RSS feed Get our RSS feed

News by Topic

end use

Results 1 - 25 of 1720Sort Results By: Published Date | Title | Company Name
By: Hewlett Packard Enterprise     Published Date: Apr 26, 2019
Discover the transformational power of intelligent storage. A company’s competitive success depends greatly on how well it harnesses the value of its data. However, it can be challenging to keep pace with the increases in the scale of data being generated, as well as users’ demands for accessibility. Additionally, maximizing the value of digital information requires data to be leveraged at both the optimal time and the optimal place. With HPE’s intelligent storage portfolio, organizations can modernize their IT to better understand their customers, run more agile IT functions, and improve logistical operations.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Apr 26, 2019
With the maturing of the all-flash array (AFA) market, the established market leaders in this space are turning their attention to other ways to differentiate themselves from their competition besides just product functionality. Consciously designing and driving a better customer experience (CX) is a strategy being pursued by many of these vendors.This white paper defines cloud-based predictive analytics and discusses evolving storage requirements that are driving their use and takes a look at how these platforms are being used to drive incremental value for public sector organizations in the areas of performance, availability, management, recovery, and information technology (IT) infrastructure planning.
Tags : 
     Hewlett Packard Enterprise
By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Technology BUSINESS CHALLENGE Reduce the impact of malware on enterprise resources IT ENVIRONMENT Symantec antivirus, layered enterprise security SOLUTION Malwarebytes Incident Response RESULTS Saved hours per week by eliminating manual threat remediation Detected and remediated threats that otherwise would not have been found Eliminated downtime for end users with thorough scans and fast remediation Easily generated reports that keep upper management informed
Tags : 
     MalwareBytes EMEA
By: Fidelis Cybersecurity     Published Date: May 15, 2019
When it comes to cybersecurity, you can only defend what you can see. Organizations continue to suffer breaches, oftentimes because they do not have continuous, real-time visibility of all their critical assets. With more data and applications moving to the cloud, IoT and other emerging technologies, the attack surface continues to expand, giving adversaries more blind spots to leverage. Watch a webinar with SANS where we examine how to: Discover, classify and profile assets and network communications Detect threats and decode content in real-time at wire speed Hunt for unknown threats via rich, indexable metadata Alter your terrain and attack surface with deception to slow down attackers By knowing your cyber terrain and increasing the risk of detection and cost to the adversary, you can gain a decisive advantage.
Tags : 
     Fidelis Cybersecurity
By: Schneider Electric     Published Date: May 20, 2019
Keeping aging switchgear performing at optimum performance levels can be challenging. When it comes to the reliability of an electrical distribution system, it’s not a question of if a system component will malfunction, but when. Electrical equipment ultimately degrades and reaches the end of its useful life, no matter how much maintenance is performed. And, with the advancements in the design of the new circuit breakers, those with older technology are no longer considered sustainable solutions. Plant managers and engineers must ensure continuity of operations and develop a plan to replace or upgrade aging switchgear. Facilities without a properly-implemented strategy put operations at risk that could lead to safety issues, equipment damage and/or downtime.
Tags : modernization, electrical distribution system, schneider electric
     Schneider Electric
By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
IBM Cloud Private for Data is an integrated data science, data engineering and app building platform built on top of IBM Cloud Private (ICP). The latter is intended to a) provide all the benefits of cloud computing but inside your firewall and b) provide a stepping-stone, should you want one, to broader (public) cloud deployments. Further, ICP has a micro-services architecture, which has additional benefits, which we will discuss. Going beyond this, ICP for Data itself is intended to provide an environment that will make it easier to implement datadriven processes and operations and, more particularly, to support both the development of AI and machine learning capabilities, and their deployment. This last point is important because there can easily be a disconnect Executive summary between data scientists (who often work for business departments) and the people (usually IT) who need to operationalise the work of those data scientists
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
The increase in sophisticated, targeted security threats by both external attackers and malicious insiders have made it extremely difficult for organizations to properly protect critical and sensitive information. The task of protecting these assets has only grown harder as IT environments have become more complex and widely distributed across geographic locations and in the cloud. Many recent high-profile breaches have one thing in common: They were accomplished through the compromise of passwords. In many cases, end-user passwords are initially hacked through various social engineering techniques. Then permissions are escalated to gain access to more privileged accounts — the keys to the kingdom. This unauthorized access can easily go undetected for weeks or even months, allowing hackers to see and steal information at their convenience. Unfortunately, many IT users lack a full understanding of how privileged accounts function, as well as the risks associated with their compromise an
Tags : 
     Group M_IBM Q2'19
By: Bluecore     Published Date: Mar 04, 2019
For a company that sells wool products, the dog days of summer can be tough. Despite this challenge, Pendleton has managed to stay relevant even during the hottest days of the year thanks to Bluecore. “In June and July, having Bluecore send people emails based on what they browsed is especially helpful because we don’t have as many messages or new products going out. So as often as people come to our site is as often as they’ll get emails, and those emails are guaranteed to be relevant to them. If the onus was on blast emails, then we’d be showing people products that are not necessarily relevant to them or that they might think are terribly out of season,”
Tags : email marketing, triggered emails, audience segmentation, email capture
     Bluecore
By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for today’s modern threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, an industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
     Forcepoint
By: Blue Prism     Published Date: Mar 15, 2019
If you're going to implement an automation tool, ensure that the tools and solutions you implement can carry your business through the rapidly changing marketplace. Desktop recording and attended automation program offer a quick return on investment but overtime, because the scripts they use so frequently become obsolete - the total cost of ownership (TCO) over the long run simply isn't sustainable.
Tags : 
     Blue Prism
By: Blue Prism     Published Date: Mar 28, 2019
Robotic process automation describes the use of technology to automate tasks that are traditionally done by a human being. The technology itself mimics an end user by simulating user actions such as navigating within an application or entering data into forms according to a set of rules. RPA is often used to automate routine administrative tasks that typically require a human being to interact with multiple systems, but RPA technology is evolving to support the automation of increasingly sophisticated processes at scale within enterprise architectures rather than on the desktop. Over the past two years, RPA has been adopted by a number of business process outsourcing (BPO) providers and a growing number of end-user organizations are now deploying the technology themselves to create “virtual workforces” of robotic workers.
Tags : 
     Blue Prism
By: Equinix APAC     Published Date: May 22, 2019
According to IDC, almost half of IT spending will be cloud-based in 2018, reaching 60% of all IT infrastructure and 60-70% of all software, services and technology spending by 2020. Today’s top-performing organizations are benefiting from hybrid and multi cloud scenarios. Industry thought leaders share their perspectives and insights on how enterprises across the region are reshaping their cloud strategies to stay ahead. • Industry Trends - William Lee, Research Director at IDC • Industry Best Practices - Brent Kendrick, Regional Director APAC, Microsoft • End User Perspective - T C Chao, Senior Manager, Ricoh • Industry Insights - Tejaswini Tilak, Sr. Director, APAC, Equinix Watch the webinar broadcast and a copy of the latest IDC cloud research report in addition.
Tags : 
     Equinix APAC
By: Velaro     Published Date: Jul 09, 2014
Application downtime impacts everyone. This paper provides best practices for communicating application downtime to end-users in a manner that maintains - or can even improve- your organization's credibility and brand image. Learn what to do and what not to do in this informative white paper.
Tags : 
     Velaro
By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
     Ounce Labs, an IBM Company
By: ASG Software Solutions     Published Date: Aug 04, 2009
Businesses expect IT management to demonstrate their contributions to end-user benefits and the bottom line while addressing immediate needs and long-term performance management goals. This white paper presents IT2020, a new performance management paradigm for meeting both of these expectations.
Tags : asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Jun 02, 2009
End-user expectations and high levels of performance against Service Level Agreements (SLAs) must be achieved or organizations risk the loss of business. This paper details key capabilities needed for successful end-user monitoring and provides critical considerations for delivering a successful end-user experience.
Tags : asg, cmdb, bsm, itil, bsm, bsp, metacmdb, user experience
     ASG Software Solutions
By: ASG Software Solutions     Published Date: May 05, 2010
Read this topical and informative white paper from EMA Research and see how you can attain peace of mind that your end user's application performance will exceed expectations.
Tags : asg, end user, service assurance, ema, it infrastructure, service management
     ASG Software Solutions
By: 123Together     Published Date: Mar 17, 2009
With the current state of the economy, IT executives are being asked to stretch their budgets in order to keep their businesses profitable. In 2008, Median IT spending per user fell to $6,667 from the previous year's $7,397, according to Computer Economics. This represents a 6.2% reduction, consistent with the fact that IT managers were supporting an increasing number of users without corresponding increases in IT spending. IT spend continued to decline in 2009 and uncertainty and caution is still prevalent in 2010.
Tags : 123together, it strategies, economy, stability, collaboration, green it, outsourcing, microsoft exchange
     123Together
By: Good Technology     Published Date: Sep 27, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
     Good Technology
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics