RSS feed Get our RSS feed

News by Topic

concerns

Results 51 - 75 of 323Sort Results By: Published Date | Title | Company Name
By: Q2 eBanking     Published Date: Jul 30, 2017
Banks and credit unions face multiple challenges to operational efficiency: tightening budgets, limited headcount, a challenging regulatory climate, ongoing security concerns and others. Efficiency and process enhancements can limit the impact these challenges could have on your institution. The following five questions—and your responses—may help your financial institution (FI) as you look to drive operational efficiencies, improve compliance and security, keep account holders happy and attract new ones.
Tags : 
     Q2 eBanking
By: IBM APAC     Published Date: Aug 25, 2017
Digital technologies have altered how people and businesses interact. Digital forces have created unprecedented levels of industry dislocation and are fundamentally changing business economics. To succeed in this disruptive environment,organizations will need to offer compelling new experiences, establish new focus, build new expertise and devise new ways of working. Business leaders will face a stark choice: Either digitally reinvent their enterprises, or watch as their businesses decompose around them. Successful Digital Reinvention will involve a fundamental reimagining of how an organization operates and how it engages with its environment.
Tags : technology factors, market factors, macroeconomic, technological disruption, regulatory concerns, socioeconomic factors
     IBM APAC
By: Okta     Published Date: Jul 01, 2015
Adobe wanted to enable creativity in their customers and allow them to be mobile and function in the cloud. Recognizing that identify was key to making this work they leveraged Okta to create a simple and secure customer experience. Watch this video to learn how Adobe found a way to bring IT and engineering together and overcome identify concerns.
Tags : 
     Okta
By: Okta     Published Date: Aug 24, 2015
Adobe wanted to enable creativity in their customers and allow them to be mobile and function in the cloud. Recognizing that identify was key to making this work they leveraged Okta to create a simple and secure customer experience. Watch this video to learn how Adobe found a way to bring IT and engineering together and overcome identify concerns.
Tags : 
     Okta
By: Dell & Microsoft     Published Date: Aug 14, 2013
Cost savings and increased flexibility are strong lures, but lingering concerns over security must be confronted and overcome.
Tags : cloud computing, it organizations, cost savings, flexibility, security
     Dell & Microsoft
By: CA Technologies     Published Date: Jan 14, 2015
Whether you were at the forefront of the mobility era or are just now catching up—or, most likely, somewhere in between—you’ve already experienced first-hand the business impact of ubiquitous smartphones and tablets. From employees to customers, mobile devices spawned an explosion in new applications, data, support needs, security concerns, and other issues. They’ve reset expectations for organizational speed and flexibility. They’ve dramatically increased the surface area for potential security attacks. All this, and the mobile era is still just in its infancy.
Tags : mobile busienss, smartphones, tablets, applications, data, support needs, security attacks, organizational speed
     CA Technologies
By: Red Hat     Published Date: Jun 23, 2016
The Middleware Services Group within Information Technology Services (ITS) at the University of North Carolina at Chapel Hill needed a comprehensive, dynamic solution for frequent server provisioning requests and, in particular, managed servers. Without such a solution, the likelihood that users would employ outside vendors significantly increased. Use of outside vendors would potentially increase security concerns, present additional costs, and further complicate system administration. Moving to a fully-interoperable Platform-as-a-Service (PaaS) offering, built on OpenShift Enterprise by Red Hat, has allowed the middleware services team to deliver a flexible development and hosting environment that has fostered innovation and increased peace of mind.
Tags : best practices, technology, productivity, enterprise, red hat
     Red Hat
By: CA Technologies     Published Date: Aug 22, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Digital transformation initiatives inevitably result in more points of access to enterprise infrastructure that are outside of existing controls, accessible by a greater number and more diverse set of identities, and proliferated across a distributed and dynamic infrastructure.
Tags : 
     CA Technologies
By: CA Technologies EMEA     Published Date: Sep 07, 2018
With the application economy in full swing, more organizations are turning to Continuous Testing and DevOps development practices in order to quickly roll out applications that reflect the ever-changing needs of tech-savvy, experience-driven consumers. Rigorous data they need, in the right formats. This forces teams to postpone their testing until the next sprint. As a result, organizations like yours are increasingly looking for ways to overcome the challenges of poor quality data and slow, manual data provisioning. They are also concerned about compliance and data privacy when using sensitive information for testing. CA Test Data Manager can help you mitigate all these concerns, so you’re positioned to achieve real cost savings.
Tags : continuous delivery, application delivery, testing, test data management
     CA Technologies EMEA
By: VMware     Published Date: Oct 12, 2018
With the benefits quickly stacking up, it’s easy to understand why Gartner stated HCI (Hyper-Converged Infrastructure) as one of the hottest trends in data centre infrastructure. HCI is intended to reduce infrastructure complexity and cost, whilst enhancing scalability, agility and operational efficiency. This consolidated infrastructure enables organizations to leverage the software layer by using low cost commodity hardware, while reducing concerns around vendor lock-in, to form a seamless software- defined IT infrastructure environment well suited to today’s IT challenges. Simple to use and manage, without specialists and more cost-effective than most traditional solutions, it’s easy to understand why more organisations are making the move from traditional architecture to Hyper-Converged Infrastructure. Submit the form to view the infograph to discover the benefits and whether this solution is right for you.
Tags : 
     VMware
By: Fidelis Cybersecurity     Published Date: May 15, 2019
This report, conducted by SC Media and sponsored by Fidelis asked security leaders, decision makers and influencers what they were most concerned about, what their C-Suite was most concerned about, and what they’re doing (or planning to do) about it. As we start off 2018 it is clear that cybersecurity is ripe for transformation. The focus has shifted away from tactical technologies that provide more proverbial fingers in the dam and towards a strategic approach that focuses on delivering quantifiable improvement to the effectiveness and efficiency of security operations. Download this a research report to: See what executives and boards of directors care most about. See the top obstacles, gaps and concerns faced by security leaders. See where we are on the road to cyber maturity, as reported by your peers. See when security professionals prefer tactical approaches and when they prefer strategic plans.
Tags : 
     Fidelis Cybersecurity
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
     Secureworks ABM UK 2017
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
     Trend Micro, Inc.
By: F5 Networks Inc     Published Date: Oct 19, 2012
Private cloud computing can better align IT with business concerns by making IT efficient, responsive, and cost-effective. Learn how to start your private cloud with automation and orchestration to gain operational efficiency and financial benefits.
Tags : private cloud, cloud automation, cloud orchestration, cloud security, secure cloud computing, applications in the cloud, data in the cloud, scalable private cloud
     F5 Networks Inc
By: TriNet     Published Date: Jul 28, 2015
Top 5 HR Compliance Concerns for Small Business
Tags : hr compliance, small business, infrastructure, administration results, hr functions, workplace litigation, benefit regulations, hr policies
     TriNet
By: NetApp     Published Date: Sep 29, 2014
As cloud deployments accelerate, there's no question that Federal agencies are reaping the benefits – improved agility, less IT complexity, and greater collaboration through shared services. But, while the benefits are clear, concerns around data stewardship and management can stop migrations in their tracks. So how are Federal agencies dealing with the control challenge? To find out, MeriTalk surveyed 153 Federal IT professionals closely involved in their agency's cloud implementations.
Tags : cloud control, it complexity, collaboration, data management, cloud implementations
     NetApp
By: CA Technologies     Published Date: Jul 13, 2015
The explosive growth of eCommerce has focused attention on security concerns associated with online payment transactions. Cardholders worry about the safety of online transactions while card issuers are concerned about balancing the risks and costs of payment fraud with a loss of revenue caused by transaction abandonment. The 3-D Secure protocol allows payment card issuers to reduce fraud in payment transactions by verifying cardholder identity during Card Not Present (CNP) transactions. Before a transaction is authorized, a cardholder can be challenged to enter a password, answer a question, or use some other form of authentication credential. This interruption in the transaction often causes legitimate customers to abandon the purchase resulting in loss of revenue for the issuer. The challenge is how to reduce fraud without impacting the user purchase experience.
Tags : ca technologies, cnp, emv, otp, 3dsecure
     CA Technologies
By: Dell EMC     Published Date: Aug 22, 2017
Digital information has quickly become the lifeblood of business success, enabling firms to become more operationally efficient and to better serve their customers. As companies seek to harness their data in new ways, the infrastructure that houses that data can falter under the strain. In response, new innovations have emerged to help address the concerns of managing and protecting these increasingly important data capacities. While some vendors focus innovation development on software alone and allow the hardware to remain commodity, Dell Technologies is delivering some impressive hardware innovation with Isilon’s next generation hardware to complement its software’s disruptive capabilities.
Tags : 
     Dell EMC
By: Mimecast     Published Date: Nov 14, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
     Mimecast
By: Akamai Technologies     Published Date: Mar 15, 2016
HIMSS Analytics, in partnership with Akamai, recently conducted a survey of U.S. hospitals to understand the current state of web security in healthcare as well as what plans are in place to improve preparedness. The results raise some concerns that despite greater consciousness of the increased risk to healthcare data security, many hospitals are still vulnerable to a wide range of cyberattacks. Read this survey to learn about critical weaknesses in hospital web security.
Tags : web security, healthcare, network management, security, cyberattack prevention, best practices
     Akamai Technologies
By: CA Technologies     Published Date: Jun 26, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Ensuring visibility and accountability for compliance, security and governance while enabling flexibility for digital transformation requires a fresh and more tightly aligned approach to who—and now what in the form of applications, services, machines and things—are given the keys to the kingdom: privileged access. Read this white paper to understand how the digital transformation journey requires thinking through a clear roadmap that spans multiple years, anticipating near- and long-term requirements from a privileged access management solution and ensuring scope and scale needs at a reasonable cost of ownership through the entire lifecycle.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Challenge Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure. Opportunity Multiple elements factor into how effectively an enterprise can embrace automation and advance the maturity of their transformation. However, security tools are central to enabling a structured and measured approach to managing critical access risks at each stage of the maturity model journey. With the right privileged access platform and set of tools, enterprises can progressively automate and scale access management to align risk
Tags : 
     CA Technologies
By: Carbonite     Published Date: Aug 02, 2017
As concerns over cloud security fade, they’ve been replaced by a new fear: the pain of migration.1 Failed migrations are forcing businesses to second-guess moving to the cloud. But the ability to migrate to new platforms is essential for businesses seeking agility in competitive markets. Here are five common mistakes you should avoid to ensure successful, non-disruptive migration from any source to any target
Tags : cloud migration, non-disruptive migration, cloud
     Carbonite
By: Carbonite     Published Date: Oct 04, 2017
As concerns over cloud security fade, they’ve been replaced by a new fear: the pain of migration. Failed migrations are forcing businesses to second-guess moving to the cloud. But the ability to migrate to new platforms is essential for businesses seeking agility in competitive markets. Here are five common mistakes you should avoid to ensure successful, non-disruptive migration from any source to any target.
Tags : migration mistakes, operations, dependencies, expectation setting, contingency planning
     Carbonite
By: New Voice Media     Published Date: Sep 19, 2017
This paper touches on the benefits of cloudbased contact centres but focuses on the concerns businesses have about cloud computing - performance, availability and security – and how NewVoiceMedia is successfully addressing them.
Tags : 
     New Voice Media
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics