users

Results 126 - 150 of 1835Sort Results By: Published Date | Title | Company Name
Published By: Lenovo UK     Published Date: May 15, 2019
With one laptop stolen every minute, how do you balance the security threat against the rising need for workforce mobility and enhanced productivity? With ThinkPad powered by Intel® Core™ i7 vPro™ processors, you benefit from Lenovo’s 360 approach to security. Plus the durability to keep your users moving and productive at every stage of their working day. Learn more in our infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside, and Intel Optane are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, security, productivity
    
Lenovo UK
Published By: HP Inc.     Published Date: May 20, 2019
HP SmartStream Designer is a powerful, easy-to-use variable data printing (VDP) tool enabling users of HP Indigo and other HP digital presses to create sophisticated high-value jobs and personalized campaigns. A software plug-in for Adobe® InDesign® or Adobe Illustrator®, HP SmartStream Designer makes it possible to personalize any job with images, text and designs, for maximum impact. It has an easy to-use interface and can be easily integrated with over a dozen third-party dynamic applications. It also features rich database logic and preflight capabilities.
Tags : 
    
HP Inc.
Published By: Limelight Network     Published Date: Aug 12, 2019
Live streaming is attracting viewers online to watch major sports events, play games, participate remotely in educational opportunities, and bid at live auctions. But today, the latency of online video stream delivery is typically too long to provide the viewing experience users expect, resulting in unhappy viewers and lost revenue. Fortunately, new live streaming technology makes it possible to deliver live streams in less than a second, enabling exciting new experiences that engage viewers in multiple ways. For organizations that need to distribute live streams, it’s about increasing audience size and revenue. For viewers, watching streams in realtime with interactive data integrated with the live video enables new possibilities for how they can interact with you and each other. Read this brief to learn how sub-second latency streaming enables new business opportunities by making live viewing a more interactive social experience.
Tags : 
    
Limelight Network
Published By: Limelight Network     Published Date: Aug 12, 2019
Why do so many companies turn to a Content Delivery Network (CDN) to deliver their online videos, websites, and downloads? It’s simple: The core benefits of a CDN directly improve customer experiences. End-users get the content they want quickly and reliably with better quality, wherever they are located. More satisfied customers help the organization increase revenue and customer loyalty.
Tags : 
    
Limelight Network
Published By: MobileIron     Published Date: Feb 17, 2015
The personal cloud is the most persistent data loss threat to the enterprise today because many employees use their own cloud services to store work documents. Traditionally, content security solutions functionally link security and storage which requires the migration of work documents to a new content storage repository in order to enforce security policies. This increases complexity by creating more repositories for the enterprise to manage. Most importantly, this approach does not solve the personal cloud problem because individual users continue to store their work documents, for convenience, in cloud services that IT cannot secure.
Tags : 
cloud, mobileiron, mobile, security
    
MobileIron
Published By: Akamai Technologies     Published Date: Dec 11, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 11, 2018
Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware.
Tags : 
    
Akamai Technologies
Published By: Dell     Published Date: Feb 23, 2017
Windows 10 brings significant changes for all users to the way the OS will be serviced and updated by Microsoft. End-user computing managers dealing with planning and implementing updates will need to revisit their processes to match the new update cadence. Download this Gartner report to learn more.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: Nov 02, 2015
To help users achieve these goals and attain greater simplicity, efficiency and versatility in ROBO sites, Dell engineered the PowerEdge VRTX shared infrastructure platform. Download this white paper to learn more about Dell PowerEdge VRTX.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 11, 2016
No matter your line of business, technology implemented four years ago is likely near its end of life and may be underperforming as more users and more strenuous workloads stretch your resources thin. Adding memory and upgrading processors won't provide the same benefits to your infrastructure as a consolidation and upgrade can. Read this research report to learn how upgrading to Dell's PowerEdge VRTX with Hyper-V virtualization, Microsoft Windows Server 2012 R2, and Microsoft SQL Server 2014 could reduce costs while delivering better performance than trying to maintain aging hardware and software.
Tags : 
    
Dell EMC
Published By: TIBCO Software     Published Date: Jan 17, 2019
Over the past decade, businesses have made tremendous investments in information capture, storage, and analysis. But having a wealth of data isn’t the same as having valuable information. Data Virtualization products and services provide a way to turn your data stores into valuable information that improves decision-making and propels experimentation and innovation. This paper explains: What data virtualization is and its benefits When and when not to use data virtualization How to deploy data virtualization to benefit your business How to unlock the value of your SAP data
Tags : 
virtualization, data, users, analytics, sql, application, access, directory
    
TIBCO Software
Published By: TIBCO Software     Published Date: Jan 17, 2019
Over the past decade, businesses have made tremendous investments in information capture, storage, and analysis. But having a wealth of data isn’t the same as having valuable information. TIBCO® Data Virtualization products and services provide a way to turn your data stores into valuable information that improves decision-making and propels experimentation and innovation. This paper explains: •?What data virtualization is and its benefits •?When and when not to use data virtualization •?How to deploy data virtualization to benefit your business
Tags : 
virtualization, data, users, analytics, sql, application, access, directory
    
TIBCO Software
Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
dns, phishing, malware, ransomware, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Enterprises use data virtualization software such as TIBCO® Data Virtualization to reduce data bottlenecks so more insights can be delivered for better business outcomes. For developers, data virtualization allows applications to access and use data without needing to know its technical details, such as how it is formatted or where it is physically located. For developers, data virtualization helps rapidly create reusable data services that access and transform data and deliver data analytics with even heavylifting reads completed quickly, securely, and with high performance. These data services can then be coalesced into a common data layer that can support a wide range of analytic and applications use cases. Data engineers and analytics development teams are big data virtualization users, with Gartner predicting over 50% of these teams adopting the technology by 202
Tags : 
    
TIBCO Software GmbH
Published By: CA Technologies     Published Date: Oct 22, 2014
This paper presented by Ponemon Institute provides its research findings into The Identity Imperative for the Open Enterprise: What IT Users and Business Users Think about Bring Your Own Identity (BYOID).
Tags : 
byoid, security, byoid strategy, it and business views on byoid, bring your own identity, it management
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 22, 2014
This paper provides findings and statistics on users demands and an important list of 5 ways to satisfy both business and user demands for IT Service.
Tags : 
cloud service management
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 22, 2014
This paper provides findings and statistics on users demands and an important list of 5 ways to satisfy both business and user demands for IT Service.
Tags : 
cloud service management
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 22, 2014
This paper provides findings and statistics on users demands and an important list of 5 ways to satisfy both business and user demands for IT Service.
Tags : 
cloud service management
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 22, 2014
This paper provides findings and statistics on users demands and an important list of 5 ways to satisfy both business and user demands for IT Service.
Tags : 
cloud service management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 09, 2015
This survey provides information on the level of interest in BYOID that IT users and Business Users have. The majority of respondents in both groups have high levels of interest in BYOID, but IT users and business user groups have different views about the perceived potential value of BYOID.
Tags : 
byod, identity, byoid benefits
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 09, 2015
This white paper focuses on how the new trends impacting business today (cloud adoption, increased mobility, rise of social media and the increased amount of online data sharing) make the need for strong authentication more important than ever.
Tags : 
authentication, security, risk-based authentication
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee