data organization

Results 151 - 175 of 1429Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Rand Secure Archive     Published Date: Jun 06, 2013
Most organizations possess considerable intellectual property. Unfortunately, that information is useless unless employees know how to find it. The time that staff members spend searching for data, often fruitlessly, represents a real cost to organizations. In some instances, when employees can’t find the information they’re looking for, they end up duplicating work. Archiving tools with powerful index and search capabilities can help maximize the value of intellectual property.
Tags : 
data, archive, tools, index, search, value, intellectual property, networking, software development, business technology
    
Rand Secure Archive
Published By: Dell EMC     Published Date: Nov 03, 2016
IT managers are struggling to keep up with the “always available” demands of the business. Data growth and the nearly ubiquitous adoption of server virtualization among mid-market and enterprise organizations are increasing the cost and complexity of storage and data availability needs. This report documents ESG Lab testing of Dell EMC Storage SC Series with a focus on the value of enhanced Live Volume support that provides always-available access with great ease of use and economics.
Tags : 
storage, data, sql, architecture
    
Dell EMC
Published By: Winshuttle     Published Date: Apr 18, 2017
Uploading bulk information to SAP doesn’t have to be time consuming and complex. Rather than rely on SAP’s Legacy System Workbench (LSMW) which was designed for IT professionals for data migration projects, business users can leverage a non-technical alternative in a few simple steps to create and update data in SAP for everyday business transactions and data projects. This white paper provides a side-by-side comparison of LSMW’s 14 step process and Winshuttle Studio’s 3 step process to upload/download data and highlights why Winshuttle’s business led, IT enabled solution provides many benefits to the organization.
Tags : 
    
Winshuttle
Published By: Dell PC Lifecycle     Published Date: Mar 07, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization.
Tags : 
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: May 15, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization.
Tags : 
    
Dell PC Lifecycle
Published By: Dell Server     Published Date: Aug 07, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization. Forward-thinking IT organizations are developing new infrastructure strategies to better support high-value analytics workloads with Dell EMC PowerEdge Servers powered by Intel® Xeon® Platinum processor.
Tags : 
    
Dell Server
Published By: SAS     Published Date: Jun 05, 2017
Data professionals now have the freedom to create, experiment, test and deploy different methods easily – using whatever skill set they have – all within one cohesive analytics platform. IT leaders gain the ability to centrally manage the entire analytics life cycle for both SAS and other assets with one environment. Organizations get faster results and better ROI from analytics efforts.
Tags : 
    
SAS
Published By: IBM     Published Date: Jul 07, 2014
With so much emphasis in the business world being placed on big data and analytics, it can be easy for midsize businesses to feel like they’re being left behind. These organizations often recognize the benefits offered by big data and analytics, but have a hard time pursuing those benefits with the limited resources available to them.
Tags : 
ibm, analytics, big data, midmarket, midsize businesses, data-driven insights, business insights, business value, data analysis
    
IBM
Published By: SAS     Published Date: Jan 17, 2018
Competitive advantage from analytics is changing, and for the better. For the first time in four years, MIT Sloan Management Review found an increasing ability to strategically innovate with analytics based on interviews with more than 2,600 practitioners and scholars globally. Learn more about key findings, including: Wider use of analytics, better knowledge of its benefits and greater focus on applications have reversed a trend on the benefits of analytics. Return on investment for analytics stems from the governing and sharing of data throughout the organization. Machine learning enables organizations to discover more insight from their data, allowing employees to focus on other critical responsibilities.
Tags : 
    
SAS
Published By: IBM     Published Date: Sep 27, 2013
Analytics: The Real-World Use of Big Data - How innovative enterprises in the midmarket extract value from uncertain data This study highlights the phases of the big data journey, the objectives and challenges of midsize organizations taking the journey, and the current state of the technology that they are using to drive results. It also offers a pragmatic course of action for midsize companies to take as they dive into this new era of computing.
Tags : 
ibm, big data, big data solutions, midmarket businesses, analytics, it management, data management, business technology
    
IBM
Published By: IBM     Published Date: Jan 02, 2014
This study highlights the phases of the big data journey, the objectives and challenges of midsize organizations taking the journey, and the current state of the technology that they are using to drive results. It also offers a pragmatic course of action for midsize companies to take as they dive into this new era of computing.
Tags : 
ibm, analytics, global business service, big data, business value, it professionals, volume, velocity, variety, customer analytics, trends and insights, information management, data security, integration, variety of data, analytic accelerator, infrastructure, data management, data center
    
IBM
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : 
ibm integrated data management, jd edwards, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth, data classification, enterprise applications, data management
    
IBM
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : 
ibm integrated data management, siebel crm, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth, data classification, enterprise applications, data management
    
IBM
Published By: IBM     Published Date: Feb 18, 2009
This white paper explains how the seven basic principles for managing enterprise application data can help your organization: Establish effective policies for full-lifecycle enterprise data management to control data growth and lower storage costs; Meet service level goals to achieve the timely completion of key business processes for mission-critical applications; Support data retention compliance initiatives and mitigate risk for audits and e-discovery requests; Implement scalable archiving strategies that easily adapt to your ongoing business requirements.
Tags : 
ibm integrated data management, oracle e-business suite, business-critical erp applications, archiving project, service level goals, data retention compliance, archiving strategies, ibm optim data growth solution, rapid data growth, data classification, enterprise applications, data management
    
IBM
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: F5 Networks Inc     Published Date: Aug 16, 2016
Data center refresh cycles and new initiatives tied to business growth and revenue opportunities are leading more organizations to deploy integrated systems, including both converged and hyper-converged infrastructures. IT leaders can see the potential benefits of converged, integrated systems but as applications increase in complexity, virtual workloads grow, and resource demands expand, managing these applications becomes a critical and often stubborn challenge.
Tags : 
application delivery services, systems deployments, integration, idg research, integrated system approach, networking, security, enterprise applications, business technology
    
F5 Networks Inc
Published By: Akamai Technologies     Published Date: May 05, 2017
Web application and DDoS attacks hit enterprises without warning or reason. Most Distributed Denial of Service (DDoS) attacks require little skill to launch with attackers can simply rent resources from DDoS-for-hire sites at a low cost.. In comparison, DDoS attacks typically result in: • Operational disruption • Loss of confidential data • Lost user productivity • Reputational harm • Damage to partner and customer relations • Lost revenue Depending on your industry, that could add up to tens of thousands of dollars in damage – and in some cases it could be millions. Only 2% of organizations said their web applications had not been compromised in the past 12 months – 98% said they had.
Tags : 
ddos, technical support, data security, application security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Web application and DDoS attacks hit enterprises without warning or reason. The attacks can expose confidential data and website resources to malicious uses, reduce performance, and render sites unavailable. Responsible organizations proactively block web attacks to protect their reputations, site availability, site performance, and confidential data.
Tags : 
application, security, performance, web attacks, data security
    
Akamai Technologies
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
Whether critical applications live in the cloud, in the data center, or both, organizations need a point of control for application security. Learn how you can achieve the security, intelligence, and performance that today's infrastructure demands.
Tags : 
cloud security, securing applications in the cloud, securing data in the cloud, secure web applications, web application firewall, business technology
    
F5 Networks Inc
Published By: F5     Published Date: Jan 31, 2013
Whether critical applications live in the cloud, in the data center, or both, organizations need a strategic point of control for application security. Learn how you can achieve the security, intelligence, and performance for today's standards.
Tags : 
application, security, cloud, cloud security, f5 networks, performance, prevent attacks, it management, data management, business technology, data center
    
F5
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee