micro

Results 351 - 375 of 1666Sort Results By: Published Date | Title | Company Name
Published By: Intel     Published Date: Apr 16, 2019
Gartner predicts that the public cloud market will surpass USD 300 billion by 2021 . With the big players (Amazon, Google, Microsoft and IBM) taking home 63 percent of the market share , how will next wave CSPs stand out from the crowd? Download Intel's latest whitepaper, Differentiating for Success: A Guide for Cloud Service Providers' to discover how to offer unique services, including: - Providing workload-specific optimizations, for example machine learning or high-performance computing - Targeting a particular geographical area - Focusing on an industry, such as financial services - Delivering emerging technology, such as virtual reality, in-memory databases, and containerization
Tags : 
    
Intel
Published By: Trend Micro     Published Date: Feb 01, 2013
This whitepaper will explore the anatomy of targeted attacks: the inner workings of the APT lifecycle. It will also provide an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks. Deep Discovery is at the heart of the Trend Micro Custom Defense solution against targeted attacks.
Tags : 
advanced persistent, threat challenge, custom defense solution, trend micro, risk management
    
Trend Micro
Published By: Trend Micro     Published Date: Feb 01, 2013
Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a point solution but rather a combination of technologies and core competencies. Detecting and responding to advanced threats should involve tight integration of multiple security technologies, network analysis and visibility (NAV) tools, the ability to automatically generate content such as security rules and signatures, context on attacker history, and overall customization and flexibility to ensure that the solution is fine-tuned for your specific IT environment.
Tags : 
security, advance threat detection, nav
    
Trend Micro
Published By: Trend Micro     Published Date: Jul 08, 2013
Superior Detection with Trend Micro Custom Defense
Tags : 
apt, c&c, communication, apts, defense, trend micro
    
Trend Micro
Published By: Entrust Datacard     Published Date: Jun 09, 2017
The rapid adoption of Office 365 means that work created using the Microsoft product contains a large amount of the business world’s sensitive information. In fact, in most enterprises using Office 365, more than half of that highly valuable information — including business plans, sales data, product designs, M&A details and financial forecasts — is contained within Excel, PowerPoint, Word, Outlook and other Microsoft software. Securing the information created with its products has emerged as a primary concern for CSOs, CIOs, IT departments and other C-level executives.
Tags : 
    
Entrust Datacard
Published By: Citrix Systems     Published Date: Sep 17, 2015
While the Google Chrome platform is ideal for accessing Google Apps, SaaS and other cloud-based services, Microsoft Windows applications continue to play an essential role in most organizations. Read this paper to learn more.
Tags : 
google chrome, windows, cloud, microsoft, software development, business technology
    
Citrix Systems
Published By: Dell & Microsoft     Published Date: Jul 23, 2013
As small businesses grow, many reach a point when their computing systems falter. A company with only a handful of employees can usually get by with disconnected computers and software packages. But as you add desktops, laptops and other devices to support an increasing headcount, the system can become so cumbersome that productivity and customer service start to suffer.
Tags : 
benefits, server, small business, it management
    
Dell & Microsoft
Published By: Dell & Microsoft     Published Date: Jul 23, 2013
A server can help you run your small business more efficiently and make your data more secure.
Tags : 
efficiency, data, security, server, solutions, software development, it management
    
Dell & Microsoft
Published By: Dell & Microsoft     Published Date: Jul 23, 2013
Buying a server is a logical step for many companies that want to better organize their data and improve access to shared resources.
Tags : 
server, data, organize, shared resources, small business, security, software development
    
Dell & Microsoft
Published By: Dell & Microsoft     Published Date: Jul 23, 2013
Help streamline workflow and improve employee productivity by choosing the server that best suits your company’s needs.
Tags : 
workflow, employee productivity, server, software development, knowledge management, enterprise applications
    
Dell & Microsoft
Published By: Microsoft     Published Date: Nov 08, 2013
Learn how Forrester researched Microsoft’s Application Lifecycle Management and found that it increases productivity, lowers costs, and creates more agile IT organizations.
Tags : 
microsoft, application lifecycle management, increase roi, cutting development cycles, microsoft alm, increase productivity, create agile it organization, forrester consulting, financial impact, cycle time reductions, owner productivity, business application productivity
    
Microsoft
Published By: Microsoft     Published Date: Nov 08, 2013
Find out why developers increasingly choose .NET to create new applications faster and more efficiently and why it offers the clearest path from the client/server world to the emerging device/cloud world.
Tags : 
microsoft, develop better applications, technology guide, business applications, application patterns, devices, web applications, native applications, data-centric business, microsoft office, microsoft sharepoint, mission-critical enterprise, business processes, bring-your-own-device, line-of-business, .net framework
    
Microsoft
Published By: Polycom     Published Date: Mar 07, 2018
The combination of Skype for Business and Polycom systems provides a scalable solution suitable for businesses of different sizes. There are different Skype for Business packages and Polycom systems available to suit any budget or collaboration requirement. These solutions can provide a flexible infrastructure for meetings of two people or events of up to 10,000 participants located anywhere in the world. Skype for Business offers a clear migration path from Microsoft Lync or Skype to protect investment for organizations with existing installations. For growing businesses or organizations that are new to collaboration, the partnership of Skype for Business and Polycom provides the portfolio and the flexibility to add features and services to suit changing collaboration needs or scale capacity in line with business growth.
Tags : 
skype, business, polycom, infrastructure, meeting, enterprise
    
Polycom
Published By: Polycom     Published Date: Mar 12, 2018
Learn how one organization with Polycom voice devices and Microsoft Office 365 realized a 109% risk-adjusted ROI and benefits of $1.6M over three years. By deploying Polycom voice solutions for Microsoft Office 365, an engineering firm was able to realize: $1.6M in total risk-adjusted benefits $1M in incremental revenue with more billable hours $537k in improved productivity $74k in phone purchase and installation cost savings $14k in employee relocation cost savings Learn more about the business benefits and cost savings attributed to Polycom voice solutions for Microsoft Office 365. The Total Economic Impact Of Polycom Solutions For Microsoft Office 365, a commissioned September 2016 study conducted by Forrester Consulting on behalf of Polycom and Microsoft.
Tags : 
economic, impact, polycom, solutions, microsoft, optimization, organization
    
Polycom
Published By: Intel Security     Published Date: Oct 21, 2015
This solution brief discusses three migration paths and how to choose the best one for your situation.
Tags : 
windows server 2003, w2k3, microsoft eol, microsoft eos, server security, server protection, data center, networking, security, data management
    
Intel Security
Published By: Intel Security     Published Date: Oct 21, 2015
Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.
Tags : 
mcafee, intel, encryption, apple, filevault, microsoft, bitlocker, security, enterprise applications
    
Intel Security
Published By: MobileIron     Published Date: May 07, 2018
Office 365, Microsoft’s cloud-based productivity suite, includes online versions of Microsoft’s most popular solutions, like Exchange and SharePoint, storage through OneDrive, and several mobile apps, including Word, Excel, PowerPoint, OneNote, Outlook, Publisher, and Skype for Business. Office 365 is central to Microsoft’s strategy as the company evolves into a mobile-first, cloud-first software and solutions provider. Many MobileIron customers are increasingly using Office 365 on mobile devices instead of on traditional PCs. Therefore the ability to secure and deploy Office 365 on mobile devices using MobileIron is a common requirement.
Tags : 
security, office, 365, mobileiron, microsoft, cloud, onedrive, business
    
MobileIron
Published By: Microsoft Azure     Published Date: Jun 14, 2018
Your critical applications need to get the most out of your data. In just a few minutes, find out where your data platform maturity stands, and get business recommendations to modernize.
Tags : 
    
Microsoft Azure
Published By: K2     Published Date: Aug 24, 2015
This white paper follows the story of Kim, head of the IT department for a large financial-services company, as she navigates the transition from Microsoft SharePoint 2010 to SharePoint 2013. Kim can’t wait to use the latest SharePoint technology, but she also knows she’ll need a third-party solution to expand the capabilities of SharePoint. She needs a solution that helps increase mobility, flexibility and collaboration between departments within her company.
Tags : 
    
K2
Published By: K2     Published Date: Aug 24, 2015
Microsoft SharePoint 2013 workflows are a powerful way to share information, collaborate on projects and automate business processes. However, in addition to the basic workflow capabilities that come with SharePoint, organizations also need sophisticated, reliable SharePoint workflow apps with advanced capabilities. Since custom code can be expensive and time-consuming, and customization options are limited in cloud-hosted SharePoint environments, third-party applications make it possible to build advanced SharePoint workflow applications without dealing with the challenges of custom code. To help you evaluate third-party workflow solutions, here are 10 tips to consider.
Tags : 
    
K2
Published By: K2     Published Date: Oct 08, 2015
Read more to learn why the K2 AppIt for SharePoint outperforms other solutions.
Tags : 
    
K2
Published By: Mimecast     Published Date: May 31, 2018
Protect Your Office 365 Investment - Choose The Right Third-Party Email Security Solution Why should you consider additional security protection around Microsoft Office 365TM email? And, what should you look for in a third-party solution? TechTarget has the answers in this brief, Remedying the Email Security Gaps in Microsoft Office 365. Learn about the key features and functions that you need to protect your investment, how to choose the right email security solution, and how one organization successfully navigated its way to highly satisfactory, reliable third-party solutions for enhancing Office 365 email security.
Tags : 
    
Mimecast
Published By: MuleSoft     Published Date: Sep 08, 2016
Today's business environment is extraordinarily competitive. No company, no matter its size or what industry it is in is safe from disruption. It is easier than ever for new entrants to come into a market, turning entire industries upside down. Unless organizations can nimbly innovate at the speed of their competition, they will be left behind, and large organizations with calcified processes and structures will be hit the hardest.
Tags : 
mulesoft, microservices, digital transformation, business value, it support
    
MuleSoft
Published By: MuleSoft     Published Date: Sep 08, 2016
Enterprises are adopting more and more SaaS applications and customers are interacting with companies from an increasing number of channels. Many companies are not ready to provide the level of engagement, service and support their customers demand. New applications are added to the company’s ecosystem, but not connected with the existing applications. Customer data is inconsistent and not synced across a customer’s lifecycle.
Tags : 
mulesoft, microservices, digital transformation, business value, it support
    
MuleSoft
Published By: Genesys     Published Date: Feb 21, 2018
Artificial Intelligence (AI) is staggering in its speed of handling simple requests and automating conversations. But AI solutions are not enough for the best customer experiences. Human emotions sometimes demand the human touch that only live agents can provide. Kate, Customer Experience AI by Genesys, combined with the power of human touch can improve customer experience, empower employees and dramatically reduce costs. This seamless combination of AI technology and humans, or “Blended AI by Genesys,” addresses the entire customer journey for the best possible outcomes. Download the eBook and learn how Kate and Blended AI lets you: • Personalize self-service • Connect customer conversations • Create smart agent experiences • Start small and deploy fast with MicroApps
Tags : 
artificial intelligence, customer experience, automation, genesys
    
Genesys
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee