enterprise management system

Results 151 - 175 of 181Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 09, 2015
This white paper describes how an enterprise asset management system can help transit organizations efficiently address the challenges of infrastructure development, inner-city congestion, carbon emissions and regulatory compliance - while supporting more riders with a shrinking budget.
Tags : 
inner-city transportation, enterprise asset management system, asset management, infrastructure delevopment, it management, knowledge management, enterprise applications, data management
    
IBM
Published By: NetApp     Published Date: Jun 27, 2016
Enterprise applications are the lifeblood of IT. We rely on them for everything from optimizing manufacturing to tracking customer satisfaction. This paper examines the criteria for selecting flash storage in support of enterprise applications and makes recommendations based on the strengths of each flash system. Explore how to align enterprise application performance, management, and growth with business priorities through the use of connected flash storage systems.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Schneider Electric     Published Date: Jun 07, 2019
Because electricity is a key commodity for business it represents significant financial risk. Yet many power management systems remain isolated and separate from the rest of the business enterprise. The result is poor access to incomplete information, with only limited knowledge of risk exposure. An integrated, comprehensive power management system that includes metering, software, and power quality mitigation equipment offers the most holistic, systems-based approach to managing this risk exposure.
Tags : 
financial risk, power management system, quality migration, schneider electric, pms
    
Schneider Electric
Published By: Groundwork Open Source     Published Date: Aug 21, 2009
IT teams have long recognized that an enterprise-class IT management system is absolutely essential, especially given the mission-critical nature of most corporate IT networks. In order for robust IT monitoring and management functionality, they had no alternative but to use a proprietary solution. Download this white paper to learn about Open Source alternatives.
Tags : 
open source, network management, openview, open view, monitoring, open source network, open source networks, groundwork, groundwork open source
    
Groundwork Open Source
Published By: IBM     Published Date: Sep 18, 2008
When bound to regulation and compliance, process manufacturers find opportunities to grow through enterprise resource planning (ERP). However, 50% of process manufacturers execute non-integrated ERP strategies. This Aberdeen Group research study reveals best practices to help you adapt or select an ERP vendor that improves your business performance.
Tags : 
erp, enterprise resource planning, cindy jutras, process, process industry, chemical, food and beverage, food, beverage, pharmaceutical, pharma, best-in-class, material requirements planning, mrp, global competition, manufacturing process, microsoft dynamics, acsis, fullscope, traceability
    
IBM
Published By: IBM     Published Date: Jan 13, 2009
The rapid growth of Web-based initiatives means organizations need to manage large amounts of targeted data. Existing enterprise content management (ECM) systems can be integrated with IBM Lotus Web Content Management software to help align accurate information with the people who affect your business. This white paper explains how.
Tags : 
ibm, web content management, enterprise content management, ecm, ibm lotus, knowledge management, enterprise applications
    
IBM
Published By: Indicative Software     Published Date: Aug 24, 2007
Learn about agent-based versus agentless monitoring approaches to enterprise management, and how a combination of data collection technologies can realize the benefits of both.
Tags : 
enterprise management, enterprise monitoring, data collection, data collection engines, agent-based monitoring, agentless monitoring, performance monitoring, application performance, synthetic monitoring, passive monitoring, active monitoring, service level management, service management, systems management, indicative
    
Indicative Software
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
CCU sought to encrypt its backup tapes for keeping customer data secure in transit and in storage at the offsite tape-vault vendor’s facility. As a financial institution, CCU was subject to stringent government regulations. With nearly 60 gigabytes of data to encrypt each night, CCU knew that a software solution was out of the question.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Given Payformance’s longstanding commitment to protecting the privacy of its clients’ information, the company has decided to investigate data encryption solutions for its primary hard drive storage and secondary backup tape storage. With its multi-vendor interoperability, NeoScale’s CryptoStor storage security appliances emerge as the obvious choice.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Qsent needed to shore up its disaster recovery strategy. This meant sending backup tapes – each with more than 2.5 terabytes of data – between data centers and storing them offsite. To keep all its data safe and secure, Qsent chose NeoScale’s CryptoStor wire-speed tape security appliance to encrypt and decrypt data.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
With horror stories in the news every week about lost or stolen laptops and backup tapes, the senior management team at Oregon Community Credit Union knew they had to do everything within their powers to protect their critical data as it traveled offsite to a third-party tape vaulting vendor. They were tasked with finding an affordable solution that would strike a balance between security, ease of use, and scalability.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
As more states pass regulations governing the security, confidentiality, and integrity of customer data, a leading national bank has recognized its need to ensure the safety and security of personal data for its thousands of customers. To ensure compliance and maintain the security of this information, the bank has deployed NeoScale’s CryptoStor Tape appliances to help accomplish its objectives.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Lawson     Published Date: Jun 23, 2008
Lawson Enterprise Asset Management is a software solution specifically designed to help improve the reliability and availability of your critical assets. It can help you to maximize your profitability and return on your asset investment during every stage of the asset lifecycle. It can also be easily integrated with your other business operations and systems.
Tags : 
erp, eam, lawson, manufacturing, enterprise asset management
    
Lawson
Published By: HP - Enterprise     Published Date: Jun 05, 2013
The term “network management” encompasses a broad range of solutions from single point products to element managers to large enterprise-class solutions. For the purpose of this ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) report, the term Enterprise Network Management Systems (ENMS) includes network-centric management solutions that are used by large organizations’ operations and engineering teams to discover, monitor, assess, troubleshoot, and generally maintain highly distributed enterprise networks. For this EMA™ Radar, the focus was put specifically on core capabilities and features primarily associated with network operations’ need to ensure health and availability of the network. Supporting functional capabilities such as performance monitoring, configuration management, asset management, as well as integrated management of connected non-network devices were also considered, but as non-critical (albeit helpful/valuable) extensions.
Tags : 
ema radar, network management, systems, network, management
    
HP - Enterprise
Published By: BlueVolt     Published Date: May 04, 2012
It's a Dog-Eat-Company world so maximizing your partner connections is important to your organization's success. Read the Maximizing your Partner Connections: The Role of your Online Presence in Reaching Your Market white paper from BlueVolt to learn how to optimize your extended enterprise.
Tags : 
bluevolt, extended enterprise, lms, learning management system, channel, training
    
BlueVolt
Published By: SAS     Published Date: Aug 04, 2016
Banks have been using credit scoring models for over five decades, so managing the life cycle of models is nothing new. Most have had some kind of process in place to ensure the models they develop are robust, validated and monitored from a performance perspective and that decision makers have confidence in them. In recent times, however - partly in response to the credit crisis in 2008 - the discipline of model risk management (MRM) has become more formalized and rigorous, driving the need for enterprise-level model information management systems. The regulatory scrutiny being applied to them is intensifying and spreading globally, with US and European regulators leading the charge. For example, whereas regulators were previously more interested in the numbers they were provided, now more regulators want to have a core understanding of the models banks used to generate these numbers.
Tags : 
best practices, risk management, finance, security, info systems
    
SAS
Published By: MarkLogic     Published Date: Dec 03, 2014
So many people are realising that yesterday’s technology can’t support today’s fast-changing data and are turning to a new generation of database: NoSQL. NoSQL makes it easy to consolidate your heterogeneous data and consolidate disparate data silos because you don’t need to make data conform to the row-and-column restrictions of relational technology. Get a head start and download Enterprise NoSQL for Dummies and discover: • The NoSQL lingo • What it does and how it works • How it can be used • Tips for what to look for in an Enterprise NoSQL database Go beyond relational and learn how NoSQL allows you to build applications with greater ease and speed! http://info.marklogic.com/nosql-for-dummies.html
Tags : 
enterprise, nosql, relational, databases, data storage, management system, application, scalable, enterprise applications, data management
    
MarkLogic
Published By: MobileIron     Published Date: Mar 21, 2017
Modern enterprises are rapidly shifting core business processes away from legacy technologies and standardizing on mobile devices and cloud services. As a result, these organizations are quickly outgrowing basic mobile device management (MDM) capabilities and apps like email and calendar. Building a secure mobile and cloud architecture now requires a comprehensive approach to enterprise mobility management (EMM). It requires a unified platform with defense-grade security, massive scalability, a broad ecosystem of technology partners, enhanced Office 365 security, and integrated desktop and mobile management. And it has to provide all of this without locking customers into a proprietary technology stack.
Tags : 
    
MobileIron
Published By: VMware AirWatch     Published Date: Nov 12, 2015
Historically in the enterprise, Macs have been managed separately from iOS devices in separate consoles, sometimes by different groups within IT. Traditional domain-joined management posed several problems for today’s modern enterprise. Nowadays, managing Macs like mobile devices means they can be configured over the air, without ever having to be domain-joined. That’s a major plus for global organizations, remote workers and companies who use contractors or freelancers. Unifying parallel device environments enables streamlined oversight, management and distribution of content across Macs and iOS devices. With AirWatch® Enterprise Mobility Management, IT can implement a BYOD program and policy for all device types, ensuring personal information remains private. IT has a consistent management experience for all device types and operating systems, enabling a single-pane-of-glass view of all endpoints in an enterprise.
Tags : 
vmware, emm, mac management, managing macs, airwatch, it management, wireless, data management, business technology
    
VMware AirWatch
Published By: SAP     Published Date: May 03, 2016
Indiana's Management and Performance Hub (MPH) program has developed a comprehensive, enterprise-wide, data-driven management system to help gain insight into the drug abuse crisis. Indiana MPH staff is tackling the issue using crime lab drug data from across the state to see new correlations in drug use over time and find insight into crime.
Tags : 
sap, indiana, government, analytics, predictive analytics, hana, digital, data management
    
SAP
Published By: Jamf     Published Date: Mar 13, 2018
The word is out. Apple has officially arrived in the enterprise. Once thought of as only for consumers, Apple has not so quietly created a $25 billion enterprise business — with no signs of slowing. If you want to join the Apple at work movement, but have questions yourself about security best practices or, more likely, need to alleviate the security concerns of your executives or information security team, we can help. Topics covered include: • How the Apple ecosystem is structured • How Apple management differs from Windows • What security features are unique to the Apple ecosystem • What to consider when adding new Apple devices • What Apple integrations are available to leverage what you already have
Tags : 
    
Jamf
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: OnBase by Hyland     Published Date: May 16, 2017
The role of enterprise content management (ECM) as a centralized document repository is well established. However, the value of ECM increases exponentially when it is leveraged as an information hub between line-of-business (LOB) systems to facilitate key processes, keep data in sync and maximize investments in existing applications.
Tags : 
hyland, ecm, document repository, enterprise information hub, automated business processes
    
OnBase by Hyland
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee