data access

Results 326 - 350 of 614Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: May 03, 2016
Analyzing big data is critical for enterprises to serve customers and improve overall business performance.
Tags : 
sap, forrester, data access, data, big data, customer insights, enterprise applications, data management, business technology
    
SAP
Published By: Delphix     Published Date: May 03, 2016
Looking to streamline processes across development, test, and operations teams with more efficient Test Data Management (TDM)? Don't let antiquated technology and complex processes stand in the way of fast access to high-quality test data. Next-generation TDM transforms how businesses deploy testing environments and the way teams work within them, providing both greater flexibility and increased efficiency.
Tags : 
    
Delphix
Published By: MuleSoft     Published Date: Apr 13, 2016
Every corner of an enterprise needs technology to build new applications for their specific function or customer. IT needs to transform from its traditional function as the sole technology provider to become an adaptive, responsive and nimble organization that can keep up with the pace of the digital era as well as embrace the opportunities provided by a change-driven environment. This transformation can occur only if IT transforms itself into a strategic business enabler rather than a centralized technology function. Being an enabler means that IT has to decentralize and democratize application development and data access to the different Lines of Business (LoBs) and functional business partners. This way, IT can concentrate on a partnership with the business - i.e. providing a set of strategic and consistent assets and technology.
Tags : 
technology, enterprise applications, best practices, business optimization, technology architecture, application management
    
MuleSoft
Published By: IBM     Published Date: Apr 12, 2016
The digital transformation that organizations are striving for today requires a mindset of "no limits" in terms of securely exposing critical business assets for internal and external consumption. In order to be an agile, digital business, enterprises need to seamlessly connect across hybrid environments, applications, data and processes, keeping a keen eye on an open cloud strategy. They also need a secure integration framework to provide controlled access, a single dashboard providing performance insights, and easy access to digital assets for your developers. This webcast will explore all of these areas in depth, to support your enterprise's quest to become a next-generation digital business.
Tags : 
ibm, digital business, api economy, api management, apim, api, enterprise applications, business technology
    
IBM
Published By: CDW - NetApp     Published Date: Apr 07, 2016
Data Fabric is NetApp’s vision for the future of data management. A data fabric seamlessly connects different data management environments across disparate clouds into a cohesive, integrated whole. A Data Fabric enabled by NetApp® helps organizations maintain control and choice in how they manage, secure, protect, and access their data across the hybrid cloud, no matter where it is. Although the data fabric is constantly evolving, organizations can start taking advantage of it today using NetApp technologies that enable data management and seamless data movement across the hybrid cloud.
Tags : 
data, application performance, data protection, performance optimization, cloud management, it management, enterprise applications, data management, business technology
    
CDW - NetApp
Published By: Hortonworks     Published Date: Apr 05, 2016
The advent of big data revolutionized analytics and data science and created the concept of new data platforms, allowing enterprises to store, access and analyze vast amounts of historical data. The world of big data was born. But existing data platforms need to evolve to deal with the tsunami of data-in-motion being generated by the Internet of Anything (IoAT).
Tags : 
    
Hortonworks
Published By: CDW     Published Date: Apr 04, 2016
Data Fabric is NetApp’s vision for the future of data management. A data fabric seamlessly connects different data management environments across disparate clouds into a cohesive, integrated whole. A Data Fabric enabled by NetApp® helps organizations maintain control and choice in how they manage, secure, protect, and access their data across the hybrid cloud, no matter where it is. Although the data fabric is constantly evolving, organizations can start taking advantage of it today using NetApp technologies that enable data management and seamless data movement across the hybrid cloud.
Tags : 
data, application performance, data protection, performance optimization, cloud management
    
CDW
Published By: Pega     Published Date: Apr 04, 2016
It is no secret banks are losing customers, and fast. A recent Finextra/Pegasystems survey pegs that 78% of banks have lost business in the last 12 months. The question is “Why?”. It all comes down to engaging with customers before, during and even after the sales process. Nearly all banks are struggling with the impact of client due diligence and KYC (know your customer) regulation on their onboarding processes, and are painfully aware that lack of speed, process visibility and repeat data requests are frustrating their corporate customers. The same holds true for service, where corporates are crying out for improvement, as well as omni-channel access and quick turnaround of service requests and inquiries. To stop the sales decline, banks need to begin doing all these things well. They will then be more competitive in the market as well as retain and win new business. Download this research study and gain a better understanding of how banks can better meet the needs of their customers
Tags : 
    
Pega
Published By: IBM     Published Date: Apr 04, 2016
The right identity governance and administration solution can help you control access risks and segregation-of-duties violations. It can help you manage user roles, access policies and risk - so you can apply and enforce appropriate levels of access across your enterprise.
Tags : 
ibm, data security, risk management, data management, knowledge management, enterprise applications
    
IBM
Published By: AlienVault     Published Date: Mar 30, 2016
Given that Point of Sale (POS) systems are used to transmit debit and credit card information in retail transactions, it's no wonder they are a desirable target for attackers. In this white paper, you'll learn about some of the common types of POS malware, how they work and best practices for protecting cardholder data. Topics covered in this white paper include: • Common types of POS malware and how they work • How attackers exfiltrate data from POS systems once they gain access • POS security techniques to protect payment card data Download your copy today to learn how to effectively detect and respond to POS malware threats.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Mar 30, 2016
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than their larger enterprise counterparts, yet they face the same threats from attackers. Fortunately, there are solutions. This whitepaper by SANS instructor Jake Williams walks through an example of a typical breach in an education organization, highlighting common ways attackers gain access to a network and practical steps to reduce risk. Download this whitepaper to learn: • Common security gaps that make educational institutions vulnerable to attack • Practical security controls that won't break the bank • Key questions to evaluate security vendors • A checklist summarizing steps you should take now to improve security
Tags : 
    
AlienVault
Published By: Cisco     Published Date: Feb 16, 2016
From collaboration to communication to data access, the web is a mission-critical business tool. Enterprises rely on the web not only to innovate and compete but also to conduct business. But the web poses significant security risks that are easily encountered by users, yet not so easy to detect.
Tags : 
cisco, web threat, data security, information security, data access, security
    
Cisco
Published By: Dell     Published Date: Feb 04, 2016
This infographic shows you how your organization’s lost laptop will not be compromised. That’s right, with Dell’s Data | Encryption unauthorized third parties can’t access your data. Within this infographic, learn how you and your employees can finally have the data protection you need.
Tags : 
    
Dell
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Future workplace structures are envisioned to be a scenario wherein employees are likely to use a multitude of connected mobile devices and apps that will offer compelling new work style experiences integrating voice, video and data access services.
Tags : 
citrix, frost & sullivan, next-gen, enterprise
    
Citrix Systems, Inc.
Published By: CDW     Published Date: Jan 15, 2016
Even with the latest devices, your mobile workforce may not have what they need to get the job done. Without a strategy to provide them with data and applications, they’re forced to work without them or find workarounds that can compromise security. Today’s workers are constantly on the move, and IT departments are scrambling to keep up. Access to email is not enough. You must address the legacy applications that your employees can’t easily access from their mobile devices, knowing that app development can be cost prohibitive and complex. And you have to have a strategy in place to secure and manage every application in use.
Tags : 
cdw, client virtualization, mobile workforce, mobile strategy, best practices, networking, security, software development, it management
    
CDW
Published By: Cisco     Published Date: Jan 08, 2016
Financial services organizations have a unique relationship with technology: electronic data and transactions are the core of this industry. Financial services firms remain vigilant because they are constantly under attack. Hackers that gain access to customer accounts or financial data can profit either by using it themselves or by selling it to other criminal organizations. - There are many differences between perception and reality when it comes to security in this industry. For example, its emphasis on fraud prevention creates the perception that financial services is highly evolved in terms of its security readiness. However, this study finds that financial services firms’ security is on a par with the security of firms in other industries. - Regulations may lead to change and investments, but they also take time to take effect. Organizations should not wait for such requirements before they make improvements. Neither should they assume that compliance gives them full protection. Regulations cannot cover every aspect in such a fast-paced environment.
Tags : 
cisco, financial services, perception gaps
    
Cisco
Published By: Domo     Published Date: Dec 18, 2015
Domo brings data from any system, spreadsheet or application into a single real-time platform. Decision makers can access the data they need, when they need it, without having to wait on any reports. And it completely transforms the way you manage business.
Tags : 
domo, spreadsheet, system, application, platform, data, software development, business technology
    
Domo
Published By: SAP     Published Date: Dec 04, 2015
Download this whitepaper to see how advanced technologies such as big data, cloud computing, mobile devices, and enterprise access to in-memory platforms, predictive analytics, and planning software can help CFOs make better and more sophisticated use of data, influence decisions, and take practical, timely action.
Tags : 
finance function, finance, cfo, big data, cloud computing, mobile, in-memory platforms, predictive analytics, planning software
    
SAP
Published By: Looker     Published Date: Dec 03, 2015
The focus of modern business intelligence has been self-service; pushing data into the hands of end users more quickly with more accessible user interfaces so they can get answers fast and on their own. This has helped alleviate a major BI pain point: centralized, IT-dominated solutions have been too slow and too brittle to serve the business. What has been masked is a lack of innovation in data modeling. Data modeling is a huge, valuable component of BI that has been largely neglected. In this webinar, we discuss Looker’s novel approach to data modeling and how it powers a data exploration environment with unprecedented depth and agility. Topics covered include: • A new architecture beyond direct connect • Language-based, git-integrated data modeling • Abstractions that make SQL more powerful and more efficient
Tags : 
    
Looker
Published By: Drillinginfo     Published Date: Nov 26, 2015
OFS companies in the Bakken Play need fast, accurate rig intelligence from one comprehensive source to stay competitive. With Drillinginfo (DI) you’ll gain a competitive edge in the Bakken Play by using the best data and the broadest intelligence available. In this PDF you’ll learn how DI provides everything you need, from permitting and leasing information to rig locations, pricing trends, and more. While tracking prospects can be a lucrative opportunity, rigs move on a daily basis, so you need timely, accurate information. In this PDF you’ll see how Drillinginfo can drive your success by gathering the very latest rig intelligence from a comprehensive, easy-to-use SAS solution. Learn how to prepare for the next well event with DI Rigs Mobile App. With this invaluable tool you can enjoy the luxury of having your own office on the road. Easy access to rig and well event coordinates and driving directions via GPS units located on over 1,800 rigs make the DI Rigs Mobile App a must.
Tags : 
ofs companies, leads, data, analytical tools, oilfield, leasing information, mobile app, rig intelligence
    
Drillinginfo
Published By: Cisco     Published Date: Nov 18, 2015
The Internet of Everything (IoE) is a continuous interaction among people, processes, data, and things. Sensors, networks, and smart devices are ubiquitous, providing a torrent of streaming data or big data. The Internet of Things (IoT), which is a network of physical objects accessed through the Internet that can sense and communicate, is a component of IoE. Cisco is helping customers and strategic partners leverage the full potential of IoE to achieve radical results across all sectors and industries. Indeed, IoE is capable of helping public safety and justice agencies increase cost efficiency, improve safety and security, provide better response times, and increase productivity.
Tags : 
ioe, public safety, justice, emergency response, networking, security, enterprise applications
    
Cisco
Published By: VMware AirWatch     Published Date: Nov 12, 2015
IT requires a solution that solves the challenge of securing proprietary applications and data in the cloud datacenter and is available only to users and devices that are delegated safe for access. VMware NSX solves this challenge through user-level micro-segmentation. The VMware NSX approach offers several differentiated advantages over traditional security approaches.
Tags : 
vmware, cloud datacenter security, mobility, smart networking, vmware nsx, micro segmentation, networking, security, it management, knowledge management, data management
    
VMware AirWatch
Published By: Citrix Systems     Published Date: Oct 16, 2015
Cases for App Virtualization
Tags : 
app virtualization, data, secure access, productivity, corporate resource
    
Citrix Systems
Published By: IBM     Published Date: Oct 02, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe, and shows how IBM InfoSphere solutions can help protect data while giving your staff the right levels of access to do their jobs efficiently and accurately.
Tags : 
ibm, big data, data security, privacy strategies, ibm infosphere, security, it management, knowledge management, business technology
    
IBM
Published By: Tripp Lite     Published Date: Sep 30, 2015
This white paper: • Explains the staggering growth of digital data volume and the increasing demand for faster access • Examines the different types of data transmission • Outlines the two potential solutions for connecting 10Gb equipment with higher-speed equipment
Tags : 
equipment, higher-speed, data transmission, infrastructure, volume, integrate, network, speed, digital, it management, enterprise applications
    
Tripp Lite
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee