RSS feed Get our RSS feed

News by Topic

control

Results 101 - 125 of 2215Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: Dec 11, 2018
Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware.
Tags : 
     Akamai Technologies
By: Dell     Published Date: Aug 11, 2015
Download this paper to discover best practices for creating a tangible, cost-effective three to five year strategic plan that enables increased end user productivity while maintaining IT control.
Tags : 
     Dell
By: Dell EMC     Published Date: Nov 09, 2015
Download this white paper and learn how the Dell Hybrid HPC solution delivers a hybrid CPU and GPU compute environment with the PowerEdge C6320 and C4130 to: - Optimize workloads across CPU/GPU servers - Deliver the highest-density, highest-performance in a small footprint - Provide significant power, cooling and resource utilization benefits - Lower cost of ownership and enhance reliability through integrated Dell Remote Access Controller (iDRAC) and Lifecycle Controller
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Nov 04, 2016
With the 'EMC Mission Control' center in Portsmouth, UK and a second at the America’s Cup venue in Bermuda, plus a mobile center travelling worldwide to the preliminary events, Land Rover BAR will have all its data continuously replicated. The team in Portsmouth can analyze race and testing data immediately, as well as identify and make improvements right up to and through the finals in June 2017. This allows the design team and the crew to adapt much faster. With the introduction of the VCE VxRail Appliance powered by Intel® Xeon® processors, Land Rover BAR will be able to flexibly and rapidly scale, irrespective of location, ensuring a seamless experience for the team. To learn more about the impact of the Dell EMC VCE VxRail Appliance, read this brief infographic.
Tags : servers, flash storage, modular platforms, software-defined, networking, infrastructure
     Dell EMC
By: Dell EMC     Published Date: Nov 10, 2015
This white paper discusses the critical storage purchasing and planning strategies IT departments can and should adopt in order to gain control over the costs of storage refresh processes and extend the usability of their storage investments. Read this to learn more about the benefits of moving to a model that unbundles the factors driving storage upgrades.
Tags : 
     Dell EMC
By: International Business Systems (IBS)     Published Date: Aug 30, 2011
Revenue may be the sexy side of business, but reducing operating expenses is critical. It's no good growing your sales if the profits are leaking out
Tags : distribution logistics, distribution management, wholesale distribution, distribution resource management, supply chain management, erp, enterprise, resource
     International Business Systems (IBS)
By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : rdns, dns, anti-virus, security, network defense
     Akamai Technologies
By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : dns, rdns, security, zero trust security, malware, data, network security
     Akamai Technologies
By: TIBCO Software     Published Date: Mar 15, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Speakers:
Tags : 
     TIBCO Software
By: TIBCO Software GmbH     Published Date: Jan 15, 2019
The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and no need to rework faulty products. To satisfy the customer demand behind this trend, manufacturers must move quickly to new production models. Quality assurance is the key area that IT must support. At the same time, the traceability of products becomes central to compliance as well as quality. Traceability can be achieved by interconnecting data sources across the factory, analyzing historical and streaming data for insights, and taking immediate action to control the entire end-to-end process. Doing so can lead to noticeable cost reductions, and gains in efficiency, process reliability, and speed of new product delivery. Additionally, analytics helps manufacturers find the best setups for machinery.
Tags : 
     TIBCO Software GmbH
By: CA Technologies     Published Date: Jan 09, 2015
This paper focuses on the Insider threat to security and the controls available to reduce risk and enable information sharing within an organization.
Tags : insider threats to security, reducing risk of insider threats, enabling safe data sharing, ca security
     CA Technologies
By: Dell     Published Date: Dec 15, 2014
Many great choices abound, but you have to think carefully through the buying decision. The good news is, the ever-widening array of hardware choices provide IT buyers with matches to specific end user needs. The challenge is figuring out what choice is the right one. Focus on user productivity and cost controls as guidelines to start the refresh process. This infographic shows how.
Tags : dell, right pc, hardware, it buyers
     Dell
By: Dell     Published Date: Oct 24, 2014
Employees are increasingly using bring-your-own devices (BYOD) to work and accessing corporate IT resources from home. Until now, management of BYOD within IT was piecemeal, with most organizations cob¬bling together solutions that included mobile device management software, unified access suites, security, and hardware. Read this technology brief to learn how Windows Server 2012 R2 takes the guesswork and integration out of BYOD security and administration, providing one point of control and management for IT organizations.
Tags : byod, mobile device mangement, secure mobility
     Dell
By: webmechanix     Published Date: Mar 19, 2014
Introducing ETO Cloud for Government Agencies. Interoperable case management software designed to deliver better results by connecting people, programs, and services. Learn how it can put you in control of your organization’s data and help you produce measurable change in the communities you serve.
Tags : interoperability, case management software, eto software, human services software, workforce reporting, workforce development software, workforce development, wia reporting software
     webmechanix
By: Websense     Published Date: Jan 25, 2013
In this whitepaper, we provide guidance and clarity to help you implement a DLP control that is practical, efficient, and effective. Learn about 4 key topics of data breaches, potential vendors, 9 step framework and other best practices.
Tags : websense, data loss prevention, executive guide, data loss, practical guide, 4 topics, potential vendors
     Websense
By: PulseSecure     Published Date: Apr 01, 2015
Learn how to achieve a better bring your own device policy for your organization and properly implement an integrated VPN, access control, and mobile device management solutions to deliver network security and BYOD productivity.
Tags : byod, pulse secure, vpn, mobile device management, network security, productivity, security
     PulseSecure
By: Hewlett Packard Enterprise     Published Date: Jul 19, 2018
"The Enterprise Strategy Group put HPE SimpliVity hyperconverged infrastructure through its paces in a series of hands-on performance and stress tests simulating real-world configurations and load conditions. Read this report to learn how an HPE SimpliVity infrastructure: Ran nine workloads simultaneously, with an average response time across all applications of 3.9ms Showed little to no performance impact as a virtual controller, drive, and node were systematically failed on a two-node cluster."
Tags : hyperconverged, infrastructure, simplivity
     Hewlett Packard Enterprise
By: Dell     Published Date: May 09, 2017
Dell’s approach to PC Lifecycle management is designed to help customers make the change from IT maintenance to innovation all while controlling their PC infrastructure costs. With this eGuide IT professionals will learn how to deploy, secure, and support PCs with unparalleled efficiency leveraging Dell’s industry-leading hardware, services, and security solutions. Access the eGuide from Dell and Intel® and you will learn: • Why IT needs to take a different approach PC lifecycle management • The four critical stages of the PC lifecycle (Plan, Deploy, Manage, and Retire) • How to partner with Dell to strategically migrate to Windows 10 • What solutions can help in each phase to reduce costs and increase IT productivity • The latest security solutions to protect data and employees
Tags : it maintenance, pc lifecycle, pc infrastructure, pc support, pc lifecycle management
     Dell
By: FICO     Published Date: Aug 27, 2012
In this white paper, FICO describes how to use business rules management systems as a core technology to improve revenue while controlling costs.
Tags : cost control, underwriting, insurance, pos, point of sale, revenue generation, analytics, decision management
     FICO
By: IBM APAC     Published Date: Jun 21, 2019
Understanding cloud environments and making decisions about multiloucd management can be complex. Questions arise, such as how organizations need to change in this multicloud world. Working with enterprise customers, IBM has identified ten key pain points and related best practices that help organizations successfully navigate these transformations. This covers the following key pain points: • Cost transparency and visibility • Dynamic, up-to-date Catalog • IT to operate in two, connected models • Standardized consumption • Aggregated services for added value • Integration remains a necessity • Control without obstruction • Challenges of user management • Primary consumption: Machine-to-machine purchase • Internal and external IT role changes
Tags : 
     IBM APAC
By: Polycom     Published Date: Sep 04, 2012
To accelerate the assessment and treatment of stroke patients, Orlando Health turned to Polycom-based video collaboration.
Tags : polycom realpresence, mobile video collaboration, telemedicine, video conferencing, tele-health, case study, camera control
     Polycom
By: Bill.com     Published Date: May 14, 2012
Small and mid-sized business use Bill.com to help manage their cash flow and make better use of their resources. Here are the top ten things you can do with Bill.com to help take control of your organization's financial management.
Tags : cloud invoice, cloud, smb, management, invoices, bill.com, small business
     Bill.com
By: MobileIron     Published Date: Apr 20, 2015
As mobile users increasingly demand the ability to use their own devices for everything personal and work-related, IT is quickly losing control over end-user technology decisions. Enterprises can no longer ignore this reality, especially given the explosive global demand for mobile devices. (Guide written in Japanese)
Tags : enterprise, management, mobility, workforce, operating system, device, productivity
     MobileIron
By: Schneider Electric     Published Date: Jun 06, 2017
Could you do more for worker safety? Protective gear alone can't prevent arc flash injury. In fact, according to NFPA 70E, injuries sustained during an arc ?ash event would be reduced and survivable due to arc-rated PPE. Complying with the safe work practices required by NFPA 70E and implementing arc flash mitigation strategies through engineering controls will enhance workplace safety for employees and lower financial risk for your company. Read the white paper, "Mitigating Arc Flash Hazards", for more information.
Tags : arc flash, nfpa 70e compliance, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation solutions
     Schneider Electric
By: Schneider Electric     Published Date: Nov 21, 2017
Could you do more for worker safety? Protective gear alone can't prevent arc flash injury. In fact, according to NFPA 70E, injuries sustained during an arc ?ash event would be reduced and survivable due to arc-rated PPE. Complying with the safe work practices required by NFPA 70E and implementing arc flash mitigation strategies through engineering controls will enhance workplace safety for employees and lower financial risk for your company. Read the white paper, "Mitigating Arc Flash Hazards", for more information.
Tags : arc flash, nfpa 70e compliance, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation solutions
     Schneider Electric
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics