Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it service providers

Results 251 - 257 of 257Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 04, 2016
Enterprises are trending toward hybrid IT operations, turning to the cloud and managed service providers to fill the gaps in complex IT environments. This demands a new generation of MSS, enabling on-premise and managed functions to be viewed and controlled as part of a common platform.
Tags : 
ibm, hybrid it operations, cloud, mss, managed security services, it management
    
IBM
Published By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
    
CA Technologies
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: Juniper Networks     Published Date: Jun 22, 2017
This study was conducted with independent global research firm Wakefield Research between November 24 through December 14th, 2015. The data was based on an online study of 20 content questions, plus screeners and demographics of 2704 respondents, in 8 markets: US, China, Australia, Japan, India, UK, Germany, and France. All respondents were restricted to the following industries: service provider organizations, healthcare, retail, and financial services. In this case, the definition of service provider includes companies offering web content services, cable, internet service providers, or telecom. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. Our team co-innovates with customers and partners to deliver automated, scalable and secure networks with agility, performance and value. Visit www.juniper.net for more information.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Juniper Networks
Published By: Group M_IBM Q3'19     Published Date: Jun 25, 2019
In our 27-criterion evaluation of global internetof-things (IoT) services for connected business operations providers, we identified the 14 most significant ones — Accenture, Atos, Capgemini, Cognizant, Deloitte, Dimension Data, EY, HCL Technologies, IBM, Infosys, KPMG, PwC, Tata Consultancy Services (TCS), and Wipro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps infrastructure and operations (I&O) professionals make the right choice.
Tags : 
    
Group M_IBM Q3'19
Published By: HERE Technologies     Published Date: Jul 11, 2019
On-demand services that transport people in high volumes over short distances have a crucial role to play in changing urban transportation. New technology and data bring a wealth of opportunity for new mobility service providers to optimize, keep customers satisfied and achieve the operational superiority for which they’re all striving. This ebook looks at the critical role location intelligence can play in helping on-demand organizations make that extra drop-off each hour. By reading this ebook, you will discover: - How accurate location, asset and routing data can aid fleet optimization and improve service response times - How accurate pick-up and trip destination ETAs ensure time isn’t wasted connecting users with drivers - How services can calculate the fastest possible route between multiple waypoints to maximize journey efficiency
Tags : 
urban mobility, here tech, mapping
    
HERE Technologies
Published By: Commscope     Published Date: Jun 24, 2019
The less you hear about your building’s network, the better. Enterprise networks rarely make the news unless the news is bad—and an unplanned outage is about as bad as it gets. In 2017, a tech’s typo at one of the world’s largest cloud services providers took a large swath of servers offline for four agonizing hours. According to one estimate, it cost S&P 500 companies $150 million—and U.S. financial-service companies $160 million—in lost revenue. Of course, the financial hit is just one aspect of an outage. The true cost also includes lost productivity and damage to your reputation. As our reliance on ITC infrastructure increases, the cost of an unplanned outage will only go up. >
Tags : 
    
Commscope
Start   Previous    1 2 3 4 5 6 7 8 9 10 11     Next   End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.