Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

centric

Results 251 - 275 of 511Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Things aren't what they used to be in the enterprise. Your employees are mobile and they're storing and accessing data in cloud apps—often in disparate networks. That presents a serious challenge for old-school threat-centric security models that force you to make decisions with little insight or broader context. Download our eBook to find out how a human-centric, risk-adaptive approach to data security can free up your overwhelmed security team to focus on investigations that really matter.
Tags : 
    
Forcepoint
Published By: Tenable     Published Date: Nov 06, 2018
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
    
Tenable
Published By: Brocade     Published Date: Sep 07, 2010
The emerging IP-centric Session Initiation Protocol (SIP) will be essential, allowing the creation of more sophisticated web-enabled communication and collaboration tools which benefit office, mobile and home workers.
Tags : 
brocade, ip networking, computerworld uk, ip-centric session initiation protocol, sip, ip networks, ip telephony
    
Brocade
Published By: Riverbed     Published Date: Jul 21, 2015
IT organizations have been evolving their WAN connectivity strategies to align with new IT cost, resilience, and performance objectives. Hybrid WAN is a growing trend with many organizations and enterprises, enabling them to augment traditional private leased lines or MPLS-based WAN circuits with secured public Internet services to achieve their goals. Riverbed takes a holistic, application-centric approach to solving the challenges of hybrid architectures. Read how SteelHead's hybrid architecture simplifies the laborious aspect of operating in a hybrid WAN environment.
Tags : 
hybrid enterprise, app performance, wan connectivity, hybrid wan, application-centric, it management
    
Riverbed
Published By: Riverbed     Published Date: Jul 21, 2015
This is a riverbed white paper explains how the flexibility and cost benefits of Internet connectivity lead to a hybrid network and provides best practices to overcoming the challenges introduced. This piece focuses on the ability to control such deployments at scale, and covers our application centric approach, covering our network services in depth (app groups, global policy management, QoS, Path selection, etc.)
Tags : 
hybrid enterprise, cost and flexibility, internet connectivity, hybrid network, network services, it management
    
Riverbed
Published By: Riverbed     Published Date: Nov 02, 2016
"Applications are at the core of digital transformation. Intrinsically linked to the success of digital initiatives and the apps that power them are the areas of DevOps and Continuous Delivery. Underpinning all of these is the area of application performance management (APM). Read this study from Enterprise Management Associates to discover: 10 key factors impacting APM practices in the digital economy. APM requirements for DevOps and Continuous Delivery. How APM addresses other top challenges in a cloud- and digital-centric business."
Tags : 
    
Riverbed
Published By: Arcserve     Published Date: Jul 26, 2010
Business is driving IT operations management to become increasingly application-centric. At the same time, applications are becoming more difficult to manage. How vendors respond to the application performance monitoring challenge will have a profound impact on their overall market positions.
Tags : 
ca technologies, magic quadrant, application performance monitoring, it operations management, apm, monitoring
    
Arcserve
Published By: Absolute Software     Published Date: Feb 23, 2010
A majority of environments today are cross-platform, combining both PCs and Macs. The result has become a common IT challenge: How can you maintain Macs in a network environment with a PC-centric infrastructure and with Windows-based network services?
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Vendor Guru     Published Date: Dec 21, 2007
Since the 1990s, the customer relationship management (CRM) concept has been embraced by the business world as a way to forge, maintain, and improve bonds with customers. Previously, many companies focused mainly on gathering consumer data for their own use. However, once businesses began to understand the value of allowing customers to dialog about their needs, they began implementing more systems that invited customer feedback.
Tags : 
vendor guru custom question campaign, crm tool, crm solution, crm tools, crm, customer relationship, customer centric, customer-centric, customer data, data integration, feedback, vendor guru, vendorguru, quinstreet, loyalty, customer service
    
Vendor Guru
Published By: Pivotal CRM     Published Date: Dec 21, 2007
For more than a decade, Pivotal CRM has been the choice of Microsoft-centric organizations that want the flexibility to model their specific business practices within their customer relationship management system. The Pivotal CRM product line leverages the Microsoft technology stack to provide usability and productivity advantages through integration to Microsoft Office, and more.
Tags : 
pivotal, crm, customer relationship management, microsoft, partner, partnership, alliance, product, direction, sedna, 6.0, .net, web services, soa, service oriented arthitecture, architecture, tier, flexibility, usability, future
    
Pivotal CRM
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
The pervasiveness of load balancing technology does not mean it is universally understood, nor is it typically discussed other than from a basic, network-centric viewpoint. This White Paper thoroughly explains load balancing and strips away some of the mystery and magic from basic load balancing practices.
Tags : 
load balancing technology, load balancing, networking, ip networks, ip telephony
    
F5 Networks Inc
Published By: Aternity     Published Date: Aug 26, 2011
This whitepaper provides insight, best practices, and recommendations for monitoring the end user experience within Virtual Desktop Infrastructures (VDI).
Tags : 
aternity, vdi, real end user experience, fpi, frontline performance intelligence, virtual desktop infrastructure, application performance, user productivity, user-centric proactive it management, slas, infrastructure
    
Aternity
Published By: Aternity     Published Date: Sep 29, 2011
Published by Aternity, the paper includes 8 real-world cases detailing how Aternity empowers SAP customers with a user-centric approach to proactive IT management.
Tags : 
aternity, sap, application performance, it management, training, real-time
    
Aternity
Published By: Aternity     Published Date: Apr 10, 2012
View these new on-demand videos and quickly see how a user-centric approach to proactive IT management can optimize performance, eliminate business disruptions, and increase user productivity.
Tags : 
aternity, technology, performance management, technology platform, it management, performance optimization
    
Aternity
Published By: Citrix Systems     Published Date: Jul 17, 2015
User-centric approach can meet needs of employees and IT.
Tags : 
mobility, virtualization, support, efficiency, productivity
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 17, 2015
Simplify adoption of the Google Chrome computing platform.
Tags : 
application delivery, platform, computing, architecture, security device optimization, network architecture
    
Citrix Systems
Published By: IBM     Published Date: Jun 25, 2012
Explore the four stages to transforming an organization from a traditional marketing communicator to a customer-centric communicator.
Tags : 
retail, ibm, marketing, pinpoint, customer service, offer, online, digital, e-commerce
    
IBM
Published By: Merkle     Published Date: Oct 19, 2012
As media and channels proliferate with the upsurge in digital touchpoints, we have access to massive volumes of customer data. This leads to the personalization of customer interactions that drive customer strategy as a business strategy.
Tags : 
brand experience, customer experience, customer insights, communication management, marketing accountability, roi, data management, customer centricity, crm, buying behaviors, segmentation, customer lifecycle, integrated, customer solutions, target segmented customers, measurement, marketing strategy, competitive advantage, business strategy, customer value
    
Merkle
Published By: Merkle     Published Date: Oct 19, 2012
An effective marketing investment strategy will help you take inventory of your current measurement framework and develop a more accurate, reliable and consistent strategy for assessing and improving the performance of your marketing spend.
Tags : 
marketing accountability, roi, data management, customer centricity, crm, buying behaviors, segmentation, customer lifecycle, integrated, customer solutions, target segmented customers, marketing measurement, marketing strategy, competitive advantage, business strategy, customer value, optimization, integrated marketing strategies, integrated, customer experience
    
Merkle
Published By: Merkle     Published Date: Oct 19, 2012
An integrated customer communication strategy places customer needs, behaviors and value at the center of all interactions and will result in increased revenue, profit and shareholder value.
Tags : 
data management, customer centricity, crm, buying behaviors, segmentation, customer lifecycle, integrated, customer solutions, target segmented customers, marketing measurement, marketing strategy, competitive advantage, business strategy, customer value, kpi, optimization, integrated marketing strategies, integrated
    
Merkle
Published By: Quest Software     Published Date: Jan 03, 2013
Discover Application Performance Management best Practices of 400 Leading Companies and See How to Implement These Best Practices in Your Organization.
Tags : 
application, performance management, best practices, enterprise applications
    
Quest Software
Published By: McAfee     Published Date: Jan 23, 2013
John Oltsik from ESG discusses the next generation of data-centric DLP that addresses today's risks and keep your business data safe.
Tags : 
dlp, data-centric dlp, data leakage, dlp deployment
    
McAfee
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.