Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

asset

Results 276 - 300 of 1123Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The cloud — at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. Most of today’s IT security was built to protect a well-defined network infrastructure, but that is yesterday’s architecture. When users and assets move outside the network perimeter where the traditional security stack can no longer protect them, your enterprise is exposed to an entirely new set of risks. And with more apps and sensitive data living in the cloud or on mobile devices, gaps emerge that leave organizations susceptible to attacks. Read this flipbook to see how you can take your security to new heights. We'll explain the challenges driving the shift in the market and how you can take advantage of these changes and improve security for your organization.
Tags : 
    
Cisco Umbrella EMEA
Published By: Carbonite     Published Date: Jan 04, 2018
For a backup solution to be considered flexible, it needs to satisfy several key business requirements. It should integrate seamlessly with any servers you’re running and provide full support for all the applications your business uses. It should enable you to protect assets in different parts of the country or overseas. And it should let you manage and monitor backups from anywhere. A flexible backup solution gives you everything you need to protect the technology investments you make now and in the future. So instead of having to buy multiple solutions to support your changing needs, you can have a single solution that adapts to fit your environment. We call that flexible deployment.
Tags : 
    
Carbonite
Published By: SAP     Published Date: Nov 22, 2017
The digital transformation (DX) of industries is well under way — a transformation that is enabled by the Internet of Things (IoT). The IoT allows organizations to reinvent existing industry processes, augment how they engage with their customers, and accelerate the speed at which they deliver their products and services. This white paper looks at how these digital strategies facilitated by the IoT are reshaping those industry segments that are both asset rich and focused on services rather than products. The paper then explores IoT scenarios that hold great promise and how companies are approaching investment to optimize business outcomes.
Tags : 
digital transformation, industries, iot, internet of things, customers, products, services, companies
    
SAP
Published By: IBM     Published Date: Apr 14, 2017
The growing need for organizations to treat information as an asset is making metadata management strategic, driving significant growth for metadata management solutions. We evaluate nine vendors to help data and analytics leaders find the solution that best suits the needs of their organization.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection, metadata
    
IBM
Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: IBM     Published Date: May 02, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
Published By: Absolute Software     Published Date: Nov 21, 2011
Learn about best practices in the management and security of IT assets and the sensitive information they contain.
Tags : 
security, strategy, healthcare, absolute, it assets, sensitive information, phi, ehr
    
Absolute Software
Published By: Schneider Electric     Published Date: Jan 26, 2018
The first event in the Partnering with Certainy Webinar Series, "Customer Demands at the Edge." Trends like IoT are driving customer experience expectations in a way that demands resiliency in local edge environments. As a result, we’re seeing a rise of edge computing (compute power coming out of the cloud and into the access layer). Customer demands manifest themselves differently based on things like company size and segment. For example, a retail customer’s business imperatives might look different from a doctor’s office. But one thing remains constant: A standardized, redundant, and repeatable physical infrastructure can protect the availability of these now-critical access-layer IT assets. APC by Schneider Electric has: The solutions you need to deliver a standardized, redundant, & repeatable infrastructure to your customers The tools you need to configure them, The alliances & certifications you trust & rely on, The program to make it profitable. Fill out your information and click "Register" to watch the kick off our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Always On, Always Connected.” This webinar originally aired on October 5th, 2017.
Tags : 
    
Schneider Electric
Published By: BMC Software     Published Date: May 16, 2011
In this white paper learn how to identify existing assets, assess your business needs, and develop a technical and business plan for your cloud.
Tags : 
amp design, cloud computing, constraining, service design, cloud planning, bmc software, cloud operations, compliance
    
BMC Software
Published By: SAS     Published Date: Apr 16, 2015
The framework presented here is a way to avoid data dysfunction via a coordinated and well-planned governance initiative. These initiatives require two elements related to the creation and management of data: • The business inputs to data strategy decisions via a policy development process. • The technology levers needed to monitor production data based on the policies. Collectively, data governance artifacts (policies, guiding principles and operating procedures) give notice to all stakeholders and let them know, “We value our data as an asset in this organization, and this is how we manage it.”
Tags : 
    
SAS
Published By: Taleo     Published Date: Apr 11, 2011
Do you know how your company is measuring up against the competition? It's imperative to uncover every distinction that sets your company apart. Your people, or talent, is a valuable asset you can use to impact success.
Tags : 
taleo, talent management, competition, employees, talent, asset, top peformers, engagement
    
Taleo
Published By: Brightcove     Published Date: Feb 18, 2016
Video used to be a nice-to-have asset, but today it is a fundamental part of any successful marketing strategy. Yet, some companies still seem reluctant to invest in a video strategy because their leadership may not fully grasp the benefits of video.
Tags : 
video marketing, revenue marketing, demand generation, lead generation, video, martech, marketing technology, digital marketing
    
Brightcove
Published By: Workday     Published Date: Mar 02, 2018
Today’s banks, credit unions, asset management firms, lending companies, and other financial services businesses operate in a highly competitive and regulated environment. Servicing clients, introducing new products and channels, and opening new markets as well as having insight into your loans, investments, and deposits is critical to your bottom line. At the same time, employing the right people is what drives your future. Workday provides financial management, human capital management, and planning/ budgeting in a single cloud-based system to support your needs.
Tags : 
bank, credit unions, financial services, cloud-based system
    
Workday
Published By: ServiceNow     Published Date: Nov 22, 2013
A modern ITAM solution allows organizations to consolidate legacy systems into one system of record and automate the asset lifecycle.
Tags : 
servicenow, enterprise it, asset management, software asset management, itam, itsm, service management, software-as-a-service
    
ServiceNow
Published By: ServiceNow     Published Date: Nov 22, 2013
An effective service catalog enables IT to deliver business services that are more customer and service focused, which results in higher customer satisfaction, provides standardization and consistency and increases IT visibility across the organization.
Tags : 
servicenow, enterprise it, boost visibility, business value, service catalog, service management, infrastructure library, budget effectiveness
    
ServiceNow
Published By: Kaseya     Published Date: May 13, 2015
At the same time that organizations are moving many of their IT assets to the cloud, the problem of how to manage all of an organization’s IT assets has, in many ways, become more complex.
Tags : 
kaseya, hybrid, cloud, management, msp, mobile, big data, network architecture
    
Kaseya
Published By: Waterline Data & Research Partners     Published Date: May 18, 2015
Waterline Data automates the cataloging of data assets and provides an Amazon.com-like guided shopping approach to data discovery that is intended to take the guesswork out of targeting the right data.
Tags : 
waterline, big data, automation, cataloging, processing, analysis, assets, data science
    
Waterline Data & Research Partners
Published By: Waterline Data & Research Partners     Published Date: May 18, 2015
In this report, Forrester Research recommends that application development and delivery (AD&D) professionals working on BI and big data initiatives get the best out of both by designing and integrating them in a flexible data platform.
Tags : 
waterline, big data, automation, cataloging, processing, analysis, assets, data science
    
Waterline Data & Research Partners
Published By: FICO     Published Date: Jun 07, 2016
As IT departments’ lists of backlogged application development projects keep growing, so does the speed of new development requests from line-of-business personnel. For many IT departments, the speed of business — the speed of requests for additional developments — can’t be met under current practices. This inability to keep pace with critical development requests, supporting timely strategy modifications, seriously impacts an enterprise’s profitability. The solution FICO advocates — one that accounts for budget constraints, legacy operational realities and quality assurance — is to empower line-of-business personnel as Citizen Developers, giving them the right set of technology assets to quickly, safely and cost effectively participate in application development.
Tags : 
    
FICO
Published By: VMware AirWatch     Published Date: Feb 21, 2017
"Mobile and cloud deployment issues are dominating the concerns of organizations today. End-user mobility and flexibility versus IT control and visibility are the opposing requirements challenging even the most nimble of environments. Organizations are searching for several key capabilities to address this dichotomy: • Infrastructure that is optimized for end users to drive down costs, simplify acquisition, upgrade easily, and support policy management • Flexibility in delivering workspaces to users—on-premises, cloud, and offline—all within a unified workspace with single sign-on • Management capabilities encompassing the entire ecosystem and providing security, compliance, and management of day-to-day end-user environments Download this asset to learn how VMware addresses these needs more effectively than Citrix with the VMware mobile-cloud architect."
Tags : 
    
VMware AirWatch
Published By: OpenText     Published Date: Nov 30, 2015
Download this whitepaper to learn how OpenText’s enterprise-grade, workflow-oriented digital asset management ecosystem gives organizations the necessary combination of performance, security and management control for using digital assets both within their enterprises and in their relationships with customers, partners and prospects.
Tags : 
    
OpenText
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
Something odd happened during Selectica’s roll-up strategy. Usually when a technology vendor acquires a number of providers at relatively low valuations, its focus tends to be on financially engineering the various SaaS, maintenance, upsell and other income schemes from the assets. But in Selectica’s case, the acquired became the basis of the company, in a manner in which the sum of the assets became an entirely different equation that it likely even bargained for before getting into the activity in the first place. But sometimes the uncertainty of post-merger integrations can lead to an outcome that benefits all parties involved (including customers) in ways that would be difficult to have imagined going into the process.
Tags : 
    
Determine (Selectica)
Published By: GE Power     Published Date: Oct 05, 2016
Ten Billion dollars in production is lost annually from unplanned downtime in the power sector. 95% of alarms don’t matter. In this eBook learn how power leaders are leveraging Asset Performance Management (APM) to drive less unplanned downtime, safer operations and a competitive edge with data and predictive analytics.
Tags : 
power plant asset management software, plants operation management software, asset performance management system, emissions management software
    
GE Power
Published By: GE Power     Published Date: Oct 05, 2016
Gathering machine sensor data for analysis across a power plant is only the beginning. The Digital Twin takes analytics to the next level by creating a virtual analytic model of assets within the plant. With the GE Digital Twin power companies can understand how assets are performing in real time, and predict future performance.
Tags : 
digital power plant, digital power, digital power station, distributor solution, efficiency of power generation, industrial power
    
GE Power
Published By: GE Power     Published Date: Oct 05, 2016
Cyber attacks against utilities and power producers are on the rise. Prudent leaders are taking action now to lock down their control systems and operations assets before a potentially catastrophic event occurs. Download the eBook “5 Security Imperatives for Power Executives” to learn how to prepare and react to threats to your business and the public you serve.
Tags : 
energy cyber security, power plant cyber security, digital security for power plants, dcs security, ics security, power plant cyber risk
    
GE Power
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.