Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

profile

Results 101 - 125 of 308Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Feb 24, 2017
Apple began aligning management profiles in Mac and iOS software years ago so that Macs could be managed alongside iOS devices with mobile device management (MDM). Each macOS update has delivered additional MDM controls, enabling IT to manage more endpoints together. Unified endpoint management brings together traditional client management with a modern enterprise mobility management framework to simplify the management process for IT. This whitepaper summarizes the key challenges of Mac management and outlines considerations and product features to help ensure a successful deployment.
Tags : 
    
VMware
Published By: NetApp     Published Date: Feb 15, 2017
How can hybrid-flash array users benefit from a move to all-flash? This case study profiles a large European organization that moved their VMware server and desktop environments from hybrid-flash to NetApp AFF all-flash systems
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: DocuSign     Published Date: Feb 13, 2017
Join us as we begin with a profile of real world customers from a wide range of industries who are closing more deals faster using Salesforce and DocuSign.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Feb 13, 2017
Nancy from SmartSellingTools.com profiles DocuSign, a Digital Transaction Management & eSignature solution, a solution that speeds your sales contracts through the approval process.
Tags : 
    
DocuSign
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jan 10, 2017
Read this whitepaper by Forrester Research to gain perspective on the trends shaping development and operations strategies. Learn how progressive companies are handling application development and operations in a DevOps environment faster and at lower costs
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Viavi Solutions     Published Date: Jan 04, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
    
Viavi Solutions
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Published By: NetApp     Published Date: Dec 05, 2016
How can hybrid-flash array users benefit from a move to all-flash? This case study profiles a large European organization that moved their VMware server and desktop environments from hybrid-flash to NetApp AFF all-flash systems.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Riverbed     Published Date: Nov 02, 2016
IT leaders are adopting hybrid WAN topologies to increase capacity and reliability while balancing cost and performance requirements. However, these hybrid architectures are often too complex, rigid, and fragile. As a result, many organizations are challenging the status quo of traditional networking. Read this Technology Adoption Profile from Forrester to learn why 90% of network managers are looking to evolve their WAN, and see why new approaches such as SD-WAN are required to compete in today's digital age.
Tags : 
    
Riverbed
Published By: Veracode     Published Date: Oct 26, 2016
When a high-profile, or simply branded, vulnerability is disclosed, security teams are expected to abandon their planned activities and react. But, these responses can be time-consuming and costly. Even if the vulnerability is achieving mainstream awareness, enterprises need to balance responses against risk. Download this handy report for guidance on preparing for a high-profile vulnerability disclosure so risk-management or security teams can respond with the appropriate level of urgency.
Tags : 
veracode, security, vulnerability, high-profile vulnerability disclosure, vulnerability disclosure, enterprise applications
    
Veracode
Published By: JBoss Developer     Published Date: Oct 21, 2016
Digital transformation (DX) is the continuous process by which enterprises adapt to or drive disruptive change by leveraging digital competencies, such as harnessing sensor data or using location, customer profile, and a mobile app to make shopping recommendations. DX reshapes the organization's culture where required; leverages existing processes, systems, and assets; and creates net-new digital capabilities as needed. With DX, there is the need to embrace new business models and new architectures and technologies that will help an enterprise with customer-facing innovation as well as transition existing systems, processes, organization structure, and relationships to support the transformation.
Tags : 
api, market intelligence, advisory services, digital transformation, data
    
JBoss Developer
Published By: IBM     Published Date: Oct 07, 2016
The new capabilities of WebSphere Application Server Liberty profile, based on Java EE 7 standards, are designed for enhanced developer productivity, dynamic scale, resilient production deployments and ease of integration into modern DevOps workflows. These new production ready capabilities of Liberty profile enable development and delivery of engaging and responsive applications by providing the application infrastructure that meets expectations for speed, agility and user friendliness.
Tags : 
ibm, middleware, cloud, platform services, websphere application server, java ee 7, websphere application server liberty, networking
    
IBM
Published By: Adobe     Published Date: Sep 20, 2016
Download our new data-driven marketing guide, The Holistic Picture, to learn how multiple sources of data can be transformed into unified customer profiles. And see how you can use those profiles to create personalized experiences your customers will love.
Tags : 
adobe, data driven marketing, marketing, marketer, marketing guide, customer experience
    
Adobe
Published By: LeadGenius     Published Date: Sep 13, 2016
You’re building a marketing and sales technology stack. Know what’s coming around the corner.
Tags : 
b2b, abm, account based marketing, account based sales, b2b marketing, lead generation, demand generation, marketing operations
    
LeadGenius
Published By: LeadGenius     Published Date: Sep 13, 2016
Do your B2B web forms capture all the qualifying data you need from inbound prospects? Neither do ours. That’s why we’ve compiled a PDF guide highlighting the best ways to get all the prospect data you need, without lengthening your forms.
Tags : 
b2b, abm, account based marketing, account based sales, b2b marketing, lead generation, demand generation, marketing operations
    
LeadGenius
Published By: LeadGenius     Published Date: Sep 13, 2016
The most comprehensive guide to Account Based Marketing to date.
Tags : 
b2b, abm, account based marketing, account based sales, b2b marketing, lead generation, demand generation, marketing operations
    
LeadGenius
Published By: DocuSign     Published Date: Jul 25, 2016
This short video profiles the use of DocuSign in Insurance with a special focus on our customer’s customer. See first hand how DocuSign improves customer experience, maximizes ROI, and ensures compliance as the global standard for Digital Transaction Management in Insurance
Tags : 
    
DocuSign
Published By: IBM     Published Date: Jul 19, 2016
Learn how IBM Cognos Analytics incorporates many governed discovery features, with which business users can easily expose the underlying data modelling of existing reports and modify it to an individual or departmental requirements
Tags : 
ibm, ibm cognos analytics, analytics, business intelligence, business analytics
    
IBM
Published By: SnowFlake     Published Date: Jul 08, 2016
This EMA case study profiles the implementation of the Snowflake Elastic Data Warehouse, a new generation of cloud-based data warehouses, by Accordant Media. This document details significant tangible and intangible improvements and opportunities the Snowflake solution created for the Accordant Media infrastructure and analytical teams.
Tags : 
snowflake, media, data, technology, cloud-based data, best practices
    
SnowFlake
Published By: Qualys     Published Date: Jun 30, 2016
Few would argue with the statement that security is a top priority for IT departments at companies large and small today. Data is the currency of the digital age and the lifeblood of organizations, so strategies to protect corporate data are growing in importance and are now a topic of C-suite consideration. So with high-profile data breaches continuing to occur across industries, security leaders are revamping their strategies to keep pace.
Tags : 
security, cloud, cloud management, data security, it management
    
Qualys
Published By: Delta Risk     Published Date: Jun 07, 2016
Recent high profile, high impact cyber breaches at some of the largest financial institutions in the United States have highlighted the fact that boards of directors need to take an active role in the management of cyber risk. This Viewpoint offers the Delta Risk perspective on how boards should engage in the management of cyber security risks, stressing four priority activities.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Marketo     Published Date: Jun 06, 2016
Download this complimentary marketing automation buyer’s guide from TrustRadius, the most trusted research platform for business technology. This guide, which places Marketo in the Top Rated category, is based upon a distillation of 1,650 in-depth reviews of 20 leading marketing automation (MA) software products on TrustRadius. In it, you’ll get tips for succeeding with marketing automation and detailed profiles of each marketing automation platform from its end users.
Tags : 
marketo, marketing automation software, marketing
    
Marketo
Published By: Trapit     Published Date: Jun 02, 2016
To be successful, sometimes you need to be pointed in the right direction. That’s where our cheat sheet comes in. It answers your burning questions – like these: - Why do sales reps need social selling? - What are the ground rules for social selling? - How do you set up your social profiles to attract buyers? - How do you write tweets and LinkedIn updates that will spark engagement? - How do you find your buyers on social networks?
Tags : 
social selling, customer aquisition, trapit, social selling programs, content strategies
    
Trapit
Published By: Forcepoint     Published Date: May 16, 2016
The financial and legal ramifications of the high-profile cyber-incidents that happened in the past year send an unmistakable message: data theft is too important for a board of directors not to be involved. The “Cybersecurity and Data Theft Prevention” report provides a non-technical overview every board of directors can use to assess their organization’s security posture.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks
    
Forcepoint
Published By: Delphix     Published Date: May 03, 2016
High-profile data breaches continue to make headlines as organizations struggle to manage information security in the face of rapidly changing applications, data centers, and the cloud. Against this backdrop, data masking has emerged as one of the most effective ways to protect sensitive test data from insider and outsider threats alike. While masking is now the de facto standard for protecting non-production data, implementing it alongside virtual data technologies has elevated its effectiveness even further.
Tags : 
    
Delphix
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.