Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

providers

Results 851 - 875 of 959Sort Results By: Published Date | Title | Company Name
Published By: Spectrum Enterprise     Published Date: Mar 01, 2019
To support business continuity, many organizations eagerly avoid putting all their eggs in one basket. Understanding the critical role of last-mile connectivity and always-available Internet access, savvy firms utilize redundant wide area network (WAN) and Internet connections from multiple service providers to ensure network availability in addition to load balancing. Despite the good intentions, their Internet connectivity risks may still be in a single basket. That is because internet service providers (ISPs) and competitive local exchange carriers (CLECs) may operate using leased network infrastructure from the same incumbent local exchange carrier (ILEC).
Tags : 
    
Spectrum Enterprise
Published By: Spectrum Enterprise     Published Date: May 28, 2019
The right fiber Internet provider can significantly improve the service you provide to employees, partners and clients. For the best outcome, carefully vet providers based on the following top three criteria:
Tags : 
    
Spectrum Enterprise
Published By: Spectrum Enterprise     Published Date: Jun 05, 2019
Link your locations with nationwide reach, leverage bandwidth-intensive applications, connect to leading cloud service providers and fortify your business continuity plans. Do it all with customized Ethernet Services from Spectrum Enterprise.
Tags : 
    
Spectrum Enterprise
Published By: Spectrum Enterprise     Published Date: Aug 29, 2019
The right fiber Internet provider can significantly improve the service you provide to employees, partners and clients. For the best outcome, carefully vet providers based on the following top three criteria:
Tags : 
    
Spectrum Enterprise
Published By: Spectrum Enterprise     Published Date: Aug 29, 2019
Clients are benefiting from a rapidly evolving fiber Internet landscape and the associated competition among providers. Choosing the right vendor from among the many vying for your business requires careful consideration of how each operates. Take into account, for example, expertise and experience, breadth of services and support and investment in infrastructure.
Tags : 
    
Spectrum Enterprise
Published By: Sponsored by HP and Intel ®     Published Date: Feb 20, 2014
Introducing KVM support for HP CloudSystem for enterprises and service providers.
Tags : 
hp cloud, converged cloud, hp cloudsystem, kernel-based virtual machines, (kvm), it management
    
Sponsored by HP and Intel ®
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
Learn how healthcare providers are reducing their need for storage capacity through thin provisioning and reducing administration time by up to 90% by using autonomic management to simplify, automate and expedite storage management and maintenance.
Tags : 
strategy cost effective, storage for healthcare, hp intel, it systems, storage maintenance, it management, data center
    
Sponsored by HP and Intel® Xeon® processors
Published By: Sprint     Published Date: Oct 15, 2010
As businesses increasingly demand mobile options for employees, Sprint has introduced a service for wholesale providers called Wholesale Mobile Integration (WMI), which integrates wireless and office telephones on the same phone number.
Tags : 
sprint wholesale, wireless integration, business communication, mobile phone, wholesale mobile integration, voip
    
Sprint
Published By: Stratasys EMEA     Published Date: Feb 21, 2019
Ask anyone in business, higher education or the medical community what their top objectives are and they’ll probably say it’s to achieve more, to solve more problems, faster than what’s possible now, while saving money in the process. Ask what’s holding them back and you’ll probably find a diverse variety of obstacles in their day-to-day work processes that hinder them in meeting those goals. Having the right tools to do the job is one crucial element in solving problems and becoming more efficient and productive. Additive manufacturing, widely known as 3D printing, is one of those tools that has helped businesses, educators, health care providers and researchers improve how they design, manufacture and perform research. While no tool is an all-in-one solution, 3D printing is a strong step in that direction, particularly in its most sophisticated forms. 3D printing makes it possible to manufacture things that aren’t feasible with traditional processes like machining or injection moldi
Tags : 
    
Stratasys EMEA
Published By: SugarCRM     Published Date: Jan 07, 2015
The way companies use and pay for customer relationship management (CRM) software has changed significantly over the past decade. Moving from a predominantly perpetual license-based system, where companies paid a large up-front sum and then smaller annual maintenance fees, CRM software providers are now moving towards monthly or annual subscription fees to access CRM software on the Internet.
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing
    
SugarCRM
Published By: SumTotal     Published Date: May 24, 2013
The Value Matrix is based on functionality and usability, the two core measures that Nucleus has found indicate an application’s ability to deliver initial ROI and, ultimately, maximum value over time. Leaders, Experts, Facilitators, and Core Providers are identified in this matrix. Discover how the current workforce management providers stack up in this streamlined and concise evaluation.
Tags : 
workforce management, streamline hr, workforce management solutions, sumtotal
    
SumTotal
Published By: SunGard     Published Date: Aug 13, 2012
Recovery-as-a-Service (RaaS) has been available for some time, and has leveraged a number of infrastructure options and recovery platforms. Many of these options have provided a recovery solution that is flexible, scalable, and secure. And in some cases, service providers offer fully managed solutions with the expertise to support heterogeneous IT environments.
Tags : 
cloud, recovery-as-a-service, raas, infrastructure, platforms, heterogeneous, networking, data center
    
SunGard
Published By: SunGard     Published Date: Aug 13, 2012
Most organizations today understand that a disaster recovery (DR) plan is essential to their continued survival should a natural disaster occur. But implementing a DR plan entails substantial time, effort and cost - not to mention significant investment in developing new areas of technical expertise within the organization. As a result, many organizations are turning to disaster recovery service providers (DRSPs) to offload their disaster recovery operations.
Tags : 
sungard, recovery, service, organizations, disaster, recovery, survival, recovery
    
SunGard
Published By: Symantec     Published Date: Jan 04, 2012
Symantec SSL Certificates Provide a Secure Bridge to Trusted Cloud Hosting Providers
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec
Published By: Symantec     Published Date: Jun 29, 2012
Symantec SSL Certificates Provide a Secure Bridge to Trusted Cloud Hosting Providers
Tags : 
ssl, cloud security, enterprise, regulatory compliance, data segregation, data recovery
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
Symantec SSLCertificates Provide a Secure Bridge to Trusted Cloud Hosting Providers
Tags : 
cloud, ssl, symantec
    
Symantec
Published By: Symantec     Published Date: Jan 10, 2013
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has went from "if" to "when". This white paper is aimed to help enterprises making decisions on where and when to implement cloud.
Tags : 
cloud hosting providers, cloud, hosting, security, implementing cloud, networking
    
Symantec
Published By: Symantec     Published Date: Dec 04, 2014
SSL Certificates have been in use for almost 15 years, and they continue to serve a vital role in protecting data as it travels across the Internet and other networks. From online financial transactions to e-commerce to product development, SSL Certificates make it possible for users around the world to communicate sensitive information with the confidence that it is safe from malicious hackers. The Internet has evolved in innumerable ways over the past decade and a half; so why do SSL Certificates continue to instill trust? Simply put, SSL Certificates are very effective in protecting data in transit. Yet, customers transacting on websites and systems that are protected by SSL security still face serious threats . One key reason for this danger: poor SSL Certificate management. Enterprises with hundreds of SSL Certificates from several different providers could lose track of certificates in their environment. This white paper will present the pitfalls associated with poor SSL Certificate management, why they are potentially dangerous to the enterprise, and how enterprises can keep track of SSL Certificates effectively.
Tags : 
ssl, ssl certificates, business continuity, breach protection, protection, e-commerce, malicious hackers, security
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
Cloud Access Security Brokers (CASBs) serve as a critical control point to ensure the secure and compliant use of cloud apps and services. Cloud service providers typically maintain a shared responsibility policy for security—they guarantee the integrity of their service infrastructure, but the customer is responsible for securing actual app usage. In addition to the growing cloud security challenges organizations face to safeguard data and protect against threats in the cloud, total volume of cloud app adoption is accelerating, with most of it being done by business units and employees without approval or security oversight from the IT organization. As a result, CASB functionality has become so critical that by 2020 it is projected that 80% of enterprises will use a CASB solution. (Gartner)
Tags : 
cloud, cloud service providers, cloud security, cloud applications
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : 
endpoint security, security, threat prevention, threat detection, security solution
    
Symantec
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
mobile apps, symantec, cybercriminals, security, mobile applications, code signing, malware
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
symantec, mobile, mobile applications, security, code signing certificates
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Mar 21, 2014
Symantec SSL certificates provide a secure bridge to trusted cloud hosting providers
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
security, mobile, mobile app, code, mobile application, code signing, software development
    
Symantec Corporation
Published By: Synnex     Published Date: Oct 11, 2017
Cloud is disrupting traditional IT faster than we think. Today, with 80%1 business deploying or fully embracing the cloud, we have ‘crossed the chasm’ and are in the ‘early majority’ stage of the adoption curve. All of this means more opportunities for cloud solution providers. IDC discusses this opportunity extensively in “The Booming Cloud” report.
Tags : 
    
Synnex
Start   Previous    25 26 27 28 29 30 31 32 33 34 35 36 37 38 39    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.