RSS feed Get our RSS feed

News by Topic

next gen

Results 1 - 25 of 630Sort Results By: Published Date | Title | Company Name
By: Dell EMC     Published Date: May 23, 2017
Explore the key features and highlights of the new generation of Dell EMC Isilon Scale-Out NAS.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: May 23, 2017
Digital information has quickly become the lifeblood of business success, enabling firms to become more operationally efficient and to better serve their customers. As companies seek to harness their data in new ways, the infrastructure that houses that data can falter under the strain. In response, new innovations have emerged to help address the concerns of managing and protecting these increasingly important data capacities. While some vendors focus innovation development on software alone and allow the hardware to remain commodity, Dell Technologies is delivering some impressive hardware innovation with Isilon’s next generation hardware to complement its software’s disruptive capabilities.
Tags : 
     Dell EMC
By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 18, 2017
By investing in your customer experience teams, next-generation approach, and customers, you empower the modern customer across all touch points and create remarkable experiences. Oracle has the most complete set of customer experience cloud applications to help you meet change, achieve growth, and drive customer loyalty.
Tags : service, commerce, cpq, cloud, sales, social, marketing
     Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
     IBM
By: Pure Storage     Published Date: Apr 24, 2017
This Technology Spotlight examines the evolving primary flash array market with a particular emphasis on what next-generation flash-driven enterprise storage architectures will look like. It also looks at the role Pure Storage, with its FlashArray//x, plays in this strategically important market.
Tags : flash, flash technology, storage, storage management, flash adoption, migration, business transformation
     Pure Storage
By: Comcast     Published Date: Jul 10, 2017
Healthcare technologies have proven their worth for practitioners and facilities in increasing the quality of patient care while saving time and streamlining operations. In some cases, however, the benefits of these technologies are outweighed by their impact on the network, slowing network performance sometimes to the point of ineffectiveness.Software-defined networking can be the bridge to help healthcare providers update their networks and avoid disruption. SDN helps organizations save money on networking infrastructure, reduces the complexity of managing networks, enhances security through added intelligence and simplifies compliance, among other benefits.
Tags : healthcare, sdn, healthcare technology, patient care, technology, reducing costs, improve security, healthcare benefits
     Comcast
By: Comcast     Published Date: Jul 10, 2017
The financial services industry is increasingly at a crossroads. Faced with mounting pressure from external forces, such a competition from FinTech companies and a more demanding client base, banks and financial services firms are working to become more customer-centric in their approach to business. However, the need to keep sensitive customer and business information secure and ensure compliance with government regulations can stymie those efforts. The proprietary hardware so prevalent in traditional networks can’t provide what financial institutions need; a growing number, therefore, are turning to software-defined networking (SDN).
Tags : financial services, sdn, increase efficiency, reducing complexity, next-generation technologies, financial benefits, security control, lower costs
     Comcast
By: Marketo     Published Date: Jun 08, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: • How to create a solid ABM strategy to meet your goals • What stakeholders to involve across the organization • How to identify, prioritize, and profile the right accounts • What content you need to support an ABM strategy • Which channels to leverage and how to coordinate them • How to measure the effectiveness of your ABM strategy
Tags : access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
     Marketo
By: Sitecore     Published Date: Nov 04, 2009
This report highlights the strategic value of a next generation web content management system integrated with lead scoring, email marketing, customer relationship management, and web analytics. The report links the technology and practices of Best-in-Class organizations to engage customers, provide personalized experiences and manage the lead lifecycle.
Tags : sitecore, aberdeen, lifecycle management, web content management, analytics, crm, emarketing, email marketing
     Sitecore
By: ZoomInfo     Published Date: Sep 07, 2010
Find and connect quickly with the right people, prospects, and opportunities to grow your sales pipeline and boost conversion rates. The ZoomInfo™ Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation prospecting tool, ZoomInfo™ Pro, featuring rich segmentation, export capabilities, and list building. Add custom appends and lists to streamline revenue generation and maximize ROI. Start your free trial today.
Tags : zoominfo, sales, marketing, pipeline, conversion rates
     ZoomInfo
By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : device management, data solutions, system solutions, data breach, mobile management
     IBM
By: SAS     Published Date: Apr 25, 2017
Business intelligence has come a long way ? from assistance with report generation to self-service platforms for discovery and analytical insight. As technological capabilities and business aptitude with information continue to advance, the next generation of BI will be even more capable and valuable to the enterprise. To discuss today’s success factors and tomorrow’s opportunities, IIA spoke with Andy Bitterer, Senior Director of Business Intelligence Product Management at SAS, and Tapan Patel, Principal Product Marketing Manager at SAS.
Tags : 
     SAS
By: Marketo     Published Date: Jul 12, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders
Tags : access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
     Marketo
By: SAP     Published Date: Nov 18, 2015
This infographic illustrates how SAP S/4HANA is the next generation business suite that helps enterprises reimagine business.
Tags : reimagine your business, digital, internet of things, real time, acess to real time information, sap, sap s/4 hana
     SAP
By: SAP     Published Date: Nov 18, 2015
This whitepaper shows how SAP S/4HANA helps enterprises to run simple in a digital economy.
Tags : digital, internet of things, complexity, cimplicity, digital economy, enterprises, sap, sap s/4hana
     SAP
By: SAP     Published Date: Nov 24, 2015
This video shows how with SAP S/4HANA, the next generation business suite, you can break the limitations of the past.
Tags : sap, sap s/4hana, digital, network, connect to real-time information, real-time, sap platform
     SAP
By: Cisco     Published Date: Jan 05, 2016
This buyer’s guide provides an in-depth explanation of the factors that impel organizations to look at next generation security solutions
Tags : cisco, next gen buyer, guide, network security, solutions, security
     Cisco
By: Cisco     Published Date: Jan 08, 2016
The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : cisco, ngfw, security, svm, firewall, protection, leader
     Cisco
By: Cisco     Published Date: Jul 08, 2016
Modern networks and their components are constantly evolving and traditional next-generation firewalls are not able to provide the level of protection organizations require. In this paper you will learn: • Why typical next-generation firewalls that focus primarily on application visibility and control offer an incomplete approach to threat defense • What organizations need to defeat advanced threats in a resource-constrained environment • What benefits you can gain with the Cisco Firepower™ Next-Generation Firewall (NGFW), the industry’s first fully integrated, threat-focused NGFW
Tags : 
     Cisco
By: Cisco     Published Date: Jul 08, 2016
This white paper can help you confirm that your small business or distributed enterprise needs to invest in an effective next-generation firewalls (NGFW) solution. For small businesses, the NGFW should provide an affordable and manageable entrée to advanced threat protection. In branch offices and the distributed enterprise, NGFWs should provide a detection and enforcement point, analyzing real-time threats and network traffic at scale and benefiting from an integrated and holistic view of the network of which it is a part. In both use scenarios, the NGFW should help your organization defend against targeted and persistent malware attacks, including emerging threats.
Tags : 
     Cisco
By: Cisco     Published Date: Jul 08, 2016
When evaluating a next-generation firewall (NGFW) to determine whether the solution can give you comprehensive protection for your entire enterprise, you need to look for seven must-have capabilities. The NGFW should: 1. Integrate security functions tightly to provide effective threat and advanced malware protection 2. Provide complete and unified management 3. Provide actionable indications of compromise to identify malicious activity across networks and endpoints 4. Offer comprehensive network visibility 5. Help reduce complexity and costs 6. Integrate and interface with third-party security solutions 7. Provide investment protection This white paper explains this checklist in depth and provides examples of the benefits a truly effective NGFW solution can deliver.
Tags : 
     Cisco
By: Equinix     Published Date: May 28, 2015
As the digital economy explodes it is becoming increasingly difficult to keep pace with the rate of rapid change taking place in today’s world.
Tags : digital landscape, digital, digital enterprise, next generation network, technology, networking, connectivity, security
     Equinix
By: Pentaho     Published Date: Nov 04, 2015
Although the phrase “next-generation platforms and analytics” can evoke images of machine learning, big data, Hadoop, and the Internet of things, most organizations are somewhere in between the technology vision and today’s reality of BI and dashboards. Next-generation platforms and analytics often mean simply pushing past reports and dashboards to more advanced forms of analytics, such as predictive analytics. Next-generation analytics might move your organization from visualization to big data visualization; from slicing and dicing data to predictive analytics; or to using more than just structured data for analysis.
Tags : pentaho, analytics, platforms, hadoop, big data, predictive analytics
     Pentaho
By: Workday     Published Date: Mar 17, 2017
In this webinar Centegra Health System discusses how Workday helped it meet immediate business challenges and position itself for future success with mobile, intuitive, user-friendly, and selfservice technology delivered in the cloud.
Tags : workday, centegra, business challenges, selfservice technology
     Workday
By: Cisco     Published Date: Feb 13, 2015
The Enterprise Strategy Group (ESG) characterizes traditional security tactics as a "messy independent array of independent technologies." A decade ago, this could suffice, but it's no match for today's requirements. Read how an integrated, threat-focused approach can help.
Tags : network security, enterprise organizations, security threats, security architecture, central command, central control, firewall, distributed enforcement
     Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics