RSS feed Get our RSS feed

News by Topic

solutions

Results 1 - 25 of 4114Sort Results By: Published Date | Title | Company Name
By: HPE APAC     Published Date: Jun 16, 2017
Read this white paper to discover the benefits of moving your applications to hybrid cloud.
Tags : 
     HPE APAC
By: Akamai Technologies     Published Date: May 05, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing website infrastructure or within a data center with security measures in the cloud for a more robust security posture. We share Akamai’s approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics — so you can make more educated decisions about the best solutions for your needs.
Tags : cloud security, data, akamai
     Akamai Technologies
By: Schneider Electric     Published Date: Jun 06, 2017
Could you do more for worker safety? Protective gear alone can't prevent arc flash injury. In fact, according to NFPA 70E, injuries sustained during an arc ?ash event would be reduced and survivable due to arc-rated PPE. Complying with the safe work practices required by NFPA 70E and implementing arc flash mitigation strategies through engineering controls will enhance workplace safety for employees and lower financial risk for your company. Read the white paper, "Mitigating Arc Flash Hazards", for more information.
Tags : arc flash, nfpa 70e compliance, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation solutions
     Schneider Electric
By: IBM APAC     Published Date: Jun 07, 2017
This Total Economic Impact (TEI) analysis has been prepared exclusively for you based on your inputs. The analysis provides a high-level estimate of the impact of implementing IBM customer behavior analytics solutions.
Tags : customer experience, customer analytics, customer behavioural analytics, customer experience management
     IBM APAC
By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that can’t be patched: people. That’s why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employee’s inbox.
Tags : security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
     Proofpoint
By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : advanced threats, e-discovery, compliance, rapid response, office 365, email controls, archiving, customer support
     Proofpoint
By: Proofpoint     Published Date: Aug 10, 2017
Doing all you can to ensure the security of Office 365 makes a lot of sense. As the volume and sophistication of advanced threats continues to evolve more rapidly than ever before, you must protect your people, data and brand from advanced attacks and compliance risks. Our security solutions provide you with industry-leading security, compliance and email continuity capabilities for your cloud-based Office 365 deployment that far exceed Microsoft’s native protection. With Proofpoint, you can take advantage of the freedom, flexibility and cost savings of Office 365—without sacrificing your ability to keep users connected and protected.
Tags : malware, business email compromise, security, it departments, archiving, information protection, advanced technologies, office 365
     Proofpoint
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Jun 22, 2017
Juniper Networks works with leading companies around the world to increase the service agility of their networks. With simple, open, and smart networks, financial services firms can bring innovative new services to market faster and at lower costs. They can leverage Juniper’s expertise, experience, and partner ecosystem to build agile, service-aware networks. Juniper is a leader in high-performance, highly reliable routing, switching, and security, with solutions deployed in some of the most complex networks in the world across banking, capital markets, and insurance providers. A broad ecosystem of solution, services, delivery, and consulting partners can provide businesses with a complete offering that enables innovation.
Tags : financial services, financial security, data security, cloud security, network security, business protection
     Juniper APAC DWA Cloud Leads July 2017
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
OpenLab is a centre of innovation provided by Juniper, for business leaders who want to build network-integrated software applications and solutions quickly and securely. This is done by offering hands-on and cloud-based access to Juniper and third-party solutions including SDN sandboxes and NFV interoperability testing.
Tags : technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
     Juniper APAC DWA Cloud Leads July 2017
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
Ellie Mae processes approximately 30 percent of residential U.S. mortgage applications through their Encompass® all-in-one mortgage management solution.Their customers include major lending institutions. By introducing extensive automation to the residential mortgage process, Ellie Mae has streamlined lenders’ ability to remain competitive, compliant, and efficient.
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     Juniper APAC DWA Cloud Leads July 2017
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
To maximize the benefits of its next-generation systems and successfully execute its information strategy, CU had to overcome its aging network. Most of CU’s network infrastructure, which was built from solutions by another vendor, was introduced in 2007, when its computing center was first built. Over time, the equipment began to fail, affecting the stability of applications which relied on network connectivity. Technical support also became a major issue as the equipment faced obsolescence and maintenance contracts with vendors expired.
Tags : data management, data system, business development, software integration, resource planning, enterprise management, data collection
     Juniper APAC DWA Cloud Leads July 2017
By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
OpenLab provides an environment and set of resources where customers representing telecommunications, education, government, financial services, and virtually every other vertical market can explore new technologies, all in the spirit of network transformation. By examining SDN/network automation solutions such Network Functions Virtualization (NFV), software-defined WAN (SD-WAN), and others, OpenLab offers a platform for developing and delivering new network-integrated functionality that serves the greater need.
Tags : technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access
     Juniper APAC DWA Cloud Leads July 2017
By: VMware     Published Date: Jul 24, 2017
ANZ Bank chose VMware AirWatch® to securely manage the bank’s fleet of more than 18,000 mobile devices that are used in 34 countries. ANZ Bank uses AirWatch to manage bankers’ company-issued mobile devices, and to manage digital tools such as Apple® iPad® kiosks in bank branches. Learn more about VMware AirWatch solutions built specifically for the finance industry.
Tags : 
     VMware
By: Carbonite     Published Date: Jul 12, 2017
With IT departments stretched thin, it’s no wonder more businesses are looking to outsource their backup and disaster recovery (BDR) plan. The rise of disaster recovery as a service (DRaaS) is a big win for businesses that want their IT staff focusing on strategic business goals but still require a dependable, provable BDR deployment. Find out more by reading our white paper, 5 reasons to choose DRaaS. Carbonite DoubleTakeTM is now delivering leading DRaaS solutions for complex and mixed environments. Contact us to learn more.
Tags : information technology, disaster recovery, it development, outsource
     Carbonite
By: Carbonite     Published Date: Aug 02, 2017
Every day, a new product launch promises speed, efficiency or savings for businesses eager to stay a step ahead. But if you’re an IT pro, and it’s your job to onboard the new system, the allure gives way to practical considerations: How are you going to move all that critical data—including dependencies, settings and custom configurations—from one system to another so it all talks to each other the way it’s supposed to? Whether you’re tackling a oneoff project or looking to improve your in-house skills, these eight tips for mastering migration will help you form a strategy, determine costs and find technical solutions to ensure successful migration no matter what platform you’re on or which one you’re moving to.
Tags : migration, technical solutions
     Carbonite
By: Akamai Technologies     Published Date: Jun 27, 2017
Traditional remote access solutions were designed for business models of twenty years ago, but today they are distributed, mobile, and have many remote and third-party users. Read this paper to learn about a fundamentally new way to provide simple, secure remote access.
Tags : 
     Akamai Technologies
By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : mobile device, flexibility, risk reduction, data security, agility
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : ransomware, security, risk reduction, containerization, data security
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
Architects and engineers focus on functionality, cost effectiveness and efficiency. Yet many firms fail to apply those same standards to sharing large files with their clients. Read this E-Book to learn how your firm can beat your competitors who use traditional file sharing solutions: Avoid the unreliability and time-consuming limitations of FTP and email. Send files of any size with ease, then track their delivery online.Create a personalised, secure online portal your clients can access for all their files.
Tags : client relations, efficiency, file sharing, data tracking
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : risk reduction, flexibility, mobility, data security, agility
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : ransomware, risk reduction, data security, collaboration, containerization
     Citrix ShareFile
By: HP Inc.     Published Date: Jul 17, 2017
As a consumer, it’s more than likely that you own at least one item made by Jabil. Headquartered in the U.S., Jabil is one of the world’s most technically advanced manufacturing solutions providers, working with most major consumer brands across more than 100 facilities in 28 countries. Keeping its customers competitive requires Jabil to stay on the cutting edge of engineering, prototyping, and manufacturing. Producing parts on a 3D printer that meet or exceed traditional manufacturing’s cost, quality, and speed gives Jabil’s customers a new edge in the ultra-competitive consumer products market—a benefit that’s especially important to Dulchinos.
Tags : 3d printing, printer, print services, hp technology, prototyping, 3d printer, production software, printing solutions
     HP Inc.
By: HP Inc.     Published Date: Jul 17, 2017
In May of 2013 McKinsey & Company published their now famous report which outlined twelve disruptive technologies that would have a big impact by 2025. 3D printing was one of them and consumer products were a driving force. In the report, they noted that, “3D printing could have meaningful impact on certain consumer product categories, including toys, accessories, jewelry, footwear, ceramics, and simple apparel.” They predicted that “global sales of products in these categories could grow to $4 trillion a year (at retail prices) by 2025.”
Tags : 3d manufacturing, digital printer, digital manufacturing, printer, scanning, printing solutions, 3d printer, rapid prototyping
     HP Inc.
By: Dassault Systemes     Published Date: Jul 21, 2017
Product Lifecycle Management (PLM) software can help your company keep up with the increasing complexity of developing today’s high-tech products. While smaller companies may use relatively simple Product Data Management (PDM) tools, larger companies rely on full-featured PLM systems that help automate processes and share data across global supply chains. Mid-size companies can feel stuck because PDM is too basic, but PLM feels out of reach. This resource will help you: • Recognize why “simple” solutions fall short and do not support your capabilities • Better connect to customers and the supply chain • Drive higher product development speed • Get started with the right PLM solution Midsize manufacturers need a system that quickly delivers the core capabilities they need to streamline product development but also gives them room to grow value over time. So, what’s the right size PLM to fit a midsized high-tech company? Download this resource and take a look.
Tags : product solutions, lifecycle management, tech products, data management tools, pdm, plm, process automation, product development speed
     Dassault Systemes
By: Dassault Systemes     Published Date: Jul 21, 2017
Obtaining a first-mover competitive advantage or faster time-to-market requires a new wave in analytics. Dassault Systèmes remains a leading innovator in Product Lifecycle Management (PLM) and has invested heavily in analytical technologies to further drive business benefits for its customers in the related areas of planning, simulation, insight and optimization. This white paper examines the challenges peculiar to PLM and why Dassault Systèmes’ EXALEAD offers the most appropriate solution. It also clearly positions EXALEAD PLM Analytics alongside related technologies like BI, data-warehousing and Big Data solutions. Understand and implement PLM Analytics to access actionable information, support accurate decision-making, and drive performance.
Tags : product solutions, lifecycle management, tech products, data management tools, pdm, plm, process automation, product development speed
     Dassault Systemes
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics