data organization

Results 1376 - 1400 of 1443Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: Nov 12, 2018
If your organization runs VMware vSphere-based cloud infrastructure in your on-premises data center, but you have been reluctant to migrate applications to the cloud for fear of losing some VMware vSphere-based cloud capabilities, VMware Cloud on AWS solves this problem by seamlessly integrating your familiar VMware virtualization and cloud management tools with Amazon Web Services (AWS). Many organizations believe that moving their applications to the cloud makes it necessary to introduce new tools, skills, and processes. This can present a new set of challenges because learning to use new tools, applying new skills, and adapting to new processes can be costly and time-consuming. In this eBook, we dive deeper into how these challenges can hinder hybrid cloud adoption and cover how VMware Cloud on AWS can help your organization overcome these challenges. Join our webinar to learn The benefits of Disaster Recovery-as-a-Service (DRaaS), delivering on-site protection. How automated or
Tags : 
    
AWS
Published By: AWS     Published Date: Nov 12, 2018
If your organization runs VMware vSphere-based cloud infrastructure in your on-premises data center, but you have been reluctant to migrate applications to the cloud for fear of losing some VMware vSphere-based cloud capabilities, VMware Cloud on AWS solves this problem by seamlessly integrating your familiar VMware virtualization and cloud management tools with Amazon Web Services (AWS). Many organizations believe that moving their applications to the cloud makes it necessary to introduce new tools, skills, and processes. This can present a new set of challenges because learning to use new tools, applying new skills, and adapting to new processes can be costly and time-consuming. In this eBook, we dive deeper into how these challenges can hinder hybrid cloud adoption and cover how VMware Cloud on AWS can help your organization overcome these challenges. Join our webinar to learn How to take advantage of flexible consumption models to align hybrid cloud adoption with your business
Tags : 
    
AWS
Published By: VMware     Published Date: Oct 05, 2015
Most data center security emphasizes strong perimeter defense to keep threats on the outside. But this model is ineffective against today’s new types of threats, which may be borne by east-west traffic inside your data center. Some of these intrusions may lurk for days, weeks, or months to discover and exploit vulnerabilities. An existing concept called micro-segmentation is the solution. But until now, it was hardware-intensive and costly. In this solution overview, you’ll learn why micro-segmentation is now within your organization’s reach. Get your free copy now.
Tags : 
vmware, data center security, data center, micro segmentation, micro segmentation solution, security
    
VMware
Published By: HP     Published Date: Sep 02, 2015
Service virtualization enables development and test teams to simulate and model the dependencies of unavailable or limited services and data. Voke conducted a survey of 505 participants from technology and non-technology companies to explore their use of service virtualization and its results. Organizations using service virtualization experienced fewer defects, reduced software cycles, and increased customer satisfaction. The 2015 Service Virtualization Market Snapshot™ REPORT by Voke Research provides real-world data to help you justify the investment in service virtualization.
Tags : 
analytics software, application management, application performance, cloud applications, cloud virtualization, service virtualization
    
HP
Published By: Qualys     Published Date: Jul 20, 2012
Vulnerability Management (VM) means systematically finding and eliminating network vulnerabilities. Choosing a solution for VM is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security. This checklist from Qualys provides a 12 point shortlist of considerations to determine what solutions will work best for your organization.
Tags : 
technology, security, vulnerabilities, internet, virus, solutions, vulnerability management, business technology
    
Qualys
Published By: Qualys     Published Date: Nov 05, 2013
Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.
Tags : 
qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies, enterprise applications, enterprise integration, vulnerability scanners, threat management, security platforms, cloud
    
Qualys
Published By: Dell EMC     Published Date: Feb 23, 2017
As organizations continue to virtualize their infrastructures to gain higher levels of operational efficiency, VM sprawl and resource utilization are two key factors that can quickly create havoc for IT admins. In resource-siloed infrastructures, where multiple administrators are in charge of different pieces of the infrastructure, complexity continues to grow as mission-critical data sets and organizations grow. This is especially true in dynamic, mission-critical environments, where one wrong move or lack thereof could significantly impact an application, the end-user experience, or worst case, company revenue.
Tags : 
    
Dell EMC
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
“Does Cisco Umbrella block ransomware?” This is one of the most common questions that we hear from customers. In reality, the answer for any security provider — including Cisco — is seldom an absolute “yes” or “no.” It really depends on how each variant arrives onto your systems, as well as its order of operations for encrypting data for ransom. However, with Cisco you can significantly reduce the number of ransomware infections across your organization.
Tags : 
    
Cisco Umbrella EMEA
Published By: HP Enterprise Services     Published Date: Mar 20, 2014
Learn why it is crucial to protect against data breaches and see how you can save your company from potential risks by taking the right steps to avoid breaches and maintain your organization’s reputation.
Tags : 
data breaches, protection, video, prevent data breaches, avoid costs, security, data management
    
HP Enterprise Services
Published By: IBM     Published Date: Feb 10, 2014
Predictive maintenance taps into the sets of structured and unstructured data that organizations already have available.
Tags : 
ibm, business analytics, operational analytics, predictive maintenance, predictive analytics, data analysis, efficiency, roi, infrastructure mangamenet, knowledge management, business technology
    
IBM
Published By: Cumulus Networks     Published Date: Dec 30, 2016
By the year 2018, it is expected that over 25% of enterprise customers will adopt web-scale networking to build modern data centers. This rapid adoption can be attributed to businesses' increasing dependence on their data centers, while at the same time facing reduced IT budgets and limited staff to address their growing business needs. Fill out the form to download a TCO report on how organizations have saved an average of 45% on CapEx and approximately 74% on OpEx by adopting web-scale networking solutions from Cumulus Networks. You’ll learn how Cumulus modeled a real-life TCO calculator on the actual production path their customers took to build an agile, scalable, and cost-efficient data center.
Tags : 
    
Cumulus Networks
Published By: NetApp     Published Date: Dec 12, 2013
Despite the hype, Big Data has introduced critical challenges for modern organizations – and unprepared organizations risk getting buried beneath an avalanche of information. In this informative webcast, join industry and business intelligence (BI) expert Wayne Eckerson as he tackles the challenges of Big Data. Uncover practical tips and tactics for driving value with your Big Data platform – watch now to learn more.
Tags : 
netapp, big data, webinar, webcast, unprepared organizations, avalanche of info, business intelligence, alcatel lucent, data management, data center
    
NetApp
Published By: Oracle     Published Date: Dec 21, 2016
In this webinar you will learn about the expansion of the Oracle Database Appliance portfolio, and how Oracle can provide organizations with a pathway to the cloud.
Tags : 
    
Oracle
Published By: Oracle ODA     Published Date: Oct 19, 2016
Listen as Oracle Executive Vice President of Converged Infrastructure Dave Donatelli announces the expansion of the Oracle Database Appliance portfolio, and explains how Oracle can provide organizations with a pathway to the cloud. Discover how your organization can reduce database complexity, simplify database administration, and better control costs.
Tags : 
    
Oracle ODA
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Listen as Oracle Executive Vice President of Converged Infrastructure Dave Donatelli announces the expansion of the Oracle Database Appliance portfolio, and explains how Oracle can provide organizations with a pathway to the cloud. Discover how your organization can reduce database complexity, simplify database administration, and better control costs.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Pure Storage     Published Date: Jan 29, 2016
While Epic deployment is widespread in Healthcare Delivery Organizations, protection of those environments is often difficult, manual and scripted. Learn how Commvault Intellisnap software and Pure Storage enable an automated protection and recovery environment for Epic.
Tags : 
modern data protection, epic, healthcare delivery organizations, commvault intellisnap, pure storage, recovery environment
    
Pure Storage
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Webroot Inc     Published Date: Aug 27, 2015
In the past year, Webroot encountered tens of millions of instances of malware and potentially unwanted applications (PUAs), monitored billions of IP addresses and URLs, analyzed millions of new and updated mobile apps for malicious behavior, and studied major malware trends based on data from millions of endpoints. This report contains insights, analysis, and information on how collective threat intelligence can protect organizations from sophisticated attacks.
Tags : 
malware, unwanted applications, malicious behavior, threat intelligence, security
    
Webroot Inc
Published By: Dell EMC     Published Date: Mar 18, 2016
Big Data brings unquestionable value to any organization. But as it continues to grow in volume, more sources and increased storage capacity needs grow with it, taxing the performance of existing infrastructures. But you don’t have to be stuck in such a dismal place. Make the trip to Data Lake instead.
Tags : 
emc, data lake, big data, storage, infrastructure, business technology
    
Dell EMC
Published By: Global Software     Published Date: Aug 13, 2018
Going forward, CFOs will continue to implement processes and systems to reduce the overall cost of financial reporting while improving accuracy, visibility of data beyond the general ledger, and accessibility at all levels of the organization. In addition, there will continue to be greater demand for more advanced dynamic reporting — including enhanced cost and profitability reporting, rolling forecasts, and zero-based budgeting — in an environment finance teams are comfortable with, such as Excel, so they can work more efficiently.
Tags : 
financial, reporting, cfo, organization, data
    
Global Software
Published By: Workday     Published Date: Feb 01, 2019
"Are you spending more time aggregating and reconciling data than analyzing it? We uncovered the main roadblocks that are keeping finance and analytics apart, and they’ll have you rethinking the role of finance at your organization. View the infographic to get insight from more than 670 finance leaders on data intelligence."
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday
Published By: Secureworks     Published Date: Oct 04, 2017
The General Data Protection Regulation1 is a European Union regulation with the full title of ‘Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, which repeals Directive 95/46/EC (General Data Protection Regulation)’. It’s the first comprehensive overhaul and replacement of European data protection legislation in over twenty years and could be the most significant regulatory framework to hit organizations since Sarbanes-Oxley in 2002. Its purpose is to replace the varying implementations across Europe of the earlier EU Data Protection Directive with a single harmonized EU regulation. The intended outcome is a standardized set of expectations about how an organization must manage and protect personally identifiable information on employees, clients and other applicable data subjects. Any organization that holds data on EU citizens, regardless of where it is domiciled, within the EU or otherwise, is in sco
Tags : 
    
Secureworks
Published By: Domino Data Lab     Published Date: May 23, 2019
As data science becomes a critical capability for companies, IT leaders are finding themselves responsible for enabling data science teams with infrastructure and tooling. But data science is much more like an experimental research organization than the engineering and business teams that IT organizations support today. Compounding the challenge, data science teams are growing fast, often by 100% a year. This guide will quickly help you understand what data science teams do to build their predictive models and how to best support them. Learn how to modernize IT’s approach to ensure your company’s data science teams perform their best, and maximize impact to the business. Some highlights include: Why data science should not be treated like engineering. How to go beyond simple infrastructure allocation and give data science teams capabilities to manage their workflows and model lifecycle. Why agility and special hardware to support burst computing are so important to data science break
Tags : 
    
Domino Data Lab
Published By: Gleanster Research     Published Date: Jul 02, 2014
In this Deep Dive we will explore what sales leaders should actually be demanding from marketing automation tools. In fact, survey data paints a very compelling picture about how sales should be evaluating the impact of marketing automation on sales performance. We'll explore why sales might be resistant in the first place, and how Top Performing organizations overcome these challenges to help support the collaborative pursuit of top line revenue growth between marketing and sales.
Tags : 
gleanster, sales, marketing, marketing automation, revenue, marketing automation tools, sales performance, sales analytics
    
Gleanster Research
Published By: Carbonite     Published Date: Jan 04, 2018
These days, a lot of organizations are looking to the cloud to help them protect their data. They wish to take advantage of the appealing economics and operational agility that are two of the biggest attributes of a cloud-based IT infrastructure. Leveraging the cloud can be a smart choice for any organization interested in gaining more control over costs (i.e., almost all organizations). According to ESG research, reducing costs was the second most commonly reported business driver affecting IT spending in 2016.
Tags : 
    
Carbonite
Start   Previous    44 45 46 47 48 49 50 51 52 53 54 55 56 57 58    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee