RSS feed Get our RSS feed

News by Topic

aditi

Results 176 - 200 of 1499Sort Results By: Published Date | Title | Company Name
By: Canon Business Process Services     Published Date: Aug 27, 2013
Managed print services have been proven to drive cost savings as much as 10-30 percent over traditional approaches as well as increase efficiency, security and sustainability across your business.
Tags : print management, business process outsourcing, business performance management, managed print services, business imaging, document and print management, business management
     Canon Business Process Services
By: Dell EMC     Published Date: May 09, 2019
Traditional methods for provisioning and deploying end-user devices can present real headaches to IT staff and business in general. In comparison, Dell Provisioning for Vmware Workspace ONE® saves time for small and large-scale deployments. This service enables a company to pre-configure devices before they leave the factory, with no ongoing IT involvement. Download this white paper from Dell and Intel® to learn how to; eliminate on-site adminstrative deployment time, deploy large quanitites of fully provisioned devices with a single one-time configuration, and, expedite getting fully configured systems to end-users.
Tags : 
     Dell EMC
By: Oracle     Published Date: Nov 27, 2017
Customer service has an opportunity to be a much more strategic weapon for businesses that understand its power. To do this means moving away from what has traditionally been viewed as a back-end operation and cost center to what is now being viewed as a brand-focused profit center. The primary driver of this sea change is engaged and empowered consumers, who want to get the answers to their questions anytime, anywhere, on any device they choose.
Tags : communications, telecom, financial services, insurance, technology, retail, wholesale distribution, manufacturing
     Oracle
By: Webroot     Published Date: Nov 02, 2012
This report presents our results and findings as a result of performance benchmark testing conducted for eight security software products, on Windows 7 Ultimate Edition from December 2011 to January 2012.
Tags : it security, endpoint security, endpoint protection, security
     Webroot
By: Webroot     Published Date: Nov 02, 2012
This short paper looks at this situation and suggests how by replacing traditional AV with next generation cloud-based endpoint protection you will solve many of the issues surrounding your highly distributed mobile workforce.
Tags : mobility, endpoint security, it security, endpoint protection, mobile workforce, high mobility, security
     Webroot
By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters
     Red Hat
By: Oracle     Published Date: Aug 08, 2013
As social media use has grown, an urgent need has emerged to correlate the information generated through social data with existing consumer information, and integrate it with sophisticated data management systems. This white paper describes how organizations can blend social insights with more-traditional data in an integrated customer data hub to optimize social strategies and create outreach efforts, new products, and campaigns grounded in real-time, repeatable, automated, and scalable analysis.
Tags : social media, business intelligence, customer hub, crm, oracle
     Oracle
By: HP Inc.     Published Date: Feb 03, 2016
Almost every organization takes its desktop/laptop security seriously – but most simply rely on software-level solutions, missing out on a deeper level of protection. Are these traditional software solutions keeping data safe enough? Not according to a recent Spiceworks survey, in which only about half of IT professionals in the Americas feel like their current, software-level solutions are very effective. Where does your organization rank?
Tags : 
     HP Inc.
By: Pega     Published Date: May 24, 2016
The digital service revolution is well underway. For communications service providers (CSPs), it means going beyond traditional voice and data and upgrading their entire digital communications infrastructure. Research shows enterprise-class organizations are allocating heavy dollars towards communications solutions and prefer a single provider for digital services. This is a massive opportunity for CSPs to expand their services, generate more revenue, grow profit and increase market share. However, the majority of enterprises reported not receiving a consistently excellent experience with their most recent service contract. As a result, many switch to new providers. CSPs are losing credibility and the loyalty of their customers because of legacy and traditional systems that constrain their ability to act quickly. Enterprises are looking for CSPs who understand their complex business and can offer a full portfolio of digital services with quality and creativity to meet their needs.
Tags : 
     Pega
By: Pega     Published Date: May 24, 2016
Governments have long found it challenging to modernize legacy IT systems. Now comes pressure to offer digital government services. However, which takes priority? The answer is both. But rather than thinking linearly, the smart way is to execute simultaneously by standing a traditional IT approach on its head. Government agencies need to use technology to develop proactive and digital government services, from the outside in, from the perspective of the constituent, while making modernizing adjustments. To be successful, it is critical for government agencies to move beyond traditional development methodologies by adopting an agile development approach. But what are the challenges? How can they modernize massive projects already in the works? In short, how to get there? Download this E-bookand find out where government agencies are falling short and where they can improve regarding digitization.
Tags : 
     Pega
By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
The need to bridge the gap between traditional IT services and cloud application delivery is vital.   This HPE Pointnext blueprint guide examines the critical global business services and IT technology best practices for enabling cloud-native applications—from DevOps practices to underlying infrastructure. The blueprint helps IT teams accelerate the development and delivery of cloud-native applications.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Organizations are running their business on exponentially more data, created by more users, from different devices, and through different IT services and digital processes. While some data growth is fueled by new applications, it also arrives increasingly from non-traditional IT sources, including digital media, machines, and edge devices. Edge IoT devices are generating a massive amount of data that must be managed, monitored, stored, and analyzed. Deciding where to perform each of these functions is critical to supporting new data-driven global business services and processes. This blueprint from HPE Pointnext, the Services division of HPE, is based on real-world experiences from many customers across a range of industries on how to leverage flash storage modernization.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Forward-looking organizations are looking to next-generation all-flash storage platforms to eliminate storage cost and performance barriers. Advancements in all-flash technology have led to remarkable priceperformance improvements in recent years. The latest all-flash solutions from HPE deliver breakthrough economics, speed and simplicity, while improving availability and data durability. All-flash storage can help you reduce TCO and boost the performance of traditional applications as well as accelerate the rollout of new initiatives like IoT, big data and analytics. But moving data to a new storage architecture introduces a variety of organizational and technical challenges.
Tags : 
     Hewlett Packard Enterprise
By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
     CA Technologies
By: Zendesk     Published Date: Jan 03, 2019
To successfully meet customer demands for more immediate, personalized attention, companies are leveraging new technologies that go beyond traditional voice and email. By implementing such channels as live chat, social media, mobile apps, SMS/text messages, self-help solutions, and more, companies can now be ready wherever and however the customer wants. The following report, sponsored by Zendesk, is based on an online survey of 1,044 U.S. consumers who have received online or phone customer service. The research goal was to better understand present customer expectations and to quantify the impact of customer service on business results. Questions were asked about past experiences with customer service, as well as preferences and opinions. Certain questions were repeated from a similar 2013 survey to enable trend analysis.
Tags : 
     Zendesk
By: Juniper Networks     Published Date: May 04, 2018
The role of IT is changing from a traditional focus on cost-efficient enablement to a more strategic contribution. Total Cost of Ownership (TCO), while important, is being surpassed by a growing focus on automation and orchestration that is needed to fulfill enterprise demands for security, agility, and innovation. The cloud-grade enterprise network – spanning the campus, data center, and branch – must be able to respond to rapid changes in business, growing reliance on hybrid cloud architectures, and the needs of users and customers.
Tags : 
     Juniper Networks
By: Cloud Blue     Published Date: Jul 20, 2018
Digital-native enterprises are first to accelerate cloud commerce business. IDC explains how cloud platforms like CloudBlue are key to evolving business models and architecture to scale operations and innovate faster than traditional businesses in preparation for the Future of Commerce.
Tags : 
     Cloud Blue
By: LifeWorks     Published Date: Dec 04, 2018
Employee assistance programs (EAPs) are moving beyond the traditional idea of being a work-based intervention program solely aimed at resolving employees’ personal problems. Nowadays, EAPs are preventative by nature. They provide important work life resources like counselling, coaching, guidance, and financial and legal support for employees and family members. The focus has expanded from personal problems to overall well-being.
Tags : 
     LifeWorks
By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Many businesses are adopting a multi-cloud infrastructure. However, managing data and communication between multiple cloud environments is often challenging and complex. Therefore, companies often try to find a technical partner that can help them. Companies with on-premise data centers need some type of interconnect to access their products and services hosted on the cloud. The traditional Virtual Private Network (VPN) connection method usually can’t meet enterprise speed,stability, security, and compliance requirements.This whitepaper describes the challenges that companies face when building dedicated connections between different cloud environments and how Alibaba Cloud’s Express Connect is the perfect solution for them
Tags : data center, cloud computing, networking, security, china, global expansion
     Alibaba Cloud SEA
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : it security, vendor, malware, analysis, service, malicious attacks, network, traffic
     Rohde & Schwarz Cybersecurity
By: Oracle APAC     Published Date: May 24, 2018
Cloud has become a crucial foundation for digital transformation (DX) initiatives and is shaping the IT strategy of enterprises today. Companies are extending their IT infrastructure into the cloud for running business-critical applications, developing new applications, and delivering new cloud-based services. Applications are the lifeblood of modern enterprises. They are the foundation on which businesses maintain their existing revenue streams while examining ways to create new ones. A sound application strategy is a must for frms to be successful in expanding their competitive differentiation in the digital economy. Operating systems (OSs) provide a common foundational layer that enables IT to run current and new generations of applications in traditional IT environments, on its own private cloud, and in public clouds and utilize a variety of computing options such as bare metal, virtualization, and containerization. The increased reliance of IT on the cloud has accelerated the
Tags : 
     Oracle APAC
By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : cloud security, cloud management, it protection, api integration, credential verification, security efficiency
     CA Technologies
By: Silver Peak     Published Date: Apr 12, 2016
This white paper reveals how with the proliferation of cloud-based and Software-as-a-Service (SaaS) applications, traditional means of connecting branches and users to applications must evolve.
Tags : cloud, cloud computing, cloud architectures, wan, saas, software as a service, cloud services, hybrid cloud
     Silver Peak
By: Juniper Networks     Published Date: Oct 25, 2017
The broad adoption of the next generation of cloud, mobile, M2M, and big data applications is having profound impacts on IT and network infrastructures. Compared to traditional applications, these applications have much shorter life cycles. You must be able to spin them up, spin them down, and grow and shrink them on demand. Furthermore, you must be able to move these application workloads within a data center or across geographically distributed data centers, resulting in increased management complexities.
Tags : data management, data system, business development, software integration, resource planning, enterprise management, data collection
     Juniper Networks
By: Symantec     Published Date: Jul 09, 2017
This guide details some of the major considerations when looking to secure cloud application use, the limitations of existing pointproducts, including traditional Secure Web Gateways (SWGs), and an overview of the integrated cloud security gateway approach that is needed to provide comprehensive, information-centric security as your data moves between your users and your cloud applications.
Tags : cloud, cloud applications, swgs, secure web gateway's, saas
     Symantec
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics