Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

providers

Results 851 - 875 of 940Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : 
endpoint security, security, threat prevention, threat detection, security solution
    
Symantec
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
mobile apps, symantec, cybercriminals, security, mobile applications, code signing, malware
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
symantec, mobile, mobile applications, security, code signing certificates
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Mar 21, 2014
Symantec SSL certificates provide a secure bridge to trusted cloud hosting providers
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
security, mobile, mobile app, code, mobile application, code signing, software development
    
Symantec Corporation
Published By: Synnex     Published Date: Oct 11, 2017
Cloud is disrupting traditional IT faster than we think. Today, with 80%1 business deploying or fully embracing the cloud, we have ‘crossed the chasm’ and are in the ‘early majority’ stage of the adoption curve. All of this means more opportunities for cloud solution providers. IDC discusses this opportunity extensively in “The Booming Cloud” report.
Tags : 
    
Synnex
Published By: Synnex     Published Date: Oct 31, 2017
The Modern Microsoft Partner Series is a collection of five eBooks designed to help IT solution providers on their journey to success in the cloud. The series is full of insights and best practices that cover a variety of critical business topics. The first eBook sets up the series and focuses mainly on revealing the compelling evidence around the cloud opportunity. If you are interested in learning about the size or pace of the cloud opportunity, this first eBook is meant for you.
Tags : 
    
Synnex
Published By: T Systems     Published Date: Nov 28, 2018
The wait is over. Here at T-Systems, we are proud to present the findings of CXP Group - a leading independent European research and advisory firm in the field of digital, software and IT services. Their new “Digital Industrial Transformation with the Internet of Things” report examines the dynamic range of opportunities that IoT holds for businesses and explores the challenges of integrating existing data processes with those that are IoT enabled. The report is the result of the feedback cultivated from interviews with senior business and IT decision-makers responsible for creating and running innovation strategies at 250 large-scale European manufacturers. The data has been disseminated by region, strategies, pain points, IoT adoption, intention, investment etc. and provides readers with a detailed examination of what industrial businesses look for most from IoT. The report provides a fascinating unearthing of influencing factors for IoT readiness and digitization as a whole. Using
Tags : 
industrial manufacture, iot, internet of things, iot adoption, european, digitization, digitization strategy, value chains, service providers, consultation, supply chain management, operational technology, data analytics, new business models
    
T Systems
Published By: Tail-f Systems     Published Date: Sep 16, 2008
The NETCONF protocol is a modern building block for device management automation, offering a unified approach to network configuration, rather than a device-specific methodology. To equipment vendors, NETCONF is a way to standardize the management interface of network elements. To service providers, NETCONF is a way to optimize the administrative workflow, by moving management intelligence out of the device under management, and consolidating this management into higher-level applications.
Tags : 
netconf, netconf standard, device management automation, network standard, ietf standard, tail-f, tailf, networking, network management
    
Tail-f Systems
Published By: Tapinfluence     Published Date: Jun 07, 2016
The rise of digital in the marketing mix has brought a whirlwind of change to the agency space, from work being brought in house to competition from consultancies and service providers. What an agency looks like in just five years is going to be tremendously different from the traditional model we know today.
Tags : 
marketing, content marketing, best practices, business optimization, best practices
    
Tapinfluence
Published By: TARGUSinfo.     Published Date: May 20, 2010
The arrival of 3rd party data is changing the landscape of online targeting. There is an influx of companies offering these services. But, what works with your business model? How do you evaluate the options? THE QUESTIONS YOU NEED TO KNOW AND WHY: • Is there high fidelity data? • Is the provided data stable? • Is your partner built to last? • Does your partner use a transparent methodology? Download our guide to evaluating data providers and find out the importance and relevance of these terms and conditions.
Tags : 
targus info
    
TARGUSinfo.
Published By: Taridium     Published Date: May 22, 2007
Take advantage of this free information by Taridium and see how comms platform allows service providers to offer instant retail VoIP service and host virtual PBX’s with all of today’s most advanced features.
Tags : 
voice over ip, voip, ipbx, ippbx, ip pbx, ip telephony, pbx, phone, ip networks, taridium
    
Taridium
Published By: Tenable     Published Date: Mar 08, 2018
Which questions have you overlooked and why do the answers matter? According to Gartner, “OT SRM (security and risk management) leaders must ask the right questions during the technology procurement process to achieve long-term success in their security investments.” Further, Gartner states, “Translating IT security practices and copying IT security technology will not result in a secure operational technology (OT) environment.” By reading “7 Questions SRM Leaders Aren't Asking OT Security Providers,” you’ll learn which questions to ask, why they matter, and be armed with follow-up guidance to make smarter decisions. Questions covered include: - Does the Solution Provide Asset Discovery to Enable Operational Continuity and System Integrity? - Does the Solution Detect and Alert on Known Common Vulnerabilities and Exposures? - Does Your Solution Provide IT Support in Addition to OT? - Does Your Solution Support Secure IT/OT Alignment? Threats and vulnerabilities originally targeti
Tags : 
    
Tenable
Published By: Texas Instruments     Published Date: Nov 06, 2006
Download this free whitepapers to learn how Remote Management can transform this challenge into an opportunity to stand apart from other service providers in a very competitive market.
Tags : 
access control, remote access, remote management, remote support, service provider, service providers, ip networks, ip tv, customer service, customer satisfaction, texas instruments, remote network management
    
Texas Instruments
Published By: Thawte     Published Date: Nov 08, 2011
Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : 
cloud computing, computing in the cloud, the cloud, in the cloud, cloud provider, cloud providers, cloud services, cloud storage, cloud security, cloud solutions, geotrust, geo trust, geotrust.com, verisign; verisign.com, verisign inc, symantec, symantec.com, symantec corporation
    
Thawte
Published By: Thawte     Published Date: Dec 29, 2015
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting the ways in which SSL from a trusted Certificate Authority (CA) can help enterprises conduct business in the cloud with confidence.
Tags : 
    
Thawte
Published By: The TriZetto Group     Published Date: Aug 01, 2011
Learn how to maximize efficiencies through greater system integration and automation, enable seamless interactions with providers, members and other constituents, and drive increased healthcare value with automated, value-based programs.
Tags : 
trizetto, trizeto, healthcare reform for payers, payers and healthcare reform, reform and payers, compliance with reform, administrative efficiency, technology, icd-10, 5010, claims administration, mlr requirement, value-based insurance design, value-based reimbursement programs, healthcare information technology, population health management, mlr
    
The TriZetto Group
Published By: Third Brigade     Published Date: Aug 21, 2009
Healthcare organizations are being targeted by financially motivated attackers that steal and sell valuable data, including identities and computing resources. This white paper defines the new threat, and outlines three important steps that providers can take to protect their critical systems.
Tags : 
hipaa, hipaa compliance, network security, network security appliance, security management, intrusion prevention, intrusion detection, hacker detection, ips, host-based ips, third brigade, security
    
Third Brigade
Published By: Thomson Reuters     Published Date: Mar 08, 2018
In recent years, the legal marketplace has seen an influx of new start-ups and new entrants looking to challenge the long-standing service model offered by law firms to their clients. Traditionally, clients looked to their law firms to provide a full range of legal and legal-related services, i.e., to handle every aspect of a matter, even including those activities that did not involve the direct provision of legal services. Today, by contrast, consumers of legal services find themselves the beneficiaries of a new and growing number of nontraditional service providers that are changing the way legal work is getting done. These alternative providers comprise a new sector of the legal market, one that is emerging and evolving rapidly, but is still very much in its infancy.
Tags : 
legal, services, lpo, accounting, audit, revenue, thomson, reuters
    
Thomson Reuters
Published By: Thomson Reuters     Published Date: Jul 30, 2018
How confident is your law firm in its document review process? Learn more about cost-effective and defensible document review and the benefits of partnering with a managed review provider instead of contract attorneys. According to a recent study of Alternative Legal Service Providers (ALSPs), the use of ALSPs such as managed review providers for doc review is expected to grow by more than 50% in the next five years. The top reasons cited for using such providers aligned with the benefits listed here: to control costs and meet peak demand without increasing permanent headcount.
Tags : 
document, review, law, thomson, reuters
    
Thomson Reuters
Published By: Thomson Reuters     Published Date: Jul 30, 2018
Law firms are – or should be – rethinking the way they approach the delivery of legal services and leveraging service providers to achieve the efficiency their clients are demanding. According to the Alternative Legal Service Study, 51% of law firms report using an Alternative Legal Service Provider (ALSP) such as a managed review provider for at least one type of service today. And the use among law firms is set to grow dramatically in the next five years.
Tags : 
firm, demand, clients, legal, services, thomson, reuters
    
Thomson Reuters
Published By: ThousandEyes     Published Date: Nov 17, 2016
The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services has increased the complexity application delivery. Online Operations and Site Reliability teams in firms of all types are now responsible for many parts of the application delivery chain. When things go wrong, no matter where, they’re expected to react quickly to minimize the impact on their customers. The challenge for application providers is that users may often experience service degradation when the application stack seems to be working perfectly fine, making troubleshooting extremely difficult. Download now to learn more!
Tags : 
    
ThousandEyes
Published By: TIBCO Software     Published Date: Aug 13, 2018
Every financial services firm understands the importance of data. More is better. Sooner is better. Accessing it, understanding it, and taking advantage of it before the competition is better. In the mid-2000s, Financial Services was the first industry to strongly adopt data virtualization as a disruptive, new technology for accessing and integrating more data, faster and more easily than ever before. Buy and sell side groups at the largest institutions led the charge, followed soon after by risk management and compliance units. The leading mutual fund providers, along with hedge funds, led the next wave of adoption. In recent years, commercial banks and insurers have accelerated their use of data virtualization. And today, analyst firms such as Gartner, Inc. and Forrester project continued data virtualization adoption for both first-time use at new firms and expanded deployments at existing sites. This whitepaper provides 10 examples of TIBCO Data Virtualization enabled application
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Feb 26, 2019
Every financial services firm understands the importance of data. More is better. Sooner is better. Accessing it, understanding it, and taking advantage of it before the competition is better. In the mid-2000s, Financial Services was the first industry to strongly adopt data virtualization as a disruptive, new technology for accessing and integrating more data, faster and more easily than ever before. Buy and sell side groups at the largest institutions led the charge, followed soon after by risk management and compliance units. The leading mutual fund providers, along with hedge funds, led the next wave of adoption. In recent years, commercial banks and insurers have accelerated their use of data virtualization. And today, analyst firms such as Gartner, Inc. and Forrester project continued data virtualization adoption for both first-time use at new firms and expanded deployments at existing sites. This whitepaper provides 10 examples of TIBCO Data Virtualization enabled applications f
Tags : 
    
TIBCO Software
Published By: Tidal Software     Published Date: Sep 03, 2008
Staples’ information systems play a critical role in delivering on their brand promise 'that was easy.' As part of a recent strategic imperative, Staples recently embarked on a major modernization of its systems architecture and supporting processes. The goal was to ensure IT’s systems could scale with the company’s continued global expansion without sacrificing the quality of the brand experience. One critical target for modernization was Staples’ enterprise job scheduling processes and systems. After researching the top software providers in this space, Staples selected Tidal Software to support its efforts to centralize and streamline automated batch processing.
Tags : 
job scheduling roi, tidal scheduler, enterprise scheduling roi, systems management tools, batch processing, systems architecture, tidal, tidal software, network architecture, network management
    
Tidal Software
Start   Previous    24 25 26 27 28 29 30 31 32 33 34 35 36 37 38    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.