RSS feed Get our RSS feed

News by Topic

ca technologies

Results 1726 - 1750 of 1812Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Jul 19, 2017
• Digital transformation is essential in the modern software factory, and mainframes are mission-essential elements in many industries, including, finance, transportation, insurance and others • The industry is adopting agile and DevOps practices throughout IT to increase business agility • Explore the potential for DevOps in your organization, told from a mainframer’s point of view
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jul 19, 2017
• Bringing DevOps to Mainframe enables organizations to increase business agility and sustain innovation velocity • CA solutions deliver DevOps for the mainframe and support agile development, continuous testing, continuous delivery and agile operations
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 24, 2017
Pour gérer votre IT de manière professionnelle, vous avez besoin d’outils qui vous permettent de garantir la fiabilité de vos services de manière proactive, tout en renforçant votre agilité opérationnelle. Cela implique d’opter pour une nouvelle approche de la gestion de l’infrastructure IT et de sélectionner un fournisseur de solutions de gestion de l’infrastructure qui soit en mesure de répondre à vos nouvelles exigences IT et métier.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Thanks to numerous, headline-making incidents in recent years, cybercrime has risen toward the top of the concern list for many organizations—and the customers with whom they do business. You’ve heard many of the stories. Major health insurers, such as Anthem, Premera BlueCross and CareFirst had personal information for millions of their customers stolen. Sony Pictures experienced a breach that not only embarrassed employees and adversely impacted the release of the high-profile film, “The Interview,” but also damaged systems and applications—making it extremely difficult for the company to conduct business. The list goes on. Some you maybe haven’t heard, like the one about CodeSpaces, a provider of version management services to developers. When attackers were able to gain access to its cloud-based management consoles, they deleted the company’s entire infrastructure and backups—ultimately forcing CodeSpaces out of business. The bad news for organizations like yours is, thanks to the
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
     CA Technologies
By: Determine (Selectica)     Published Date: Sep 13, 2016
The sponsor named below commissioned Ardent Partners to write this report. While the report topic In 2015, collaboration is the name of the game in procurement and frequently entails working with key internal stakeholders (like line-of-business managers and legal departments) or preferred suppliers to drive greater value through sourcing and procurement. For Chief Procurement Officers ("CPOs") and other supply management leaders, collaboration has taken on many new and innovative forms over the years, causing these executives to leverage new (and, in some cases, existing) processes, relationships, and technologies to enhance compliance, decrease risk, and increase savings. One such business process, contract management, has been reborn with digital, automated features that can shift the way procurement teams collaborate, mitigate risk, drive performance, and realize greater savings for the enterprise.
Tags : 
     Determine (Selectica)
By: IBM     Published Date: Apr 18, 2017
There are myriad software products, from complete CRM platforms that offer analytics to standalone or add-on software products that focus solely on analytics. There are analytics apps that can be added to your existing CRM platform. Or there’s the option to outsource analytics to a growing number of service providers. “The technologies are changing rapidly. There are a zillion startups offering either new tools or technologies, so it is kind of hard to navigate,”Mike Gualtieri, an analystfor Forrester Research Inc. in Cambridge, Mass., said in a recent webcast on analytics. “There isn’t just one platform that you’re going to need. There’s a whole ecosystem of platforms.” Having the right people on staff who know how to use the technology is equally important, analysts say. Analytics aren’t just for statisticians anymore—they’re used by sales, marketing and customer service teams in daily decision making.
Tags : data management, data system, business development, software integration, resource planning, enterprise management, data collection
     IBM
By: IBM     Published Date: Oct 26, 2017
With the growing demand of business for tighter communication and collaboration with external parties such as business partners and customers, IT has to provide the technical foundation for such integration. Web Access Management and Identity Federation are key technologies for that evolution. They enable organizations to manage access both from and to external systems, including cloud services, in a consistent way. Organizations have to move forward towards strategic approaches to enabling that integration, in support of the Extended and Connected Enterprise.
Tags : access management, identity federation, it strategies, security, infrastructure
     IBM
By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and greater convenience through the capabilities of better networking technologies, opportunities have never been greater to use technology to make for a truly seamless hospitality experience. However, growing dependence on your network for everything from booking to entertainment can also mean that hospitality networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
     Cox Business
By: Cox Business     Published Date: Dec 19, 2016
As the healthcare industry continues to move forward into an age of big data, optimization, and greater coordination of care through the capabilities of better networking technologies, opportunities have never been greater to use technology to truly improve how healthcare professionals interacts with patients. However, growing dependence on your network for everything from medical records to billing information can also mean that healthcare networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
     Cox Business
By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and shared information through the capabilities of better networking technologies, opportunities have never been greater for using technology to improve the way the government interacts with constituents. However, increasing dependence on web and network services also makes government a tempting target for hackers. Distributed Denial of Service attacks, data breaches, leaks, the risks can be enormous. Recent events have shown us that now more than ever, government servers are getting victimized by well-funded teams of foreign hackers, possibly funded by their government.
Tags : 
     Cox Business
By: Lookout     Published Date: Aug 28, 2017
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence.
Tags : data protection, mobile risks, productivity tools, cyber attacks, device vulnerabilities
     Lookout
By: Progress     Published Date: Mar 26, 2018
The transition to value-based outcomes, an aging population, and new mobile and wearable and chat bot technologies are driving changes across every aspect of the healthcare industry. Advances in digital health technologies hold great promise that healthcare can be delivered in smarter, simpler, and more cost effective ways. Mobile technologies can foster patient engagement, enhance care team communication, reduce cost of delivery, and improve the healthcare experience for both patients and their providers. The key is figuring out which apps to tackle first. This document outlines a few of the key use cases that are showing positive impact. While this isn’t an exhaustive list, it provides several great places to start on the digital health innovation journey.
Tags : 
     Progress
By: Juniper Networks     Published Date: Jun 22, 2017
Hybrid cloud is your IT platform of the present. Juniper Unite Cloud helps you win the race to the hybrid cloud because it offers the flexibility of hybrid cloud and hybrid operations models while effectively confronting and addressing the overabundance of variables in hybrid IT technologies. Juniper’s product portfolio offers the ultimate flexibility, so that you can seamlessly integrate cloud stacks and unify policy in and across today’s and tomorrow’s private and public clouds. Contact your Juniper Networks representative to learn more about this hybrid cloud solution.
Tags : cloud computing, cloud mobility, cloud security, esignature, digital signature, transaction security, financal security
     Juniper Networks
By: Juniper Networks     Published Date: Aug 10, 2017
The dramatic growth of hybrid cloud deployments is creating new challenges for security professionals that can no longer be addressed with legacy technologies, policies and processes. As applications and data move fluidly between multiple clouds private, public and hybrid—organizations must take a unified approach to security that incorporates a range of products working hand in glove to reduce risk and protect the business.
Tags : cloud, malware protection, compromised files, threat intelligence, security director, virtual firewall, atp, srx
     Juniper Networks
By: Juniper Networks     Published Date: Aug 10, 2017
In most cases, your physical data center will not disappear as these growth trends play out. Instead, it will evolve into a hybrid environment, incorporating a mixture of physical and virtual computing technologies—including both public and private clouds. You’ll face even more challenging security risks within these hybrid environments than you have protecting your physical data center today. And you won’t be alone with these challenges when making the shift to a hybrid data center architecture.
Tags : intrusion prevention, data attacks, firewall, junos space virtual director, appsecure, unified management, centralized platform
     Juniper Networks
By: Dassault Systèmes     Published Date: Jun 19, 2018
This white paper outlines a framework that emphasizes digitization and business transformation and the new opportunities pull processes bring. The mechanism of “Pull” processes—those triggered by an actual event instead of a forecast—is nothing new. It is at the heart of many successful manufacturing strategies. Recent technological advances in digitization, including the harnessing of Big Data analytics, the use of the cloud, Business Process Management (BPM), social media, IIoT, and mobility, have extended the power of Pull beyond Lean manufacturing. In the wake of the current technological innovation wave, it is not uncommon for manufacturers to not know what next step to take. In light of these new developments, this white paper will focus on the mechanism of business transformation enabled by these technologies, which can be attributed to two major forces: the power of Pull and digitization. Nine practical applications are detailed, showing how innovative manufacturers can better
Tags : 
     Dassault Systèmes
By: Google     Published Date: Dec 03, 2018
As businesses have embraced application development, they have also adopted cloud technologies that provide their teams lesser reliance on hardware. In this sponsored Economist Intelligence Unit report, we look at the real-life experiences of over 1,000 business executives and understand the importance of close alignment between development teams, C-suite, and the wider business. Read the report and find out how you can manage application development to unlock its full potential.
Tags : 
     Google
By: CA Technologies EMEA     Published Date: Aug 03, 2017
GDPR compliance can be achieved through a combination of people, processes and technology. This document has described solutions that can help organizations with their GDPR journey. But you can extend that protection and strengthen security controls even further via strong and risk authentication or workload automation for the processing automation of personal data helping you comply with GDPR as well as similar mandates. Regulations tend to set the minimum standards to be required, but in the application economy, open enterprises must ensure due diligence to protect one of the most important and critical assets: private customer information.
Tags : identity management, privileged user access, secure privileged credentials, secure hybrid it
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Aug 07, 2017
Durante los últimos años, la gestión de accesos con privilegios (un conjunto de funciones de control, monitorización y auditoría cuyo fin es mitigar los riesgos asociados a los usuarios, las cuentas y las credenciales con privilegios) se ha convertido en una de las principales prioridades para cualquier tipo de organización.
Tags : prevención de fugas de datos, gestión de las amenazas internas, auditoría y conformidad con normativas, infraestructura de ti híbrida
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Aug 07, 2017
The European General Data Protection Regulation (GDPR) will be upon us on May 25th 2018, and contrary to enduring public opinion, Brexit won’t make any difference. The GDPR comes in response to global shuffling of privacy laws to meet the growing demands of cloud, data security and other technological needs. The US Safe Harbor framework has been replaced with Privacy Shield, and on top of this is the e-Privacy Regulation, which takes specific interest in electronic communications, cookies for tracking user behaviour online, and other issues around personal data and consent.
Tags : gdpr, storage, access management, personal data, software development, ca technologies, anonymize data, privacy projects
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Oct 18, 2017
Die wichtigsten dieser identitäten sind die der privilegierten Anwender. Da diese Anmeldeinformationen den „generalschlüssel“ darstellen, werden sie zunehmend gestohlen und als hauptangriffsvektor benutzt.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Oct 18, 2017
Avec la prolifération des applications SaaS et des appareils mobiles, la sécurité réseau n’a jamais été aussi complexe. Vos employés et vos partenaires disposent désormais d’un niveau d’accès sans précédent à votre organisation, souvent hors des limites physiques de l’entreprise. En d’autres termes, votre sécurité basée sur le périmètre ne suffit plus : les identités sont devenues le nouveau périmètre.
Tags : 
     CA Technologies EMEA
By: CA Technologies EMEA     Published Date: Oct 18, 2017
C’est en volant les informations d’identification de ce tiers que les attaquants ont été en mesure d’exploiter les infrastructures informatiques des entreprises visées, pour y localiser des comptes à forts privilèges qu’ils ont ensuite utilisés pour accéder à des systèmes critiques et leur porter atteinte.
Tags : 
     CA Technologies EMEA
Start   Previous    59 60 61 62 63 64 65 66 67 68 69 70 71 72 73    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics