Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

pervasive

Results 26 - 50 of 132Sort Results By: Published Date | Title | Company Name
Published By: Riverbed     Published Date: Jul 17, 2013
How to effectively troubleshoot your VDI deployment Virtual desktop infrastructure has come a long way since the first steps were taken a decade ago to run desktop workloads in the data center. While more pervasive today, VDI technologies are latency-sensitive, and wholly dependent on the network. Complaints of poor end-user experience persist, especially over the WAN at branch offices where bandwidth constraints and latency delays are common. But there is a way to ensure consistent and reliable VDI performance to deliver: Reduced downtime Faster troubleshooting Improved SLAs Enhanced planning and control Read this brief to learn how the Riverbed® Cascade® application-aware network performance management (NPM) solution unlocks VDI visibility.
Tags : 
virtual desktop, infrastructure, deployments, cascade, riverbed, local area networking, network architecture, network management, network performance, network performance management
    
Riverbed
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If you’re like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
    
CA Technologies EMEA
Published By: IBM     Published Date: Jul 07, 2015
This white paper describes the pervasive lack of resiliency planning in most cloud implementations today and discusses how better up-front assessment and planning can help organizations realize the enormous potential cloud offers for improved, more agile resiliency.
Tags : 
ibm, resilience, cloud, design, sustain, enterprise applications
    
IBM
Published By: HP - Enterprise     Published Date: Jun 05, 2013
The year 2011 ended with a staggering 5.9 billion mobile phone subscriptions, especially significant considering that the total world population is around 7.011 billion. Of course, a direct comparison is not fair since many people have multiple subscriptions, but it represents a window into the pervasiveness of these devices and how they are an integral part of people’s lives today. For enterprises, this also represents the impending end to the old computing era and the emergence of the mobile worker. Enabling mobility in the workplace is a top-of-mind goal for decision-makers within every organization. This necessity is brought about by the consumerization of IT and the requirement to develop policies to manage the “bring-your-own-device” (BYOD) trend.
Tags : 
mobile phones, mobility, it management
    
HP - Enterprise
Published By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : 
ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends, it management, wireless, enterprise applications
    
MobileIron
Published By: MobileIron     Published Date: Sep 22, 2014
The release of iOS 8 not only introduces a comprehensive list of features to enable greater enterprise mobility, it also highlights the pervasive need for an agile mobility strategy and EMM platform. According to a March 2014 study conducted by the Ponemon Institute, 50 percent of IT professionals in financial services say their company has no mobile strategy(1). Without a strategic approach to mobility and an EMM provider, organizations lack control over data security, end-user privacy, and mobile technologies that support corporate productivity. As iOS 8 becomes widely adopted, it will impact other mobility trends such as the continued migration away from Blackberry. Enterprises will need to move quickly to address these challenges, so updating the mobile strategy should be a top priority in every IT organization.
Tags : 
ios 8, agile mobility strategy, emm platform, data security, end-user privacy, corporate productivity, mobility trends, it management, wireless, enterprise applications
    
MobileIron
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 11, 2017
Mobile, relationship intelligence, and sales coaching are necessities for today’s sales organization and are pervasive capabilities for every sales automation solution category. No vendor solely offers these capabilities without complementing them with other functions. Instead, they are embedded across the categories mentioned above. For example, sales content management providers cannot compete without extensive mobile expertise; market intelligence and customer success do not work without relationship intelligence; and sales coaching is not constrained only to the sales performance management vendors.
Tags : 
sales content management, customer success, market intelligence, sales acceleration, sales performance management, partner relationship, contract life cycle
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 11, 2017
What this case study reveals is that, with the right leadership, it is possible to turn a company around and make it far more responsive and relevant to its customers, and as a result deliver growth and profits. The upshot of D+M's cultural and business transformation has been a return to growth and profitability. The entire enterprise has played its part, which is why the annual Chairman's Award has recognized individuals who have lived the winning cultural values and achieved excellence in performance. Winners have included factory workers and services people. The firm also continues to innovate with HEOS WMS capabilities extending to the other brands. Customer experience continues to be an area of deep cross-functional focus, and feedback from customers provides a clear indication that the customer experience throughout their buying and ownership journeys is rated highly.
Tags : 
visionary leadership, adaptive enterprise architecture, simplified processes, continuous innovation, rewarding pervasive cx, acute sensing capabilities, collaborative
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Gigamon     Published Date: Mar 26, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 21, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper "Network Architecture with Security in Mind" and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
Banking institutions worldwide are expanding their digital capabilities to meet evolving customer expectations and keep pace with new digital banking trends. As financial services firms increasingly embrace a multicloud strategy to achieve greater agility and cost savings, pervasive visibility across data centres and cloud environments is paramount to meet evolving security and compliance requirements.
Tags : 
    
Gigamon
Published By: Automation Anywhere APAC     Published Date: Aug 15, 2019
Automation is already pervasive in our lives—from tried-and-true mechanized assembly lines to the dawn of self-driving cars. But how can you use advanced forms of automation to improve your business processes? Download this starter guide for a detailed look at robotic process automation (RPA), a type of automation that can help you: Reduce costs Decrease errors Improve efficiency Boost productivity Also explore the definition and features of RPA, as well as the types of automation software.
Tags : 
rpa, digital workforce, productivity, ocr
    
Automation Anywhere APAC
Published By: Gigamon     Published Date: Feb 20, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security
Tags : 
    
Gigamon
Published By: Rackspace     Published Date: Jan 09, 2012
Distributed computing has been pervasive in IT organisations for nearly two decades, but the tables are beginning to turn. This whitepaper discusses Rackspace's experience in quick deployment and hosting of VDI environments.
Tags : 
rackspace, technology, virtual desktop, vdi, infrastructure, data center
    
Rackspace
Published By: IBM     Published Date: Jun 16, 2015
Read the white paper to learn how a good data center strategy can help you prepare for the rigors and unpredictability of emerging technologies. Find out how IBM’s predictive analytics are helping companies build more accurate, forward-looking data center strategies and how those strategies are leading to more agile, efficient and resilient infrastructures.
Tags : 
data center, predictive analytics, data center strategy, resilient infrastructure, cloud computing, social collaboration, business analytics, emerging technologies, virtualization, automation, infrastructure, data center design and management
    
IBM
Published By: Carbonite     Published Date: Jan 04, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually. According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands. No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.
Tags : 
    
Carbonite
Published By: FireEye     Published Date: Apr 07, 2013
Malware activity has become so pervasive and attacks so successful at penetrating legacy defenses.
Tags : 
fireye, threat report, malware, threat landscape, legacy defenses, advanced persistent threat, apt
    
FireEye
Published By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
For many years, traditional businesses have had a systematic set of processes and practices for deploying, operating and disposing of tangible assets and some forms of intangible asset. Through significant growth in our inquiry discussions with clients, and in observing increased attention from industry regulators, Gartner now sees the recognition that information is an asset becoming increasingly pervasive. At the same time, CDOs and other data and analytics leaders must take into account both internally generated datasets and exogenous sources, such as data from partners, open data and content from data brokers and analytics marketplaces, as they come to terms with the ever-increasing quantity and complexity of information assets. This task is clearly impossible if the organization lacks a clear view of what data is available, how to access it, its fitness for purpose in the contexts in which it is needed, and who is responsible for it.
Tags : 
    
Waterline Data & Research Partners
Published By: Teradata     Published Date: Jul 15, 2015
This paper examines the value of big data applications as a means to ensure pervasive availability of big data analytics in the organization.
Tags : 
analytics, big data, applications, lob
    
Teradata
Published By: SAP     Published Date: Jul 18, 2016
Retail is a data-intensive industry. Knowing the customer better than competition and having the ability to orchestrate business decisions is the new retail competitive battlefield. Read the white paper to learn customer insights on the future of retail analytics.
Tags : 
    
SAP
Published By: SAP     Published Date: Jul 18, 2016
The broad shift from on-premises to cloud deployments has begun, and spending on cloud business analytics will grow five times faster than similar on-premises solutions. Read the white paper to learn some of drivers and the roadblocks of cloud-based business analytics solution deployments, and the offerings from SAP in this market.
Tags : 
    
SAP
Published By: AWS     Published Date: Dec 19, 2018
Cisco and Amazon Web Services (AWS) believe not only in making it simple to connect to the cloud, but also to protect your cloud services. Security is not just an on-premises or a cloud thing. It’s every-“thing” and everywhere. Gaining pervasive security means you need visibility across your entire IT environment to help you effectively identify and mitigate security threats. Cisco Stealthwatch Cloud provides scalable visibility and delivers secure network behavioral analysis across on-premises and AWS environments to help identify anomalous activity that could indicate a security threat. This self-learning security solution continually refines its behavioral models as it monitors your environment, ultimately improving its functionality and reducing the costs required for manual security checks and updates. Watch our webinar to learn how JetBrains increased transparency and reduced threat exposure by deploying Stealthwatch Cloud on AWS. Along with increased infrastructure protection,
Tags : 
    
AWS
Published By: Group M_IBM Q1'18     Published Date: Feb 09, 2018
Organizations are looking to use DXPs as they move from web-centric to more pervasive, multichannel digital experiences. This Magic Quadrant will help those responsible for a range of customer-, employee- and partner-facing initiatives find the most suitable vendor for their needs.
Tags : 
gartner magic quadrant, gartner, digital experience, dxp, multichannel
    
Group M_IBM Q1'18
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.