RSS feed Get our RSS feed

News by Topic

oggi

Results 76 - 100 of 120Sort Results By: Published Date | Title | Company Name
By: Dell EMC Storage     Published Date: Aug 22, 2019
Oggi le aziende hanno bisogno di un'infrastruttura di storage dei file integrata altamente scalabile, sicura emulti-cloud. Dell EMC, leader in questo ambito, ha appena presentato ilsistema operativo Dell EMC Isilon OneFS 8.2insieme a Isilon H5600, un nuovo storage nodeNAS scale-out ibrido più denso e più veloce. Con queste nuove innovazioni, Isilon consente alle organizzazionidi accelerare nuovi carichi di lavoro e creare nuove opportunità ed efficienze, avanzando in modo significativo nei loro percorsi di rinnovo dell'IT.
Tags : 
     Dell EMC Storage
By: CradlePoint     Published Date: Sep 04, 2014
In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint solutions. Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI DSS 3.0. Enabling features include network segmentation (ethernet ports, SSIDs, and VLANs), stateful firewall, MAC/IP/URL filtering, authentication/encryption, event logging, event alerts, time synchronization, and configuration/upgrade management from CradlePoint Enterprise Cloud Manager.
Tags : cradlepoint enterprise cloud manager, pci dss 3.0, pci compliance, stateful firewall, mac/ip/url filtering, authentication/encryption, event logging, event alerts
     CradlePoint
By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, using Centrify's DirectControl to extend Active Directory authentication and access control to your UNIX, Linux and Mac OS systems and applications, and using Centrify's DirectAudit to log user activity to provide you a clear picture of end user actions on all UNIX and Linux systems.
Tags : heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
     Centrify Corporation
By: CA Technologies EMEA     Published Date: Apr 10, 2018
Un nuovo modello di sicurezza che vale la pena di studiare, e di imitare. La sicurezza enterprise si basa, tradizionalmente, su una strategia che blocca gli endpoint degli utenti e posiziona la rete all'interno di una sorta di perimetro fortificato. Oggi, questa strategia non è in grado di supportare né proteggere l'uso di device mobile e le funzionalità SaaS, che esistono al di fuori di quel perimetro. Di conseguenza, i Chief Information Security Officer (CISO) sono alla ricerca di soluzioni nuove, in grado di tutelare queste tecnologie e di adattarsi al modificarsi di minacce ed esigenze di business.
Tags : 
     CA Technologies EMEA
By: Comcast Business     Published Date: Feb 03, 2017
Electronic health records are changing the face of patient record-keeping. No longer are doctors’ offices repositories for large, bulky, paper-based patient files—those have been replaced by computer-based files accessible to authorized people simply by logging on to the office’s network.
Tags : 
     Comcast Business
By: CA Technologies EMEA     Published Date: Sep 13, 2018
Introduzione La forza lavoro di oggi è abituata a utilizzare tecnologie personali che semplificano le comunicazioni e la vita quotidiana. Molti strumenti aziendali, tuttavia, non sono riusciti a rimanere al passo. La maggior parte delle attuali soluzioni di project and portfolio management non è in grado di fornire modi semplici per svolgere le attività quotidiane. Non facilitano le comunicazioni contestuali che agevolerebbero la risoluzione dei problemi e non dispongono di funzionalità chiave: capacità di restringere il focus ai dati pertinenti, di eseguire il drill-down per accedere a ulteriori informazioni e di prevedere in modo efficiente le necessità finanziarie e modellare i risultati.
Tags : 
     CA Technologies EMEA
By: Net Atlantic     Published Date: May 28, 2010
During our live demo, you'll get an overview of Net Atlantic's Email Marketing Suite, tips to help make your email marketing campaigns more successful, mistakes to avoid, and a review of tools for effective email marketing. This one-hour session is perfect if you are new to Net Atlantic or interested in learning about our advanced capabilities, including segmentation, triggered and sequential mailings, and much more. Marketers focus on four basic elements in their campaigns; the list, the message, delivery, and measurement. We'll discuss the important factors of each. Our overview covers: •Logging into your list •Managing your members •Creating content •Sending mailings •Checking the results of your campaigns •And much more. This webinar will take around 30-45 minutes with time left over for Q&A. Register now using the form to the right. Webinar Details: "Email Marketing with Net Atlantic" presented by Gregg Hanson Date: Every Wednesday Time: 1:00PM EDT; 10:00AM PDT (1 Hour)
Tags : net atlantic, webinar, live event, email marketing
     Net Atlantic
By: Outreach.io     Published Date: Apr 09, 2018
Modern business-to-business (B2B) buyers have unprecedented access to information to support their buying process and, as a result, have become more self-reliant in the evaluation process. This has made B2B sellers’ jobs harder; not only do they have less control in earlier stages of the sales cycle, but they have to work harder to connect and engage with buyers, turning prospects into customers. Sales technologies have helped modernize how sellers and sales leaders manage their pipelines and execute contracts, but technology gaps around engagement persist, making it difficult for sellers to keep pace with, connect with, and support buyer engagement. The common outcome: Sellers become slaves to their CRM systems, focused more on updating reports and logging their activities than they are in driving business results.
Tags : 
     Outreach.io
By: Cisco     Published Date: Dec 08, 2015
Driven by budget pressures and the growth of cloud-hosted applications, mobility, and bandwidth-hogging applications such as video, many IT organizations are actively considering direct Internet access (DIA) at their branches. DIA offers two compelling benefits: (1) it can substantially reduce operating costs by freeing up costly WAN bandwidth for mission-critical applications, and (2) it offers a better experience for users accessing applications hosted in the public cloud.
Tags : direct internet access, cisco, canada, dia, wan, wide area network
     Cisco
By: Arbor     Published Date: Sep 15, 2014
In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.
Tags : cyber defenses, threat actors, it security, security analytics
     Arbor
By: Attachmate     Published Date: Mar 20, 2013
Traditional fraud detection methods, such as application logging, can’t address the scale and sophistication of today’s threats. Find out how to get the visibility you need to better and manage enterprise risk with Luminet.
Tags : luminet, intellinx, enterprise fraud management, fraud management, fraud detection, fraud compliance, failed security audit, enterprise fraud management
     Attachmate
By: Social Text     Published Date: Jul 21, 2009
Read this paper to learn the steps to successfully roll out an enterprise collaboration solution and help your organization embrace a more collaborative, transparent and effective way of working. Introducing a social software solution carries with it a unique set of challenges and opportunities, and requires a new roll-out approach. The approach outlined in this paper has been honed over thousands of customer implementations to generate the fastest adoption across your enterprise.
Tags : socialtext, social networking, collaboration, enterprise collaboration, social media, twitter, linkedin, facebook
     Social Text
By: Social Text.     Published Date: Jul 21, 2009
Read this paper to learn the steps to successfully roll out an enterprise collaboration solution and help your organization embrace a more collaborative, transparent and effective way of working. Introducing a social software solution carries with it a unique set of challenges and opportunities, and requires a new roll-out approach. The approach outlined in this paper has been honed over thousands of customer implementations to generate the fastest adoption across your enterprise.
Tags : socialtext, social networking, collaboration, enterprise collaboration, social media, twitter, linkedin, facebook
     Social Text.
By: BatchBlue Software     Published Date: Mar 27, 2009
Even though you may not be familiar with the term “social media”, chances are you’ve heard about it or maybe even are using it to communicate in your personal life. But is social media successfully making the crossover from personal pastime to business tool? This blue paper outlines the different types of tools in the social media toolkit and proposes ways they can be used to promote your brand, communicate with your customers and help grow your business.
Tags : social media, matternow, communications, brand management, media toolkit, marketing communications, myspace, youtube
     BatchBlue Software
By: Quocirca     Published Date: Sep 07, 2007
Social Networking tools have proliferated in the recent past, and many individuals are now utilizing such tools as a core part of their day-to-day lives.  If these tools can be harnessed as a means of interaction by the public sector, constituency involvement will rise, while costs can be minimized.
Tags : social networking, blog, blogging, blog marketing, wiki, wikis, wiki marketing, emerging marketing
     Quocirca
By: Epicor     Published Date: Jul 10, 2018
In today’s competitive market, FFLs often have inadequate tools that are hindering their growth, or are often sold software rather than solutions to their ATF compliance needs—leaving them confused and less compliant than before. Fortunately, it just got easier to streamline compliance processes and keep your Bound Book up-to-date. Get the facts in a quick-reading guide from the FFL Operations experts at Orchid Advisors and the software experts at Epicor. Learn how firearms businesses like yours are using cloud technology to keep their bound book to date, making compliance tasks much simpler and more cost effective. • Why the ATF changed its rules in 2016 and how you take advantage of it • Practical tips for moving your Bound Book to the cloud, stress-free • Streamline business process and improve ATF Compliance
Tags : electronic bound book software, regulations, compliancy, bound book, firearms pos, atf audits, shooting sports software, a&d logging
     Epicor
By: VMware AirWatch     Published Date: Oct 02, 2015
Nonostante la massiccia adozione delle piattaforme mobili, degli smartphone e dei tablet, le applicazioni e i desktop Windows mantengono un ruolo centrale nelle aziende di oggi. Tuttavia, a differenza di quanto avvenuto per le tecnologie mobili, le architetture desktop non si sono evolute nel corso degli anni. È giunto il momento di una trasformazione del desktop.
Tags : byod, emm, mobility
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 12, 2015
Nonostante la massiccia adozione delle piattaforme mobili, degli smartphone e dei tablet, le applicazioni e i desktop Windows mantengono un ruolo centrale nelle aziende di oggi. Tuttavia, a differenza di quanto avvenuto per le tecnologie mobili, le architetture desktop non si sono evolute nel corso degli anni. È giunto il momento di una trasformazione del desktop.
Tags : byod, emm, mobility, airwatch
     VMware AirWatch
By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the challenges of migrating NIS deployments to a central repository, and explains in detail how a combination of Microsoft Active Directory and Centrify DirectControl can deliver a cost-effective solution that strengthens security while improving IT efficiency.
Tags : heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
     Centrify Corporation
By: Oracle     Published Date: May 05, 2017
I commerciali vendono. I clienti acquistano. Il digital irrompe. Al giorno d’oggi, ogni persona del business deve gestire l’impatto della digital disruption.
Tags : 
     Oracle
By: Intacct Corporation     Published Date: Oct 02, 2015
Like it or not, the accounting function is in the news distribution business. The demand for financial performance information is high and the pressure for more timely information is even higher. A fast close improves the timeliness of information, aids decision making and is a value-enhancing proposition for the business. To continue adding value, the CFO and controller must find ways to speed up their financial close processes and report financial results before they become old news. Download this white paper and learn the "7 Steps to a Faster, Better Close" including how to: • Identify the hidden traps and pitfalls bogging down your accounting processes • Drive process improvement and collaboration within your organization • Gain visibility and timely access to critical financial and operational information through application integration • Utilize modern accounting technology to accelerate your close with automation
Tags : 
     Intacct Corporation
By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, describes how Centrify's integrated architecture enables you to extend Active Directory to your non-Microsoft platforms, and describes the Centrify Suite's unique benefits.
Tags : heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance
     Centrify Corporation
By: Cymfony     Published Date: Feb 22, 2007
This white paper summarizes the status of current trends in public relations and provides PR professionals with recommendations for actions to take in 2007 to begin to evolve their communications strategies and tactics.
Tags : branding, emerging marketing, press release marketing, blog marketing, blogging, social media, public relations, cymfony
     Cymfony
By: Bridgeline Digital     Published Date: Oct 28, 2013
Blogging. For one contingent of marketers, pumping out posts on the company blog is their favorite part of the day; an opportunity to muse about industry news, highlight their product, and release creative fuel that is otherwise bottled up. For other marketers, blogging is the chore in the way of getting “more important” work accomplished. In other words, writing daily posts is an endless nuisance, like listening to “The Song That Never Ends.”
Tags : blogging, corporate blogging, blogging basics, blog speak, blog posts, company blog, blog writing, types of blogs
     Bridgeline Digital
By: Marketo     Published Date: Jun 26, 2015
Download today, and learn how lead generation can fill your sales funnel with qualified, quality leads.
Tags : lead generation, marketing, blogging, email marketing, paid programs, optimization
     Marketo
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics