RSS feed Get our RSS feed

News by Topic

control

Results 176 - 200 of 2235Sort Results By: Published Date | Title | Company Name
By: F5 Networks Inc     Published Date: Apr 18, 2012
VDI deployments offer tremendous advantages but can also impact server and network resources significantly.  A complete VDI solution should deliver a reliable, high-performing desktop user experience while taming complexity and supporting scalability within a secure, stable framework.
Tags : vdi, vmware view, citrix, xenapp, xen desktop, virtual desktop infrastructure, big-ip, application delivery controllers
     F5 Networks Inc
By: BP Logix     Published Date: Jan 17, 2011
This white paper covers how time is the critical element of the planning, oversight, and improvement of business processes. Learn how business users can gain ultimate control making processes more effective.
Tags : bpm, business process management, process management, worklfow
     BP Logix
By: NetIQ     Published Date: Jan 12, 2011
Addressing the potential for insider threats is an often overlooked security imperative for virtually all organizations worldwide.
Tags : netiq, insider threat, security, audits, access control, enterprise software
     NetIQ
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn
     Trend Micro, Inc.
By: Okta     Published Date: May 07, 2015
Bring Your Own Device (BYOD) can be a very polarizing topic for IT. Some view it as a solution that can save money, improve end user satisfaction, and enable remote employees. For others, BYOD represents risk of data leakage, loss of control, and signing up to support an endless ecosystem of unknown devices. No matter what your opinion on BYOD is, the impact on IT policy cannot be overstated. Through 2017, Gartner reports that 90% of organizations will support some aspect of BYOD. Read this eGuide and learn how you can address several new BYOD challenges facing IT.
Tags : byod, okta, mobility, safety, dad, mobility management
     Okta
By: Group M_IBM Q119     Published Date: Jan 17, 2019
Today, financial service companies are embracing hybrid cloud and its advantages, such as the ease of shifting production workloads and secure applications to public cloud environments. But, what is challenging is the complex regulatory landscape. 20,000 new regulatory requirements were created in 2016 alone. How can security pros ensure that controls for identity management, authentication and encryption work in both private and public clouds? Download this report for a closer look at the complexity of hybrid cloud security and 10 essential elements for compliant business operation.
Tags : 
     Group M_IBM Q119
By: Druva     Published Date: Mar 30, 2016
As information security continues to rise to the top of the enterprise priority list, what used to be an easy-to-control environment, with all data stored behind the corporate firewall, is no longer. Shadow IT, mobile computing, consumer IT, and cloud computing are all transforming enterprise IT. Workers using unsecured networks and devices without encryption are also a concern, as data breaches cost organizations millions of dollars in fines, data loss, investigations, and customer backlash.
Tags : druva, data risks, consumer it, corporate firewall, shadow it, mobile computing, data breaches, security
     Druva
By: Exabeam     Published Date: Sep 25, 2017
This solution brief will describe how Exabeam can help organizations implement effective security controls and best practices to achieve alignment with GDPR.
Tags : 
     Exabeam
By: Zebra Technologies     Published Date: Jul 06, 2017
Gestione sin esfuerzo su flota de impresoras térmicas de códigos de barras para un control más estricto y mayores resultados. Este artículo cubre desafíos como aprovisionamiento problemático, dolores de cabeza de seguridad y monitoreo confuso.
Tags : printer intelligence, industrial printers, desktop printers, mobile printers, highly durable printers, improving warehouse, manufacturing productivity, shipping accuracy
     Zebra Technologies
By: Zynapse     Published Date: Sep 10, 2010
UNSPSC enables preference item management, better spend analysis, supply standardization and information control. Whether you are deliberating on the need for a common product and classification standard for your company, or are an advanced UNSPSC adopter, we hope that "Adopting UNSPSC" will answer some of your questions and perhaps help you in some way to improve your purchasing and supply management processes.
Tags : zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management
     Zynapse
By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
     Symantec
By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : network protection, it security, firewall, hacker detection, security management
     McAfee
By: Bit9     Published Date: Mar 07, 2013
Download this white paper and learn how to use a progressive, three-step approach to build trust, monitor activity and tailor protection to your enterprise and build an adaptive application control framework.
Tags : security, risk management, roi, cost reduction, enterprise, cyber threat
     Bit9
By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : control, visibility, customer, financial risk, web fraud, bots, infrastructure
     Akamai Technologies Australia
By: Red Hat     Published Date: May 05, 2015
It's time to manage all your VMware machines through 1 tool. Red Hat® CloudForms gives you visibility and control throughout your whole infrastructure—from individual VMware machines to your entire cloud and virtualization infrastructure. Download the technology brief to learn more.
Tags : redhat, cloud management, vmware environments, virtualization infrastructure, visibility
     Red Hat
By: IBM     Published Date: Oct 30, 2013
Learn how leading companies are using performance management analytics to unlock business value.
Tags : ibm, disclosure management, financial disclosure, risk management, complex reporting, global statutory reporting, financial data, operational data
     IBM
By: Aerohive     Published Date: Feb 06, 2008
Craig Mathias, Principal of the Farpoint Group, explores the advent of cooperative control, an innovative new class of wireless infrastructure from Aerohive Networks. Aerohive’s cooperative control architecture gives you all of the benefits of autonomous access points and controller-based infrastructures, without the high OPEX or CAPEX associated with either approach. Cooperative control architecture represents an innovative approach to wireless LAN systems, one that incorporates a number of interesting features and corresponding benefits.
Tags : wireless lan, wlan, wireless architecture, wireless infrastructure, aerohive, wifi, wi-fi
     Aerohive
By: IBM     Published Date: Apr 21, 2016
"Reshaping trading partner communities with growth, agility and scalability View this ebook to learn how leading organizations are managing, deploying, designing or planning cloud-based B2B integration alternatives to future-proof their B2B trading operations. Discover the benefits that clients of IBM B2B Cloud Services cite, including: - Reduced risk and total cost of ownership (TCO) in B2B integration - Enhanced visibility and control over business processes shared with partners - Faster partner onboarding and faster, more reliable data exchange - Greater collaboration across IT, business managers and external partners"
Tags : ibm, b2b, cloud, b2b integration
     IBM
By: IBM     Published Date: Oct 11, 2016
View this ebook to learn how leading organizations are managing, deploying, designing or planning cloud-based B2B integration alternatives to future-proof their B2B trading operations. Discover the benefits that clients of IBM Sterling B2B Cloud Services cite, including: -Reduced risk and total cost of ownership (TCO) in B2B integration - Enhanced visibility and control over business processes shared with partners - Faster partner onboarding and faster, more reliable data exchange - Greater collaboration across IT, business managers and external partners
Tags : ibm, commerce, b2b, b2b integration, cloud, advantage cloud
     IBM
By: Aerohive     Published Date: Oct 23, 2014
This analysis is designed to provide potential customers with a comprehensive picture of the direct and indirect costs and benefits they should consider when evaluating Aerohive or any other wireless connectivity solutions.
Tags : wireless connectivity, aerohive, controlle-less, benefits of wirelesss connectivity
     Aerohive
By: Microsoft Visual Studio Team System     Published Date: Apr 29, 2009
Today’s economic climate presents challenges in achieving business differentiation.  Investing in innovation during an economic downturn may seem counterintuitive at first, but it can help companies pull ahead of the competition by displaying a show of strength in a climate of weakness.  The Microsoft® Application Platform can help organizations do more with less, enabling them to more quickly, efficiently, and cost-effectively deliver custom solutions that provide strong business value.
Tags : microsoft, vsts, microsoft vsts, affordable innovation, application platform, custom solutions, application life-cycle management, rich development platform
     Microsoft Visual Studio Team System
By: Lenovo UK     Published Date: Nov 09, 2018
L'aumento della mobilità sta causando mal di testa a tutti i team IT, con potenziali aumenti di costi e rischi. Ma con ThinkPad basato su processori Intel® Core™ i7 vPro™, ottieni sicurezza a 360, durata affidabile e produttività senza compromessi in tutti i dispositivi. Scopri di più nel nostro white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, il logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, il logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside e Intel Optane sono marchi di Intel Corporation o di società controllate da Intel negli Stati Uniti e/o in altri Paesi.
Tags : lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicurezza, produttività
     Lenovo UK
By: Lenovo UK     Published Date: May 15, 2019
L'aumento della mobilità sta causando mal di testa a tutti i team IT, con potenziali aumenti di costi e rischi. Ma con ThinkPad basato su processori Intel® Core™ i7 vPro™, ottieni sicurezza a 360, durata affidabile e produttività senza compromessi in tutti i dispositivi. Scopri di più nel nostro white paper. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, il logo Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, il logo Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside e Intel Optane sono marchi di Intel Corporation o di società controllate da Intel negli Stati Uniti e/o in altri Paesi.
Tags : lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicurezza, produttività
     Lenovo UK
By: Dell & Microsoft     Published Date: Mar 06, 2014
Small businesses typically keep a sharp focus on cost control and cash conservation, which is good. However, when it comes to the decision to buy new PCs or maintain older ones, many small businesses falsely believe it’s financially advantageous to maintain older PCs rather than replace them. Download this independent, global small business study to learn how: o Older PCs negatively affect operating costs o Older PCs diminish employee productivity o Newer PCs deliver better application performance and improved productivity at a reduced operating cots Download this report today to learn the true direct and indirect costs of maintaining and upgrading older PCs in your small business.
Tags : dell, small business, employee productivity, reduce operating costs, productivity, collaboration, older pcs, pc refresh
     Dell & Microsoft
By: VMware Dell     Published Date: Jan 31, 2008
AIC, Canada’s largest privately held mutual fund company, aimed to shrink their data center footprint and manage IT infrastructure more effectively. With the VMware Infrastructure 3 suite, AIC has been able to handily address its IT challenges and create a scalable, manageable IT infrastructure. Find out how much they saved, and how VMware impacted their organization's workload and productivity.
Tags : vmware, virtual, virtualize, virtualization, virtual machine, server, infrastructure, cost savings
     VMware Dell
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics