RSS feed Get our RSS feed

News by Topic

it dependency

Results 1 - 25 of 39Sort Results By: Published Date | Title | Company Name
By: KPMG     Published Date: Jun 06, 2019
What impact will the cloud-enabled workplace have on your cybersecurity strategy? This year’s research shows that organisations are navigating a myriad of both old and new cybersecurity challenges to bring the cloud into scope. Read this to discover: • how growing cloud dependency has created distinctive challenges around cyber security • what the biggest cyber challenges are for organisations in this context • how intelligent automation and machine learning is being used to overcome operational obstacles hampering cloud security • a set of cybersecurity considerations for modern IT environments.
Tags : 
     KPMG
By: effectual     Published Date: Dec 03, 2018
Multi-Cloud, hybrid strategies add complexity Nearly 60% of businesses say they're moving toward hybrid IT enviornments that integrate on-premises systems and public cloud resources and enable workloads to be pleaced according to performance, security and dependency requirements. Identifying the best execution venue is a key cloud hurdle.
Tags : cloud enablement, cloud optimization, digital transformation, cloud migration, cloud computing, cloud architecture
     effectual
By: DocuSign UK     Published Date: Nov 06, 2018
"With every week that passes, our dependency on paper wanes as digital processes are introduced into every aspect of our daily activity. If you want to sign a contract, book a restaurant or make a bank transfer, you can do so digitally – it is ingrained in our lives. Taking an entire business digital can be more challenging and reliant on many more moving parts. Identifying how businesses are evolving to meet these rapidly changing demands is essential for decision makers across all sectors of the economy to prepare their organisation or department accordingly to undertake successful digital transformations. This eBook investigates digital expectations from both the consumer and business perspectives. It identifies what action is being taken to meet the demand in the market and where the main challenges lie for businesses that are trying to deliver the digital experience their customers want."
Tags : 
     DocuSign UK
By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyer’s Guide — to learn more.
Tags : authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
     Entrust Datacard
By: Oracle     Published Date: Oct 20, 2017
Virtually every business-oriented conversation Wikibon has with senior IT leaders includes a discussion of digital transformation. The relevance to this research is the increasing interdependency between organizations and the data they use, create, access, share and store. Digital means data and lots of it; and this data must be protected. The data requirements facing organizations today as a direct result of digital initiatives are unprecedented and require new approaches for protecting and enabling recovery for high value data assets. Governments around the world are trying to keep pace with the digital tsunami and new/evolving regulations will further pressure data protection and recovery requirements. For example, the EU’s General Data Protection Regulation (GDPR) states that organizations must take appropriate measures to ensure the ability to restore personal data “in a timely manner in the event of a physical or technical incident.” Beginning in May of 2018, penalties for non-co
Tags : 
     Oracle
By: KIBO     Published Date: Nov 10, 2016
In today’s rapidly evolving commerce space, only the agile seller will survive. In this white paper, learn how flexible and nimble technology that empowers users, rather than relies on IT, will be the determiner of the day.
Tags : online selling, ecommerce, customer experience, crm solutions/software, customer experience/engagement, e-commerce solutions
     KIBO
By: BMC Software     Published Date: Jul 22, 2015
In this white paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services. • Accelerate mean time to repair (MTTR) while communicating better with stakeholders. • Manage even the most complex hybrid environments more efficiently and effectively. • Understand the impact of proposed changes and potential security risks to guide decision-making.
Tags : cloud, hybrid environments, application discovery mapping, application dependency mapping, security risks
     BMC Software
By: BMC Software     Published Date: May 01, 2015
Complex hybrid environments can make it difficult to track interdependencies, increasing the risk of disrupting critical business services. In this research paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services • Accelerate mean time to repair (MTTR) while communicating better with stakeholders • Manage even the most complex hybrid environments more efficiently and effectively • Understand the impact of proposed changes and potential security risks to guide decision-making
Tags : hybrid environments, critical business services, mean time to repair, potential security risks, decision-making, cloud optimization, visibility and performance
     BMC Software
By: IBM     Published Date: Feb 05, 2014
Companies increasingly rely on IT discovery to provide a complete picture of the infrastructure for IT optimization and migration initiatives. But current methods are costly, and they can take too long to deliver results. ALDM (analytics for logical dependency mapping), a new service from IBM Research, is changing all of that. In this interview, Larry Thompson, IBM offering development executive, explains how ALDM reengineers IT discovery with analytics, automation and cloud computing technologies and delivers a more complete and accurate view of your IT environment. Listen to the full 8-minute podcast interview or read the two-page encapsulated version to learn how ALDM is lowering the cost of IT discovery while speeding results.
Tags : 
     IBM
By: IBM     Published Date: Oct 10, 2013
With modern IT infrastructures an intricate web of interdependencies, uncovering the total IT environment, including the logical relationships between physical, virtual and cloud elements, has never been more important—or more complex. This white paper discusses how IBM’s analytics for logical dependency mapping, ALDM, reengineers the IT discovery process to provide a more complete and accurate view of the IT infrastructure.
Tags : reengineering, it discovery, analytics, visualization, interdependencies, it environment, logic, logical relationships
     IBM
By: Riverbed     Published Date: Jul 17, 2013
Effective IT planning and decision making are dependent upon having a complete asset inventory and an accurate understanding about dependencies available before, during and after IT change activities. Application discovery and dependency mapping (ADDM) solutions automate the process of discovering and mapping transactions and applications to the underlying infrastructure and application interdependencies. Learn how Riverbed Cascade’s built-in application discovery and dependency mapping capabilities can help you shorten project times and mitigate risk.
Tags : effective it, addm, application discovery, riverbed cascade
     Riverbed
By: Riverbed     Published Date: Oct 12, 2012
Riverbed® Cascade® is an application-aware network performance management solution with built-in application discovery and dependency mapping capabilities. The result is dramatically shortened project times, reduced costs, and improved efficiencies.
Tags : application discovery, it planning, data consolidation, virtualization
     Riverbed
By: Riverbed     Published Date: May 18, 2012
As your business needs become more dynamic, monitoring systems will be key to understanding how applications fulfill business needs and your ability to provide governance will determine the success level of your entire enterprise. With complexity growing at such a hyperbolic rate, in the future, automated application discovery and dependency mapping will not just be useful -it will be mandatory.
Tags : service management, management software, infrastructure, devops, cloud performance monitoring, application monitoring, database monitoring, end user experience monitoring
     Riverbed
By: Riverbed     Published Date: May 18, 2012
Data center consolidation and migration projects are fraught with risk. By using Network Behavior Analysis (NBA) systems to get a handle on dependency information, usage information, change impact information, and post-change problem identification, IT organizations can significantly reduce risk by automating and improving the planning process and minimizing disruption during implementation. Download this informative Riverbed white paper to learn more.
Tags : data center consolidation, migration, it infrastructure, network behavior analysis, nba analysis, storage
     Riverbed
By: Jonckers     Published Date: Apr 11, 2011
In this whitepaper, we will discuss: 5 Important Questions to Ask Yourself to Determine Need; Supplier Dependency; Time to Market; Cost Tolerance; Risk and more!
Tags : jonckers, strategic sourcing, project timelines lsp, localization, project management, ad management, crm and sales tools, localization
     Jonckers
By: Jonckers Translation & Engineering     Published Date: Jul 13, 2010
In this whitepaper, we will discuss: 5 Important Questions to Ask Yourself to Determine Need; Supplier Dependency; Time to Market; Cost Tolerance; Risk and more!
Tags : jonckers, strategic sourcing, project timelines lsp, localization, project management, ad management, crm and sales tools, localization
     Jonckers Translation & Engineering
By: ASG Software Solutions     Published Date: Mar 10, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : asg, cmdb, bsm, itil, ema, configuration management, itsm, bsm
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Feb 23, 2010
Virtualization continues to grow at 20 percent or more per year, but it is not expected to overtake existing physical architectures at least through 2010. This white paper examines the unique challenges of virtualization and offers tips for its successful management alongside IT's physical deployments.
Tags : asg, cmdb, virtualization, bsm, itil, bsm, metacmdb, configuration management
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Feb 23, 2010
There are success stories of businesses that have implemented Business Service Management (BSM) with well-documented, bottom-line results. What do these organizations know that their discouraged counterparts don't?
Tags : asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Feb 18, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL®) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : asg, cmdb, bsm, itil, bsm, metacmdb, asg ddm, cab
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Nov 09, 2009
Composite applications can provide multiple benefits, such as business agility, better utilization of business software assets through code reuse, development efficiencies, and cost optimization. Once companies are skilled at deploying them, many find that they roll out new applications and integrations faster, while maximizing the value of "tried and true" software components.
Tags : asg, cmdb, bsm, itil, roi, configuration management, metadata, metacmdb
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Nov 05, 2009
Effective workload automation that provides complete management level visibility into real-time events impacting the delivery of IT services is needed by the data center more than ever before. The traditional job scheduling approach, with an uncoordinated set of tools that often requires reactive manual intervention to minimize service disruptions, is failing more than ever due to todays complex world of IT with its multiple platforms, applications and virtualized resources.
Tags : asg, cmdb, bsm, itil, bsm, metacmdb, workload automation, wla
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Sep 28, 2009
Virtualization is now mainstream. Enterprises continue to heavily invest in virtualization projects and while short term hardware and cost saving benefits are being achieved, few enterprises achieve anywhere close to the full potential of virtualization as they struggle with new problems like assuring performance and availability, preventing VM sprawl, and maximizing resource utilization
Tags : asg, cmdb, bsm, itil, bsm, bsp, metacmdb, virtualization
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Jul 27, 2009
To meet the challenges of intense competition and increasing customer demands, companies must tightly align their IT service management with business issues and priorities. This paper outlines the maturity steps involved in the progression towards proactive Business Service Management (BSM) and explains how ASG's metaCMDB helps secure its seamless adoption.
Tags : asg, cmdb, bsm, itil, bsm, metacmdb, configuration management, metadata
     ASG Software Solutions
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics