Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical data

Results 176 - 200 of 659Sort Results By: Published Date | Title | Company Name
Published By: DellEMC and Intel®     Published Date: Oct 18, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. Intel Inside®. Nya möjligheter på utsidan. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logotyp, intel atom, intel atom inside, intel core, intel inside, intel inside logotyp, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. Intel Inside®. Intel otwiera nowe mo?liwo?ci. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Databases are often the driving force behind a company’s mission critical work. They power online stores, confidential records, and customer management systems, so a solution that sustains high levels of database work can be a big advantage as your company grows. Intel Inside®. Intel otwiera nowe mo?liwo?ci. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: Delphix     Published Date: Jun 27, 2014
Data is increasingly critical to driving business. This IDC Whitepaper outlines how CIOs can understand what the "total cost of data" is across their entire organization and how Delphix can assist them in managing the data that drives the business forward.
Tags : 
idc, report, business gains, idc, cios, total cost of data, organization, manage data, networking, it management
    
Delphix
Published By: Delphix     Published Date: Jun 27, 2014
Companies too often overlook the business gains a better archiving strategy can deliver, from enabling access to and preservation of critical data to more easily complying with regulations. Download this white paper to learn how Delphix can be an intregal part of ensuring your archiving strategy actually enables your business.
Tags : 
regulation, legal hold and delivery, integral, archiving strategy, networking, it management
    
Delphix
Published By: Delphix     Published Date: May 28, 2015
Over the past several years data loss and data leaks have been a regular part of headline news. From high-profile hacks of retailers such as Target and Home Depot to inadvertent email data leaks from large multi-national banks to targeted leaks of sensitive government documents, it is becoming clear throughout the private and public sector that data security or the lack thereof is an existential threat to business operations. While there are many vendors focused on data encryption, data masking is actually the single most effective mechanism for an IT organization to dramatically reduce or even eliminate the risk of data loss.
Tags : 
    
Delphix
Published By: Deluxe     Published Date: Mar 15, 2017
Best-in-class FI marketers have embraced the power of signals. Through their everyday actions, consumers and businesses continually create signals for marketers like you. A signal is an indication of intent or behavior. Examples of activities that produce signals include making a purchase, searching online for information about a financial product, clicking on an ad, applying for a loan, and paying off debt. Each signal can be tracked, monitored, and acted upon. Reaching customers at the critical moment, in the right channel with the right message, requires keen insights about the signals they’re producing. Signals aren’t new to marketing. In fact, you may already be using new mover lists or even search engine marketing. Today, though, there is so much more valuable data available — if you know where to look and what to do with it.
Tags : 
    
Deluxe
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security, strong authentication, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, biometrics, fraud prevention, transaction authentication, identification
    
DigitalPersona UK
Published By: Dome9     Published Date: Apr 25, 2018
It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption. According to a recent 2017 Cloud Security survey to over 350,000 members of the LinkedIn Information Security Community, IT pros have general concerns about security in the cloud (33 percent), in addition to data loss and leakage risks (26 percent) and legal and regulatory compliance (24 percent)1. The number of reported breaches in enterprise datacenter environments still far exceeds the reported exposure from cloud platforms, but as businesses start using public clouds to run their mission-critical workloads, the need for enterprise-grade security in the cloud will increase. Public cloud environments require a centralized, consolidated platform for security that is built from the ground up for the cloud, and allows administrators to monitor and actively enforce security policies. The tools and techniques that worked to secure datacenter environments fail miserably in the cloud. Se
Tags : 
    
Dome9
Published By: Domino Data Lab     Published Date: Feb 08, 2019
As data science becomes a critical capability for companies, IT leaders are finding themselves responsible for enabling data science teams with infrastructure and tooling. But data science is much more like an experimental research organization than the engineering and business teams that IT organizations support today. Compounding the challenge, data science teams are growing fast, often by 100% a year. This guide will quickly help you understand what data science teams do to build their predictive models and how to best support them. Learn how to modernize IT’s approach to ensure your company’s data science teams perform their best, and maximize impact to the business. Some highlights include: Why data science should not be treated like engineering. How to go beyond simple infrastructure allocation and give data science teams capabilities to manage their workflows and model lifecycle. Why agility and special hardware to support burst computing are so important to data science break
Tags : 
    
Domino Data Lab
Published By: Domino Data Lab     Published Date: May 23, 2019
As data science becomes a critical capability for companies, IT leaders are finding themselves responsible for enabling data science teams with infrastructure and tooling. But data science is much more like an experimental research organization than the engineering and business teams that IT organizations support today. Compounding the challenge, data science teams are growing fast, often by 100% a year. This guide will quickly help you understand what data science teams do to build their predictive models and how to best support them. Learn how to modernize IT’s approach to ensure your company’s data science teams perform their best, and maximize impact to the business. Some highlights include: Why data science should not be treated like engineering. How to go beyond simple infrastructure allocation and give data science teams capabilities to manage their workflows and model lifecycle. Why agility and special hardware to support burst computing are so important to data science break
Tags : 
    
Domino Data Lab
Published By: Double-Take Software     Published Date: Sep 24, 2009
Download this free whitepaper to learn how combining Double-Take Software's replication solutions with virtualization technologies, organizations can achieve additional flexibility and cost-effectively protect their critical data and applications.
Tags : 
disaster recovery, recoverability, virtualization, double-take, lost data, cdm, cam
    
Double-Take Software
Published By: Double-Take Software     Published Date: Jun 26, 2009
Just because your business is small, doesn't mean your data isn't just as critical as your Fortune 500 competitors. Like major corporations, small and midsize businesses are increasingly reliant on the critical data stored on their servers.
Tags : 
double-take, smbs, server, midsize, backup, vulnerability, small business networks
    
Double-Take Software
Published By: DoubleTake     Published Date: Jul 14, 2010
SMBs in regulated industries are also subject to the same data availability and data protection requirements as large corporations for regulations such as HIPAA, FDA Part 11, Sarbanes-Oxley and SEC Rule 17, but without the budgets necessary to meet these requirements. This whitepaper provides six tips for an SMB approach to protecting data, such as confidential employee information, so download now to learn how keep your SMB protected from this critical loss of data.
Tags : 
double-take, smbs, server, midsize, backup, vulnerability
    
DoubleTake
Published By: Druva     Published Date: Nov 09, 2018
The all-encompassing data center is a thing of the past. Modern data environments are distributed and include remote and branch offices, mobile devices, and the Internet of Things (IoT) as well as cloud solutions such as infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). There’s more critical data to back up than ever before. Plus, data silos and fragmented management mean poor visibility, which can make it difficult to comply with regional data residency and security rules as well as service-level agreements (SLAs). On-premises data protection has not kept pace. According to a survey by Fujitsu, 45% of IT managers said they had lost data or productivity related to data protection inefficiency within the last year.1 Often, this is because on-premises backups are cumbersome and do not always happen on time.
Tags : 
    
Druva
Published By: Dun & Bradstreet     Published Date: Oct 21, 2016
The modern credit department is playing an expanded role in supporting sales and driving business growth. Traditionally, credit departments have focused on identifying potentially poor customers, thereby reducing losses and mitigating risks. Although this remains a critical function, credit departments also possess a wealth of data that can be mined to identify new business opportunities. With the help of new technologies, credit can work with sales departments by tapping into customer data and sharing insights for increasing sales. Download this white paper to learn more!
Tags : 
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Feb 21, 2017
As the volume of data coming into organizations – from both internal and external sources – continues to grow and makes its way across departmental systems in many different formats, there is a critical need to create a single, holistic view of the key data entities in common use across the enterprise. Master Data Management (MDM) aims to accomplish this goal. Not surprisingly, MDM has become a significant priority for global enterprises, with the market expected to triple from $9.4B to $26.8B by 2020 according to analysts. The reality, though, is that while seemingly everyone is investing heavily in the tools to manage data, few are putting a great enough emphasis on the data itself. And that’s a problem. Poor data quality is said to be costing businesses $3.1 trillion annually – and that’s just in the US alone. The information being put into MDM tools must be mastered first and foremost.
Tags : 
managing data, data management insight, mdm, master data management
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
A tool for finance leaders to unify disparate customer data with financial and strategic ROI If you’ve found yourself sweating in a smoky billiard room, wondering what role customer data should play in finance—as well as in your company’s long-term strategy—this eBook will help you hone your pool shark skills. Inside, you’ll find insights about…. • How to identify patterns in your customer portfolio, and why it matters. • Avoiding four critical data billiard blunders. • Key questions to ask while you’re segmenting your data. • How to tell if your portfolio segmentation strategy is working with the right reporting. This eBook will help you navigate the crowded billiard room of customer data and how you can use it to drive cross-functional value for your team.
Tags : 
    
Dun & Bradstreet
Published By: Dyn     Published Date: Nov 03, 2016
Global DNS performance and availability are critical to user experience. According to Gartner, “DNS is mission-critical to all organizations that connect to the internet. DNS failure or poor performance leads to applications, data and content becoming unavailable, causing user frustration, lost sales and business reputation damage.” But many businesses still rely on a single, often in-house DNS solution that lacks global scale and resiliency. This white paper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: - The critical role DNS plays in the user experience. - The risks of relying solely on a single DNS solution. - The added performance and reliability benefits of a high availability DNS architecture with a redundant managed DNS service. - Criteria for evaluating a managed DNS service provider.
Tags : 
dyn, dns, downtime risk, end-user experience, networking, enterprise applications
    
Dyn
Published By: e-DMZ Security LLC     Published Date: Sep 27, 2010
This white paper discusses key issues and offers innovative solutions to support granting access to production resources.
Tags : 
e-dmz security. emergency access, production access, access control, compliance, developer access, mission-critical, business-critical, datacenter security
    
e-DMZ Security LLC
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
By redirecting traffic away from ISP outages and WAN link bottlenecks, Ecessa, with its PowerLink and ShieldLink family of affordable WAN Optimization Controllers help avoid critical WAN infrastructure problems. Ecessa optimizes WAN infrastructure as defined by 24/7 availability, high-performance, flexible scalability, and secure operations - while streamlining IT costs. PowerLink and ShieldLink simplify the management of network links, and optimize user access to datacenters and remote sites.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: Emerson Network Power     Published Date: Aug 19, 2010
While both IT and facilities organizations have invested heavily in technology resources (people, processes and tools) to manage the data center infrastructure, they have failed to achieve the promise and potential due to critical gaps between their data center facilities and IT infrastructure components. A new perspective on managing the critical infrastructure gaps is emerging. Read on for more.
Tags : 
emerson, data center, automation, infrastructure, virtualization, cloud computing, cloud
    
Emerson Network Power
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
    
Entrust Datacard
Published By: Ephesoft     Published Date: Apr 04, 2018
All accounting procedures, especially remittance and AR/AP processing, are critical to any organization’s financial well-being. Manual data entry of invoices is an inefficient, expensive, labor intensive and often errorprone process. Slow and mistake-laden document processing lengthens payment cycles, reduces staff productivity, adds late payment penalties and causes missed early payment discounts
Tags : 
    
Ephesoft
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.