RSS feed Get our RSS feed

News by Topic

integrated management

Results 51 - 75 of 296Sort Results By: Published Date | Title | Company Name
By: VMware Citrix     Published Date: Jan 23, 2018
VMware Horizon® 7 offers full-featured support for hosted applications and shared desktop sessions, expanding the capabilities of the leading virtual desktop infrastructure (VDI) platform. Tightly integrated with Microsoft Remote Desktop Services (RDS), Horizon can deliver hosted applications and desktop sessions, virtual desktops, and VMware ThinApp® virtualized applications, all supported on the devices end users want to use. This white paper provides guidance for adding support for hosted applications and desktop sessions to your VMware Horizon infrastructure. Whether the goal is to integrate an existing RDS environment for combined management with VMware Horizon virtual desktops or deploy hosted applications and desktop sessions for the first time, VMware Horizon provides the technology required and a simple path forward.
Tags : hosted, applications, horizon 7, virtual desktop, infrastructure, microsoft, remote, services
     VMware Citrix
By: NAVEX Global     Published Date: Jan 11, 2018
The integrated hotline and incident management components are the employee facing “front end” of any whistleblower programme. As such, their proper implementation and management will determine how the programme is perceived by potential whistleblowers and other key stakeholders. The hotline will also largely conclude how effective and efficient the programme is in meeting its overall objectives.
Tags : whistleblower, hotlines, case, management, solutions, practices, navex
     NAVEX Global
By: McAfee EMEA     Published Date: Nov 15, 2017
The top concern of all of respondents with moving to IaaS is having consistent security controls that provide integrated security with central management across all cloud (private and public) and traditional data center infrastructure. The top concern of all of respondents with moving to IaaS is having consistent security controls that provide integrated security with central management across all cloud (private and public) and traditional data center infrastructure.
Tags : cloud, usage, data, infrastructure, private, public, security, integration
     McAfee EMEA
By: Adobe     Published Date: Nov 10, 2017
Reaching out to your customers across channels is difficult and takes a coordinated effort. You need sophisticated audience segmentation, real-time engagement insights, and efficient ways to orchestrate a campaign across all channels, devices, and screens. These capabilities, integrated and working together as they do in Adobe Campaign, create consistent customer experiences that span all marketing channels. See why we’re a Leader in Gartner’s 2017 Magic Quadrant for Multichannel Campaign Management.
Tags : 
     Adobe
By: Adobe     Published Date: Nov 09, 2017
Robust Data Management Platforms drive intimate customer experiences. You know the importance of identifying your best customer segments and treating them right. You also know that takes a ton of work. But it’s work that we can help you accomplish with our integrated and secure Data Management Platform (DMP). By using Adobe Audience Manager, our DMP offering, you'll aggregate data from all your sources to better understand your current customer segments, while we also help you identify new audiences to target. The new Forrester Wave™: Data Management Platforms, Q2 2017 says “Adobe was a DMP Forrester Wave leader in 2013 and 2015, and continues to set the pace in this Forrester Wave.” See where we receive the highest scores and why we are named a Leader in this report.
Tags : 
     Adobe
By: Datavail     Published Date: Nov 03, 2017
The management of financial data in an organization is of paramount importance. Reporting, evaluating ROI, making adjustments across the business, and increasing revenue depend on good, accessible financial data that can be updated and integrated across systems and software. For these reasons, many organizations have turned to master data management (MDM) software in the effort to better store, access, search, retrieve, and analyze their financial data. These MDM solutions are able to collect data within a single unified, fully integrated, user-friendly platform. However, in order to be most effective, MDM applications must also have capabilities in data relationship management (DRM). DRM software is able to describe and enforce the relationships between data, no matter where it's located within an organization, to provide a holistic and consistent solution.
Tags : 
     Datavail
By: AlienVault     Published Date: Oct 20, 2017
Achieving PCI compliance takes focus, determination, and the right set of tools. By building these essential security capabilities into an integrated, complete solution, AlienVault Unified Security Management™ (USM) delivers a workflow-centric approach that materially reduces your organization’s time to compliance versus a solution stitched together from individual point products. In this paper you will read an overview of AlienVault USM™ as well as learn about the capabilities and benefits it includes to help you comply with PCI DSS requirements.
Tags : 
     AlienVault
By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
     IBM
By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : it security, malware, malware protection, virus prevention, ibm, threat intelligence
     IBM
By: Cognizant     Published Date: Oct 03, 2017
Impact that situation awareness can have on extended supply chain operations w/focus on logistics companies
Tags : data science, predictive analytics, applications services, systems integration, business process management, digital transformation, social mobile analytics cloud (smac), integrated cloud services
     Cognizant
By: MuleSoft     Published Date: Sep 27, 2017
As one of the most popular integrated enterprise resource planning (ERP) solutions on the market, SAP has enabled organizations to optimize many of their most essential business functions in finance, human capital management, enterprise performance management, and supplier relationship management. One of the most pervasive challenges for SAP shops is integrating SAP to other applications within their organization. Without proper integration between SAP and these systems, organizations fail to fully automate and optimize their business processes. This whitepaper provides an overview of some of the most common challenges faced when integrating SAP, a brief overview of SAP interfaces and integration points, various approaches for SAP integration and a suggested best architecture for solving the SAP integration challenge.
Tags : 
     MuleSoft
By: Cognizant     Published Date: Sep 21, 2017
Additional insight on Forbes Research that ends with four “How To Get Started” steps.
Tags : data science, predictive analytics, applications services, systems integration, business process management, digital transformation, social mobile analytics cloud (smac), integrated cloud services
     Cognizant
By: Cognizant     Published Date: Sep 21, 2017
The impact that state-of-the-art simulation and modeling techniques can have on supply chain operations.
Tags : data science, predictive analytics, applications services, systems integration, business process management, digital transformation, social mobile analytics cloud (smac), integrated cloud services
     Cognizant
By: Cognizant     Published Date: Sep 19, 2017
Focus on creating consistent terminology in order to generate insights from the digital data encircling employees, partners, processes and customers.
Tags : data science, predictive analytics, applications services, systems integration, business process management, digital transformation, social mobile analytics cloud (smac), integrated cloud services
     Cognizant
By: Epicor     Published Date: Jul 18, 2017
As technology improves, retailers are relying more and more on their customer service to gain an advantage and differentiate themselves from the competition. Providing a pleasant customer experience can turn a first-time shopper into a lifelong buyer. By reading this Epicor eBook, you’ll discover the important role mobile technology plays in delivering faster, service. Retailers everywhere are implementing mobile tools to empower their employees to support customers—from stock and pricing information to mobile checkout. Epicor Eagle N Series is a fully integrated retail management system that offers a whole host of mobile tools to help you service your customers, stay informed, and make decisions from anywhere. Read the eBook and learn how the mobility of Epicor Eagle N Series can provide your retail business with a competitive advantage.
Tags : retail store software, retail sales software, retail saas, business retail software, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas
     Epicor
By: CA Technologies     Published Date: Apr 06, 2017
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure
     CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics