RSS feed Get our RSS feed

News by Topic

scribe

Results 126 - 150 of 834Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 26, 2017
Identity and access management exists for one critical reason—security. Organizations need to make certain the right people have access to the right resources to do their jobs—and that people without proper authorization can’t get in. In an era the IBM X-Force security team recently described as experiencing “an ever-upward trend of more attacks, more leaked records and more varied threats,” security is a critical function for business as well as IT.
Tags : access manager, security, cloud service, microsoft office 365, it strategies
     IBM
By: Citrix     Published Date: Oct 26, 2017
This paper describes key criteria for evaluating SD-WAN solutions. It discusses the most important issues, and outlines levels of capability that separate “just okay” products from really good ones.
Tags : 
     Citrix
By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Big Data is not just a big buzzword. Government agencies have been collecting large amounts of data for some time and analyzing the data collected to one degree or another. Big data is a term that describes high volume, variety and velocity of information that inundates an organization on a regular basis. But it’s not the amount of data that’s important. It’s what organizations do with the data that matters. Big data can be analyzed for insights that lead to better decisions and better services.
Tags : cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
     Hewlett Packard Enterprise
By: OneLogin     Published Date: Oct 24, 2017
For today's digital businesses, identity and access management (IAM) involves far more than just provisioning and enforcing employee access to corporate resources. S&R pros must now govern access across a variety of populations — from employees to partners to customers — without affecting experience. And they must protect corporate resources across a hybrid environment while providing users secure access to these resources from a variety of devices. This report describes the trends shaping the IAM landscape in 2017 and how S&R pros should adapt.
Tags : 
     OneLogin
By: CrowdStrike     Published Date: Oct 23, 2017
As damaging breaches continue to occur, more organizations are considering endpoint detection and response (EDR) solutions to address the incidents that aren't being handled adequately by their existing defenses. However, EDR solutions come in a wide variety of implementations and can vary significantly in scope and efficacy — choosing the best solution can be challenging. This white paper, “Endpoint Detection and Response: Automatic Protection Against Advanced Threats,” explains the importance of EDR, and describes how various approaches to EDR differ, providing guidance that can help you choose the product that's right for your organization. Read this white paper to learn: What makes EDR such a valuable addition to an organization's security arsenal and why finding the right approach is critical How the “EDR maturity model” can help you accurately evaluate vendor claims and choose the solution that best fits your organization’s needs How the CrowdStrike® EDR solution empowers organ
Tags : 
     CrowdStrike
By: SAS     Published Date: Oct 18, 2017
Machine learning uses algorithms to build analytical models, helping computers “learn” from data. It can now be applied to huge quantities of data to create exciting new applications such as driverless cars. This paper, based on presentations by SAS Data Scientist Wayne Thompson, introduces key machine learning concepts and describes SAS solutions that enable data scientists and other analytical professionals to perform machine learning at scale. It tells how a SAS customer is using digital images and machine learning techniques to reduce defects in the semiconductor manufacturing process.
Tags : 
     SAS
By: Sprinklr     Published Date: Oct 18, 2017
How do manufacturers get beyond the obstacles and barriers to increase cognitive manufacturing maturity? The obstacles encountered by our respondents are tied to organizational maturity. Overcoming them is fundamental to increase cognitive manufacturing success. In this report, we’ll first describe cognitive computing and how it gives rise to cognitive manufacturing. Then, we’ll review specific study findings and recommend actions for electronics executives.
Tags : cognitive manufacturing, electronics, computing, organizational maturity
     Sprinklr
By: IBM     Published Date: Oct 18, 2017
How do manufacturers get beyond the obstacles and barriers to increase cognitive manufacturing maturity? The obstacles encountered by our respondents are tied to organizational maturity. Overcoming them is fundamental to increase cognitive manufacturing success. In this report, we’ll first describe cognitive computing and how it gives rise to cognitive manufacturing. Then, we’ll review specific study findings and recommend actions for electronics executives.
Tags : cognitive manufacturing, ibm, electronics, organizational maturity
     IBM
By: IBM     Published Date: Oct 16, 2017
This white paper examines how some of the ways organizations use big data make their infrastructures vulnerable to attack. It presents recommended best practices organizations can adopt to help make their infrastructures and operations more secure. And it discusses how adding advanced security software solutions from IBM to their big-data environment can fill gaps that big-data platforms by themselves do not address. It describes how IBM® Security Guardium®, an end-to- end solution for regulatory compliance and comprehensive data security, supports entitlement reporting; user-access and activity monitoring; advanced risk analytics and real-time threat detection analytics; alerting, blocking, encryption and other data protection capabilities, as well as automated compliance workflows and reporting capabilities, to stop threats.
Tags : security, big data, ibm, data protection
     IBM
By: Oracle Security Solutions     Published Date: Oct 16, 2017
Cloud adoption promises the benefit of increased flexibility and significant cost savings. Hence, migrating business-critical applications to the cloud is becoming a growing priority for companies of all sizes. A recent survey of more than 250,000 information security professionals revealed that more than 77 percent of organizations have already adopted cloud services and 10 percent of those companies using cloud services describe themselves as heavy users.
Tags : 
     Oracle Security Solutions
By: Vindicia     Published Date: Oct 04, 2017
The number of services available via online subscription is exploding—and the big bang of subscription is only gaining momentum. Companies want to turn one-time purchases into regularly recurring subscriptions or memberships. The siren song of subscription success is calling to executives in virtually every industry. Business leaders want ongoing revenue streams from an army of subscribers. But, as companies that plunged into recurring business models are realizing, subscriptions are more than just transactions that recur. Subscription success can be illusive. Too often, subscription models don’t generate the expected high, ongoing revenue streams.
Tags : 
     Vindicia
By: Vindicia     Published Date: Oct 04, 2017
Consumers and businesses can subscribe to a virtually infinite array of products and services. From meal delivery and financial advice to legal services and weight-loss coaching, people try to keep using services that fit their needs. The subscription business model is having an equally dramatic impact on businesses like yours. Instead of investing in customer acquisition in hopes that customers will simply make a one-time purchase, you entice people into making a recurring commitment to your offering.
Tags : 
     Vindicia
By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
     OKTA
By: CA Technologies     Published Date: Sep 25, 2017
Agile may be simple, but it still takes work. Often, organizations fail to adopt agile methods for similar reasons, and many of these reasons are cultural. From checkbook commitment and lack of executive support to ineffective retrospectives and bad product ownership, this e-book describes the 12 agile failure modes to avoid so you can succeed with your own agile transformation.
Tags : leadership, workflow, congruence, transition, ca technologies
     CA Technologies
By: Exabeam     Published Date: Sep 25, 2017
This solution brief will describe how Exabeam can help organizations implement effective security controls and best practices to achieve alignment with GDPR.
Tags : 
     Exabeam
By: Exabeam     Published Date: Sep 25, 2017
The Exabeam Security Intelligence Platform addresses every key weakness of existing SIEM solutions: Cost, Intelligence, and Productivity. This paper describes the challenges of security intelligence and how Exabeam specifically overcomes them.
Tags : 
     Exabeam
By: Adobe     Published Date: Sep 21, 2017
"Email has proven itself as a revenue-driving workhorse of any marketing strategy. And yet, two-thirds of marketers are still less than satisfied with their email marketing efforts. We joined forces with Email on Acid to shed a light on the most effective email campaigns. Read The Art of the Click to learn helpful email insights, like: --The four critical qualities of all great email experiences --Subscriber open and read behaviors throughout the day --Why all clicks aren’t created equal"
Tags : 
     Adobe
By: AppDynamics     Published Date: Sep 20, 2017
Azure has been through many rounds of changes that have significantly affected the ways in which .NET and other developers interact with the platform. The shift in strategy has been rocky at times. In 2011, technology reviewers described Microsoft Azure as a confusing platform with a difficult to use web-based interface and incomprehensible documentation. Since then, the teams working on the platform have gradually improved it, resulting in a much more user-friendly platform that offers a well-organized array of services.
Tags : mobile developers, microsoft azure, xamarin, it operations, developer market, container
     AppDynamics
By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
An online transformation is changing how the world’s most successful B2B companies engage buyers, acquire customers and drive ongoing revenue. To survive this transformation, today’s B2B e-commerce sites must do more than simply exist as a portal for selling products; they must be compelling, relevant and simplify the buying process. This eBook examines the factors and impact of this migration, and describes seven best practices for adapting and succeeding in this new era.
Tags : 
     Oracle Commerce Cloud
By: Skytap     Published Date: Sep 01, 2017
In this report, Forrester answers these questions and prescribes a detailed model for assessing, budgeting and managing the migration of a traditional enterprise application to the cloud.
Tags : 
     Skytap
By: CA Technologies     Published Date: Aug 21, 2017
Agile may be simple, but it still takes work. Often, organizations fail to adopt agile methods for similar reasons, and many of these reasons are cultural. From checkbook commitment and lack of executive support to ineffective retrospectives and bad product ownership, this e-book describes the 12 agile failure modes to avoid so you can succeed with your own agile transformation.
Tags : 
     CA Technologies
By: Polycom     Published Date: Aug 17, 2017
"Polycom offers a broad selection of easy-to-use, high-quality desk phones, conference phones, and applications. This guide describes the important collaboration features and benefits of Polycom voice solutions and explains how they can be used in different meeting environments. Want to know more? Download our guide! "
Tags : polycom, business phone, video conferencing
     Polycom
By: Dell EMC     Published Date: Aug 17, 2017
The migration from a traditional enterprise IT infrastructure architecture with separate servers, separate traditional SAN, and separate hyperscale public cloud to an integrated hyperconverged architecture including Server SAN and an integrated hybrid cloud is a profound change. Wikibon explores the premise that the migration is justified, and the optimum hybrid cloud strategy is to use the same architecture and software for both the on-premises True Private Cloud and the public cloud services. Wikibon uses the term “True Hybrid Cloud” to describe this approach.
Tags : hyper-converged infrastructure, hci, it infrastructure, vmware environment, it performance
     Dell EMC
By: Marketo     Published Date: Aug 10, 2017
So why is a MarTech stack so critical to success? At its base, a strategic MarTech stack is how you can efficiently and effectively stay connected to your buyers. And that is critical when you consider that businesses are competing on customer experience. In fact, a Harvard Business Review study, “Designing a Marketing Organization for the Digital Age,” described marketing technology as essential to creating agile and fluid structures and driving customer engagement. Teams that use marketing technology understand that by doing so, they can gain better insights into the unique relationships and connections with their customers and prospects.
Tags : martech, marketing technology, customer engagement, customer experience
     Marketo
By: CA Technologies EMEA     Published Date: Aug 03, 2017
GDPR compliance can be achieved through a combination of people, processes and technology. This document has described solutions that can help organizations with their GDPR journey. But you can extend that protection and strengthen security controls even further via strong and risk authentication or workload automation for the processing automation of personal data helping you comply with GDPR as well as similar mandates. Regulations tend to set the minimum standards to be required, but in the application economy, open enterprises must ensure due diligence to protect one of the most important and critical assets: private customer information.
Tags : identity management, privileged user access, secure privileged credentials, secure hybrid it
     CA Technologies EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics