RSS feed Get our RSS feed

News by Topic

concerns

Results 301 - 323 of 323Sort Results By: Published Date | Title | Company Name
By: NETIQ     Published Date: Mar 12, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : security compliance, users access management, it management compliance
     NETIQ
By: HP and Intel ®     Published Date: May 06, 2013
This paper examines historical concerns about Linux virtualization, and assesses why, when, and how enterprises can safely virtualize their critical Linux workloads. We also review a Linux virtualization solution that meets enterprise needs -- the powerful combination of Red Hat Enterprise Virtualization and HP ProLiant Servers.
Tags : linux, virtualization, data center, research, enterprise
     HP and Intel ®
By: CareCloud     Published Date: Jan 26, 2015
Somerset Orthopedic Associates (SOA) has always been on the cutting edge of medicine. In fact, SOA opened the first orthopedic-specific ambulatory surgical center (ASC) in the state of New Jersey in 1997. However, like many medical groups, SOA came to realize that when it came to practice management (PM) software, it had been holding onto an outdated system for too long. Although the seven-surgeon group was growing, so too were the frustrations and costs associated with its client-server system, not to mention concerns about keeping up with industry change. Determined to make the group more nimble, SOA’s Administrator of over 16 years, Alexandra Archibald, set out in search of a new PM-EHR solution.
Tags : carecloud, modern practice management, orthopedic specific, outdated systems, asc, soa, client server system
     CareCloud
By: Logicalis     Published Date: Feb 14, 2014
Learn the top trends and concerns for choosing the right infrastructure-as-a-service (IaaS) provider.
Tags : logicalis, iaas, infrastructure-as-a-service, iaas market
     Logicalis
By: Logicalis     Published Date: Mar 17, 2014
The success of an outsourced service desk initiative really comes down to one thing: the satisfaction of your users. As you seek a provider, keep that in mind.
Tags : 
     Logicalis
By: Logicalis     Published Date: Mar 21, 2014
Learn the top trends and concerns for choosing the right managed services partner.
Tags : logicalis, modular computing, data optimization, cloud computing, network rationalization
     Logicalis
By: Logicalis     Published Date: Mar 21, 2014
Learn the top trends and concerns for choosing the right service desk provider.
Tags : logicalis, modular computing, data optimization, cloud computing, network rationalization
     Logicalis
By: IBM     Published Date: Aug 06, 2014
Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.
Tags : ibm, banking, mobility, risk, mitigation, security
     IBM
By: Cisco     Published Date: Aug 18, 2014
You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the revival of distributed denial-of-service (DDoS) attacks.
Tags : security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network
     Cisco
By: Dell     Published Date: Nov 15, 2016
PCs have been the core productivity tool for organizations for years, but the workforce and technology trends are changing dramatically. With Windows 10, hypermobile employees, and increasing security threats, it’s more critical than ever for IT to understand how the latest PCs have evolved to tackle these challenges. Download this eGuide from Dell and Intel® to learn how… · Dell’s latest commercial notebooks, 2-in-1s, tablets and desktops are thinner, lighter, faster, and more beautiful than ever before · New PCs can increase productivity by up to 50% and reduce security concerns with built-in data protection software · Windows 10 will affect commercial organizations and how IT can plan for the next wave of PCs and devices
Tags : upgrade, principled technologies, mobility, windows 10
     Dell
By: Tyco Integrated Security     Published Date: Sep 10, 2015
The role of the CMO is rapidly evolving as CEOs raise expectations about how marketing should contribute to company growth. Who are today’s CMOs, where did they come from, what do they do best and how do they do it? gyro, Forbes Insights and SAP surveyed more than 300 marketing executives to find out. Uncover answers and insights when you discover the unique traits that create a “growth CMO,” an elite marketer who successfully drives cultural change, builds marketing capabilities for the future and achieves compelling business results.
Tags : 
     Tyco Integrated Security
By: Intel Security     Published Date: Oct 20, 2015
This in-depth report provides a detailed look at a recent survey carried out by Intel Security exploring the topic of data exfiltration. Participants were asked about their top concerns, breach and exfiltration details, outsider and insider threats, exfiltration differences between traditional networks and cloud applications, and the tools and practices they use to identify and prevent data exfiltration.
Tags : data exfiltration, data loss prevention, dlp
     Intel Security
By: MobileIron     Published Date: Apr 13, 2015
Enterprises around the world have been searching for a way to securely enable Android™ devices for work, but have shied away from the platform due to ongoing security and fragmentation concerns. Delayed or non-existent Android security patches, malicious app store activity, and other security gaps have led organizations to distrust the platform, particularly those in industries with tight security and compliance requirements. This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
     MobileIron
By: IBM     Published Date: Jul 20, 2016
A successful business case is one that enables your organisation’s business leaders to make the right decisionabout a Talent Analytics investment. In this report we highlight the key aspects you need to think about as you create your own business case for Talent Analytics, starting with getting a clear handle on why it is a worthwhile investment for your organisation, but also addressing considerations such as budget and resourcing concerns, how you can measure the success of your initiative and demonstrate ROI, and the major risks you need to bear in mind over the lifetime of the initiative.
Tags : ibm, mwd advisors, talent analytics
     IBM
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Enterprises are moving to the cloud because it offers greater flexibility and lower cost. The first wave of cloud native and content apps are well on their way, but there's a new wave of traditional enterprise applications that enterprises are still struggling to move to the cloud. The Q&A walks you through the most common issues related to cloud storage—and how HPE Cloud Volumes put any remaining concerns to rest.
Tags : 
     Hewlett Packard Enterprise
By: Jamf     Published Date: Mar 13, 2018
The word is out. Apple has officially arrived in the enterprise. Once thought of as only for consumers, Apple has not so quietly created a $25 billion enterprise business — with no signs of slowing. If you want to join the Apple at work movement, but have questions yourself about security best practices or, more likely, need to alleviate the security concerns of your executives or information security team, we can help. Topics covered include: • How the Apple ecosystem is structured • How Apple management differs from Windows • What security features are unique to the Apple ecosystem • What to consider when adding new Apple devices • What Apple integrations are available to leverage what you already have
Tags : 
     Jamf
By: Lookout     Published Date: Mar 28, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : insights, mobile, security, byod, lookout
     Lookout
By: Lookout     Published Date: Mar 28, 2017
Enterprise mobility started with the Blackberry, a revolutionary messaging device that solved security concerns by giving IT managers the ability to set many restrictions on its functionality. In the following years, employees started using fully-functional, internet-capable smartphones in their personal lives and demanded the same capabilities at work.
Tags : enterprise, mobile, security, lookout, revolutionary
     Lookout
By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime associated with server migration have prevented many IT organizations from making the move to cloud. Some have valid concerns about cloud lock-in. Still, without cloud, IT teams are less agile, less flexible and less able to meet the demands of their business. With so much C-suite awareness of the cloud competitive edge, IT can no longer avoid taking this step. Carbonite DoubleTake™ Cloud Migration Center quickly and easily migrates physical, virtual and cloud workloads over any distance with minimal risk and near-zero downtime. The streamlined process automates 100 manual steps into five easy steps, automating everything from server discovery to target VM provisioning to the ultimate cutover. Using efficient real-time, byte-level replication technology, Cloud Migration Center creates a replica of the entire server being migrated and keeps it in sync with production systems. The migrated data can be validated without disrupting business operations, and downtime is
Tags : carbonite, cloud migration, automation, virtual workload, cloud workload
     Carbonite
By: Datastax     Published Date: May 20, 2019
Mainframe technology is struggling to keep up with the data demands of today’s businesses. And yet, many businesses continue to rely on mainframes in spite of growing concerns around security, capacity, and performance. This white paper explains how adopting a data modernization strategy that incorporates your mainframe can save you millions of dollars in operating costs.
Tags : 
     Datastax
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : firewall, r&s, visibility, application, network, secure, cloud, business applications
     Rohde & Schwarz Cybersecurity
By: Lenovo - APAC     Published Date: Jul 02, 2019
Don’t let your guard down. 4.5 billion records were compromised in the first half of 2018 and threats are growing in numbers. But keeping your data, devices and your employees safe doesn’t have to be complicated. There’s one solution that gives you complete protection, no matter where you are. ThinkShield is Lenovo’s end-to-end protection, built-in to devices. And it’s giving organisations like yours the confidence to make fearless business decisions, without security concerns. Read the eBook to find out how your security compares to organisations like yours, and how to protect what matters.
Tags : 
     Lenovo - APAC
By: Lenovo - APAC     Published Date: Jul 08, 2019
Don’t let your guard down. 4.5 billion records were compromised in the first half of 2018 and threats are growing in numbers. But keeping your data, devices and your employees safe doesn’t have to be complicated. There’s one solution that gives you complete protection, no matter where you are. ThinkShield is Lenovo’s end-to-end protection, built-in to devices. And it’s giving organisations like yours the confidence to make fearless business decisions, without security concerns. Read the eBook to find out how your security compares to organisations like yours, and how to protect what matters.
Tags : 
     Lenovo - APAC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics