RSS feed Get our RSS feed

News by Topic

it discovery

Results 201 - 214 of 214Sort Results By: Published Date | Title | Company Name
By: Sponsored by HP and Intel®     Published Date: Mar 05, 2013
Read this white paper sponsored by HP and Intel® for an overview of the HP Cloud Discovery Workshop and to understand how it can help clarify your company's cloud vision -- through costs, potential and innovations.
Tags : adapt technology, cloud, organization of cloud, cloud infrastructure, it infrastructure, cloud implementation, intel
     Sponsored by HP and Intel®
By: Oracle     Published Date: Nov 14, 2016
Get instant clarity with stunningly visual analysis and self-service discovery. Fast, fluid insights for the entire organisation.
Tags : 
     Oracle
By: IBM     Published Date: Feb 05, 2014
Companies increasingly rely on IT discovery to provide a complete picture of the infrastructure for IT optimization and migration initiatives. But current methods are costly, and they can take too long to deliver results. ALDM (analytics for logical dependency mapping), a new service from IBM Research, is changing all of that. In this interview, Larry Thompson, IBM offering development executive, explains how ALDM reengineers IT discovery with analytics, automation and cloud computing technologies and delivers a more complete and accurate view of your IT environment. Listen to the full 8-minute podcast interview or read the two-page encapsulated version to learn how ALDM is lowering the cost of IT discovery while speeding results.
Tags : 
     IBM
By: IBM     Published Date: Nov 12, 2014
There is an exponential increase in connected devices that are producing data about our homes, health, cars, and everything in between. The Internet of things (IoT) is exploding into apps that allow users to see and interact with these devices. Watson can enable IoT apps to understand the meaning and intent of the users that interact with these connected devices. Check out this upcoming webcast to learn how the cognitive services from IBM Watson available on Bluemix can make IoT apps be intelligent, overcome complexity, and support discovery and decision making.
Tags : cognitive internet, iot, iot apps, intent data
     IBM
By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common PCI DSS compliance challenges, questions to ask as you plan and prepare, core capabilities needed to demonstrate compliance, and how to simplify compliance with a unified approach to security
Tags : pci, dss, compliance, alienvault, security management, vulnerability management, cyberattacks, data breach prevention
     AlienVault
By: Intel Security     Published Date: Oct 20, 2015
Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : data center security, datacenter security, server security, endpoint security, virtual system security, data center virtualization, datacenter virtualization, virtual data center
     Intel Security
By: Mimecast     Published Date: Nov 06, 2017
Trying to manage disparate email solutions? Not just for e-discovery, archiving and recovery, but security and continuity as well? Your perfect-world archive is achievable. Reduce administrative complexity with a 100% cloud solution for not only your email archiving but continuity and security, too. Watch the virtual event on cloud archiving on-demand now, featuring: • Amanda Crew, from the hit show Silicon Valley, with a brief history of cringeworthy archive failures. • First-hand industry insight from Mimecast CEO Peter Bauer and CTO Neil Murray. • A deep dive demonstration of the leading cloud archive solution including, data protection, recovery, e-discovery and compliance features.
Tags : mimecast, virtual event, email archiving, email solutions, cloud archiving
     Mimecast
By: Mimecast     Published Date: Oct 02, 2019
Often, e-discovery solutions focus on the middle of the electronic discovery reference model (EDRM) and only concern themselves with review and production. Certainly, the majority of e-discovery cost is at the review stage and often the focus is on making that process as efficient as possible. The less you collect then the less you must review. A focus on best practices on the left?hand side of the EDRM can sow great rewards to be reaped later. Organizations that wait until they are sued before they start preparing for litigation lose no matter what the case outcome is. Sponsored by Mimecast, this paper from IDC details how e-discovery trends are changing to accommodate more in-house control and key recommendations on building a next-generation solution.
Tags : 
     Mimecast
By: Mimecast     Published Date: Oct 02, 2019
Often, e-discovery solutions focus on the middle of the electronic discovery reference model (EDRM) and only concern themselves with review and production. Certainly, the majority of e-discovery cost is at the review stage and often the focus is on making that process as efficient as possible. The less you collect then the less you must review. A focus on best practices on the left?hand side of the EDRM can sow great rewards to be reaped later. Organizations that wait until they are sued before they start preparing for litigation lose no matter what the case outcome is. Sponsored by Mimecast, this paper from IDC details how e-discovery trends are changing to accommodate more in-house control and key recommendations on building a next-generation solution.
Tags : 
     Mimecast
By: Druva     Published Date: Aug 04, 2016
The rise of the mobile workforce, combined with an increasing risk of litigation, has created a crisis for businesses. When faced with a request for eDiscovery—the production of electronically-stored information (ESI) in the course of a lawsuit or investigation—legal and IT teams must identify and place costly, time-consuming holds on responsive files. These holds apply across devices and repositories, both inside and outside the organization, including SaaS-based cloud applications such as Office 365, Google for Work, and Box. And lest these teams become complacent, saying “It won’t happen here,” it should be noted that in 2014, 34 percent of companies faced at least one lawsuit with more than $20 million at issue.
Tags : 
     Druva
By: Druva     Published Date: Aug 04, 2016
The rise of the mobile workforce, combined with an increasing risk of litigation, has created a crisis for businesses. When faced with a request for eDiscovery—the production of electronically-stored information (ESI) in the course of a lawsuit or investigation—legal and IT teams must identify and place costly, time-consuming holds on responsive files. These holds apply across devices and repositories, both inside and outside the organization, including SaaS-based cloud applications such as Office 365, Google for Work, and Box. And lest these teams become complacent, saying “It won’t happen here,” it should be noted that in 2014, 34 percent of companies faced at least one lawsuit with more than $20 million at issue.
Tags : best practices, storage, mobile workforce, technology, data, office 365, mobile device
     Druva
By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime associated with server migration have prevented many IT organizations from making the move to cloud. Some have valid concerns about cloud lock-in. Still, without cloud, IT teams are less agile, less flexible and less able to meet the demands of their business. With so much C-suite awareness of the cloud competitive edge, IT can no longer avoid taking this step. Carbonite DoubleTake™ Cloud Migration Center quickly and easily migrates physical, virtual and cloud workloads over any distance with minimal risk and near-zero downtime. The streamlined process automates 100 manual steps into five easy steps, automating everything from server discovery to target VM provisioning to the ultimate cutover. Using efficient real-time, byte-level replication technology, Cloud Migration Center creates a replica of the entire server being migrated and keeps it in sync with production systems. The migrated data can be validated without disrupting business operations, and downtime is
Tags : carbonite, cloud migration, automation, virtual workload, cloud workload
     Carbonite
By: IBM Watson Health     Published Date: Jul 06, 2018
The need Carson Tahoe Health needed insights to convince its board that an outpatient palliative care program could help address its higher-thanaverage mortality rates and help decrease the risk of future financial impact from those rates The solution The healthcare system used IBM® CareDiscovery to track and analyze end-stage patient mortality and related length of stay, readmissions, utilization and costs in key disease groups—by comparing those who participated in trial inpatient palliative care and those who did not The benefit The analysis was used to demonstrate to the system’s board that an outpatient palliative care service line was viable in terms of both cost savings and quality-of-care improvement
Tags : 
     IBM Watson Health
By: Tenable     Published Date: Mar 08, 2018
Which questions have you overlooked and why do the answers matter? According to Gartner, “OT SRM (security and risk management) leaders must ask the right questions during the technology procurement process to achieve long-term success in their security investments.” Further, Gartner states, “Translating IT security practices and copying IT security technology will not result in a secure operational technology (OT) environment.” By reading “7 Questions SRM Leaders Aren't Asking OT Security Providers,” you’ll learn which questions to ask, why they matter, and be armed with follow-up guidance to make smarter decisions. Questions covered include: - Does the Solution Provide Asset Discovery to Enable Operational Continuity and System Integrity? - Does the Solution Detect and Alert on Known Common Vulnerabilities and Exposures? - Does Your Solution Provide IT Support in Addition to OT? - Does Your Solution Support Secure IT/OT Alignment? Threats and vulnerabilities originally targeti
Tags : 
     Tenable
Start   Previous    1 2 3 4 5 6 7 8 9     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics