RSS feed Get our RSS feed

News by Topic

bring

Results 351 - 375 of 1063Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Jan 06, 2014
As most European organisations open up their applications for external users, Identity Access Management (IAM) is becoming ever more critical to drive business growth.
Tags : mediacom, byoid, identity access management, iam, business growth, directories of identities, it professionals, external business users
     CA Technologies
By: CA Technologies     Published Date: Jan 06, 2014
This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.
Tags : mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device
     CA Technologies
By: CA WA     Published Date: May 12, 2008
CA Workload Automation brings a central point of control and visibility to help assure efficient, reliable and secure business process management. It enables business workload design across platforms and operating systems, offering advanced monitoring and automated responses to changes and exceptions.
Tags : web services, bpm, business process, ca wa, workload automation
     CA WA
By: CA WA     Published Date: Aug 15, 2008
One of the most dramatic innovations in the infrastructure management marketplace in the last five years is the rise of Network Change and Configuration Management (NCCM) as a strategic requirement. This white paper will focus on the strong values that NCCM can bring to reliability, risk and cost management, as well as some of its powerful operational and lifecycle asset values. This report will also introduce the CA SPECTRUM Network Configuration Manager as a distinctive leadership offering.
Tags : configuration management, configuration, change management, change, network management, ca wa, computer associates, workload automation
     CA WA
By: CA WA 2     Published Date: Oct 01, 2008
Virtualization and clustering can bring many benefits to your business—better IT asset utilization, improved business continuity and improved operational efficiency. At the same time, virtualization can create a new level of complexity for IT. This white paper describes some of the technical challenges inherent in managing these complex environments and recommends strategies for successful deployment that will maximize the value of virtualization technology in your organization.
Tags : virtual, virtual machine, virtual storage, virtual server, virtualization, ca wa, ca wa 2
     CA WA 2
By: CA WA 2     Published Date: Oct 01, 2008
Given the increased complexities and requirements thrust onto data center management environments over time, a more holistic management approach is necessary for efficient and cost effective delivery of IT services. Authors and analysts Judith Hurwitz and Robin Bloor bring their research and extensive experience to light in respect to the state of data center management by building the case for automation as a key strategy for efficient and cost effective management.
Tags : datacenter automation, data center automation, network management, ca wa, ca wa 2
     CA WA 2
By: F5 Networks Inc     Published Date: Mar 30, 2018
Enterprises understand that greater efficiency, improved time-to value, and new opportunities can be gained by using cloud platforms; automating and accelerating their IT delivery; and putting technology to work in new ways to digitally transform their business. The difficult question is how to create an organization that is able to deliver these innovations. Skilled resources do exist, but they command high salaries and are in short supply. In fact, 70% of respondents to a recent Computing survey stated that their companies face a shortage of cloud skills. While bringing in experienced staff who can guide and lead new initiatives is often a necessity, it’s vital to concurrently train your existing staff and adopt solutions that narrow the gap between the realities of the present and the hopes for the future.
Tags : netops, skills, automation, enterprises, cloud, delivery, resources
     F5 Networks Inc
By: Brightcove     Published Date: Sep 17, 2014
PUMA produces and publishes a wide range of video content around the world to support its products but also to bring customers on a journey. While PUMA is known for its cutting-edge products, its brand really comes alive through the context that the company puts the products in and the lifestyle that the brand portrays. PUMA looks to video as an opportunity for engagement and a way to direct customers to a cadence-specific, multiscreen experience.
Tags : video cloud, video content, live video content, emerging marketing, interactive marketing, marketing software, customer experience/engagement
     Brightcove
By: Citrix Systems     Published Date: Jul 28, 2015
This white paper explores the evolution of secure remote access requirements, focusing in particular on the impact of user mobility and growing adoption to bring your own device (BYOD) practices.
Tags : 
     Citrix Systems
By: Citrix Systems     Published Date: Sep 17, 2015
Citrix Workspace Suite brings together award-winning technologies into an integrated solution that provides people with secure access to apps, data, desktops and IT services seamlessly across whatever device they happen to be using. This is the mobile workspace in action.
Tags : citrix workspace, it services, business mobility
     Citrix Systems
By: HP-Intel®     Published Date: Jul 22, 2013
HP Bring Your Own Device to Healthcare
Tags : device, healthcare, integration, security, control, wi-fi devices
     HP-Intel®
By: Citrix     Published Date: Nov 09, 2012
Companies of all sizes are witnessing the changes in types of devices entering the workplace, fueled by the employees, not IT. Employees want to be able to have a device of their choice. This paper discusses the concept of BYO, Bring Your own.
Tags : citrix, bring your own device, bring your own, byo, devices
     Citrix
By: Fortinet     Published Date: Nov 14, 2012
How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices
Tags : fortinet, byod, data loss, market fragmentation, malware, mobile devices, risk, bring your own device
     Fortinet
By: Teradata     Published Date: Jun 12, 2013
Because subpar analytics put customer relationships at risk, Forrester is redefining the modern practice of web analytics as "digital intelligence." This new approach to analytics brings a set of expanded requirements and calls on firms to consider their technology frameworks, organizational structures, metrics, and optimization practices.
Tags : web analytics, data driven marketing, digital intelligence
     Teradata
By: RelayHealth     Published Date: Mar 29, 2013
Widespread electronic health record (EHR) adoption has ushered in a pivotal moment in laying the groundwork for health information exchange (HIE).
Tags : meaningful use, hie, health information exchange, ehr, electronic health records, connectivity, care coordination, population health
     RelayHealth
By: CareCloud     Published Date: Sep 09, 2014
In an increasingly complex business environment, U.S. physicians are banding together into mega groups that gain leverage with payers without sacrificing independence. Innovative technology platforms are playing a major role in making it happen. One leading mega-group shares its story.
Tags : carecloud, mega group, complex business environments, us physicians, innovative technology platforms
     CareCloud
By: Oracle     Published Date: Apr 17, 2017
Our latest study, Agile Finance Revealed, looks to identify the traits of agile finance leaders and benchmark their success in creating a dynamic new operating model that is resilient, responsive, and predictive – enabling finance to lead digital transformation – not just react to it. At Oracle, we believe that digital transformation brings companies into the future, and it enables them to be more competitive.
Tags : 
     Oracle
By: Microsoft     Published Date: Nov 08, 2013
Find out why developers increasingly choose .NET to create new applications faster and more efficiently and why it offers the clearest path from the client/server world to the emerging device/cloud world.
Tags : microsoft, develop better applications, technology guide, business applications, application patterns, devices, web applications, native applications
     Microsoft
By: Oracle     Published Date: Jan 15, 2014
The latest IT tools and techniques can bring benefit to policy implementation in Government, as well as to administration and operations. This new role for IT can not only speed up the implementation of policy changes, but enable more effective targeting of those policies. This paper explains how. Oracle provides standard COTS software that can do this, and how such solutions have already been proven in Government Ministries.
Tags : oracle, government, cots software, smarter policy implementation, government ministries
     Oracle
By: Red Hat     Published Date: Mar 11, 2016
Three customer success stories for Red Hat and OpenStack®: Financial services provider FICO, broadcast media company KBS, and Pennsylvania State University.
Tags : 
     Red Hat
By: Delphix     Published Date: May 28, 2015
A new generation of tools is bringing agility to components of IT operations . Learn how recent advancements in agile data management, data virtualization, and data masking are combining to help companies achieve previously unachievable breakthroughs in IT security and risk management. Starting with a technical dive into data masking and the key concepts surrounding “virtual data”, this eBook also leverages exhaustive industry research and company surveys to translate the business value associated with these solutions.
Tags : 
     Delphix
By: HP     Published Date: Feb 02, 2015
Many businesses continue to rely on outdated IT infrastructures to run the extremely demanding workloads of today. Not surprisingly, these businesses are facing increasing complexity and challenges. However, by taking the important step to adopt next generation infrastructure hardware, leading organizations are gaining a great opportunity to meet the challenges of these workloads with a reliable and optimized environment that delivers the services that customers demand, and brings significant benefits and returns on investment.
Tags : 
     HP
By: CenturyLink     Published Date: Jan 02, 2015
Cloud-enabled managed hosting brings cloudlike consumption and provisioning attributes to the traditional managed hosting market in Europe. This is a new evolution of a mature market, with a wide variety of vendor offerings and capabilities, so infrastructure managers must choose with care.
Tags : gartner, magic quadrant, compute infrastructure, storage resources, network resources, strategic providers
     CenturyLink
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics