data access

Results 326 - 350 of 604Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Oct 28, 2014
Compliance and financial risk used to be the driving concerns for security and risk management. Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Tags : 
security connected framework, big security data, big data, log management, siem, security
    
McAfee
Published By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : 
siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance, security
    
McAfee
Published By: VMware, Inc     Published Date: Dec 05, 2013
Organizations worldwide are using virtual desktop infrastructure (VDI) to run virtual desktops in the datacenter and deliver these to employees as a managed service. End users gain a familiar, personalized environment they can access anywhere from any device, while administrators gain control and security. With VMwareģ Horizon Viewô (formerly VMware View), IT professionals can implement a VDI infrastructure to help drive down operational costs, enhance security, and support a mobile workforce.
Tags : 
vmware, vmware horizon view, virtual desktop infrastructure, virtual desktops, vdi, datacenter, networking, it management, knowledge management, enterprise applications, storage, data management, business technology, data center
    
VMware, Inc
Published By: QTS Data Centers     Published Date: Mar 31, 2015
One of ITís biggest balancing acts is to make data transactions easily available to authorized users while preventing all others from accessing its data assets. With high-profile data security breaches splashed across headlines nearly every day, CIOs are understandably worried about protecting their data. And for IT leaders who are considering moving their business to the cloud it is critical to ensure the provider they select has undertaken full and robust measures for physical and logical security.
Tags : 
qts, cloud, security, data transactions, cio report, cyber threats, security breaches, it leaders, it management
    
QTS Data Centers
Published By: CenturyLink     Published Date: Jan 02, 2015
With core competencies like security, facility management, and carrier access, CenturyLink provides comprehensive global colocation services that extend your IT infrastructure into a more efficient virtual environment. You manage your own hardware, software, and applications to maintain complete control while gaining the cost and growth benefits of colocation.
Tags : 
data center build, facility management, carrier access, global colocation services, it management, knowledge management, enterprise applications, data management, data center
    
CenturyLink
Published By: CommVault     Published Date: Jun 10, 2015
Modern data protection solutions must be able to access and restore from backups painlessly, with minimal IT help required.
Tags : 
backup, data, management, storage, data protection, software, network
    
CommVault
Published By: FICO     Published Date: Feb 06, 2018
The FICOģ Enterprise Security Score measures the likelihood that you will suffer a data breach in the coming 12 months. To deliver the FICO Enterprise Security Score, we access billions of external data points at internet scale and apply our analytics to give you an empirically derived score. You can measure the cybersecurity risk of your organization, or any organization you want to work with, to see the risk you are inheriting from your supply chain. We provide the information behind your cybersecurity score so you can see where you need to take action, and you can measure the effect of improvements on your overall cybersecurity posture.
Tags : 
grow, optimize, business, enterprise, security, data, breach
    
FICO
Published By: Anaplan     Published Date: Sep 07, 2018
For many years, large corporations have employed financial planning and analysis professionals to oversee budgeting, planning, forecasting and analysis. But the sea-change in technology, data and the competitive landscape is having a sustained impact on the FP&A function as it transforms from a predominately budgeting function to a forward-focussed strategic contributor. Now, as new cloud technology makes implementing modern FP&A quicker and cheaper, the function has become more accessible to medium-sized, or even smaller, organisations. There is a nascent but growing realisation that this corner of the finance function should be demanding more of an organisationís attention, large or small, because having accurate and timely visibility, further into the future, could mean the difference between success and failure in todayís highly uncertain and volatile business environment.
Tags : 
    
Anaplan
Published By: Infosys     Published Date: May 21, 2018
Experimenting faster is a trait shared by most innovative organizations. They want to experiment with new products and promotions to see if they can unearth bold new ways of serving the customer. But this experimentation cannot be random: it needs to be guided by data and based on current customer insight. It was access to this data that was the problem for our client, a large consumer brand. It took a long time to prepare the data to a point where it could be used by business managers. So long, in fact, that the data was no longer relevant; and the moment as often lost. The company needed to be able to experiment faster but was held back by a cumbersome and ineffective analytics infrastructure.
Tags : 
experiment, organizations, customer, insights, analytics
    
Infosys
Published By: Snowflake     Published Date: Jan 25, 2018
To thrive in todayís world of data, knowing how to manage and derive value from of semi-structured data like JSON is crucial to delivering valuable insight to your organization. One of the key differentiators in Snowflake is the ability to natively ingest semi-structured data such as JSON, store it efficiently and then access it quickly using simple extensions to standard SQL. This eBook will give you a modern approach to produce analytics from JSON data using SQL, easily and affordably.
Tags : 
    
Snowflake
Published By: Cloudian     Published Date: Feb 15, 2018
We are living in an age of explosive data growth. IDC projects that the digital universe is growing 50% a year, doubling in size every 2 years. In media and entertainment, the growth is even faster as capacity-intensive formats such as 4K, 8K, and 360/VR gain traction. Fortunately, new trends in data storage are making it easier to stay ahead of the curve. In this paper, we will examine how object storage stacks up against LTO tape for media archives and backup. In addition to a detailed total cost of ownership (TCO) analysis covering both capital and operational expenses, this paper will look at the opportunity costs of not leveraging the real-time data access of object storage to monetize existing data. Finally, we will demonstrate the validity of the analysis with a real-world case study of a longstanding network TV show that made the switch from tape to object storage. The limitations of tape storage go way beyond its lack of scalability. Data that isnít searchable is becoming
Tags : 
    
Cloudian
Published By: Amazon Web Services     Published Date: Apr 11, 2018
Connecting your VPC and corporate data helps make the AWS Cloud a valuable extension of your data center. Using IPsec AWS managed VPN connections and secure gateways provides secure access to seamlessly connect to AWS hosted resources just like any other internally facing resource.
Tags : 
    
Amazon Web Services
Published By: Infosys     Published Date: Jun 12, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : 
internal, applications, data, hacks, privacy, enterprises
    
Infosys
Published By: Talend     Published Date: Nov 02, 2018
Ready to embrace the multi-cloud future? This new TDWI Checklist Report is the cloud primer youíve been waiting for. The most successful companies are embracing cloud data integration to help them leverage more data. Businesses are increasingly having to learn what data integration is and does as well as increasing their data processing scale and performance at lower cost. This whitepaper demonstrates how to reduce risk and disruption while implementing multi-cloud data integration and self-service data access.
Tags : 
    
Talend
Published By: FICO EMEA     Published Date: Jan 25, 2019
Communications service providers (CSPs) have long recognized the potential of data analytics. Yet their early efforts to pull actionable intelligence from the oceans of data they have access to were largely unsuccessful. Many tried a 'big bang' approach to building a central repository without knowing what they wanted to do with the data in it. The arrival of artificial intelligence (AI) Ė its machine learning subset in particular Ė has changed their thinking and approach. For this Quick Insights report, we surveyed 64 professionals from CSPs around the world who are applying, leveraging and/ or planning to deploy advanced analytics in some capacity at various points across the customer lifecycle.
Tags : 
analytics, artificial intelligence, customer lifecycle, insights, telecom credit lifecycle, customer acquisition, optimisation
    
FICO EMEA
Published By: Cisco     Published Date: Jan 08, 2016
Financial services organizations have a unique relationship with technology: electronic data and transactions are the core of this industry. Financial services firms remain vigilant because they are constantly under attack. Hackers that gain access to customer accounts or financial data can profit either by using it themselves or by selling it to other criminal organizations. - There are many differences between perception and reality when it comes to security in this industry. For example, its emphasis on fraud prevention creates the perception that financial services is highly evolved in terms of its security readiness. However, this study finds that financial services firmsí security is on a par with the security of firms in other industries. - Regulations may lead to change and investments, but they also take time to take effect. Organizations should not wait for such requirements before they make improvements. Neither should they assume that compliance gives them full protection. Regulations cannot cover every aspect in such a fast-paced environment.
Tags : 
cisco, financial services, perception gaps
    
Cisco
Published By: McAfee EMEA     Published Date: Mar 14, 2018
Use of cloud computing services continues to grow rapidly as organizations migrate business applications and data to cloud-based software, platform and infrastructure services. Gartner estimates 2017 will see growth of 18% in spending on public cloud services and that cloud adoption will infuence more than 50% of IT spending through 2020. Deloitte Global predicts that by the end of 2022 more than half of all IT spending will go to IT-as-a-service providers. In the 2016 edition of this survey, 56% of the security professionals responding said limitations on access to collect incident response data and evidence for forensic analysis was a key challenge to securing the cloud. Sixty-two percent said they were concerned about unauthorized access by outsiders, and 59% said they worried about access by other cloud tenants. Of the 10% who reported being breached, half blamed stolen credentials or compromised accounts.
Tags : 
    
McAfee EMEA
Published By: HP     Published Date: Jun 23, 2008
To stay competitive in today's business climate, organizations must find ways to meet their business needs while controlling IT costs. IT departments face flat budgets and, at the same time, find that their organizations have become increasingly dependent on uninterrupted access to business-critical data. In today's world, prudent IT administrators prepare to recover from two types of disasters as part of a complete Business Continuity and Availability (BC and A) plan.
Tags : 
3 data center replication, 3dc, 4aa0-3153enw, storageworks, xp continuous access async, xp continuous access journal, xp continuous access synchronous, xp10000 disk array, xp12000 disk array, availability, business continuity, data center replication, disk array, wwenterprise, hp disaster proof, disaster-proof, disaster proof, storage
    
HP
Published By: HP     Published Date: Jun 23, 2008
This paper provides a comprehensive set of test-proven best practices for properly configuring, deploying, and operating an Oracle 10g database on an HP StorageWorks XP12000 Disk Array (XP12000) in an HP-UX environment using HP StorageWorks XP Continuous Access Software as the remote copy infrastructure.
Tags : 
replication, remote replication, storageworks, hp disaster proof, disaster proof, disaster-proof, oracle, storage
    
HP
Published By: HP     Published Date: Aug 03, 2009
In terms of health care IT, what does the next five years look like? The IT team at Harvard Medical School — Partners HealthCare Center for Genetics and Genomics (HPCGG) has focused its efforts on building a viable IT foundation with the right hardware and innovative software. The team also hopes to ensure that IT is not a constraining factor in realizing the benefits of next-generation sequencing technologies. Read this white paper to learn how HPCGG is implementing a cost-effective storage system that can integrate with its existing cluster environment for exponentially faster data access.
Tags : 
genomics, storage, storageworks
    
HP
Published By: Motorola     Published Date: Feb 06, 2008
This White Paper outlines how mobile solutions help organizations work efficiently in a global business environment. It also discusses how organizations can best create processes around device usage, data/service access and security.
Tags : 
mobile strategy, wireless, mobility, adoption, htc, mobile workers, security, network, wireless knowledge, mobile messaging, mobile device, data access, motorola, motorola good
    
Motorola
Published By: Oracle Corp.     Published Date: Oct 15, 2012
During this webcast Kamal Tbeileh, Sr. Principal Product Manager at Oracle, will discuss database access control best practices for all database users, including highly privileged users using Oracle Database Vault.
Tags : 
database, database access control, database security, database consolidation, compliance, oracle
    
Oracle Corp.
Published By: SRC,LLC     Published Date: Jun 01, 2009
To mine raw data and extract crucial insights, business decision‚Äźmakers need fast and comprehensive access to all the information stored across their enterprise, regardless of its format or location. Furthermore, that data must be organized, analyzed and visualized in ways that permit easy interpretation of market opportunities growth, shifts and trends and the business‚Äźprocess changes required to address them. Gaining a true perspective on an organization’s customer base, market area or potential expansion can be a challenging task, because companies use so many relational databases, data warehouse technologies, mapping systems and ad hoc data repositories to gather and house information for a wide variety of specialized purposes.
Tags : 
src, enterprise, enterprise applications, convergence, compared, counted, combined, reorganized, analyzed, visualized, mapped, database, gis, geographic business intelligence, data independence, etl, csv, delimited text file, mdb (both for microsoft access, esri personal geodatabase
    
SRC,LLC
Published By: SRC,LLC     Published Date: Jun 01, 2009
Companies spend millions of dollars every year on building data warehouses, buying business intelligence (BI) software tools and managing their analytic processes in the hope of gaining consumer insight and winning market share. Yet, many companies fail to realize the full benefits of their technology investments because they are hamstrung by the layers of expertise and the complexity of technology tools needed to integrate various data warehouses and associated tools within their existing analytic environments. Since analysis is only as good as the accessibility, timeliness and accuracy of the information being analyzed, the interoperability of any data warehouse with any analytic environment is essential to achieving insightful, actionable analysis and making better decisions.
Tags : 
src, enterprise, streamline, analytics, economy, analytic imperative, business intelligence, seamless, data warehouse, interoperability, analytic environment, data assets, report generation, output options, total cost of ownership, tco, roi, return on investment, olap, enterprise applications
    
SRC,LLC
Published By: Okta     Published Date: Feb 24, 2015
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and user management solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : 
identity and access management, saas applications, single sign-on, active directory, management solutions
    
Okta
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee