Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it platforms

Results 501 - 525 of 645Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 01, 2017
MaaS360 delivers robust UEM capabilities across all major computing platforms, including iOS, macOS, Android and Windows devices. And where competing solutions offer incomplete support for legacy Microsoft platforms, MaaS360 supports Windows XP SP3, Microsoft Windows Vista, Microsoft Windows 7, Microsoft Windows 8, Windows 10 and Microsoft Windows 10 Mobile. These capabilities include: Identity and access management (IAM) that allows a shift from a device-based context to a more comprehensive, userbased context Application management, including an intuitive, universal application catalog for iOS, macOS, Android and Windows, advanced bundling and promotion features, bulk application purchase and distribution capabilities, and fine-grained data controls Download now to learn more!
Tags : 
microsoft, ibm, competing solutions, it support, device based, identity access management, universal application, promotion features
    
IBM
Published By: IBM     Published Date: May 01, 2017
Endpoints continue to advance… Employees come and go... And the security landscape is in constant flux. IT leadership must rise to the challenge of managing a disparate and growing number of endpoints, operating systems, and platforms. The only efficient method of managing and securing all endpoints, their users, apps, content, and data is to implement and deploy a unified endpoint management (UEM) solution that changes and adapts with new technology, more skilled users, and increasingly sophisticated attacks by hackers. Read onward to learn why UEM is necessary, how it addresses complex problems encountered in the modern enterprise, and best practices for a successful deployment.
Tags : 
endpoints, employees, security landscape, security leaders, it security, unified endpoint management
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman Security, IBM, Intel Security, LogRhythm, RSA, Securonix, and Splunk — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Tags : 
security analytics platforms, ibm security, security analytics, security and risk
    
Group M_IBM Q1'18
Published By: thawte     Published Date: Aug 27, 2008
This guide will show you how Code Signing Certificates are used to secure code that can be downloaded from the Internet. You will also learn how these certificates operate with different software platforms.
Tags : 
ssl, thawte, certified, certification, secure socket
    
thawte
Published By: CrownPeak     Published Date: Jun 30, 2009
The content management market has exploded in size in recent years with the availability of platforms like Open Source and SaaS giving way to scores of solutions in a variety of sizes and complexities. While companies are spoiled for choice, the unprecedented volume of solutions makes selecting the right content management system (CMS) for an organization an increasingly difficult task. Learn more today!
Tags : 
cms, saas, software-as-a-service, crownpeak, content management system, open source, end-to-end process, collaboration
    
CrownPeak
Published By: F5 Networks Inc     Published Date: Oct 31, 2013
This white paper examines the DDoS threat spectrum including conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
Tags : 
distributed denial of service, ddos, ddos threat spectrum, network attacks, conventional network attacks, http floods, ssl floods, low bandwith threats
    
F5 Networks Inc
Published By: Cornerstone OnDemand     Published Date: Jul 28, 2017
The modern recruiter has it far from easy. While the soft skills of recruiting are still relevant — good communication skills, outgoing personality, and keen intuition — the tech-driven world of work requires talent acquisition specialists to navigate a variety of tools, data analytics, and social media platforms. Recruiters can no longer just be great “people people”—they need to be great tech people, too.
Tags : 
recruitment, human resources, communication, data analytics, social media
    
Cornerstone OnDemand
Published By: Unitrends     Published Date: Nov 03, 2010
When Yogi Berra said "The future ain't what it used to be" he could have been talking about backup rather than baseball. Despite enormous progress in backup technologies over the last decade, the"secondary" technology of backup as a whole has barely kept up when compared to the incredible gains in the "primary" technologies associated with computer and storage platforms
Tags : 
unitrends, backup, recovery, disaster recovery, capacity, storage
    
Unitrends
Published By: Conductor     Published Date: Nov 16, 2010
Huge opportunities and technology advances in natural search are compelling search marketers to turn to SEO platforms to gain the upper hand. SEO has long been running to keep up with its digital family but the SEO platform is changing the way SEO is being practiced.
Tags : 
seo, seo platform, conductor, search engine optimization, website, analysis, analyze, serps
    
Conductor
Published By: Cisco     Published Date: Nov 17, 2014
The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.
Tags : 
cloud-computing, malware, cisco, malware infection, amp, networking, security, it management
    
Cisco
Published By: CarbonBlack     Published Date: Nov 01, 2016
A SANS Guide to Evaluating Next-Generation Antivirus Rather than dying, antivirus is actually growing up. Today, organizations look to spend their antivirus budget on replacing current solutions with next-generation antivirus (NGAV) platforms that can stop modern attacks, not just known malware.
Tags : 
carbonblack, sans, antivirus, security, enterprise applications
    
CarbonBlack
Published By: BlackBerry     Published Date: Mar 11, 2013
This whitepaper reveals research findings on the total cost of ownership (TCO) and security for the major mobile platforms: Apple iOS, Google Android™, BlackBerry®, Windows Phone and Nokia Symbian.
Tags : 
tco, security of enterprise grade mobility, blackberry, total cost of ownership, major mobile platforms, security, wireless
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 12, 2013
Find out about the challenges companies are encountering in the face of the four Cs: Compliance, Control, Cost and Consumerization. And, learn what businesses can glean from the public sector about best-practice Enterprise Mobility Management (EMM).
Tags : 
tco, security, enterprise grade mobility, emm, blackberry 10, best practices, enterprise applications
    
BlackBerry
Published By: Blackberry     Published Date: Mar 12, 2013
This whitepaper reveals research findings on the total cost of ownership (TCO) and security for the major mobile platforms: Apple iOS, Google Android™, BlackBerry®, Windows Phone and Nokia Symbian.
Tags : 
tco, security, enterprise grade mobility, blackberry, blackberry 10, enterprise, enterprise applications
    
Blackberry
Published By: IBM     Published Date: Oct 01, 2013
Continual and timely upgrades of UNIX systems can enable growth and lower costs. But for some Sun/Oracle and HP customers, expected upgrade plans have hit major hurdles. Read this Clipper Group white paper to see how only IBM continues to provide a plan, and a predictable drumbeat, for the future. Read it now.
Tags : 
ibm, ibm power7, ibm power7 systems, data center, it infastructure, data center, enterprise applications, consolidation
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
As your employees bring their own smartphones and tablets to the workplace, you need to create a flexible mobile environment that allows personally owned and corporate-issued devices to co-exist. IBM Mobile Enterprise Services for managed mobility is designed to help reduce the complexity that comes with multiple mobile platforms. IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program. In this report, you’ll learn how these companies: Increased employee productivity and satisfaction; expanded revenues from improved sales mobility, and decreased replacement, mobility infrastructure and support costs.
Tags : 
managed mobility, byod, michelle evangelista, bring your own device, mobile, flexible, mobile environment, ibm mobile enterprise services
    
IBM
Published By: IBM     Published Date: Oct 15, 2013
Marketers’ biggest challenges and opportunities reveal the rise of the empowered customer
Tags : 
customer experience, social media, changing market, digital world, shifting new channels, exceptional customer experience, ibm, technology adoption
    
IBM
Published By: Metalogix     Published Date: Mar 25, 2014
SharePoint presents many unique backup issues that are not addressed by general disaster recovery solutions. This whitepaper introduces the broad topic of disaster recovery (DR) and how its principles can be specifically applied to the Microsoft SharePoint 2010 and 2013 platforms.
Tags : 
sharepoint, disaster recovery, microsoft, backup, restoration, dr strategy, security, enterprise applications
    
Metalogix
Published By: Oracle     Published Date: Jan 22, 2014
Organizations across all sizes and industries are leveraging tools to simplify business. Traditionally, marketing technology has been very task specific, designed to operate within a single functional silo such as email campaign management or lead scoring. But marketers know the value and significance of aligning marketing automation, sales force automation (SFA), and customer relationship management (CRM) platforms in the cloud — a task that can be easily accomplished through the implementation of Marketing Technologies.
Tags : 
marketing technology, modern marketing, tenants, customer journey, segmentation, lead generation, eloqua, oracle
    
Oracle
Published By: IBM     Published Date: Jan 02, 2014
Buy-and-hold strategies can actually add costs to the datacenter, as systems age in place. Not only do hardware maintenance and software maintenance fees rise, over time – but the aging of applications also costs the organization money. Investing in a transition from POWER5 to POWER7 resulted in a return on investment (ROI) of more than 150 percent over three years.An insightful and and compelling discussion by IDC that reviews the primary reason for maintaining current systems -- Return on Investment. IDC studied IBM Power Systems sites that remained on the POWER5 platform long after its initial introduction in 2004. When comparisons to the succeeding generation of POWER7 are made, customers have found that the increase in scalability and performance of POWER7 systems, combined with a reduction in server "footprint" size and overall electrical requirements, resulted in significant reductions in ongoing costs, or opex, per 100 end users supported.
Tags : 
ibm, idc, server transition, server alternatives, business value, operating costs, hardware platforms, server life cycles
    
IBM
Published By: IBM     Published Date: Jan 09, 2014
This IDC analyst white paper discusses an important sea change happening in IT: the development of expert integrated systems. Converged systems are becoming increasingly important in the systems market. Similarly, convergence is occurring in middleware core runtime services for application development and deployment that are being unified as an enterprise application platform. Given the similarity in derived value propositions, converged systems and platforms are coming together as integrated systems; with the addition of capabilities focused on deployment, management, and optimization, integrated systems become expert integrated systems.
Tags : 
ibm, pureflex, integrated systems, pureflex system, legacy solution, uefi code, system management, platform infrastructure
    
IBM
Published By: Cisco     Published Date: Apr 10, 2015
The new Cisco Nexus® 9000 Series Switches provide features optimized specifically for the data center: high 10 and 40-Gbps port densities, reliability, performance, scalability, programmability, and ease of management. With exceptional performance and a comprehensive feature set, the Cisco Nexus 9000 Series offers versatile platforms that can be deployed in multiple scenarios, such as layered access-aggregation-core designs, leaf-and-spine architecture, and compact aggregation solutions.
Tags : 
cisco, data center, switches, optimization, scalability, storage, applications, enterprise support
    
Cisco
Published By: Cisco     Published Date: Jun 10, 2015
Vendor innovation is focused on supporting new application types and deployment options, with WAN optimization migrating toward more diverse platforms or to a WAN cloud.
Tags : 
wifi, wireless, technology, network, 802.11, cloud, network architecture, cloud computing
    
Cisco
Published By: Cisco     Published Date: Sep 15, 2015
Wi-Fi is about to get a reboot. New 802.11ac Wave 2 products will make it possible to deliver LAN-like multigigabit speeds over the wireless network for the first time, enabling previously unimagined scale and flexibility in the enterprise workspace. But how will businesses capitalize on this new capacity when most current Ethernet access cabling maxes out at 1 Gigabit per second (Gbps)? This white paper: ? Introduces the new generation of Cisco® Catalyst® switches with Multigigabit Ethernet technology, the first platforms to combine support for multigigabit wireless speeds with full power over Ethernet (PoE) in an easy-to-deploy solution ? Shows how Cisco Catalyst Multigigabit Ethernet switches use NBASE-T technology to empower you to deliver 5-Gbps speeds over your existing access cabling ? Details how Cisco Catalyst Multigigabit Ethernet switches gives you the scale and capacity you need today, while protecting your network investments for the future Are you ready to learn more?
Tags : 
migration, ethernet, deploy, wireless, network, it management, enterprise applications
    
Cisco
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.