RSS feed Get our RSS feed

News by Topic

control

Results 326 - 350 of 2209Sort Results By: Published Date | Title | Company Name
By: Staples     Published Date: Oct 24, 2018
Cybersecurity risks don’t begin and end with your PCs. Watch this webinar to hear HP’s top security expert Ron Chestang detail some surprising security issues lurking in your print network and outline specific controls you can use to minimize the risk.
Tags : mps, cybersecurity, print security, managed print, print networks, network security, it security, security
     Staples
By: Oracle ODA     Published Date: Oct 19, 2016
Listen as Oracle Executive Vice President of Converged Infrastructure Dave Donatelli announces the expansion of the Oracle Database Appliance portfolio, and explains how Oracle can provide organizations with a pathway to the cloud. Discover how your organization can reduce database complexity, simplify database administration, and better control costs.
Tags : 
     Oracle ODA
By: CA Technologies     Published Date: Sep 13, 2017
"Companies have complied with data protection directives and regulations for more than two decades. But the General Data Protection Regulation (GDPR), an overhaul of existing European Commission data protection legislation, aims to strengthen and unify those laws for EU citizens. Primary GDPR objectives are to give citizens back control over their personal data and simplify the regulatory environment for international business. For organizations already compliant with Directive 95/46/EC, what do they need to do from a technology perspective to comply with GDPR? Read this solution brief to see how CA can help you with GDPR compliance."
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
     CA Technologies
By: GE Power     Published Date: Jan 27, 2017
Don’t wait to implement your cyber protection program. An excellent place to begin developing your approach is with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment.
Tags : cyber security, power plants, utilities, power producers, power plant, cyber attacks, power grids, power industry
     GE Power
By: VMware     Published Date: Jul 24, 2017
Workspace™ ONE™ is VMware’s digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMware’s decisions of how and when to deploy, plus an overview of the business results we’ve achieved so far.
Tags : 
     VMware
By: Progress     Published Date: Oct 09, 2017
"The customer experience is incredibly important to business success and is often tied to customer engagement, retention rates, revenue, purchase frequency and overall loyalty. Today, the customer journey is incredibly complex, with everything from geographic location to data quality influencing the customer experience. As a result, brands may not be making the most of their customer experiences. However, with a mix of new technology combined with best practices, companies can regain control of the customer journey and create memorable experiences for their customers. "
Tags : 
     Progress
By: WorkBook from Deltek     Published Date: Jul 20, 2018
Over–servicing is a very real issue for agencies. As a business whose value is judged on the quality of service, it is all too easy for agencies to always want to go the extra mile for clients, both happy and unhappy. Our research into the creative industry shows that while 75% of agency time is spent on client work, only 70% of that time is actually billed to clients. In this eGuide, we will show you 4 ways to take more control and avoid over–servicing in your agency.
Tags : 
     WorkBook from Deltek
By: Intel     Published Date: May 02, 2017
Enabling communications service providers to scale up and support rapidly rising 4G LTE traffic while controlling costs
Tags : virtualisation, cost reduction, network transformation
     Intel
By: UPS     Published Date: Sep 01, 2017
Growth in new markets introduces new costs to control, regulations to manage, and supply chain complexities to solve. Longer, more complicated cold chains mean that collaboration with third party logistics providers (3PLs) can help make the difference between profitable simplicity and unmanageable complexity. Companies are increasingly relying on their 3PLs for services such as monitoring and intervention, contingency planning, and cost control. Reduce risk by improving packaging, visibility, and establishing QA best practices. Improved visibility, new tools, new monitoring capabilities and appropriate packaging can also help drive down costs for shippers.
Tags : healthcare, cold chain, efficiency, ups, practices
     UPS
By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
The past five years have marked the beginning of the “Age of the Customer,” in which technology and economic forces have put customers in control of their interactions with businesses. These businesses, hoping to understand and serve customers in a global and digital economy, are almost universally undergoing digital transformation, which involves realigning and investing in new technology and business models with a specific focus on the customer experience.
Tags : online customer experience, cross channel, call center agent, improving mobile, store/branch, phone service, social computing
     Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
By: Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017     Published Date: Jul 12, 2017
Enterprises tend not to view project management as a holistic process. Much like the disparate systems they have in place, they see a disparate collection of issues. They typically look to solve specific pain points with single applications. Rather than migrate an entire enterprise to a new system, they are looking to manage a problem spot and have it flow into a specific component (e.g., cost, human capital leverage, or how demand is driven) as needed. In many cases, however, the pain points are symptoms of a larger issue, and to remove them the situation must be viewed in the context of the full project life cycle. Oracle Project Portfolio Management (PPM) Cloud, part of the integrated suite that is Oracle ERP Cloud, not only does this, but it’s also built with the user in mind… solving the PPM pain points through role-based analytics, social collaboration, optimization, costing, control, and mobile solutions for today’s project team.
Tags : ppm, project portfolio management, erp, oracle, cloud
     Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017
By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 12, 2017
The manufacturing industry has entered a completely new technological realm that did not even exist five years ago. Three industrial revolutions forever changed manufacturing—and the world—and the fourth is now underway. Factories have had to adapt rapidly with the advent of advanced automation and robotics as well as software to manage processes and control. The onset of digital manufacturing accelerates the need for new approaches. While consumers typically embrace disruptive technology with enthusiasm, manufacturers inevitably approach new technology with caution, carefully evaluating how it can improve their businesses. Eventually, however, caution must be replaced with innovation to ensure survival. Those organizations that find themselves on the wrong side of the technology curve today will face increasing challenges to remain competitive as time marches forward.
Tags : supply chain management, scm, manufacturing, digital manufacturing
     Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
By: PODS for Business     Published Date: Jul 24, 2017
The constant churn of product selection is not just time-consuming, it requires meticulous attention to detail, a reliable product tracking system, and significant physical space. Mastering inventory results in much more than simply organizational improvements. It can lead to increased revenues, better theft control, improved forecasting and budget setting, and even smoother customer service.
Tags : inventory, management, efficiency, theft control, revenue
     PODS for Business
By: Exabeam     Published Date: Sep 25, 2017
This solution brief will describe how Exabeam can help organizations implement effective security controls and best practices to achieve alignment with GDPR.
Tags : 
     Exabeam
By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Credential stuffing is on the rise. Bots are getting smarter and malicious actors are getting more confident. Unfortunately, these advanced cyberattacks are also becoming more difficult to detect with standard security controls. Learn more about credential stuffing and how you can protect your business, your brand, and your customers from bots that commit fraudulent activity.
Tags : credential, bots, business, risk, management, security, cyberattacks
     Akamai Technologies Australia
By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : control, visibility, customer, financial risk, web fraud, bots, infrastructure
     Akamai Technologies Australia
By: Schneider Electric     Published Date: Jun 05, 2018
Balancing the increased pressure to improve productivity and quality, while reducing cost against mandated safety regulations is one of the most complex challenges in industry today.
Tags : process automation, ecostruxure plant, operational profitability, cybersecurity, safety, smart control, empowered operators, optimized assets
     Schneider Electric
By: Schneider Electric     Published Date: Jun 05, 2018
Integrating safety and process environments can improve reliability, profitability and cybersecurity. Read Frost & Sullivan’s white paper and plan your digital transformation today.
Tags : process safety, profitable safety, smart control, empowered operators, optimized assets, future of automation, reliability, cybersecurity
     Schneider Electric
By: Schneider Electric     Published Date: Jun 05, 2018
Since the sepia-toned days of the early 19th century, industry has sought effective ways to control manufacturing and production processes. New technology has greatly influenced factories and plants, resulting in new operational approaches to maximize benefits and achieve 100% ROI in a very short time.
Tags : process control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
     Schneider Electric
By: Schneider Electric     Published Date: Jun 05, 2018
Power industries - including Nuclear, Fossil, Hydro, Wind and Geothermal - are susceptible to a variety of cyber threats which can wreak havoc on control systems. Management, engineering and IT must commit to a comprehensive approach that encompasses threat prevention, detection and elimination.
Tags : smart control, power generation, power industry, empowered operators, optimized assets, future of automation, reliability, safety
     Schneider Electric
By: Schneider Electric     Published Date: Jun 05, 2018
Cybersecurity threats are an unfortunate reality for industry everywhere. How do you protect your business while still embracing new technologies that enable you to grow and deliver the best possible results? Robust cybersecurity protection is a must, as well as rigorous mindset, policies, and methodologies. Download the whitepaper to learn more.
Tags : cybersecurity, smart control, empowered operators, optimized assets, future of automation, reliability, safety, operational profitability
     Schneider Electric
By: Schneider Electric     Published Date: Jun 05, 2018
Today’s plants are faced with managing two major challenges: the increasing speed of business and integrating emerging technologies. Leveraging IIoT as a basis for plant modernization could result in big payoffs: download the white paper to learn more.
Tags : smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
     Schneider Electric
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics