Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

all ict

Results 301 - 325 of 371Sort Results By: Published Date | Title | Company Name
Published By: Centrify Corporation     Published Date: Dec 04, 2014
The number of identities that an organization must control and secure is exploding as companies support the evolution of business. Traditional users, customers and partners, outsourced or offshore IT, support and development teams, and new users from mergers and acquisitions are working from increasingly distributed locations and devices and to be efficient they need the right set of privileges across a diverse set of servers and applications. So, how can an organization successfully control privilege for all of these identities to mitigate identity-related risk without slowing down the business? From this webinar you will learn: • Forrester’s predictions for next generation privileged identity management. • How best-in-class organizations are successfully controlling privilege and mitigating risks
Tags : 
identity management, it support, security, identity management, controlling privilege, enterprise applications
    
Centrify Corporation
Published By: Internap     Published Date: Dec 02, 2014
As organizations aim to increase business agility and streamline costs, demand for public cloud services continues to grow exponentially, with Gartner predicting it will become the majority of new IT spending by 2016. This evolving application ecosystem with its intensive performance demands is placing new pressures on traditional public cloud services. Amid this shift, Internap surveyed nearly 250 Internet infrastructure decision makers to gain insight into cloud adoption, requirements and challenges – including the differences in feedback between the cloud-wise, those using cloud services, and the cloud-wary, those with no near-term plans to use cloud services. The details of these findings are reflected in this Cloud Landscape Report.
Tags : 
internap, cloud landscape, application ecosystem, cloud adoption, cloud, internet infrastructure, it management, data center
    
Internap
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Businesses today are faced with the almost insurmountable task of complying with a confusing array of laws and regulations relating to data privacy and security. These can come from a variety of sources: local, state, national, and, even, international law makers. This is not just a problem for big businesses. Even a small business with a localised geographic presence may be subject to laws from other states and, possibly, other nations by virtue of having a presence on the internet. In many instances, these laws and regulations are vague and ambiguous, with little specific guidance as to compliance. Worse yet, the laws of different jurisdictions may be, and frequently are, conflicting. One state or country may require security measures that are entirely different from those of another state or country. Reconciling all of these legal obligations can be, at best, a full time job and, at worst, the subject of fines, penalties, and lawsuits.
Tags : 
byod, device discovery, data privacy, data security, it security, security, it management
    
Kaspersky Lab
Published By: Singtel     Published Date: Oct 28, 2014
Examine the three broad challenges that Financial Services Institutions (FSIs) face today: compliance and risk management, consolidation and innovation. To address these effectively, FSIs require an Information and Communication Technology (ICT) infrastructure that offers both the security and reliability of their legacy communications systems as well as the flexibility and scalability that new generation networks provide, in order to adapt and innovate in the highly competitive financial services environment.
Tags : 
singtel, vpn, wan, lan, infrastructure, ip networks, ip telephony, local area networking
    
Singtel
Published By: SAS     Published Date: Sep 30, 2014
Stop to think about how – and how often – your business interacts with customers. Every day, with each interaction, data is created. What percentage of the data generated by these interactions are you using? There are so many channels for interaction, like social media, call centers, sales staff, help and support resources, marketing and campaigns. Typically, organizations believe that they are using only a small fraction of it effectively – at best, upwards of 10 percent of all the available data. Why? One reason relates to the difficulties in collecting all this data. This limitation is beginning to wane as commodity hardware becomes increasingly popular for big data storage. But another major inhibitor to examining all customer data has been the inability to examine millions, or even billions, of data points that constitute the customer picture. And much of this is now in the form of unstructured text inputs.
Tags : 
sas, text analysis visualization, voice of the customer, unstructured text inputs
    
SAS
Published By: McAfee     Published Date: Sep 15, 2014
The need for robust network security is growing, but IT security teams, resources, and budgets are shrinking at many organizations. That doesn’t mean you have to scale down your growth or skimp on key IT security areas, but it does mean you need to optimize your resources, starting with your network firewall team. Resource optimization involves the automation and streamlining of operational processes and management workflows so that your IT team members can be freed up to focus their time, skills, and expertise on priority projects. Furthermore, optimizing your resources helps preserve your budget while eliminating budgetary conflicts and slashing administrative costs.
Tags : 
network security, it security, firewall, resource optimization, security management
    
McAfee
Published By: Cisco     Published Date: Aug 18, 2014
Optimize benefits from your Cisco ASA 5500-X Series Next-Generation Firewall, and better secure your network from malicious activity, with a proven firewall and IPS design guide. Use this guide for faster, more reliable, and more predictable deployment.
Tags : 
security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network
    
Cisco
Published By: EMC Corporation     Published Date: Aug 05, 2014
It’s an exciting yet daunting time to be a security professional. Security threats are becoming more aggressive and voracious. Governments and industry bodies are getting more prescriptive around compliance. Combined with exponentially more complex IT environments, security management is increasingly challenging. Moreover, new “Big Data” technologies purport bringing advanced analytic techniques like predictive analysis and advanced statistical techniques close to the security professional.
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance, security
    
EMC Corporation
Published By: Adobe     Published Date: Aug 05, 2014
Marketers have more channels to choose from than ever before. In 2014, their choices will become even more numerous, thanks to increasing device proliferation, the Internet of Things and the digitisation of offline channels. Crucial to succeeding in this increasingly complex world is the one concept underlying all marketing channels and the very best programs: data in, data out. In this report, we predict how data-driven marketing will evolve in 2014.
Tags : 
marketers, marketing channels, data, internet, data-driven
    
Adobe
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : 
enterprise authentication, securing identities, evolving environment, attacks, mobile platforms, user identities, network devices, security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more.
Tags : 
identity guard, enterprise, securing identities, corporate network, mobile platforms, security
    
Entrust Datacard
Published By: TeamQuest     Published Date: Jul 11, 2014
In this whitepaper you will learn about the following: • Analytics and today’s optimization challenges • What REALLY matters • Desired state and results • Methodology and ideation examples – Business and service aligned – Automated and predictive IT analytics • Recommendations Download to learn more!
Tags : 
mobile app, optimizing it, automated and predictive it analytics, it management, enterprise applications
    
TeamQuest
Published By: Gleanster Research     Published Date: Jul 02, 2014
In this Deep Dive we will explore what sales leaders should actually be demanding from marketing automation tools. In fact, survey data paints a very compelling picture about how sales should be evaluating the impact of marketing automation on sales performance. We'll explore why sales might be resistant in the first place, and how Top Performing organizations overcome these challenges to help support the collaborative pursuit of top line revenue growth between marketing and sales.
Tags : 
gleanster, sales, marketing, marketing automation, revenue, marketing automation tools, sales performance, sales analytics
    
Gleanster Research
Published By: Lattice Engines     Published Date: Jun 19, 2014
Everyone is talking about predictive analytics these days, but what does it mean for B2B marketers? Find out how top demand generation professionals are using predictive applications powered by leading edge data science to optimize all stages of the funnel. Read Lattice Engine’s latest ebook, Decoding Predictive Marketing, and learn where predictive fits into your marketing mix.
Tags : 
lead scoring, marketing automation, predictive analytics, predictive marketing, predictive lead scoring, b2b marketing, lead nurturing, lead management
    
Lattice Engines
Published By: BMC Software     Published Date: May 28, 2014
Learn how BMC Control-M for for Hadoop allows IT to extract value from big data, with clear visibility, predictability and increased productivity and efficiency.
Tags : 
it management, enterprise applications
    
BMC Software
Published By: HP and Intel ®     Published Date: May 27, 2014
The technology industry is constantly changing. Usually, it evolves along a progression of somewhat predictable lines. But every 20 years or so, a sea change shakes its very foundation. Tried-and-true practices that underpinned the previous model may no longer apply. It happened, for example when our industry transitioned from the mainframe to a client/server model. That change required a rethinking of the IT model from top to bottom. Download to learn more!
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
    
HP and Intel ®
Published By: HP     Published Date: May 27, 2014
The technology industry is constantly changing. Usually, it evolves along a progression of somewhat predictable lines. But every 20 years or so, a sea change shakes its very foundation. Tried-and-true practices that underpinned the previous model may no longer apply. It happened, for example when our industry transitioned from the mainframe to a client/server model. That change required a rethinking of the IT model from top to bottom. Download to learn more!
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
    
HP
Published By: HP     Published Date: May 14, 2014
What worked in storage yesterday is not necessarily effective for today or tomorrow. Legacy storage is too complex and not well aligned with today’s business strategies and objectives. Many storage platforms are not up to the challenge of today’s unpredictable workloads and unconstrained data growth. They don’t offer the adaptability, agility and consolidated management capabilities IT requires, which means that IT needs a future-proof storage architecture. Learn about the next generation in storage.
Tags : 
converged storage, legacy storage, future proof storage, storage, hp converged storage
    
HP
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, enterprise authentication, security, identity security, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 13, 2014
The boundaries of the corporate network are being challenged. Today’s enterprise is falling victim to unrelenting attacks that target physical and logical infrastructures, mobile platforms, user identities, network devices and more. Entrust provides more than a simple one-step means of protecting the world’s largest and most respected enterprises. Reduce costs, defend against targeted attacks and consolidate identity-based security via a single management and strong authentication platform.
Tags : 
entrust, identitityguard, enterprise security, networking, it management
    
Entrust Datacard
Published By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : 
data security, compliance, technology, network security, regulatory compliance, security, enterprise applications, data center
    
Intralinks
Published By: Intralinks     Published Date: Mar 12, 2014
In the age of Edward Snowden and the NSA, there are increasing concerns about data privacy and especially where best to keep data secure. The prevalence of cloud computing and cloud-based storage and collaboration services is only exacerbating these concerns. Many organizations are confused about regulations that protect data in different countries and jurisdictions, and don’t know what steps to take to ensure their cloud collaboration vendor can provide adequate safeguards. While pushback and reform efforts are evolving, the reality is that companies must operate within the law. Deciding where to house your data and how to move it is an exercise in understanding the relevant legal regimes and the application of risk analysis in the decision making process. This white paper will examine those elements with regard to cloud-based storage and processing.
Tags : 
data privacy, technology, data, security, safeguards, cloud computing, enterprise applications, data center
    
Intralinks
Published By: IBM     Published Date: Mar 07, 2014
2 Page Written Case Study on Consolidated Communications that discusses the challenges they were facing and how IBM's Predictive Insights capability helped them find problems in their network infrastructure before they actually occurred.
Tags : 
consolidated communications, ibm, predictive insights, infrastructure, problem solving, network
    
IBM
Published By: Avalara     Published Date: Jan 28, 2014
States, counties and municipalities have historically relied on local brick-and-mortar businesses to collect retail sales taxes. These businesses collected the sales tax from their customers, and then remitted the tax proceeds to their local sales tax jurisdiction. It was a straightforward process, and no one much quarreled with who owed the taxes and who would receive them. That straightforward proposition became complex with the rise of thousands of catalog merchants in the ‘70s and ‘80s. Catalog merchants sold to consumers nationwide, who began to shift their purchases away from local brick-and-mortar merchants. This reduced revenue to local sales tax jurisdictions because catalog companies rarely collected sales taxes from their customers. Download this White Paper for more information.
Tags : 
sales tax, tax liability, internet sales tax, best practices, e-commerce, enterprise applications
    
Avalara
Published By: VMware, Inc     Published Date: Dec 05, 2013
PC life-cycle management (PCLM) solutions primarily focus on deploying or moving an application or an operating environment to a new user location. Functions include packaging, distributing, installing , and updating an application or an operating environment. These solutions provide a certain level of automation and are certainly more advanced than dealing strictly with scripts. However, they have complex workflows and do not provide the highest level of automation. In today's multidevice world, where the average user carries three or more devices, this paradigm alone is not agile enough for modern end users.
Tags : 
vmware, pc life-cycle management, pclm, operating environment, automation, layered desktop images, automatic synchronize, datacenter backup
    
VMware, Inc
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.