterprise network. This paper describes a new way to protect the enterprise which hides applications from the Internet, outside of the firewall, with zero open ports and a minimal attack surface.
Tags : 
security, enterprise security, eaa
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Traditional remote access technologies—like VPNs, proxies, and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications."
Tags : 
vpn, proxies, security, security breach, technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
In September 2017, Akamai commissioned Forrester Consulting to examine how companies approach digital experience and digital security. A survey of over 350 IT executives around the world found that: Customer trust is at an all-time low and it’s hurting growth Executives are aware that customer trust is becoming critical to success Companies struggle to balance security with digital experience Failure to deliver on security impacts brand reputation, customer trust, and revenues This report, Drop A Pin At The Intersection Of Digital Experience And Security, shares insights into these findings and what sets top digital businesses apart.
Tags : 
digital, experience, security, executives, customer
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Butler Technologies     Published Date: Jul 02, 2018
A Next-Generation Approach to Attack Remediation
Tags : 
    
Butler Technologies
Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
Maintaining a competitive edge today means building a Digital Enterprise capable of taking full advantage of social, mobile, web, cloud, “things,” (sensors and devices), and analytics technologies. Among the terms used to describe this business transition is “the API Economy,” an economy in which APIs are no longer just an IT concern, but the underpinnings of new revenue streams and new business models that are disrupting entire industries. Read this paper to learn about: New, modern applications being built for the enterprise Application ecosystems and extending the value of your company in the API Economy Two ways to integrate devices in the Internet of Things The microservices approach to application development The role of API management in the digital enterprise
Tags : 
    
TIBCO Software APAC
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
Despite being knowledgeable about their industry and experienced in running their organizations, the majority of business users lack expertise in analytics and visualization techniques—but that doesn't stop them from wanting to have a go. But making tools easier and more widely accessible is only part of the answer. A better approach is to work both sides of the gap. To make tools that can empower business users to discover and unlock value in their data—and that extend capabilities for experts, so they can share the analytics workload, improve efficiency, and focus on higher level work.
Tags : 
    
TIBCO Software APAC
Published By: Here Technologies     Published Date: Aug 17, 2018
As map providers move to a highly modular, platform-centric approach, get an understanding of the value being delivered and find out how governments can harness the benefits and apply them across regions to enhance mobility, experiences and safety. In this report by Counterpoint Technology Market Research, learn why HERE’s Open Location Platform – described as super-rich and always up-to-date, is a leader in the location data arena.
Tags : 
    
Here Technologies
Published By: Here Technologies     Published Date: Aug 17, 2018
As map providers move to a highly modular, platform-centric approach, get an understanding of the value being delivered and how you can harness the benefits and apply them to advertisement campaigns to attain more granular segmentation, precise targeting and a better audience experience. In this report by Counterpoint Technology Market Research, learn why HERE’s Open Location Platform – described as super-rich, always up-to-date, and a neutral offering – is a leader in the location data arena.
Tags : 
    
Here Technologies
Published By: Here Technologies     Published Date: Aug 17, 2018
As map providers move to a highly modular, platform-centric approach, get an understanding of how fleet and logistics software providers can deliver more value in their solutions to enhance efficiency, productivity, and safety. In this report by Counterpoint Technology Market Research, learn why HERE’s Open Location Platform – described as super-rich, always up-to-date, and a neutral offering – is a leader in the location data arena.
Tags : 
    
Here Technologies
Published By: KPMG     Published Date: Jul 10, 2018
With disruptive ideas and technologies coming thick and fast, formulating a strategic response is critical to long-term survival. How can you prepare a strategy for success? Read this report to find out: • how established organisations are meeting the challenge from disruptors • what models they’re using to gain first-mover access to technology innovation • why designing an overall portfolio of disruption responses is key • how to navigate disruption successfully, with a clear four-step approach.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 10, 2018
With disruptive ideas and technologies coming thick and fast, formulating a strategic response is critical to long-term survival. How can you prepare a strategy for success? Read this report to find out: • how established organisations are meeting the challenge from disruptors • what models they’re using to gain first-mover access to technology innovation • why designing an overall portfolio of disruption responses is key • how to navigate disruption successfully, with a clear four-step approach.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 11, 2018
Looking for a smarter approach to workforce planning? With robotics and artificial intelligence transforming the workplace, analysing supply and demand over 3–5 years doesn’t make sense. HR leaders need to find a more flexible approach to workforce shaping. Read this report to discover: • the key trends that will shape the future workforce • what early movers into intelligent automation can teach us • what’s involved in agile workforce shaping • how to use our 5C Framework to navigate the changes ahead.
Tags : 
    
KPMG
Published By: Black Duck Software     Published Date: May 18, 2010
In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source
    
Black Duck Software
Published By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, intellectual property
    
Black Duck Software
Published By: IBM     Published Date: Aug 07, 2018
Learn about the top needs and challenges for GDPR compliancy and how IBM resolves these challenges with a security first cloud approach.
Tags : 
    
IBM
Published By: Menlo Security     Published Date: Jun 01, 2018
"Financial services institutions are high-value targets for cyberattacks because of the capital they control, the personal information on customers they maintain, and the fear an attack on a bank generates in the public. Phishing attacks on FSIs have risen steadily, especially employee credential theft - because once an employee’s credentials are stolen, cyberattackers can access customer information, employee data, even finances. While legacy security solutions claim to block up to 99.9 percent of cyberattacks, all it takes is one employee or contractor to open an email from an unknown source, download a file from a compromised website, or in any other way fall victim to a cyberattack. So, it’s time for a new approach: Isolation, also known as, remote browsing. Download this Financial Services Best Practices Guide to Isolation to learn how to best eliminate phishing attacks and web malware. "
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Jun 01, 2018
"Uncover the Business Impact of Managing Risky Web Content Download this white paper to learn: How to safely manage ""uncategorized"" websites when sites are unknown to the secure web gateway (SWG) policies, which are largely based on website categories, such as news, entertainment, weather, social media, etc. The cost implications of securing web content, including staffing, clean-up and risk mitigation Isolation - a new technique for malware prevention to maintain end user & IT staff productivity Administrators can either be lenient in allowing access to uncategorized sites, increasing malware risk, or deny access and deprive employees of necessary information. There are hidden costs to both approaches. "
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
    
Menlo Security
Published By: HireVue     Published Date: Aug 10, 2018
In retail, your people are your greatest asset. In this eBook you'll learn how to proactively drive revenue with recruiting, and how to prove the value of your efforts. Expect to learn: • 3 ways to calculate the ROI of your recruiting • How you can use the candidate experience to generate revenue • How to use the hiring process to decrease employee turnover • 2 approaches that remove the hiring burden on store managers Want to start driving revenue through your retail recruiting? Download the free eBook now!
Tags : 
    
HireVue
Published By: Global Software     Published Date: Aug 13, 2018
Humans excel at tasks that require creativity, the opportunity to respond to the unexpected, and general attentiveness to the surrounding environment. Technology and machines, on the other hand, are built to process a lot of information quickly without getting bored; technology reliably completes the task it is assigned without deviation. The most powerful approach to adding technology to a team takes the strengths of both humans and technology into account and from that, creates a superior, collaborative system. For example, reporting software such as Spreadsheet Server and Atlas for Dynamics AX/365 by Global Software, Inc. both serve as machine learning intelligence that uses automation to reduce errors, while at the same time preserving humans’ ability to create reports and outcomes from the data the way they need to see it.
Tags : 
technology, machines, dynamics, global, software
    
Global Software
Published By: Adobe     Published Date: May 15, 2018
The companies that are succeeding today are the ones that go beyond their products and services and create exceptional experiences. We surveyed industry leaders around the world to discover the top digital marketing trends and priorities. We’re sharing the results of the 2017 Digital Marketing Study in Running on Experience. Read the report to learn: What strategies and approaches set leaders apart from the rest Where companies in your industry are investing The four steps for digital transformation
Tags : 
    
Adobe
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee