Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

familiar

Results 1 - 25 of 126Sort Results By: Published Date | Title | Company Name
Published By: BitGravity     Published Date: Dec 17, 2009
This paper outlines the seven essential buying criteria that every decision-maker needs to consider when making a decision on a video delivery provider. These buying criteria are shared across the gamut of small, video-centric startups and established, familiar media giants.
Tags : 
bitgravity, video delivery, legacy cdns, network architecture, internet video, file management, total cost ownership, proxy cache, bandwidth management, infrastructure, traffic management
    
BitGravity
Published By: AWS     Published Date: Jun 11, 2019
Some organizations are reluctant to migrate to the cloud because they believe they will be forced to learn new skills, start using new tools, and adopt new processes. However, by deploying VMware Cloud on AWS, your organization can continue to leverage existing, familiar VMware investments. This on-demand service delivers a powerful hybrid cloud solution, combining an industry leader in virtualization, VMware, with the largest cloud provider, Amazon Web Services (AWS). One of the first solution providers to achieve the VMware Solution Competency and a participant in the AWS Partner Initiative for VMware Cloud on AWS, RoundTower is uniquely qualified to help your organization adopt and optimize VMware Cloud on AWS. Watch this webinar to see how they can extend your on-premises data center to AWS, enabling you to gain increased flexibility, a rapidly scalable environment, and faster time to innovation. Download our webinar to learn How to take advantage of flexible consumption models t
Tags : 
    
AWS
Published By: Lenovo UK     Published Date: Mar 14, 2019
An increasingly tech-savvy workforce is changing the future of work and the workplace. The workplace is now where your people are, not where they go – whether that’s the public space of a coffee shop or private space at home. Working hours are no longer standard, dictated by the tasks to be done, not by the clock. Work tools are no longer based only on workplace technology. The same cool features used in consumer devices, such as touch, are now required for workplace devices. It’s this familiar, smart technology that keeps people, across the generations, happy, productive and engaged. This dynamic IT is the foundation for a smart workplace that will enable you to attract and keep top talent – and shape the future-ready enterprise, now.
Tags : 
dynamic it, smarttechnology, dynamicworkplace, security-first, smartit, workplacesecurity, cybersecurity, iot, artificalintelligence, future-ready
    
Lenovo UK
Published By: Cisco EMEA     Published Date: Nov 13, 2017
If this snapshot of working life looks familiar, keep reading. Cisco® technology can help the busiest executives not only stay in touch, but also get work done throughout the day.
Tags : 
cisco, spark, daily, workplace, employee, management, optimization, efficiency
    
Cisco EMEA
Published By: BigCommerce     Published Date: Oct 16, 2018
Whether your company has been selling online for 20 minutes or 20 years, you are undoubtedly familiar with the PCI DSS (Payment Card Industry Data Security Standard). It requires merchants to create security management policies and procedures for safeguarding customers’ payment data. Originally created by Visa, MasterCard, Discover, and American Express in 2004, the PCI DSS has evolved over the years to ensure online sellers have the systems and processes in place to prevent a data breach.
Tags : 
    
BigCommerce
Published By: Coupa     Published Date: Dec 14, 2018
Visibility remains a huge challenge for CFOs in today’s dynamic and ever-evolving business environment. A study of more than 500 CFOs and senior finance executives conducted by the Economist Intelligence Unit (EIU) and commissioned by Coupa, reveals that more than 60 percent of CFOs lack complete visibility into the transactions within their organization. Sound familiar? Read the report to learn how CFOs are responding in a rapidly evolving world where new technologies, uncertainty, and emerging threats abound. The report also includes five qualitative interviews with the CFOs from Ally Financial, Driftwood Acquisitions and Development, Hays, Micron Technologies, and Zendesk.
Tags : 
    
Coupa
Published By: Akamai Technologies     Published Date: Nov 10, 2017
Ponemon Institute surveyed 569 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. According to respondents, these attacks cause costly application downtime, loss of customers, and involvement of IT security that can result in a cost of millions of dollars. The survey highlights the challenges in identifying who is accessing their websites using stolen credentials, as well as the difficulty in preventing and remediating these attacks.
Tags : 
poneman, credential stuffing, it security, damage mitigation, research report
    
Akamai Technologies
Published By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
The Cloud, once a radical idea in IT, is now mainstream. Whether it’s email, backup or file sharing, most consumers probably use a cloud service or two. Similarly, most IT professionals are familiar with cloud service providers such as Amazon, Google and Microsoft Azure, and many companies have moved at least some of their information technology processes into the cloud. In fact, the cloud has become so popular it’s easy to assume that running IT applications on-premises is not cost competitive with a cloud based service. In this report Evaluator Group will test the validity of that assumption with a TCO (Total Cost of Ownership) model analyzing a hyperconverged appliance solution from HPE and a comparable cloud service from Amazon Web Services (AWS).
Tags : 
infrastructure, cost competitive, cloud, hyper converged, amazon web services, total cost of ownership, tco
    
Hewlett Packard Enterprise
Published By: Frontier Communications     Published Date: Dec 22, 2016
Miscommunications? Inefficiencies? Sound familiar? The same set of issues can plague multi-location businesses. Here are a few ways to keep your locations working together.
Tags : 
    
Frontier Communications
Published By: Pentaho     Published Date: Feb 26, 2015
Ventana’s benchmark research on big data integration will help you become familiar with the tools and technologies you need to help your organization succeed with big data.
Tags : 
benchmark research, big data integration, big data, business intelligence systems, business analytics, data integration
    
Pentaho
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Global Payments     Published Date: May 02, 2019
Doing business across borders presents a whole host of unfamiliar challenges to today’s merchant. As technological advancement and increasing globalization unlock international markets, it’s tempting to imagine that a business model successful in one region can simply be transplanted into another. Not so. The logistics of domestic and international transactions have changed, and so too have customer expectations and preferences. Customer and merchants pain points have transformed and multiplied. In this report, we explore some of the core challenges businesses today face in their quest to succeed in global commerce. We offer an overview of how unified commerce can both resolve these issues and offer new advantages and standards of best practice, enabling your business to meet the demands of tomorrow’s customer, no matter their location, preferred payment method, and mode of contact.
Tags : 
unified commerce, global commerce, payment convenience, payment speed, global payments technology, retail, wechat pay, alipay, chinese wallets, mobile payments, international payment solutions, international payment systems, payments, online payments, omnichannel commerce
    
Global Payments
Published By: ServiceNow     Published Date: Jul 12, 2013
"Unauthorized software, painful software license compliance audits, long fulfillment times, limited visibility, unaccountability... if these issues sound familiar, you are not alone. These are real challenges faced by many IT organizations - with serious consequences if not properly addressed. During our Software Asset Management webinar you will learn how having asset, configuration and other service management processes together in one system of record provides the control and visibility you need to overcome these challenges."
Tags : 
software, asset management, software asset management, webinar, software development, it management
    
ServiceNow
Published By: Webroot     Published Date: Nov 02, 2012
Download this information to familiarize yourself technically with the components and capabilities of Webroot® SecureAnywhereTM Business - Endpoint Protection.
Tags : 
endpoint security, endpoint protection, it security, malware solutions, malware, malware protection, security
    
Webroot
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
At a Glance: With the new CA Project & Portfolio Management (CA PPM) 15.3, you can tailor projects to any business unit with drag and-drop ease. Whether complex workflow for HR or simple task management for sales, workers now spin up projects in minutes—not days. Add in-app collaboration to eliminate redundant meetings, a familiar Microsoft Excel®-like grid to manage budgets, a new connection for third-party business intelligence (BI) tools to unearth answers, and you have the most modern project portfolio management app on the market today. Download this whitepaper today to find out more about CA PPM 15.3—a simple, powerful and practical project portfolio management tool available on-premises and in the cloud—let you modernize the project management office.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The latest version of CA Project & Portfolio Management facilitates core financial activities with the ease and familiarity of a spreadsheet. Two years ago, CA began to reevaluate how organizations were leveraging their project and portfolio management solutions. Our goal was to identify ways CA Project & Portfolio Management (CA PPM) could better serve every user, from project, resource and financial managers to executive decision makers and team members. CA PPM 15.3 simplifies the job of the financial manager with Microsoft Excel®-like functionality, embedded communication and collaboration features, and direct links to the industry’s most popular reporting and business intelligence tools.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Introduzione CA Project & Portfolio Management (CA PPM) 15.3 consente di personalizzare i progetti per qualsiasi business unit, con la semplicità del drag-and-drop. Dal complicato workflow per HR o alla semplice gestione delle attività per le vendite, oggi i lavoratori riescono ad avviare i progetti in pochi minuti, anziché in giorni. È possibile integrare la collaborazione all'interno dell'applicazione per eliminare riunioni ridondanti, una familiare griglia di tipo Microsoft Excel® per la gestione dei budget, una nuova connessione per strumenti di Business Intelligence (BI) di terze parti che consentono di trovare risposte, e si ottiene la più moderna app di Project Portfolio Management attualmente sul mercato.
Tags : 
    
CA Technologies EMEA
Published By: Akamai Technologies     Published Date: Oct 02, 2018
The Summer 2018 security report is about change: what’s new and unusual in DDoS attacks, where are the surprising data patterns, and how should enterprises and security professionals prepare for the unexpected. Looking back at November 2017 to April 2018, as well as year-over-year changes, Akamai analysts identified data trends that spotlight the new and unfamiliar. The Summer 2018 State of the Internet / Security: Web Attacks report covers atypical attack methods, credential abuse attacks and law enforcement prosecution of DDoS-for-hire platforms. Guest writer Rik Ferguson also explores future threat scenarios. Finally, the Integrate SID for your records (and in case you need it) for this program is: 0E9175. Anything else you need to hit the ground running with this program?
Tags : 
internet, web, attacks, technology, ddos
    
Akamai Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
Are dev and test constraints holding back your digital transformation? Today, just about all businesses are scrambling to add digital components to their products and services with the hopes of capturing—and maintaining—the interest of an increasingly demanding customer base. As you undergo this digital transformation, your IT teams face tremendous pressure to not only develop innovative new experiences, but do so at an accelerated rate—lest competitors beat you to market with the next big thing. Take a new approach to solving the familiar challenge of doing more with less—and doing it faster than ever before -- remove the constraints holding you back. At its core, Service Virtualization is all about removing constraints within the SDLC by simulating dependent systems, services and behaviors. In order to understand the true depth and breadth of this concept, however, it helps to see how Service Virtualization can be utilized in different development scenarios.
Tags : 
    
CA Technologies
Published By: Carbonite     Published Date: Oct 05, 2017
Not long ago, the biggest concern for IT decision makers considering moving workloads to the cloud was security. That’s no longer the case. Today, the main obstacle to cloud adoption is different but familiar: the pain of migrating data. Traditional data migration causes major headaches: • Hours or days of downtime while servers replicate and stakeholders verify functionality • Data loss and migration failures due to inadequate tools and inability to test • Key internal resources diverted from strategic initiatives
Tags : 
data migration, cloud security, carbonite, data security, cloud platform, cloud adoption
    
Carbonite
Published By: Absorb     Published Date: Sep 18, 2018
You’re ideating while executing. With funding in hand, you must deliver. Patience? Well, it’s nonexistent. If this sounds familiar, you’re likely one of many energetic companies vying to grab the best talent possible to deliver on your mission. How well your workforce executes will depend on the quality of your onboarding and employee development. By building an eLearning program on a Learning Management System (LMS), you’ll get newbies up to speed and free your team to focus on the heavy brain work. Here’s how the right LMS will pay off bigtime ROI.
Tags : 
roi, employee development, learning & development
    
Absorb
Start   Previous   1 2 3 4 5 6    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.