Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

network app

Results 1 - 25 of 955Sort Results By: Published Date | Title | Company Name
Published By: Four Winds Interactive     Published Date: Jul 19, 2019
When it comes to implementing and managing an effective digital signage network, every organization has to start somewhere. Regardless of how many screens you have or what applications you’ve deployed, there’s always something new to learn. But you don’t have to learn every lesson on your own. We’ve compiled a list of tips and best practices from organizations of all sizes—companies with implementations ranging from 10 screens to 2,000 screens. Use this resource to learn from the people that have successfully implemented and scaled digital signage within their organizations.
Tags : 
    
Four Winds Interactive
Published By: Flexential     Published Date: Jul 17, 2019
In a data environment that’s become increasingly centralized by public cloud services, the “edge” is emerging as a critical solution for reducing latency for network-based services. Consumption habits of services and the need for analytics are shifting beyond core population centers, becoming local and even hyper-local within a region or city. As the online population continues to grow and new services emerge, the ability to handle data traffic securely – close to the customer or application – will become a common pattern for the new service evolution.
Tags : 
    
Flexential
Published By: AWS     Published Date: Jul 08, 2019
Modernize your applications quickly Many organizations are finding their legacy technology to be inadequate due to its rigidity and high costs. In search of more flexible and cost-effective solutions, many are turning to the cloud. Most Independent Software Vendors (ISVs), however, still build their solutions on commercial databases that are expensive and time-consuming for their customers to deploy and maintain. This is a significant undertaking that can hinder adoption. To address these challenges head on, ISVs can modernize their applications on Amazon Aurora, a database offering from AWS that combines the reliability and performance of commercial databases with the cost-effectiveness and flexibility of open source solutions. In this webinar, you will learn how Virtusa, an AWS Partner Network (APN) Premier Consulting Partner, can accelerate your application modernization journey and help you grow your business. PTNR_ipc-database-migration-icon_245×155_Mar-2019.png View the webin
Tags : 
    
AWS
Published By: Pure Storage     Published Date: Jul 03, 2019
Deep learning opens up new worlds of possibility in artifi cial intelligence, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up. Advanced AI applications require a modern all-fl ash storage infrastructure that is built specifi cally to work with high-powered analytics.
Tags : 
    
Pure Storage
Published By: Pure Storage     Published Date: Jul 03, 2019
Deep learning opens up new worlds of possibility in artificial intelligence within the Financial Services industry, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up. Advanced AI applications require a modern all-flash storage infrastructure that is built specifically to work with high-powered analytics.
Tags : 
    
Pure Storage
Published By: MuleSoft     Published Date: Jun 27, 2019
Banks of all sizes, from multinational firms to regional credit unions, face unparalleled pressure to digitally transform in the face of evolving customer expectations. Learn how a top 10 bank partnered with MuleSoft to address these pressures by developing an application network to rapidly modernize legacy systems, digitally transform mortgage lending, and accelerate Salesforce implementation. Read this whitepaper to learn: How banks can leverage APIs to accelerate integration between core banking systems, legacy applications, and modern SaaS endpoints. The step-by-step approach a top 10 bank took to build a Center for Enablement (C4E) and transform their SDLC to accelerate application development. How the bank created unified customer experiences across different product lines, from mortgages to wealth management, across in-person, and digital engagement channels.
Tags : 
    
MuleSoft
Published By: Gigamon     Published Date: Jun 21, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper "Network Architecture with Security in Mind" and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 21, 2019
Organisations have invested heavily in cybersecurity tools and yet more than five million data records are lost or stolen every day. The problem is not that today’s cybersecurity tools are badly designed or missing features, the problem is that surging volumes of network traffic overwhelm security tools, causing administrators to use sampling or disable advanced features in order to preserve application performance. Also, security tools and IT staff don’t get all the data they need to detect and respond to outside attacks and insider incidents, because they are faced with “blind spots” in data collection. Read this business brief in local language to find out how
Tags : 
    
Gigamon
Published By: Darktrace     Published Date: Jun 21, 2019
As a prominent US credit union, TruWest was faced with a number of challenges when securing its network and critical digital assets against cyber attackers. With the threat landscape evolving rapidly, and the cost of breaches rising, TruWest security chief, Chris Sprague, discusses how Darktrace gave his team a new way of approaching cyber security.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 21, 2019
The City of Las Vegas serves as the legislative body that governs Las Vegas, Nevada. While their network covers 3,000 users, the City of Las Vegas oversees private and sensitive data of both the 600,000 residents and over 42 million tourists per year. With Darktrace's unique ‘immune system’ approach, City of Las Vegas has increased its confidence that sensitive information is protected and secure.
Tags : 
    
Darktrace
Published By: Darktrace     Published Date: Jun 17, 2019
The City of Las Vegas serves as the legislative body that governs Las Vegas, Nevada. While their network covers 3,000 users, the City of Las Vegas oversees private and sensitive data of both the 600,000 residents and over 42 million tourists per year. With Darktrace's unique ‘immune system’ approach, City of Las Vegas has increased its confidence that sensitive information is protected and secure.
Tags : 
    
Darktrace
Published By: Indegy     Published Date: Jun 17, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegy’s agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
cybersecurity, industrial networks, security capabilities, indegy
    
Indegy
Published By: Citrix Systems     Published Date: Jun 13, 2019
https://technews.onlinetechreports.com/Technews/Citrix-BuildJAP.html
Tags : 
    
Citrix Systems
Published By: Emarsys - APAC     Published Date: Jun 12, 2019
Omnichannel isn’t just another buzzword you can ignore. In fact, today’s most successful marketing strategies all take an omnichannel track that puts customers at the center of a diverse network of interactions and engagements. In this white paper, you’ll learn: • How email can serve as the foundation of your omnichannel strategy • How Artificial intelligence marketing (AIM) can make it possible to not only achieve true 1:1 personalization, but also scale it • How to apply a step-by-step roadmap to your brand’s pursuit of omnichannel excellence
Tags : 
    
Emarsys - APAC
Published By: AWS     Published Date: Jun 11, 2019
Common daily media broadcaster tasks such as ad verification are slow and costly. Done manually, they may also introduce inefficiencies that can interfere with transparency and payment accountability—and impact your bottom line. Meanwhile, recent and archived media lies idle when you could repurpose it to increase brand exposure and generate revenue. Learn how Veritone, Inc. used its aiWARE Operating System, building on Amazon Web Services (AWS), to help Westwood One, Inc., a large audio broadcasting network in the United States, develop Artificial Intelligence (AI) and Machine Learning (ML) solutions designed for ad verification and monetizing archived media. Download our webinar to learn how you can Automate ad verification and reporting tasks. Enhance archive content to make media searchable and reusable. Use AI and ML in the cloud for near real-time media intelligence. Start applying machine learning tools.
Tags : 
    
AWS
Published By: Gigamon     Published Date: Jun 10, 2019
Explosive data growth and network complexity hindering your ability to deliver results? We get it: the more complex the application infrastructure, the harder it is to ensure apps are functioning optimally. Read our new eBook, “Driving Digital Transformation with Application Intelligence,” to learn how to provide insight into applications across complex infrastructure. Discover previously hard-to-get information about bottlenecks, suspicious data, and user experience.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Need to deliver secure customer experiences and high application performance? View our new infographic, “Digital Transformation: Seeing Through the Clouds to the Journey Ahead” to learn how to get the breadth and depth of network and application visibility needed to effectively monitor and secure your digital applications.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now. 
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: AWS     Published Date: Jun 07, 2019
Migrations to the cloud sometimes face difficulties in transitioning apps, operational inconsistencies, and incongruent networks. VMware Cloud on AWS is an on-demand hybrid cloud service designed to preserve existing investments and legacy applications, while reaping the rewards of cloud scalability and flexibility.
Tags : 
    
AWS
Published By: Gigamon     Published Date: Jun 07, 2019
You know that complex microservices-based apps can be difficult to monitor, but did you know Application Intelligence provides both the visibility and the context needed to discover, manage and secure these apps? Download the Gigamon white paper “How to Gain Control of Complex Applications in the Time of Digital Transformation” to solve the challenges of capturing application traffic on the network, identifying apps and microservices, extracting information and metadata and distributing that information to tools.
Tags : 
    
Gigamon
Published By: Forcepoint     Published Date: Jun 06, 2019
Things aren't what they used to be in the enterprise. Your employees are mobile and they're storing and accessing data in cloud apps—often in disparate networks. That presents a serious challenge for old-school threat-centric security models that force you to make decisions with little insight or broader context. Download our eBook to find out how a human-centric, risk-adaptive approach to data security can free up your overwhelmed security team to focus on investigations that really matter.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employee’s ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific user’s risk and the sensitivity or value of the data. An organization’s data protection program must consider the human point — the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Traditional security infrastructures can't keep up with the growing complexity of today's distributed networks. To power true digital transformation via the cloud, you need to integrate connectivity and security in a way that allows for higher productivity, reduced costs, and easier compliance. Download our eBook to learn about a better approach to cloud security, including how to augment or replace expensive MPLS, the types of security needed for holistic protection, and the advantages of an integrated solution instead of a patchwork of point products.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
When it comes to connecting remote offices and employees, traditional distributed networks can't handle the new wave of cloud-based applications that are driving increasing speed and innovation across the enterprise. If you want to make sure that your network resources are being used more efficiently, this eBook will show you how using direct-to-cloud connectivity and scaling site-to-site with on-demand VPNs can reduce downtime and decrease complexity—ultimately saving you money.
Tags : 
    
Forcepoint
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.