RSS feed Get our RSS feed

News by Topic

corporate app

Results 1 - 25 of 140Sort Results By: Published Date | Title | Company Name
By: MarkLogic     Published Date: Jun 09, 2017
This eBook explains how databases that incorporate semantic technology make it possible to solve big data challenges that traditional databases aren’t equipped to solve. Semantics is a way to model data that focuses on relationships, adding contextual meaning around the data so it can be better understood, searched, and shared. Read this eBook, discover the 5 steps to getting smart about semantics, and learn how by using semantics, leading organizations are integrating disparate heterogeneous data faster and easier and building smarter applications with richer analytic capabilities.
Tags : 
     MarkLogic
By: MobileIron     Published Date: Feb 08, 2017
Enterprise organizations around the world are rapidly shifting their corporate apps and data to the cloud to drive IT efficiency and expand employee access to business processes. This applies not only to productivity suites like Microsoft Office 365, but also to enterprise mobility management (EMM) solutions like MobileIron.
Tags : 
     MobileIron
By: AppAssure Software     Published Date: Jul 14, 2010
All those employees who access email, financial systems, human resources, and other core corporate applications; Replay for Exchange continuously protects and monitors the health of your Exchange data stores and allows administrators to quickly search, recover, and analyze mailbox content. With Replay for Exchange you can restore individual email messages, folders, or mailboxes to a live Exchange server or directly to a PST, thereby solving some of your most costly and time consuming challenges. Take advantage of these Free Trial Offer!!
Tags : appassure, sql, hyper-v, windows, vmware, replay, windows server, application server
     AppAssure Software
By: Commvault     Published Date: Jul 06, 2016
Email is the backbone of today’s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers, vendors, partners and investors. It is arguably today’s most pervasive and critical business application within which is stored the most valuable business content. To protect this vital information while working to eliminate risk, lower management costs and improve business insight, companies require a comprehensive email archiving solution. This solution should not only work to effectively retain email information in a searchable repository, the best email archiving solutions also provide a smarter approach to collecting, retaining and accessing data so that it can deliver true business value.
Tags : commvault, email archiving, data protection, email archiving solution, mailbox archiving, reduce bloat, o365, storage
     Commvault
By: Cisco     Published Date: Feb 23, 2016
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : customer engagement, business practices, technology, design management
     Cisco
By: Cisco     Published Date: Feb 23, 2016
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : design guide, customer engagement, design management, system management, website/graphic design
     Cisco
By: Cisco     Published Date: Jun 21, 2016
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
     Cisco
By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : mobility, business solutions, cisco, mobile applications, secure mobile
     Cisco
By: Cisco     Published Date: Jan 05, 2015
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : datacenter, data management, collaborations, business capabilities
     Cisco
By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : red hat, datacenters, enterprise, linux, security mechanisms, network firewalls
     Red Hat
By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters
     Red Hat
By: Adobe     Published Date: Oct 29, 2015
This white paper explains how training apps are emerging as an important component of any organisation’s ongoing digital transformation.
Tags : corporate training apps, mobility, mobile, mobile learning, training, digital training, e-learning, customer experience/engagement
     Adobe
By: Adobe     Published Date: Feb 09, 2016
This white paper explains how training apps are emerging as an important component of any organisation’s ongoing digital transformation.
Tags : corporate training apps, mobility, mobile, mobile learning, training, digital training, e-learning, customer experience/engagement
     Adobe
By: Adobe     Published Date: Feb 09, 2016
This white paper explains how training apps are emerging as an important component of any organisation’s ongoing digital transformation.
Tags : corporate training apps, mobility, mobile, mobile learning, training, digital training, e-learning, customer experience/engagement
     Adobe
By: Riverbed     Published Date: Jul 17, 2013
Riverbed Cascade is a new type of tool that incorporates traffic monitoring, packet capture and protocol analysis to provide an application-aware view of the network. Download this white paper from NetMedia to learn how Riverbed Cascade can help to solve your IT performance challenges.
Tags : network performance, management, performance management, riverbed cascade, riverbed
     Riverbed
By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : mobile devices, enterprise, best practices, management
     Microsoft
By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : mobile, cloud, best practices, productivity, technology
     Microsoft
By: OANDA | Solutions for Business     Published Date: Oct 19, 2016
Amid heightened volatility in global currency markets, companies involved in multi-currency transactions need to be extremely diligent about how they manage their exchange rate exposure. A sudden, unexpected market swing can have a major hit on a corporate balance sheet. Capable FX management involves much more than simply hedging against risk; in order to take the appropriate course of action, all levels of the organization need to be informed and involved—from the highest levels of corporate governance down. Download now to find out more!
Tags : 
     OANDA | Solutions for Business
By: Anaplan     Published Date: Mar 05, 2015
Financial consolidation systems are the ‘engine room’ of the corporate finance department, enabling companies of all sizes to comply with regulatory reporting requirements, company law and global accounting standards as well satisfy management’s need for periodic management reporting. But all is not well with standalone consolidations applications that were developed in the 1990’s and which are still commonplace in some of the world’s largest multinationals. According to one recent report, 47 percent of companies have made substantial investments in the last year in their financial close, filing, and reporting. Yet, despite the considerable sums of money invested in the process, management teams across the globe remain dissatisfied with the quality and timeliness of management information.
Tags : consolidation, planning, survey, performance, sales, audience, finance, strategic exercise
     Anaplan
By: SAP     Published Date: Jun 12, 2015
Competition for talent is fierce, and employer branding – or communicating why your company is a great place to work – is becoming a more sophisticated and more critical part of a recruiting strategy. While you communicate an employer brand in many ways, it’s most important on the corporate career site, where you have the opportunity to convert people you’ve touched through other channels into potential future employees. A poor user experience on your career site negatively impacts your employer brand and greatly reduces the chance that people will fill out an application. Download this white paper to discover five best practices that can help make your career site your # 1 recruiting asset.
Tags : 
     SAP
By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
Competition for talent is fierce, and employer branding – or communicating why your company is a great place to work – is becoming a more sophisticated and more critical part of a recruiting strategy. While you communicate an employer brand in many ways, it’s most important on the corporate career site, where you have the opportunity to convert people you’ve touched through other channels into potential future employees. A poor user experience on your career site negatively impacts your employer brand and greatly reduces the chance that people will fill out an application.
Tags : 
     SuccessFactors, an SAP Company
By: Blue Coat Systems     Published Date: Jun 30, 2011
Social and technological changes are transforming the nature of network traffic, raising network costs and performance issues. Learn how to proactively manage the WAN as new Web protocols, consumer and corporate video and cloud-delivered applications become mainstream.
Tags : blue coat, wan optimization, secure web gateway, application performance monitoring
     Blue Coat Systems
By: Code42     Published Date: Mar 31, 2015
File sharing is as necessary to business as payroll. Without the ability to distribute content in the corporate ecosystem, business would grind to a halt. Through the years, file-sharing solutions have come in all shapes and sizes. They’ve arrived in the enterprise legitimately— through sanctioned IT purchases—and by workers who smuggle in what they need to get their work done. When employees introduce their own devices, apps and clouds, they don’t knowingly circumvent the rules, they just desire easy, convenient technology. This brief outlines the dangers of personal cloud sharing and the benefits of enterprise-ready file sync and share. It also answers the big question “How do you convince employees to divorce the consumer-cloud and “marry up?” The answer is SharePlan—the enterprise sync and share solution that workers adore and enterprises trust.
Tags : fss, file sharing, personal cloud sharing, consumer cloud, shareplan, enterprise sync and share, security
     Code42
By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : network protection, it security, firewall, hacker detection, security management
     McAfee
By: Oracle HCM Cloud     Published Date: Jun 07, 2016
Leveraging analytics to drive business growth is top-of-mind for corporate (C-Suite) leaders, prompting HR executives to take a more strategic, data-driven approach to workforce management. Learn the art and science of combining workforce data, business data and IT expertise together to allow HR departments to make more effective and efficient decisions about people.
Tags : 
     Oracle HCM Cloud
Start   Previous   1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics