Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical it

Results 176 - 200 of 1826Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
As line-of-business owners (LOBs) seek to initiate the SaaS model, it becomes critical to consider these concerns to assure productivity. This white paper from BlueCoat identifies the key concerns that IT must address to assure access and performance for Internet-based software-as-a-service (SaaS) applications.
Tags : 
strategies, saas, application, lob, bluecoat
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are taking—or not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : 
data, non-malicious, malicious, ponemon, solera network
    
Blue Coat Systems
Published By: Blue Jeans Network     Published Date: Oct 29, 2013
Scalability and affordability have extended video beyond the boardroom to meet the demands of a growing mobile workforce. Cloud-based video conferencing has enabled companies to realize the full benefits of video: fact-to-face contact, efficient knowledge transfers and a degree of personal interaction that's proven critical for businesses hoping to gain a competitive advantage.
Tags : 
video conferencing, collaboration, cloud based video, mobile video conferencing, corporate agility, cloud, human resources
    
Blue Jeans Network
Published By: BMC ASEAN     Published Date: Dec 18, 2018
DevOps is fast becoming a core competency required to gain competitive advantage. At its most basic level, DevOps is a team approach to drive agile modern application development and operations to deliver high quality critical digital business services. Cloud services are fundamentally changing the way applications are developed. The near ubiquitous, lowfriction access to cloud computing for developers, who can literally access powerful computing resources at the touch of a keystroke or swipe of a credit card, has fundamentally altered the software development lifecycle (SDLC).
Tags : 
    
BMC ASEAN
Published By: BMC Control M     Published Date: Jul 16, 2009
Enterprise job scheduling is a mature and mission-critical IT capability that supports some of the most important business processes throughout a modern enterprise. Areas like accounting, ordering, inventory, and procurement are all likely to rely on job scheduling technology. Most common job scheduling architectures involve deploying agent software on every system in the enterprise. However, depending on the parameters of the situation, these agents may be more expensive to install and maintain. Learn more today!
Tags : 
bmc, ema, tco, security, job, scheduling, agent, faster, cheaper, safer, technology, software, bmc contol-m, enterprise, management
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 16, 2009
Batch Application Integration allows you to process critical transactions, such as payment authorizations, in real-time, and cue fulfillment (such as packaging and shipping) or other lower priority actions for batch processing. Learn more about Batch Application Integration, and how BMC CONTROL-M makes it possible.
Tags : 
integrating, automation, composite applications, bmc, control-m, enterprise architects, batch application integration, batch processing, object oriented design, ood, service oriented architecture, soa, enterprise management associates, ema, enterprise, bai, enterprise resource planning, erp, business-to-consumer, b2c
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 22, 2009
Enterprise job scheduling is a mature and mission-critical IT capability that supports some of the most important business processes throughout a modern enterprise. Areas like accounting, ordering, inventory, and procurement are all likely to rely on job scheduling technology. Most common job scheduling architectures involve deploying agent software on every system in the enterprise. However, depending on the parameters of the situation, these agents may be more expensive to install and maintain. Learn more today!
Tags : 
bmc, ema, tco, security, job, scheduling, agent, faster, cheaper, safer, technology, software, bmc contol-m, enterprise, management, enterprise applications
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 22, 2009
Batch Application Integration allows you to process critical transactions, such as payment authorizations, in real-time, and cue fulfillment (such as packaging and shipping) or other lower priority actions for batch processing. Learn more about Batch Application Integration, and how BMC CONTROL-M makes it possible.
Tags : 
integrating, automation, composite applications, bmc, control-m, enterprise architects, batch application integration, batch processing, object oriented design, ood, service oriented architecture, soa, enterprise management associates, ema, enterprise, bai, enterprise resource planning, erp, business-to-consumer, b2c
    
BMC Control M
Published By: BMC ESM     Published Date: Nov 06, 2009
As you know, automation is a critical component in achieving long-term IT savings. We've compiled a few resources to give you an overview of the benefits of service automation and the technology behind our comprehensive solution.
Tags : 
bsm esm, service automation, business service management, roi, configuration management, patch management, server
    
BMC ESM
Published By: BMC ESM     Published Date: Nov 06, 2009
Leading bank shares best practices, results of IT compliance implementation. Zions Bancorporation is a leader in SBA lending, public finance advisory services, and agricultural finance. Which means compliance is critical, both to internal workflows and legal mandates like Sarbanes-Oxley.With nearly 25% of the enterprise virtualized, it became clear to IT leaders at Zions that an advanced solution to IT compliance was required. Attend the webinar.
Tags : 
bmc esm, zions, it compliance, virtualization, roi
    
BMC ESM
Published By: BMC Software     Published Date: Jun 30, 2009
Batch Application Integration allows you to process critical transactions, such as payment authorizations, in real-time, and cue fulfillment (such as packaging and shipping) or other lower priority actions for batch processing. Learn more about Batch Application Integration, and how BMC CONTROL-M makes it possible.
Tags : 
integrating, automation, composite applications, bmc, control-m, enterprise architects, batch application integration, batch processing, object oriented design, ood, service oriented architecture, soa, enterprise management associates, ema, enterprise, bai, enterprise resource planning, erp, business-to-consumer, b2c
    
BMC Software
Published By: BMC Software     Published Date: May 01, 2015
Complex hybrid environments can make it difficult to track interdependencies, increasing the risk of disrupting critical business services. In this research paper by EMA, you’ll learn how application discovery and dependency mapping can help you: • Meet granular targets for availability, cost, and time-to-revenue for cloud services • Accelerate mean time to repair (MTTR) while communicating better with stakeholders • Manage even the most complex hybrid environments more efficiently and effectively • Understand the impact of proposed changes and potential security risks to guide decision-making
Tags : 
hybrid environments, critical business services, mean time to repair, potential security risks, decision-making, cloud optimization, visibility and performance, it management, enterprise applications
    
BMC Software
Published By: BMC Software     Published Date: Jul 22, 2015
In this eBook, Salesforce shares 4 elements of ITSM that are critical to IT empowerment, including: • Self-service options • Low –friction communication • Reporting and dashboards • A future-ready platform
Tags : 
it service management, salesforce, itsm, self-service, reporting
    
BMC Software
Published By: Bocada     Published Date: Aug 21, 2009
This strategic view is the proverbial "gold" that can be mined from your data protection systems; it is the asset that will enable IT management to prioritize activity to bring activities in line with business objectives and communicate policy compliance to corporate officers and data owners.
Tags : 
data consolidation, data protection, business management, business value, security policies, security policy, policy management, mission critical, mission critical data, bocata, bocada
    
Bocada
Published By: Bounty Jobs     Published Date: Oct 14, 2015
In this e-book, you'll learn how to: -Increase hiring velocity for high-demand talent -Create stronger recruiting teams -Find and engage the right agencies The six data points in this e-book are critical to unlocking the full potential of direct hire agencies in order to land those highly sought-after job candidates. Commanding this data will also position your recruiting teams to become strategic advisors to your company and its business units.
Tags : 
direct hire agencies, headhunters, job candidates, recruiting teams, recruitment
    
Bounty Jobs
Published By: Box     Published Date: Mar 14, 2012
Improving collaboration and access to the growing collection of content are critical, fundamental components of companies' future growth. Download this white paper to learn more.
Tags : 
reaping, ecm, cloud, enterprise, content, solutions, cloud, collabortation, growth, content management, enterprise applications, convergence, infrastructure, network architecture, network management, network performance, cloud computing
    
Box
Published By: Box     Published Date: Aug 13, 2014
This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.
Tags : 
box, securing content, content security in the cloud, device management, enterprise applications
    
Box
Published By: Box     Published Date: Aug 15, 2014
This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.
Tags : 
box, securing content, content security in the cloud, device management, cloud computing
    
Box
Published By: Box     Published Date: Aug 15, 2014
This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.
Tags : 
box, securing content, content security in the cloud, device management, cloud computing
    
Box
Published By: Box     Published Date: Jan 16, 2015
How do you know what the right storage set up is for you? How do you ensure that you're using best practices when implementing? As IT virtualization continues to become more and more prevalent, the storage component of the virtualization architecture continues to play a critical role in performance and availability. Additionally, the ability to benchmark and predict storage performance in a virtualized environment is essential to an efficient and well-run VDI setup. Download now and learn how to select and size the best storage array for your VMWare deployment to maximize your VM density and increase ROI.
Tags : 
nexgen, flash, qos, vmware, storage, software development, it management
    
Box
Published By: Box     Published Date: Jan 16, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now!
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware, software development, it management
    
Box
Published By: Box     Published Date: Nov 24, 2015
One of the biggest problems with any organization is complete alignment among all teams. A lot of this breakdown is due to outdated methods of sharing important documents and information. Teams function best when they are able to access and collaborate on critical documents, presentations and files. Download this whitepaper to learn the top five ways any business can benefit from Box and see how it will allow your organization to operate faster across all departments to ensure everyone is aligned while driving growth to maintain security of your files to keep your projects running smoothly.
Tags : 
sharing documents, driving growth, maintain security, sharing files, security, enterprise applications
    
Box
Published By: Box     Published Date: Nov 24, 2015
With the cloud being an essential part of so many IT organizations, best practices have emerged to help IT evaluate the right vendors’ ability to meet mission critical security needs. Download this whitepaper to learn the best practices for determining file sharing provider’s capabilities and see how it will allow you to select the right vendor to meet mission critical operational and security needs.
Tags : 
file sharing, file sharing providers, secure files, security needs, security, enterprise applications
    
Box
Published By: Box     Published Date: Jun 22, 2018
• Content is among an organization's most critical assets. It flows through every aspect of a company, from people to systems to processes. But as teams grow and the breadth of their content expands, these valuable assets get fragmented across the different tools they use. • What if you had a secure, open platform that connects all your tools in the cloud, allowing you to pull together best-of-breed technologies that fit your unique business needs? These native integrations keep teams happy and give IT full visibility and control, while boosting productivity and collaboration across the entire organization. • Download our ebook to see how Cloud Content Management from Box provides you with a central and secure content layer that unites all of your apps with seamless, native integrations. In it, you'll learn about our most popular integrations — like Microsoft Office 365, Okta, Slack and Salesforce — and how Box helps you future-proof your tech stack while also providing a unified exp
Tags : 
    
Box
Published By: Box     Published Date: Jun 22, 2018
With GDPR looming large on the horizon in May 2018 and beyond, there are a number of myths and misunderstandings circulating around the upcoming changes to compliance and data protection. In this expert e-guide, we explore how to maintain compliance for your critical content in the cloud. Uncover vendor-agnostic compliance tips from Box compliance president Crispen Maung for your content management system, and delve into topics, like: • GDPR strategies for cloud ECM • Cultural changes for upcoming compliance regulations • Projected fines associated with GDPR • And more
Tags : 
    
Box
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.