points

Results 326 - 350 of 735Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Jun 16, 2014
There are many situations where having the option to scale the same enterprise storage out, up or both is a better way forward than continuing to rely on the traditional scale up model. In this report the Evaluator Group compares the approaches and points out the significant operational and economic advantages of the new scale out paradigms.
Tags : 
netapp, clustered storage, storage systems, evaluating systems, modular storage, it management, data center
    
NetApp
Published By: NetApp     Published Date: Jun 19, 2014
There are many situations where having the option to scale the same enterprise storage out, up or both is a better way forward than continuing to rely on the traditional scale up model. In this report the Evaluator Group compares the approaches and points out the significant operational and economic advantages of the new scale out paradigms.
Tags : 
netapp, clustered storage, storage systems, evaluating systems, modular storage, it management, data center
    
NetApp
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understanding—and Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Challenge Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure. Opportunity Knowing your privileged users is knowing your risk. Privileged access management tools themselves must be able to support automation in the authorization process and enable scalability through support for both dynamic operations and ephemeral infrastructure. Benefits Better pinpointing attacks exploiting credential theft isn’t simply a question of accumulating more data but involves incorporating better data about privileged user behaviour, which can identify significant changes that represent real risk.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Défi Les organisations engagées dans un processus de transformation numérique sont davantage préoccupées par des questions liées au risque et à la sécurité, ce qui n’a rien de surprenant. Les initiatives de transformation numérique entraînent inévitablement une augmentation du nombre de points d’accès à l’infrastructure de l’entreprise qui se situent en dehors des contrôles existants et sont accessibles par des identités plus nombreuses et plus variées qui prolifèrent à l’intérieur d’une infrastructure distribuée et dynamique. Solution Connaître vos utilisateurs privilégiés, c’est connaître vos risques. Les outils de gestion des accès à forts privilèges doivent eux-mêmes être en mesure de supporter l’automatisation du processus d’autorisation et permettre l’évolutivité grâce à la prise en charge des opérations dynamiques et de l’infrastructure éphémère, comme les comptes d’administration AWS (Amazon Web Services) pour les identités humaines.
Tags : 
    
CA Technologies EMEA
Published By: Trend Micro     Published Date: May 03, 2018
Skills and resources — these are the two elements that make up an attacker’s arsenal. An attacker, however, cannot set out to break security or even perform sophisticated attacks without finding weak points in a system first. Massive malware attacks, email-borne heists, hacked devices, and disrupted services — all of these require a vulnerability in the network, whether in the form of technology or people, in order to be pulled off. Trend Micro has looked into the current and emerging threats, as well as the security approaches tailored for the landscape. Read on to find out how to make informed decisions with regard to the security focus areas that will figure prominently in 2018.
Tags : 
    
Trend Micro
Published By: Trend Micro     Published Date: May 03, 2018
Osterman Research wants to make it clear at the outset that we believe Microsoft Office 365 to be a robust and capable platform, one that will serve most organizations well. If your organization is using Office 365, we recommend you continue to do so. If you’re not using it, we recommend you consider it. Microsoft offers a large, varied and growing number of features and functions in Office 365, and at a wide range of price points that will satisfy different markets. Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery (among others) covering workloads like Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, and Azure Active Directory. An awareness of these shortcomings enables decision makers to plan for the mitigations required to assure the proper business performance of Office 365.
Tags : 
    
Trend Micro
Published By: Trend Micro     Published Date: May 03, 2018
Since the early days of the Gartner Magic Quadrant for this category, there have been successive waves of innovation. Back in 2002, integrated firewalls captured the market’s (and Gartner’s) attention. Over the years, we’ve seen technologies, such as full disk encryption, data loss prevention (DLP), behavioral detection, application control, and more recently, machine learning, as effective new ways to protect endpoints, detect threats and give security teams peace of mind. Trend Micro has consistently been part of these innovation waves. It’s clear that the market is excited about Endpoint Detection & Response (EDR). There are two drivers for this, and we are committed to delivering effective solutions in both areas.
Tags : 
    
Trend Micro
Published By: Riverbed     Published Date: Apr 24, 2015
Read this white paper to learn how to: • Architect an integrated WAN to support evolving application deployment models using the Internet in concert with MPLS. • Create a WAN solution that can optimize traffic flows between the Internet and the MPLS for all applications and between both internal and external users. • Deploy a solution across all independent network services that can monitor, report, control and optimize end-to-end path forwarding for all endpoints.
Tags : 
enterprise wan, integrated wan, public cloud services, connectivity, application performance, networking, software development, it management, wireless
    
Riverbed
Published By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in government’s expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
    
Panasonic
Published By: Aprimo     Published Date: May 01, 2012
The explosion of digital channels is creating a widening gap between classic single click attribution and the reality that marketers face when planning cross-channel campaigns with multiple touch points across many digital screens. This Aprimo White Paper will demonstrate some of the ways marketers can transform attribution and better manage marketing spend, improve planning and enhance the customer journey.
Tags : 
aprimo, marketing, customer relations, crm, customer satisfaction, customer data, marketing strategy
    
Aprimo
Published By: Oracle     Published Date: Aug 31, 2016
This webinar discusses details of Oracle's servers designed for cloud and scale-out, which provide security by default, better core efficiency for cloud apps, and accelerate data analytics at X86 commodity cost points.
Tags : 
    
Oracle
Published By: Adaptive Growth     Published Date: Feb 25, 2008
In what practical ways – if any – is ERP implementation project success different from the absence of failure? Both casual and thorough analysis of ERP failure agree on several interesting points.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth
Published By: HP Data Center     Published Date: Apr 16, 2009
This paper examines both the centralized WLAN switch architecture and the optimized WLAN architecture, so that the wireless network choice an organization makes today will protect its investment and allow it to experience the substantial benefits of 802.11 for years to come.
Tags : 
hp data center, 802.11n, architectural evolution, wlan, lan, scalability, collaboration, wireless, wireless networks, high-bandwidth, access points, aps, quality of service, qos, rf configuration, infrastructure, lan backbone, bottleneck, hp procurve, network architecture
    
HP Data Center
Published By: Citrix Systems     Published Date: Apr 15, 2015
Not all VDI solutions are alike. To deliver the best results for your business, you need to make sure the solution you choose can enable full productivity not just in the office on traditional endpoints, but anywhere people work, on any device they use. With Citrix XenDesktop, you can provide access to virtualized apps and desktops from anywhere, on any device, with a great experience in any scenario.
Tags : 
citrix, desktop virtualization, efficiency, virtualization, mobile computing
    
Citrix Systems
Published By: Citrix Systems     Published Date: Apr 15, 2016
With faster adoption rates than any other upgrade, Windows® 10 is breaking records—and it’s poised to accelerate. In fact, Gartner predicts that 50% of businesses will be on their way to Windows 10 by early 2017—and 100% by 2019. Businesses of all sizes need an IT strategy that maintains employee productivity and business continuity without the worry of app compatibility issues or OS instability across differing end points. The time to upgrade to Windows 10 is now.
Tags : 
citrix, windows, windows 10, upgrade, productivity, enterprise applications, business technology
    
Citrix Systems
Published By: LogMeIn     Published Date: Sep 16, 2014
This InfoWorld research report, based on an IDG QuickPulse survey administered to IT professionals, will provide insight into the BYOA trend, identify pain points associated with traditional online meeting tools, and address business-driven IT requirements that benefit the overall organization.
Tags : 
byoa trend, logmein, joinme, online meetings, painpoints with online meetings, problems with online meetings
    
LogMeIn
Published By: LogMeIn     Published Date: Sep 16, 2014
This InfoWorld research report, based on an IDG QuickPulse survey administered to IT professionals, will provide insight into the BYOA trend, identify pain points associated with traditional online meeting tools, and address business-driven IT requirements that benefit the overall organization.
Tags : 
byoa trend, logmein, joinme, online meetings, painpoints with online meetings, problems with online meetings, business technology
    
LogMeIn
Published By: LogMeIn     Published Date: Oct 10, 2014
This report outlines the business value and best practices of integrating the contact center with omni-channel programs in order to deliver a seamless customer experience across multiple touch-points.
Tags : 
logmein customer service technology, intergrated contact center, customer experiences, customer technology, contact center
    
LogMeIn
Published By: LogMeIn     Published Date: Jan 12, 2015
This quarterly insight into customer engagement strategy focuses on the cost of not having live chat, 5 points to consider for Live Chat and provides the 3 key takeaways for businesses to consider when trying to reduce cart abandonment
Tags : 
live chat, logmein boldchat, effectiveness of live chat
    
LogMeIn
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout
Published By: Merkle     Published Date: Oct 19, 2012
As media and channels proliferate with the upsurge in digital touchpoints, we have access to massive volumes of customer data. This leads to the personalization of customer interactions that drive customer strategy as a business strategy.
Tags : 
brand experience, customer experience, customer insights, communication management, marketing accountability, roi, data management, customer centricity, crm, buying behaviors, segmentation, customer lifecycle, integrated, customer solutions, target segmented customers, measurement, marketing strategy, competitive advantage, business strategy, customer value
    
Merkle
Published By: Merkle     Published Date: Oct 19, 2012
An effective marketing investment strategy will help you take inventory of your current measurement framework and develop a more accurate, reliable and consistent strategy for assessing and improving the performance of your marketing spend.
Tags : 
marketing accountability, roi, data management, customer centricity, crm, buying behaviors, segmentation, customer lifecycle, integrated, customer solutions, target segmented customers, marketing measurement, marketing strategy, competitive advantage, business strategy, customer value, optimization, integrated marketing strategies, integrated, customer experience
    
Merkle
Published By: vCom Solutions     Published Date: Nov 09, 2012
This research brief will show pain points mid-sized organizations face in managing their telecom expenses and provide Best-in-Class recommendations identified from 348 organizations over the past 18 months.
Tags : 
telecom lifecycle management, telecom, tlm, business technology
    
vCom Solutions
Published By: CDW     Published Date: Jun 18, 2013
It’s an ever-evolving world of operating systems. Endless endpoints. Many media-rich applications. Bottlenecks and limited bandwidth.
Tags : 
cdw, red report, mobile technology, security
    
CDW
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee