RSS feed Get our RSS feed

News by Topic

infor

Results 1 - 25 of 4325Sort Results By: Published Date | Title | Company Name
By: MuleSoft     Published Date: Oct 10, 2019
API security has become a strategic necessity for your business. APIs facilitate agility and innovation. However, the financial incentive associated with this agility is often tempered with the fear of undue exposure of the valuable information that these APIs expose. With data breaches now costing $400m or more, senior IT decision-makers are right to be concerned about API security. In this whitepaper, you'll learn: The top API security concerns for today's enterprises. How IT leaders can protect identity, integrity, and confidentiality of information without risking availability. The top three qualifications you need to keep your APIs secure.
Tags : 
     MuleSoft
By: The Economist Group     Published Date: Oct 10, 2019
With unprecedented choice and access to information, today’s customers demand an overall experience that matches their standards for product quality. In the Fourth Industrial Revolution, the definition of a “good” experience has changed. Customers demand not only relevant offers, but to feel truly known and understood as individuals. In a culture of immediacy, they also expect engagement at their exact moment of need. What’s more, this level of engagement is viewed as standard across the entire customer journey, prompting marketers to think well beyond their traditional domain.
Tags : 
     The Economist Group
By: The Economist Group     Published Date: Oct 10, 2019
While great products are great, having a great product is no longer enough. Products alone simply don’t win anymore. Say you’ve just launched a brilliant product or service. A myriad of near-identical alternatives from competitors will likely flood the market almost immediately. Differentiating yours from theirs has become a lot more difficult. Not to mention that technology has made it easier than ever for customers to shop around. From gathering information, to interacting with brands and purchasing products, it’s never been simpler to find the cheapest, fastest, smartest alternative, anywhere in the world.
Tags : 
     The Economist Group
By: Infinidat EMEA     Published Date: Oct 10, 2019
Big Data- und Analytik-Workloads bringen für Unternehmen neue Herausforderungen mit sich. Die erfassten Daten stammen aus Quellen, die vor zehn Jahren noch gar nicht existierten. Es werden Daten von Mobiltelefonen, maschinengenerierte Daten und Daten aus Webseiten-Interaktionen erfasst und analysiert. In Zeiten knapper IT-Budgets wird die Lage zusätzlich dadurch verschärft, dass die Big Data-Volumen immer größer werden und zu enormen Speicherproblemen führen. Das vorliegende White Paper informiert über die Probleme, die Big Data-Anwendungen für Storage-Systeme mit sich bringen, sowie darüber, wie die Auswahl der richtigen Storage-Infrastruktur Big Data- und Analytik-Anwendungen optimieren kann, ohne das Budget zu sprengen.
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: Oct 10, 2019
I Big Data e gli analytics workloads sono la nuova frontiera per le aziende. I dati vengono raccolti da fonti che non esistevano 10 anni fa. Tutti i dati dei telefoni cellulari, i dati generati dalle macchine e i dati relativi all’interazione con i siti vengono raccolti e analizzati. Inoltre, con i budget IT sempre più sotto pressione, l’impatto ambientale dei Big Data non fa che aumentare e pone grandi sfi de per i sistemi storage. Questo documento fornisce informazioni sulle problematiche che le applicazioni dei Big Data pongono sullo storage e su come scegliere le più corrette infrastrutture per ottimizzare e consolidare le applicazioni dei Big Data e degli analytics, senza prosciugare le fi nanze.
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: Oct 10, 2019
Le Big Data et les charges analytiques constituent une nouvelle frontière pour les entreprises. Les données collectées émanent de sources inexistantes il y a 10 ans. Les données des smartphones, celles générées par des machines et par les interactions avec les sites web sont collectées et analysées. De plus, dans un contexte où les budgets IT sont déjà sous pression, les empreintes Big Data s’étendent et posent d’énormes problèmes de stockage. Ce livre blanc délivre des informations sur les problématiques liées aux applications Big Data pour les systèmes de stockage et explique en quoi le choix de la bonne infrastructure de stockage peut rationaliser et consolider les applications d’analyse du Big Data sans faire sauter la banque.
Tags : 
     Infinidat EMEA
By: Adobe     Published Date: Oct 10, 2019
In diesem Leitfaden erfahren Sie, wie Marketo Engage Ihrem Unternehmen auf unterschiedliche Weise helfen kann. 1. Erhalten Sie Nachweise für den Wert und die Wirkung von Marketo Engage bei Marketing-Maßnahmen. 2. Finden Sie heraus, wie viel Zeit Ihr Team mit Marketo Engage gewinnen kann. 2 3. Bringen Sie in Erfahrung, welche Fragen Sie stellen und welche Schritte Sie für die Migration unternehmen sollten. 4. Lernen Sie die Details unseres Migrationsplans in drei Schritten und den zugehörigen zeitlichen Rahmen kennen. 5. Erfahren Sie, wie Sie die Umstellung auf Marketo Engage vollziehen können. 6. Informieren Sie sich darüber, wie Branchenkollegen bei ihrer Migration vorgegangen sind.
Tags : 
     Adobe
By: The Economist Group     Published Date: Oct 10, 2019
With unprecedented choice and access to information, today’s customers demand an overall experience that matches their standards for product quality. In the Fourth Industrial Revolution, the definition of a “good” experience has changed. Customers demand not only relevant offers, but to feel truly known and understood as individuals. In a culture of immediacy, they also expect engagement at their exact moment of need. What’s more, this level of engagement is viewed as standard across the entire customer journey, prompting marketers to think well beyond their traditional domain.
Tags : 
     The Economist Group
By: The Economist Group     Published Date: Oct 10, 2019
While great products are great, having a great product is no longer enough. Products alone simply don’t win anymore. Say you’ve just launched a brilliant product or service. A myriad of near-identical alternatives from competitors will likely flood the market almost immediately. Differentiating yours from theirs has become a lot more difficult. Not to mention that technology has made it easier than ever for customers to shop around. From gathering information, to interacting with brands and purchasing products, it’s never been simpler to find the cheapest, fastest, smartest alternative, anywhere in the world.
Tags : 
     The Economist Group
By: AWS     Published Date: Oct 09, 2019
As your business grows, so do your infrastructure needs. With their growing AWS infrastructure, it was important that Informatica simplify security, increase agility, and adopt a more DevOps-centric development model. Join our upcoming webinar to learn how Informatica leveraged RedLock, Palo Alto Networks’ security and compliance solution, to help build security earlier in the development process so vulnerabilities could be remediated faster. You will also learn how other businesses, like yours, can manage the security in your environment with greater ease and control.
Tags : 
     AWS
By: AWS     Published Date: Oct 09, 2019
As your business grows, so do your infrastructure needs. With their growing AWS infrastructure, it was important that Informatica simplify security, increase agility, and adopt a more DevOps-centric development model. Join our upcoming webinar to learn how Informatica leveraged RedLock, Palo Alto Networks’ security and compliance solution, to help build security earlier in the development process so vulnerabilities could be remediated faster. You will also learn how other businesses, like yours, can manage the security in your environment with greater ease and control.
Tags : 
     AWS
By: AWS     Published Date: Oct 09, 2019
Pokémon experienced massive growth in the number of downloads for their most popular gaming app. Ensuring customer data was managed, secured, and private was a top priority for their Information Security team. Join us to learn how Pokémon leveraged Sumo Logic on AWS to implement a security analytics solution to scale with their rapid growth. Pokémon will also discuss how they strengthened their overall security posture, gained a unified view of operations, and delivered on their core values of trust and child safety.
Tags : 
     AWS
By: Apptio     Published Date: Oct 09, 2019
"Ready to communicate IT cost and value in terms your business unit partners understand? The Apptio TBM Unified Model® (ATUM®) standardizes the financial information necessary for IT leaders to manage their technology business. Use this poster as a resource to: • Establish better alignment between IT, Finance, and other business units by using common language around IT costs • Confidently manage the business of IT with the backing of peer-derived best practices • Understand 10 essential metrics you should track to communicate the business value of IT "
Tags : 
     Apptio
By: Canon     Published Date: Oct 09, 2019
THE NOTIFIABLE DATA BREACHES (NDB) SCHEME came into effect on Feb 22nd 2018 making it obligatory for every organisation covered by the Australian Privacy Act to notify the Australian government of certain security breaches. The 2019 Canon Security Report is a guide to understanding which organisations are affected by this policy, the types of security breaches that require notification and what your organisation can do to help mitigate the risk of such breaches happening in the first place. Download this handy guide and protect your business from the business costs and legal ramifications of security breaches.
Tags : 
     Canon
By: Jeppesen     Published Date: Oct 08, 2019
Get this infographic to go behind the scenes and explore the four phases of transforming raw aeronautical information into NavData. From Ingest to Completed Chart, the process ensures fidelity to the highest standard of quality and accuracy, resulting in four times few alerts issued than the next leading solution.
Tags : 
     Jeppesen
By: GoCardless     Published Date: Oct 08, 2019
The PSD2 is the 2nd EU Payments Service Directive. The directive builds on three key areas of legislation first brought in with the original 2007 Directive. These areas include increased consumer rights in payments, creating a level playing field by bringing into scope the regulation of third-party access to account information and enhanced security. Enhanced security refers specifically to a set of requirements called Strong Customer Authentication (SCA). These requirements have far-reaching implications for any business with an online presence. This guide will explore SCA, who and what it affects and how businesses can prepare for the requirements taking effect.
Tags : 
     GoCardless
By: AWS     Published Date: Oct 07, 2019
Pokémon experienced massive growth in the number of downloads for their most popular gaming app. Ensuring customer data was managed, secured, and private was a top priority for their Information Security team. Join us to learn how Pokémon leveraged Sumo Logic on AWS to implement a security analytics solution to scale with their rapid growth. Pokémon will also discuss how they strengthened their overall security posture, gained a unified view of operations, and delivered on their core values of trust and child safety.
Tags : 
     AWS
By: Eaton     Published Date: Oct 04, 2019
Safety has always been Eaton’s highest priority and we work closely with the NEC (National Electric Code) to ensure new policies continue to protect our most valuable resources, people. Eaton, the NEC, NEMA, and other organizations have long maintained that molded case circuit breakers are not suitable for repair or refurbishment. While changes to the code for 2020 do not change that position, they do provide clarity on what it means to be refurbished and what is now required when a suitable product is refurbished, including clearly marking the item as refurbished and removing the original manufacturer’s listing mark. The new code distinguishes between general maintenance like replacing a breaker, and refurbishment, altering a piece of equipment to a once again operational state. Because a refurbished unit cannot be tested to the manufacturer’s test protocol, it cannot continue to carry the original listing mark. Read the article below and learn about "reconditioned", and what the NEC is doing to reinforce that UL489 molded case circuit breakers are not suitable for refurbishment or repair.
Tags : 
     Eaton
By: Cisco and NVIDIA Corporation     Published Date: Oct 03, 2019
You can manage on-premises and cloud with proven enterprise capabilities, scalability, and leveraging existing investments. Want to learn how? This informative infographic from Citrix® and Microsoft® details your path to success. Download it now!
Tags : 
     Cisco and NVIDIA Corporation
By: Cisco and NVIDIA Corporation     Published Date: Oct 03, 2019
Want to manage Windows Virtual Desktop and modernize your IT Practices? This informative, content-rich e-book from Citrix® and Microsoft® will explain how to deliver the best virtual desktop experience for cloud and on-premises. Download it today!
Tags : 
     Cisco and NVIDIA Corporation
By: Cisco and NVIDIA Corporation     Published Date: Oct 03, 2019
The future of VDI is the cloud and the time to initiate your cloud strategy is today. This informative e-book details how Citrix® plus Microsoft® Windows Virtual Desktop service empowers enterprises with a flexible, intelligent workspace that employees will love. Download it today!
Tags : 
     Cisco and NVIDIA Corporation
By: Pine Cove Consulting     Published Date: Oct 03, 2019
You've seen them, and you fear them. Now let us show you how to be cleaned of them. Hackers are increasingly targeting mobile devices to steal data (emails, contacts, corporate data, financial information) and send premium rate SMS, using up your bandwidth in the process. Sophos makes it easy to secure and manage your mobile devices.
Tags : 
     Pine Cove Consulting
By: Pine Cove Consulting     Published Date: Oct 03, 2019
Cybersecurity just isn't getting any easier. While protection technolgoies continue to advance at a rapid pace, so do the cybercriminals trying to circumvent them. Rather than continuing further with the same approach to cybersecurity, it’s time to move to cybersecurity as a system. By enabling security products to share information and work together in real time you can stay ahead of the threats while also freeing up valuable IT resources.
Tags : 
     Pine Cove Consulting
By: Mimecast     Published Date: Oct 02, 2019
Forrester Research provides insights into the key trends that are impacting your business today. The Information Archiving Now Tech report is an invaluable tool for anyone actively considering or comparing Information Archiving solutions. No matter where you sit in your organization, this is a must-read to help you build a modern, secure archive that’s purpose built for e-discovery, compliance and end-user productivity. With a credible, side-by-side comparison of leading products, you can make a more informed investment that best fits the diverse needs of your business.
Tags : 
     Mimecast
By: AWS     Published Date: Oct 02, 2019
As organizations expand their cloud footprints, they need to reevaluate and consider who has access to their infrastructure at any given time. This can often be a large undertaking and lead to complex, sprawling network security interfaces across applications, workloads, and containers. Aporeto on Amazon Web Services (AWS) enables security administrators to unify their security management and visibility to create consistent policies across all their instances and containerized environments. Join the upcoming webinar to learn how Informatica leveraged Aporeto to create secure, keyless access for all their users.
Tags : 
     AWS
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics