data strategy

Results 76 - 100 of 445Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: WNS     Published Date: Jun 21, 2017
Pricing needs to support a brand’s overall marketing platform. But is that enough to assure consistency of message throughout the organization? Given the far-reaching influence a price position has on a brand, and how various departments need to be aligned to support that position, an argument can be made for treating pricing as a core competency within the organization. What does this mean in real terms? Pricing is a day-to-day concern for numerous departments throughout the organization. While marketing might use pricing tactics to grow market share, sales teams chase volume goals, and product development teams lose sleep over the price image each product projects.
Tags : 
profitability, opportunity identification, monitoring and refinement, executive access, own price elasticity, cross price elasticities, price corridors
    
WNS
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: Gigamon     Published Date: Feb 20, 2019
Download “How to Strengthen Security While Optimizing Network Performance” to see how next-generation network packet brokers (NGNPBs) mitigate security tool sprawl, simplify IT management and improve network availability. NGNPBs help align network and security teams by creating a single view of network infrastructure and data management. See why you should shift your infrastructure strategy toward NGNPBs to boost efficiency and reduce complexity. Learn more by downloading this new research now.
Tags : 
    
Gigamon
Published By: Teradata     Published Date: Jan 30, 2015
Our goal is to share best practices so you can understand how designing a data lake strategy can enhance and amplify existing investments and create new forms of business value.
Tags : 
data lake, data warehouse, enterprise data, migration, enterprise use, data lake strategy, business value, data management, data center
    
Teradata
Published By: Teradata     Published Date: Jan 30, 2015
Data from the Internet of Things makes an integrated data strategy more vital than ever.
Tags : 
teradata, internet, things, iot, data, warehouse, analytics, patchwork, value, development, integration, supply chain, inventory, sales, market demand, channel partners, deployment, hadoop, aster, discovery
    
Teradata
Published By: Logicalis     Published Date: Sep 23, 2013
Why You Should Reevaluate Your DR Strategy Today
Tags : 
logicalis, disaster recovery, dcaas, data center-as-a-service, dr strategy, it management
    
Logicalis
Published By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : 
ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends, it management, wireless, enterprise applications
    
MobileIron
Published By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : 
ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends, it management, wireless, enterprise applications
    
MobileIron
Published By: Dell EMC     Published Date: Aug 22, 2017
Data is the foundation of the digital economy, but managing data growth poses a big challenge as organizations ramp up cloud adoption. Whether your organization is adopting a hybrid cloud strategy or building modern apps in the cloud, there are many challenges that can limit your effectiveness. With Isilon CloudPools and ECS, you can take advantage of cloud capabilities without a disruptive time-consuming migration of your data. In this webinar, we’ll discuss how Dell EMC puts you in control with a flexible cloud design, allowing you to take an application-centric approach to your data platform.
Tags : 
    
Dell EMC
Published By: Mimecast     Published Date: Mar 19, 2019
An Executive Strategy Guide Brought To You By The Cyber Resilience Think Tank Big budget or not, CISOs must make threat intelligence a priority and learn how to focus on only the data that matters—data that will help mitigate future risks. Though the technical definition of threat intelligence may change depending on who you ask, one factor remains constant: If threat intelligence isn’t part of your cyber resilience strategy in some capacity, you have a massive gap on your hands. And you may be blindsided by a phishing attack, malware incident or worse. Read this Cyber Resilience Think Tank executive strategy guide to develop a plan to architect a threat intelligence program in your organization.
Tags : 
    
Mimecast
Published By: Dynatrace     Published Date: Jul 29, 2016
Gap free data helps you create and manage high-performing applications that deliver flawless end-user experience and customer loyalty. To be gap free, you must capture data from every single method in your application infrastructure, end-to-end, including timing and code-level context for all transactions, services and tiers, and make the data available for analysis. This eBook gives you technical and business case details that will show you why gap free data is a critical part of your application management strategy.
Tags : 
dynatrace, gap free data, applications, application performance, development, devops, application infrastructure, application performance management, user experience, application management, software development, enterprise applications, business technology
    
Dynatrace
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: Micron     Published Date: Oct 14, 2016
While software is essential to any big data strategy, it is not enough. Organizations must transform their infrastructure based on innovation in storage and memory to align with the increased need for faster, real-time decisions. Download this white paper to learn more.
Tags : 
    
Micron
Published By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : 
veracode, gartner, magic quadrant, application security testing, security, application security, enterprise applications, business technology
    
Veracode
Published By: Carbonite     Published Date: Aug 02, 2017
Every day, a new product launch promises speed, efficiency or savings for businesses eager to stay a step ahead. But if you’re an IT pro, and it’s your job to onboard the new system, the allure gives way to practical considerations: How are you going to move all that critical data—including dependencies, settings and custom configurations—from one system to another so it all talks to each other the way it’s supposed to? Whether you’re tackling a oneoff project or looking to improve your in-house skills, these eight tips for mastering migration will help you form a strategy, determine costs and find technical solutions to ensure successful migration no matter what platform you’re on or which one you’re moving to.
Tags : 
migration, technical solutions
    
Carbonite
Published By: Carbonite     Published Date: Oct 12, 2017
Today it is possible, even for smaller organizations, to establish both backup and full-fledged hybrid data protection under one robust onsite/offsite underpinning. ESG has four recommendations to assist such organizations as they try to pursue a disk-to-disk-to-cloud data protection strategy in the right way, with particular consideration for EVault by Carbonite.
Tags : 
evault, midsized businesses, data protection strategy, hybrid data protection, backup, recovery
    
Carbonite
Published By: RedPoint Global     Published Date: May 11, 2017
Marketing organizations are often limited in their ability to progress marketing tactics from single channel to cross-channel and real-time customer engagement. While marketing organizations might have a robust customer engagement strategy in place, often times there is a gap between their strategy and their ability to execute, with the right personalization and context that customers prefer. Over 62 percent of customers are always-on and readily addressable, but marketers aren’t implementing the right strategies to reach them. This eBook discusses data-driven marketing tactics that can help marketers mind the gap – bridging customer strategy and ability to execute, with the right personalization and context that customers prefer.
Tags : 
customer engagement, customer data, customer data platform, data quality, customer data management, customer experience, data-driven marketing
    
RedPoint Global
Published By: TIBCO Software     Published Date: Aug 14, 2018
According to Forrester Research, "Enterprise data virtualization has become critical to every organization in overcoming growing data challenges," with faster access to connected data, self-service, and agility among the many benefits seen. In this report, Forrester analyzes past research and Forrester Wave reports, user need assessments, and vendor and expert interviews to evaluate the offerings of top vendors in enterprise data virtualization. In compiling the vendor rankings, the report reviews the current offering, strategy, and market presence for the 13 most significant vendors. They discuss where TIBCO ranks in the evaluation and positions TIBCO Data Virtualization as a leader in enterprise data virtualization Read The Forrester Wave™: Enterprise Data Virtualization, Q4 2017 report to learn more.
Tags : 
    
TIBCO Software
Published By: Trifacta     Published Date: Nov 02, 2018
In the latest report, Forrester evaluated 10 top data preparation solutions against 18 criteria, grouped into categories of Current Offering, Strategy and Market Presence. See how each data prep provider compares and who received the highest scores. Download your copy today to review: What are the key technical differentiators for data preparation solutions Which user personas do data preparation solutions focus on Why ownership of data preparation is transitioning from IT to business end users
Tags : 
    
Trifacta
Published By: Attunity     Published Date: Jan 14, 2019
This whitepaper explores how to automate your data lake pipeline to address common challenges including how to prevent data lakes from devolving into useless data swamps and how to deliver analytics-ready data via automation. Read Increase Data Lake ROI with Streaming Data Pipelines to learn about: • Common data lake origins and challenges including integrating diverse data from multiple data source platforms, including lakes on premises and in the cloud. • Delivering real-time integration, with change data capture (CDC) technology that integrates live transactions with the data lake. • Rethinking the data lake with multi-stage methodology, continuous data ingestion and merging processes that assemble a historical data store. • Leveraging a scalable and autonomous streaming data pipeline to deliver analytics-ready data sets for better business insights. Read this Attunity whitepaper now to get ahead on your data lake strategy in 2019.
Tags : 
data lake, data pipeline, change data capture, data swamp, hybrid data integration, data ingestion, streaming data, real-time data, big data, hadoop, agile analytics, cloud data lake, cloud data warehouse, data lake ingestion, data ingestion
    
Attunity
Published By: Gigamon     Published Date: Dec 13, 2018
Read “How to Strengthen Security While Optimizing Network Performance” to see how next-generation network packet brokers (NGNPBs) mitigate security tool sprawl, simplify IT management and improve network availability. NGNPBs help align network and security teams by creating a single view of network infrastructure and data management. See why you should shift your infrastructure strategy toward NGNPBs to boost efficiency and reduce complexity. Learn more by reading this new research now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
Download “How to Strengthen Security While Optimizing Network Performance” to see how next-generation network packet brokers (NGNPBs) mitigate security tool sprawl, simplify IT management and improve network availability. NGNPBs help align network and security teams by creating a single view of network infrastructure and data management. See why you should shift your infrastructure strategy toward NGNPBs to boost efficiency and reduce complexity. Learn more by downloading this new research now.
Tags : 
    
Gigamon
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee