RSS feed Get our RSS feed

News by Topic

it manager

Results 201 - 225 of 956Sort Results By: Published Date | Title | Company Name
By: Splunk     Published Date: Sep 10, 2018
collectd is an open source daemon that collects system and application performance metrics. With this data, collectd then has the ability to work alongside other tools to help identify trends, issues and relationships not easily observable. Read this e-book to get a deep dive into what collectd is and how you can begin incorporating it into your organization’s environment.
Tags : it event management, it event management tool, event logs, aiops platform, what is aiops, aiops vendor, market guide for aiops platforms, guide for aiops platforms
     Splunk
By: Spredfast     Published Date: Aug 24, 2018
Learn how to better connect with your audiences on each social channel. Our 2018 Social Audience Guide breaks down everything you need to know to from demographics, device usage and even site behavior. Start engaging in a more meaningful way, today. Download your guide.
Tags : social branding, social media branding, social media marketing courses, social media courses, social media management tools, social media monitoring, social media training, online marketing
     Spredfast
By: Spredfast     Published Date: Aug 24, 2018
It only takes one accidental Tweet to undo years of brand reputation. It's important to understand the opportunities and risks your brand faces on social, and what you can do about them. Download this whitepaper to learn more about the risks and gain advice and tips on how to protect your brand.
Tags : social media risk management, risks of social media, social media compliance, social media user management, social media security, social media management tools, social media monitoring, social media governance
     Spredfast
By: Spredfast     Published Date: Aug 24, 2018
Learn more about how Live Nation used Spredfast to bridge social gaps by creating an environment of seamless collaboration between the central and local marketers.
Tags : social media manager, social media management tools, social media tools, social media agency, social media management company, social media marketing companies, best social media management tools, social media marketing agency
     Spredfast
By: Spredfast     Published Date: Aug 24, 2018
Looking for a general primer or quick tactical reference on social marketing? We wrote the 2018 version of the Social Media Pocket Guide for you. In engaging, easy-to-read chapters, the Pocket Guide provides a broad overview of social media’s evolution — including current themes like pay to play, digital integrations, social care, and more. We also break down the latest tips and tactics for the four most common social objectives and explore specific use cases like product launches, events, and capitalizing on real-time trends. Do you learn by example? This guide is packed with fresh strategy inspiration from 15 different global brands and media properties. Keep The Social Media Pocket Guide on hand as your quick and definitive reference on all things social strategy.
Tags : social branding, social media branding, social media marketing courses, social media courses, social media management tools, social media monitoring, social media training, online marketing
     Spredfast
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
“We ruled out Zscaler due to its overly complex architecture and PAC file requirements. The ongoing management would have been a nightmare.” - Marc Tournier, Information Security and Compliance Manager (CISO), Avril Group
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
“We liked that Umbrella’s intelligent proxy would give us granular protection without the performance impact of a traditional web proxy.” - Torben Olsen, Corporate Information Security Manager, Lundbeck
Tags : 
     Cisco Umbrella EMEA
By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security
     Illusive Networks
By: Illusive Networks     Published Date: Apr 10, 2019
Do you know how attackers can move once they’re inside your network? The access footprint changes constantly as users log on and off, restart systems, change roles, and access resources. Until now, these conditions have only been visible when skilled analysts inspect individual systems. Attack Surface Manager reveals hidden credentials and paths to critical systems so you can continuously impede attacker movement—without impeding the business.
Tags : attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security
     Illusive Networks
By: Aerohive     Published Date: May 13, 2015
A paper on enabling cloud networking to lower IT costs & boost IT productivity.
Tags : benefits of cloud networking, advantages of cloud networking, cloud, networking, cloud networking, aerohive networks, hivemanager, cloud computing
     Aerohive
By: Aerohive     Published Date: May 19, 2015
The Rimi chain of supermarkets started out in Norway in 1977 as ”RIMI 500”, and was acquired by the Swedish ICA supermarket chain in 1992.
Tags : wireless network, network management system, workforce mobility, improvements in stock management, retail, aerohive networks solution, stores with aerohive networks, mobility
     Aerohive
By: Teradata     Published Date: May 02, 2017
To understand the challenges and opportunities with the Internet of Things, MIT Sloan Management Review’s 2016 Global Executive Study conducted a comprehensive study with business executives, managers, and IT professionals globally. Through the survey results and interviews with subject matter and industry experts, MIT Sloan Management Review was able to reveal the business value and competitive issues from the Internet of Things (IoT). This comprehensive report dives into data sharing with competitors, analytic talent management, and the intersection with governing the data. Analytics is unsurprisingly is shown as the key to IoT success.
Tags : data, sharing, analytics, iot, mit
     Teradata
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
     Trend Micro, Inc.
By: LexisNexis     Published Date: Mar 25, 2013
In 2010, Murphy & King recognized they needed to hire an experienced litigation support manager to assist the firm's growing litigation practice. Learn how they reduced client's expenses, increased profitability and obtained quality with E-Discovery.
Tags : client expenses, increases profitability, expenses, e-discovery, lexis nexis
     LexisNexis
By: Adaptive Planning     Published Date: Apr 25, 2012
In 2006 the world economy was booming, partly on the back of triple-A investment innovations. Then, suddenly, the boom ended. What fascinates the authors is the fact that almost no one saw the 2008 economic crisis coming. In this article, the authors come to terms with the reality that, in economics and business, accurate forecasts aren't possible. Therefore, they say, managers need to develop a different attitude about the future.
Tags : adaptive, business, finance, forecasting, business planning, budget
     Adaptive Planning
By: Gelato     Published Date: Jul 02, 2018
Operating across multiple countries is complex, as is shipping printed material. When our customers shared their stories with us, we knew we needed to act. In April 2017, Gelato entered each BRIC country. By establishing legal entities and print partners within Brazil, Russia, India, and China, Gelato gives customers an easy way to get printed material to colleagues and customers within those borders. The specific considerations in each BRIC country are numerous and often cumbersome. And who better to share insights on the state of local printing than the Gelato country managers on the ground? This ebook is for global enterprises than need to get prints in the BRIC countries, for those that are considering starting up sales and marketing operations in the regions for the first time, and also for domestic businesses that simply want to improve their local print processes.
Tags : 
     Gelato
By: IBM     Published Date: Jan 06, 2016
Replay of the September 24, 2015 webcast on API Economy & API Management with speaker George Nealon, IBM API Economy and Integration Sales Manager Worldwide.
Tags : ibm, digital, business, cloud strategy, applications, data. integration
     IBM
By: IBM     Published Date: Jan 27, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business.
Tags : 
     IBM
By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
     Group M_IBM Q2'19
By: Entrust Datacard     Published Date: Jul 21, 2015
This paper reveals how Entrust Authority Security Manager, the world's leading public key infrastructure (PKI), helps organizations easily manage their security infrastructure, and allows easy management of the digital keys and certificates that secure user and device identities.
Tags : entrust authority security manager, security, security infrastructure, digital, encryption, security management, digital certificates, digital signatures
     Entrust Datacard
By: Oracle     Published Date: Jan 28, 2019
Oracle Private Cloud Appliance is a converged infrastructure system designed for rapid and simple deployment of private cloud at an industry-leading price point. Whether customers are running Linux, Microsoft Windows or Oracle Solaris applications, Oracle Private Cloud Appliance supports consolidation for a wide range of mixed workloads in medium-to-large sized data centers. High-performance, low-latency Oracle Fabric Interconnect and Oracle SDN allow automated configuration of the server and storage networks. The embedded controller software automates the installation, configuration, and management of all infrastructure components at the push of a button. Customers need to enter only basic configuration parameters and create virtual machines (VMs) manually or by using Oracle VM Templates to get a full application up and running in a few hours. With Oracle Enterprise Manager, the Oracle Private Cloud Appliance is transformed into a powerful private cloud infrastructure that integrates
Tags : 
     Oracle
By: Sage People     Published Date: Nov 02, 2017
Did you ever wonder what enterprise resource planning or ERP is and how it can help your business? Or perhaps you know a little about ERP but you’re not sure if you should opt for an on-premise or cloud solution and what to expect from your final choice. Don’t worry. If you’re a business owner, manager or director in a mid-sized or growing business and you’re confused about ERP, this guide will help you.
Tags : workflow software, performance indecator, monitor and analyse performance, enterprise resource planning, financial management services, business transformation, competitive/swot analysis, small business accounting
     Sage People
By: Sage People     Published Date: Jul 05, 2018
As a business executive your time is incredibly valuable, right? And if you aren’t maximally time efficient or productive then you – and your business – will soon fall behind. It’s a fact of life in today’s highly-competitive digital marketplace. But how do you stem the flow of lost time? And how are other leaders making the most of this scarce resource so they can be as efficient, productive and valuable as possible? This report was produced specifically for the UK and Ireland (UK/I) region and is based on data gathered from real-world business leaders explaining how they perform tasks on a daily basis. In the report, we look at how business managers can step up from operational tasks and focus on work that will propel their business forward. We will: • Touch on the priorities of what could be termed ‘accelerated business leaders’: those decision makers leading their industries forward in a way that harnesses emerging technologies and agile new ways of working. • Examine the key facto
Tags : 
     Sage People
By: CA Technologies     Published Date: Jan 06, 2014
This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.
Tags : mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction
     CA Technologies
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics