Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

centric

Results 51 - 75 of 517Sort Results By: Published Date | Title | Company Name
Published By: Box     Published Date: Feb 13, 2015
As file sizes have increased and document-centric collaboration needs have become more complex, many organizations are turning to cloud file sharing (CFS) products to provide end users with a lightweight but effective solution.
Tags : 
cloud, mobile, cfs, cloud file sharing, it management
    
Box
Published By: Box     Published Date: Jun 22, 2018
more people than ever before. Whether it's your employees, partners or customers, all your people use enterprise content. And that means content management is becoming increasingly top-of-mind — but companies find it difficult to get it right. In this newsletter, Gartner shares how cloud content management helps you build your content management strategy from the bottom up, enabling you to: o Improve company-wide collaboration and become more customer-centric o Scale your business and reduce cost o Provide security and stability for your entire organization • Download the full Gartner newsletter, Reshaping ECM: New Opportunities in the Cloud. You'll learn about the emerging requirements of top ECM vendors, as well as discover real-world use cases of Cloud Content Management.
Tags : 
    
Box
Published By: Brocade     Published Date: Sep 07, 2010
The emerging IP-centric Session Initiation Protocol (SIP) will be essential, allowing the creation of more sophisticated web-enabled communication and collaboration tools which benefit office, mobile and home workers.
Tags : 
brocade, ip networking, computerworld uk, ip-centric session initiation protocol, sip, ip networks, ip telephony
    
Brocade
Published By: Bronto     Published Date: Jan 04, 2012
This customer-centric approach has made ACK a trusted brand and go-to source for paddlesports enthusiasts and outdoor adventurers. As ACK has evolved and grown, email has become an important driver of revenue.
Tags : 
bronto, marketing, ack, austin canoe & kayak, customer enagagement, email marketing, revenue
    
Bronto
Published By: Bronto     Published Date: Sep 09, 2013
Is your email marketing solution just a communication vehicle or is it built to drive revenue?
Tags : 
email marketing, email marketing plaform, email marketing solutions
    
Bronto
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 02, 2016
No matter where you are on your agility journey, you can transform into a customer-centric, even customer-obsessed organization that produces inspired, sustained innovation and value.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
APIs are an emerging technology for integrating applications using web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. While it is true that APIs share many of the same threats that plague the web, they are fundamentally differently and have an entirely unique risk profile that you need to manage. This eBooklet provides an overview of these new risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The advent of cloud computing and software-defined data center architectures for modern application delivery has made networking more sensitive than ever before. Applications in the digital age require networks that can expand and contract dynamically based on consumer demand. Enterprises are implementing software-defined networking (SDN) to deliver the automation required by these new environments, but the dynamic nature of SDN makes network management and monitoring fundamentally more challenging. Network infrastructure teams need monitoring tools that can provide visibility into these new and constantly changing networks. This white paper explores the importance of SDN monitoring and examines a leading example of a solution, CA Performance Management with CA Virtual Network Assurance integration.
Tags : 
    
CA Technologies EMEA
Published By: CDW     Published Date: Sep 17, 2014
We now live in a flash centric world where all active data must be on flash. This doesn’t mean, however, that all data must be on flash. The best approach is to understand your application mix and workload requirements. Some key apps, like databases, are latency intolerant and should be pinned to flash. Others apps can benefit from fully-automated storage tiering. EMC’s market leading VMAX and VNX systems are flexible choices that can deliver all-flash and hybrid services. CDW and EMC has you covered!
Tags : 
data, market, flash, systems, key apps, centric, application, tiering, latency, intolerant, storage, automated, hybrid, services, leading, active
    
CDW
Published By: CDW     Published Date: Mar 31, 2015
The new IT conundrum is to decide to rent infrastructure or build out your data center. The data explosion of the past decade has left many enterprises awash in a mixed and disjointed storage environment. With different storage technologies for primary, backup and analytic storage pools and SSD options that can confound rather than help, many in IT are struggling to improve the efficiency, performance and cost structures of what has become a big part of IT's spend. Watch this webinar to learn more.
Tags : 
storage, cloud, infrastructure, data center, storage technologies, backup, security, it management
    
CDW
Published By: Centric Software     Published Date: Dec 20, 2010
Customers should see meaningful returns on PLM investments within one product cycle, or 4 to 6 months.
Tags : 
product lifecycle management, plm, plm software, manufacturing best practices
    
Centric Software
Published By: Centrica Business Solutions     Published Date: Aug 14, 2018
The energy landscape has become increasingly complex. Globally, we’re relying less on centralized, steady power sources – such as gas-fired and coal-fired power stations – and more on mixed, locally-distributed renewable energy supplies including solar, wind, tidal and battery. While this is positive for the environment and carbon emissions, it makes balancing power grids a much more complex task. Power quality and reliability becomes more variable in output, while demand for power continues to increase steadily. But when it comes to energy resilience, many organizations simply don’t know where to start. What solutions are available? Which are the best ones for their specific situation and physical premises? What will be their return on investment? Is it simply the cost of doing business, or is there actually a business case? The guide will give you the tools and data to build your understanding and quantify the benefit for your organization.
Tags : 
energy, resilience, building, business, energy
    
Centrica Business Solutions
Published By: Centrica Business Solutions     Published Date: Aug 14, 2018
We live in an era of increased business risk and while news headlines focus on threats to business such as cyber-crime and global terrorism, there is a more pervasive and immediate issue in the form of security and continuity of the energy supply of every business.
Tags : 
energy, impact, resilience, strategy
    
Centrica Business Solutions
Published By: Centrica Business Solutions     Published Date: Aug 14, 2018
The energy landscape is changing and this is creating opportunities for how businesses use and manage energy. We wanted to understand the experience businesses are having, how they are adapting to the changing energy market and how this compares to their peers. We researched over 1,000 energy decision-makers in large organizations across six countries and The Energy Advantage Report is the outcome. It identifies how businesses are gaining competitive advantage through their energy strategies and solutions and provides practical advice on how to get more from energy.
Tags : 
energy, advantage, report, business, growth
    
Centrica Business Solutions
Published By: Centrica Business Solutions     Published Date: Aug 14, 2018
It's demanding times for businesses. Facing risks as diverse as extreme weather and cyber-attacks, ?rms are focusing more intently on business continuity plans. At the same time, the digital revolution is changing lifestyles, disrupting business models and acting as a catalyst for change. Energy itself is undergoing a transformation, as generation moves towards renewables and decentralization, while technological advances present new opportunities. Energy now has the potential to deliver competitive advantage, to enhance sustainability and resilience, and to power innovative business models. But equally, the range of new options available is making the management of energy more complex. Read this thought leadership paper to find out how energy can drive your business strategy.
Tags : 
business, strategy, energy, efficiency, performance
    
Centrica Business Solutions
Published By: CheckMarx     Published Date: Nov 02, 2018
In today’s era of digital transformation, time-to-market is the new name of the game, and DevOps is changing the way software is built. As developers have taken on a much larger role in the software development lifecycle, including developing secure code, building containers and ensuring quality, security cannot be separated from DevOps and engineering. Unfortunately, traditional software security testing tools have operated in isolation and have forced developers to change the way they work. Checkmarx, however, has developed a more agile and responsive solution: Checkmarx’ Software Exposure Platform. Taking a holistic, platform-centric approach, the platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper Delivering Secure Software at the Speed of DevOps to learn how Checkmarx provides the combinatio
Tags : 
    
CheckMarx
Published By: Cisco     Published Date: Nov 17, 2014
Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.
Tags : 
spyware, rootkits, hacking, cisco, advanced threat protection, networking, security, enterprise applications
    
Cisco
Published By: Cisco     Published Date: May 14, 2013
Not long ago, if you asked an IT executive about transformation, there was a good chance you’d get a technology-centric response. You’d hear about consolidation and virtualization, power and cooling, security and availability. Today, the responses are different. This edition of Unleashing IT is all about transformation. Not technology change, but business change through the use of technology.
Tags : 
innovation, change management, cost reduction, cloud, virtualization, bandwidth management
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.