RSS feed Get our RSS feed

News by Topic

aditi

Results 251 - 275 of 1519Sort Results By: Published Date | Title | Company Name
By: Citrix Systems     Published Date: Nov 13, 2018
Today, new application architectures like Devops microservices are opening great opportunities for innovation. But you still have traditional IT-managed applications to provide for. How do you bridge the gap between these different architectures? Download “The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery” to learn more. Fill out the form below to receive this eBook. This eBook identifies ADC considerations for: -Managing traditional and microservices apps in a unified environment -Monitoring and troubleshooting your entire application delivery infrastructure -Delivering consistent features and capabilities for all applications
Tags : 
     Citrix Systems
By: AWS     Published Date: Nov 08, 2018
In this webinar, you’ll learn how Reltio and IQVIA provide holistic data management solutions for traditional pharma, as well as for emerging biotech and consumer health companies, on Amazon Web Services (AWS).
Tags : 
     AWS
By: AWS     Published Date: Nov 07, 2018
To best support global users and customers, enterprises require seamlessly connectivity between branch office locations, applications, and workloads hosted in the cloud. Many WAN solutions are ill-equipped for this task because they are generally rigid, complex to configure, and expensive to maintain. IoT adoption, a dramatic increase of the number of network devices, and the sophistication of security threats further compounds this challenge. Geographically-distributed devices need secure cloud connectivity, limiting the ability of existing WAN solutions to fulfill the need of distributed organizations. Cisco SD-WAN on Amazon Web Services (AWS) is an overlay WAN architecture that is designed to address modern enterprise cloud applications and workloads, heterogeneous WAN connectivity, distributed global workforces, and other business needs that traditional WAN solutions cannot meet. Learn more by downloading this solution brief. Join our webinar to learn -How to migrate a data ce
Tags : 
     AWS
By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
     Tenable
By: CheckMarx     Published Date: Nov 02, 2018
In today’s era of digital transformation, time-to-market is the new name of the game, and DevOps is changing the way software is built. As developers have taken on a much larger role in the software development lifecycle, including developing secure code, building containers and ensuring quality, security cannot be separated from DevOps and engineering. Unfortunately, traditional software security testing tools have operated in isolation and have forced developers to change the way they work. Checkmarx, however, has developed a more agile and responsive solution: Checkmarx’ Software Exposure Platform. Taking a holistic, platform-centric approach, the platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper Delivering Secure Software at the Speed of DevOps to learn how Checkmarx provides the combinatio
Tags : 
     CheckMarx
By: CheckMarx     Published Date: Nov 02, 2018
Dinosaurs are super cool, but there are some places where dinosaurs don’t belong, and one of those is in your fast-paced DevOps environment. We’re in a new world where traditional security solutions no longer make the cut. Software is increasingly complex, and when deployed at the speed of DevOps, it creates a new type of risk: Software Exposure. Legacy application security tools are too big, too slow, and too clunky to deliver the innovation needed to protect your customers in the 21st century. The Software Exposure Platform from Checkmarx is an entirely new species heralding the next generation of software security. The platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper The Demise of the AppSec Dinosaur to learn how Checkmarx provides the combination of integrations and automation required in
Tags : 
     CheckMarx
By: Preempt     Published Date: Nov 02, 2018
Attackers and malware are increasingly relying on a common set of tools to compromise identities and spread within a network. Tools like Mimikatz accompanied with common administrator tools like PsExec and WMI have become a standard part of an attacker’s arsenal to turn a single machine compromise into a full network breach. In this webinar we will take a look at why some of these tools are traditionally difficult to control, and introduce new countermeasures that let you fight back. In this webinar we will cover: - An analysis of recent malware and attacks and the tools they used to spread through the network. - A closer look at the underlying protocols supporting these tools, and the traditional challenges to controlling them. - Introduce new controls that allow organizations to control NTLM in real-time, block pass-the-hash techniques, and adaptively control the use of NTLM in the network. - How to gain visibility into PsExec, WMI, and RPC in general and how to create controls t
Tags : 
     Preempt
By: AWS     Published Date: Oct 26, 2018
Today’s organisations are tasked with analysing multiple data types, coming from a wide variety of sources. Faced with massive volumes and heterogeneous types of data, organisations are finding that in order to deliver analytic insights in a timely manner, they need a data storage and analytics solution that offers more agility and flexibility than traditional data management systems. A data lake is an architectural approach that allows you to store enormous amounts of data in a central location, so it’s readily available to be categorised, processed, analysed, and consumed by diverse groups within an organisation? Since data—structured and unstructured—can be stored as-is, there’s no need to convert it to a predefined schema and you no longer need to know what questions you want to ask of your data beforehand.
Tags : data, lake, amazon, web, services, aws
     AWS
By: Google     Published Date: Oct 26, 2018
Modernizing your data warehouse is one way to keep up with evolving business requirements and harness new technology. For many companies, cloud data warehousing offers a fast, flexible, and cost-effective alternative to traditional on-premises solutions. This report sponsored by Google Cloud, TDWI examines the rise of cloud-based data warehouses and identifies associated opportunities, benefits, and best practices. Learn more about cloud data warehousing with strategic advice from Google experts.
Tags : 
     Google
By: Group M_IBM Q418     Published Date: Oct 24, 2018
After moving traditional workloads to public cloud, most customers realize they must replace many of them with cloud-native alternatives to reap the full benefits. Technology product management leaders must deliver cloud-native offerings now to capture business opportunities and avoid irrelevancy.
Tags : 
     Group M_IBM Q418
By: Akamai Technologies     Published Date: Oct 23, 2018
VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution
Tags : 
     Akamai Technologies
By: Bluecore     Published Date: Oct 23, 2018
AFTER DECADES IN THE LIMELIGHT, email remains the most powerful channel for eCommerce marketers. And this success continues even as many eCommerce marketing teams rely heavily on batch and blast emails that go to their entire list without any customization. While such efforts clearly bring in revenue, they also leave money — a lot of money — on the table. Recognizing that largely untapped opportunity, top eCommerce marketers have started to take a more strategic approach to email. In addition to traditional batch and blast campaigns, these marketers now tailor messages based on both their customers’ behaviors and changes to their product data in order to send more customized and timely messages.
Tags : bluecore, retail, email, report, ecommerce, marketing
     Bluecore
By: Sage Software     Published Date: Oct 23, 2018
Modernise Your Enterprise Management Legacy Enterprise Resource Planning (ERP) solutions are no longer capable of keeping up with today’s fast-moving world – Enterprise Management is the new business reality. Whether you’re a manufacturer, distributor, service provider or mid-market enterprise, we’ll reveal to you a world beyond ERP. • Download our new ‘Move Beyond ERP’ eBook to understand the business challenges you have, and how to meet them. • Understand why businesses are outgrowing traditional ERP and are burdened by its inefficiencies. • Look at the benefits of Enterprise Management, which provides real-time data intelligence, improved forecasting, and accelerated business processes.
Tags : bms, erp, bom, enterprise accounting, enterprise intelligence, drp, enterprise, mrp
     Sage Software
By: Cognizant     Published Date: Oct 23, 2018
In the last few years, a wave of digital technologies changed the banking landscape - social/ mobile altered the way banks engage with customers, analytics enabled hyper personalized offerings by making sense of large datasets, Cloud technologies shifted the computing paradigm from CapEx to OpEx, enabling delivery of business processes as services from third-party platforms. Now, a second wave of disruption is set to drive even more profound changes - including robotic process automation (RPA), AI, IOT instrumentation, blockchain distributed ledger and shared infrastructure, and open banking platforms controlled by application programming interfaces (API). As these technologies become commercialized, and demand increases for digitally-enabled services, we will see unprecedented disruption, as non-traditional banks and fintechs rush into all segments of the banking space. This whitepaper examines key considerations for banks as they explore value in the emerging Digital 2.0 world.
Tags : cognizant, banking, digital
     Cognizant
By: Cognizant     Published Date: Oct 23, 2018
There’s plenty of room in the digital economy for traditional retailers, as long as they shift focus from the products they offer to the experiences they provide, blending the physical and digital worlds to offer distinct and personalized shopping experiences and unleashing the untapped power of emerging new ecosystems. At the heart of retail’s ongoing transformation is a shift in focus from the point of sale to the point of experience. Retailers that will thrive and prosper in the digital economy will be those that think beyond the products they sell to providing hyper-personalized shopping experiences that surprise and delight the consumer at each interaction, regardless of channel or touchpoint. This white paper illuminates these strategic imperatives and delivers actionable recommendations to established retailers seeking to convert challenge into opportunity amid growing concern that they should merely concede victory to digitally-native companies.
Tags : cognizant, digital economy, retail
     Cognizant
By: Cisco and NVIDIA Corporation     Published Date: Oct 22, 2018
Citrix and Google are collaborating to bring the best, most secure way to deliver virtual apps and desktops from Google Cloud. The Citrix Workspace solutions traditionally installed on data center servers—including Citrix Virtual Apps and Desktops, Citrix Networking, and Citrix Content Collaboration (formerly known as Citrix ShareFile)—are now enabled on Google Cloud Platform services. Citrix enables customers to choose the workload deployment option that best aligns with their enterprise cloud strategy and offers a variety of ways to securely deploy Citrix solutions to meet unique application needs. Whether deployed on-premises, cloud-hosted, as a Citrix Workspace service, or with a service provider—customers choose how much and which components of app workloads to manage and when and where to securely deploy business apps, data, and desktops.
Tags : 
     Cisco and NVIDIA Corporation
By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
     Cisco Umbrella EMEA
By: Insight Software     Published Date: Oct 19, 2018
Ninety-five percent of companies polled in a recent Gartner survey considered increasing efficiency and productivity top priorities for IT departments when determining future budgets. Of those companies, 43 percent viewed increasing efficiency as a high priority, while 42 percent considered increased productivity a high priority. Many departments—such as sales or service—focus on the company’s profits. And while a smooth-functioning IT department may contribute to the overall efficiency of an organization, it traditionally provides little to no contribution to the bottom line.
Tags : 
     Insight Software
By: insightsoftware     Published Date: Oct 19, 2018
Ninety-five percent of companies polled in a recent Gartner survey considered increasing efficiency and productivity top priorities for IT departments when determining future budgets. Of those companies, 43 percent viewed increasing efficiency as a high priority, while 42 percent considered increased productivity a high priority. Many departments—such as sales or service—focus on the company’s profits. And while a smooth-functioning IT department may contribute to the overall efficiency of an organization, it traditionally provides little to no contribution to the bottom line. To download this white paper, please complete the following form.
Tags : 
     insightsoftware
By: insightsoftware     Published Date: Oct 19, 2018
Ninety-five percent of companies polled in a recent Gartner survey considered increasing efficiency and productivity top priorities for IT departments when determining future budgets. Of those companies, 43 percent viewed increasing efficiency as a high priority, while 42 percent considered increased productivity a high priority. Many departments—such as sales or service—focus on the company’s profits. And while a smooth-functioning IT department may contribute to the overall efficiency of an organization, it traditionally provides little to no contribution to the bottom line.
Tags : 
     insightsoftware
By: Group M_IBM Q418     Published Date: Oct 15, 2018
The enterprise data warehouse (EDW) has been at the cornerstone of enterprise data strategies for over 20 years. EDW systems have traditionally been built on relatively costly hardware infrastructures. But ever-growing data volume and increasingly complex processing have raised the cost of EDW software and hardware licenses while impacting the performance needed for analytic insights. Organizations can now use EDW offloading and optimization techniques to reduce costs of storing, processing and analyzing large volumes of data. Getting data governance right is critical to your business success. That means ensuring your data is clean, of excellent quality, and of verifiable lineage. Such governance principles can be applied in Hadoop-like environments. Hadoop is designed to store, process and analyze large volumes of data at significantly lower cost than a data warehouse. But to get the return on investment, you must infuse data governance processes as part of offloading.
Tags : 
     Group M_IBM Q418
By: VMware     Published Date: Oct 12, 2018
With the benefits quickly stacking up, it’s easy to understand why Gartner stated HCI (Hyper-Converged Infrastructure) as one of the hottest trends in data centre infrastructure. HCI is intended to reduce infrastructure complexity and cost, whilst enhancing scalability, agility and operational efficiency. This consolidated infrastructure enables organizations to leverage the software layer by using low cost commodity hardware, while reducing concerns around vendor lock-in, to form a seamless software- defined IT infrastructure environment well suited to today’s IT challenges. Simple to use and manage, without specialists and more cost-effective than most traditional solutions, it’s easy to understand why more organisations are making the move from traditional architecture to Hyper-Converged Infrastructure. Submit the form to view the infograph to discover the benefits and whether this solution is right for you.
Tags : 
     VMware
By: Lenovo - APAC     Published Date: Oct 11, 2018
Lenovo’s VMware vSAN-based hyperconverged solution reduces TCO by 40% within the datacenter. VMware-based hyperconverged solutions from Lenovo come with a set of certified components that can be deployed to create platforms that support a broad array of workloads, performance, and budgetary requirements. With VMware vSAN pre-installed, pre-configured, and pre-tested, Lenovo’s VMware-based hyperconverged solutions help improve productivity, and cut complexity quickly and easily. VMware-based hyperconverged solutions from Lenovo represent proven solutions that are enterprise-class and are already being leveraged within mission-critical environments around the world. Download IDC’s Infobrief on “The Real-World Value of Hyperconverged Infrastructure” and learn how you can: • Cut the cost of scaling infrastructure • Reduce time spent on infrastructure provisioning • Improve application performance • Eliminate complexity and cost related to refreshing traditional infrastructure
Tags : 
     Lenovo - APAC
By: Carbonite     Published Date: Oct 10, 2018
Global data deduplication provides important benefits over traditional deduplication processes because it removes redundant data through entire enterprises, not just single devices. Global deduplication increases the data deduplication ratio—the size of the original data measured against the size of the data store after redundancies are removed.
Tags : 
     Carbonite
By: Carbonite     Published Date: Oct 10, 2018
In the last few years, businesses have changed the way they protect data. Studies show they’re abandoning traditional backup and recovery in favor of disaster recovery as a service (DRaaS).1 With DRaaS, businesses enjoy the luxury of keeping a replica of their data hosted at a remote site that they can fail over to in an emergency—without bearing any of the infrastructure costs or maintenance responsibilities. All infrastructure and maintenance is the responsibility of the provider. Gartner predicts that global DRaaS revenue will reach $3.4 billion by 2019. The firm cited several reasons for the shift:
Tags : 
     Carbonite
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics