Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

zero

Results 226 - 245 of 245Sort Results By: Published Date | Title | Company Name
Published By: Delphix     Published Date: Apr 15, 2011
See how Delphix database virtualization shrinks nonproduction database storage requirements by up to 10x, and reduces database provisioning and refresh times from days to minutes with zero impact to production systems.
Tags : 
delphix, database virtualization, storage requirement, development, testing
    
Delphix
Published By: Adobe     Published Date: Feb 20, 2014
Download our 2014 Digital Trends report, created in partnership with eConsultancy, to discover the trends that are driving exceptional customer experiences — and the tools you need to gain a competitive edge. Based on a global survey of more than 2,500 marketers, our report found that customer experience, mobile marketing, and content marketing are major business imperatives for 2014. However, only 23% of marketers believe they have the tools they need to maximize their impact in these areas. Get the report now to uncover more insights for the coming year, including: - B2C brands will focus on targeting and personalization - Two-thirds of respondents will experiment with new media - Brands will zero in on mobile customer behavior
Tags : 
adobe, adobe social, social media, marketing, ecommerce, retail, market data, digital trends, benchmarking, user experience, customer experience, content marketing, targeting, conversion, mobile marketing, branding
    
Adobe
Published By: Nutanix, Inc.     Published Date: Oct 17, 2012
Join us for this hands-on, technical VDI Design Workshop where everything from choosing the right broker to zero clients and multi-site design will be discussed and analyzed.
Tags : 
vdi, desktop, technology, workshop, nutanix
    
Nutanix, Inc.
Published By: HP-Intel®     Published Date: Jul 22, 2013
White Paper
Tags : 
healthcare, zero downtime, integration, hospital
    
HP-Intel®
Published By: Cisco     Published Date: Mar 03, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking. At the same time, the Internet of Everything (IoE) is accelerating. Opportunities are opening up for businesses and attackers alike as more things come online, along with the people, processes, and data that interact with them.
Tags : 
security, detection, blocking, data
    
Cisco
Published By: GE Healthcare     Published Date: Feb 23, 2015
Southwestern Ontario Diagnostic Imaging Network relies on Centricity™ Clinical Archive to connect 62 hospitals with disparate PACS & RIS systems, resulting in reduced storage costs and data duplication and increased productivity and enhanced quality of care. Learn more in this case study. Centricity Clinical Archive includes the following product components: Centricity Enterprise Archive, Universal Viewer ZFP, Caradigm eHIE, Centricity Clinical Gateway, NextGate MatchMetrix EMPI, PACSGEAR PacsSCANTM
Tags : 
xds, cross enterprise document sharing, unified view of patient images, archive & storage, image sharing & management, vendor neutral archive (vna), centricity clinical archive, mobile image capture, enterprise archive, archiving services, zero footprint viewer, image archive, dicom storage
    
GE Healthcare
Published By: GE Healthcare     Published Date: Feb 23, 2015
Huron Regional Medical Center added Universal Viewer with Zero Footprint (ZFP), a Web-based image viewing strategy that reliably, timely and financially efficiently delivers images.
Tags : 
zero footprint viewer
    
GE Healthcare
Published By: CA Technologies     Published Date: Aug 10, 2015
As organizações ágeis de hoje delegam às equipes de operações um tremendo desafio: implementar novas versões em produção imediatamente depois de completar o desenvolvimento e a prova. Para garantir a implementação exitosa dos aplicativos, se requer um processo automático e transparente. Este proceso é conhecido como Zero Touch Deployment™. Este white paper revisa os dois enfoques de Zero Touch Deployment: uma solução baseada em scripts e uma plataforma de automatização da implementação. O artigo explica como cada um pode resolver os principais desafios tecnológicos e organizacionais que enfrentam as organizações ágeis quando elas se dispõem a por em prática um sistema de implementação automática.
Tags : 
    
CA Technologies
Published By: Intel Security     Published Date: Oct 20, 2015
Success of an effective threat defense strategy.
Tags : 
malware detection, data analytics, dynamic sandboxing, static analytics, zero-day malware, comprehensive threat protection, fast detection, malware analysis, simplifies remediation
    
Intel Security
Published By: MobileIron     Published Date: Apr 22, 2019
Protect the modern enterprise with a mobile-centric, zero trust framework.
Tags : 
    
MobileIron
Published By: Akamai Technologies     Published Date: Nov 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Dec 05, 2018
Akamai now mitigates the more than 65% of the 10,000-plus yearly DDoS attacks against its Prolexic platform via proactive mitigation controls, in 0 seconds and with no customer impact. The number of DDoS attacks instantly mitigated via the Prolexic platform has increased exponentially over the past four years. We attribute this growth to our proactive engagement with customers, and the ability to implement and manage proactive mitigation postures based upon their baselined network traffic. Akamai has been detecting and successfully mitigating DDoS attacks in an industry-leading SLA for 15 years. We will illustrate how Akamai continues to lead the industry with new capabilities including advanced customer traffic profiling and proactive mitigation controls to ensure the best possible results during an actual DDoS event.
Tags : 
    
Akamai Technologies
Published By: IBM     Published Date: Jul 15, 2016
Discover the new Zero Trust Model approach to security and how intrusion prevent systems (IPS) are important due to its visibility, alerting and protection capabilities.
Tags : 
technology, security, information technology, best practices, ips, zero trust model
    
IBM
Published By: Lookout     Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
mobile security, mobile risks, device attacks, network attacks, malware attack
    
Lookout
Published By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime of server migration have locked many IT teams into platforms that are no longer ideal. Migrations are often delayed or avoided—whether it’s moving data to the cloud or back on premises, or upgrading the hardware of the database software. This results in lost opportunities, unnecessary costs, and a lack of agility that today’s IT teams can no longer afford. Carbonite Move Powered by DoubleTake quickly and easily migrates physical, virtual, and cloud workloads over any distance with minimal risk and near-zero downtime. Using efficient real-time, byte-level replication technology, Carbonite Move creates a replica of the data, application, database, or entire server being migrated and keeps it in sync with the production system. The migrated data can be validated without disrupting business operations, and downtime is limited to the seconds or minutes required for cutover to the new server.
Tags : 
carbonite, doubletake, risk mitigation
    
Carbonite
Published By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime associated with server migration have prevented many IT organizations from making the move to cloud. Some have valid concerns about cloud lock-in. Still, without cloud, IT teams are less agile, less flexible and less able to meet the demands of their business. With so much C-suite awareness of the cloud competitive edge, IT can no longer avoid taking this step. Carbonite DoubleTake™ Cloud Migration Center quickly and easily migrates physical, virtual and cloud workloads over any distance with minimal risk and near-zero downtime. The streamlined process automates 100 manual steps into five easy steps, automating everything from server discovery to target VM provisioning to the ultimate cutover. Using efficient real-time, byte-level replication technology, Cloud Migration Center creates a replica of the entire server being migrated and keeps it in sync with production systems. The migrated data can be validated without disrupting business operations, and downtime is
Tags : 
carbonite, cloud migration, automation, virtual workload, cloud workload
    
Carbonite
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
BlackBerry Cylance
Published By: Anaplan     Published Date: Mar 29, 2018
In recent months, leaders at some of the world’s largest consumer packaged goods (CPG) companies have spoken publicly about how ZBB is helping them save on overhead costs, which can then be used to reinvest in growth through innovation or bolster their margins. As consumers increasingly have more choices, these companies are finding their margins squeezed, and with direct expenses already trimmed back to the bare minimum, the only place to look is sales, general and administration (SG&A), and other overhead expenses.
Tags : 
zero, based, budgeting, investments, consumers, margins
    
Anaplan
Published By: PGi     Published Date: Oct 01, 2018
Einfach ausgedrückt, BE ist das, was jemand fühlt, wenn er mit einer Lösung, Plattform oder einem Gerät interagiert. Die Benutzeroberfläche (BO) umfasst alle visuellen Elemente, die Sie zur Interaktion mit einer Lösung, Plattform oder einem Gerät verwenden. Dies beinhaltet alles von den Bildschirmen bis zu den Seiten — sogar die Schaltflächen und Symbole, die Sie anklicken.
Tags : 
    
PGi
Published By: Oracle     Published Date: Aug 09, 2018
Respaldar es una cosa, recuperarlo es todo. Sin duda usted aprecia la importancia crítica de su base de datos Oracle para el éxito de su empresa. Pero, ¿qué pasa si experimenta un corte de luz o un ataque cibernético? ¿Puede estar seguro de recuperar rápidamente todos sus datos? Las soluciones de respaldo tradicionales dejan los datos expuestos a pérdidas y su negocio está en riesgo. El Zero Data Loss Recovery Appliance de Oracle elimina la exposición y ahorra tiempo, esfuerzo y el estrés de recuperar datos. Descubra cómo nuestros clientes están recuperando sus datos sin drama.
Tags : 
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10     Next   End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.