ami

Results 301 - 325 of 2644Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Aug 26, 2016
Thanks to numerous, headline-making incidents in recent years, cybercrime has risen toward the top of the concern list for many organizations—and the customers with whom they do business.
Tags : 
     CA Technologies
By: Panasonic Business Mobility Solutions     Published Date: Sep 08, 2016
Today there’s no such thing as “one size fits all” when it comes to enterprise mobile computing for field services workers. While the business benefits of automation are clear (e.g. decreased downtime, increased customer satisfaction), selecting the right mobile device mix for the job is becoming more complex. This whitepaper examines three challenges organizations face when considering a mobile device deployment for field workers: 1. Integrating new mobile devices with legacy technology 2. Adapting to multi-generational workforces 3. Choosing the right mobile device for the job. Learn how to tackle these challenges and make technology decisions that improve worker productivity and help manage costs.
Tags : mobile workforce, laptops, tablet, mobile computing, productivity, rugged, mobile handheld, mobile scanner
     Panasonic Business Mobility Solutions
By: Panasonic Business Mobility Solutions     Published Date: Nov 15, 2016
As the food industry races to comply with the FDA Food Safety Modernization Act (FSMA), manufacturers are working to adopt more robust track and trace processes. A critical component to achieving compliance is the integration of automated data capture solutions throughout all stages of food production—from farm to table. This whitepaper examines technology considerations food manufacturers should weigh when implementing these systems, along with how to tackle the subsequent challenges that are sure to arise. Once the U.S. food industry understands how mobile solutions can enable track & traceability, manufacturers will be equipped with an efficient solution that not only helps to achieve regulatory compliance, but also improves overall business efficiencies.
Tags : 
     Panasonic Business Mobility Solutions
By: Zendesk     Published Date: Jan 03, 2019
Upgrades, upgrades, upgrades. Everyone is making them and so you ask yourself: Should your business upgrade systems, too? It seems like there’s always a newer version or better software out there. Yet while implementing new and improved systems can help your business scale and save your company money, it’s important to know whether new software is worth the transition. Zendesk recently commissioned Forrester Consulting to conduct a study that evaluated the financial impact of Zendesk on organizations. Forrester interviewed five customers and conducted a financial analysis. In this study, Forrester lays out the benefits and costs of Zendesk’s family of customer service products, with the analysis pointing to benefits of more than $3.8 million.
Tags : 
     Zendesk
By: LifeWorks     Published Date: Dec 04, 2018
Employee assistance programs (EAPs) are moving beyond the traditional idea of being a work-based intervention program solely aimed at resolving employees’ personal problems. Nowadays, EAPs are preventative by nature. They provide important work life resources like counselling, coaching, guidance, and financial and legal support for employees and family members. The focus has expanded from personal problems to overall well-being.
Tags : 
     LifeWorks
By: Oracle APAC     Published Date: May 24, 2018
Cloud has become a crucial foundation for digital transformation (DX) initiatives and is shaping the IT strategy of enterprises today. Companies are extending their IT infrastructure into the cloud for running business-critical applications, developing new applications, and delivering new cloud-based services. Applications are the lifeblood of modern enterprises. They are the foundation on which businesses maintain their existing revenue streams while examining ways to create new ones. A sound application strategy is a must for frms to be successful in expanding their competitive differentiation in the digital economy. Operating systems (OSs) provide a common foundational layer that enables IT to run current and new generations of applications in traditional IT environments, on its own private cloud, and in public clouds and utilize a variety of computing options such as bare metal, virtualization, and containerization. The increased reliance of IT on the cloud has accelerated the
Tags : 
     Oracle APAC
By: CA Technologies     Published Date: Apr 06, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
     CA Technologies
By: Silver Peak     Published Date: Apr 12, 2016
This white paper reveals how with an SD-WAN, enterprises can improve the resiliency of their WAN, dynamically balance traffic across multiple paths and increase application performance.
Tags : wan, connectivity, wide area network, data, sd-wan
     Silver Peak
By: Skillsoft     Published Date: Apr 27, 2015
This paper examines five important factors to consider when designing and implementing a Health & Safety Compliance training programme.
Tags : workplace safety programme, training, safety, heatlh, heath and safety, compliance, workplace safety programme, compliance training programme
     Skillsoft
By: Skillsoft     Published Date: May 19, 2015
This paper shows how companies may be overlooking is how quickly the landscape is changing—and how this dynamic shift can affect corporate compliance initiatives.
Tags : business corruption, complaince training, skillsoft, anti-corruption training, employee corruption training, changing landscape of corruption
     Skillsoft
By: Juniper Networks     Published Date: Oct 25, 2017
My name is Jonathan McCaffrey and I work on the infrastructure team here at Riot. This is the first post in a series where we’ll go deep on how we deploy and operate backend features around the globe. Before we dive into the technical details, it’s important to understand how Rioters think about feature development. Player value is paramount at Riot, and development teams often work directly with the player community to inform features and improvements. In order to provide the best possible player experience, we need to move fast and maintain the ability to rapidly change plans based upon feedback. The infrastructure team’s mission is to pave the way for our developers to do just that - the more we empower Riot teams, the faster features can be shipped to players to enjoy.
Tags : technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
     Juniper Networks
By: Juniper Networks     Published Date: Oct 25, 2017
Hey all, this is David Press and Doug Lardo, two engineers working on improving the data center networking that enables online services at Riot. This article is the third part in a series on exactly that topic, which begins with an overview from Jonathan of a platform we called rCluster. This time we’ll be discussing our approach to Software Defined Networking (SDN), how we integrate SDN with Docker, and the new infrastructure paradigms that this combination has unlocked for us. If you’re curious about how SDN can transform infrastructure, how to empower developers to obtain and secure networking resources via an API, or how to get out of purchasing larger and larger specialized networking appliances, this article is for you.
Tags : technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
     Juniper Networks
By: Adobe     Published Date: Feb 20, 2014
U.K. planning and design consultancy creates sustainable, dynamic, and progressive places for people to live, work, and play by standardizing on Adobe solutions.
Tags : adobe, adobe creative cloud, standardization, collaboration, tco, total cost of ownership, enterprise agreement, software deployment, license management, productivity, document security, compliance, industry regulations, file management, document management, software development
     Adobe
By: Adobe     Published Date: Apr 22, 2016
This guide is intended for creative marketing and business leaders who recognise that the current technologies and processes that support marketing cannot scale with the demand for dynamically relevant, personalised brand experiences. DAM is about more than storage. It’s a strategic enabler of digital transformation.
Tags : marketing, return of investment, roi, digital marketing, online marketing, brand experiences, customer experience
     Adobe
By: Adobe     Published Date: Apr 25, 2016
Ce guide est destiné aux chefs d’entreprise et aux directeurs du marketing créatif qui reconnaissent que les technologies et processus actuels à la base du marketing ne sont pas en mesure d’évoluer avec la demande pour produire dynamiquement des expériences pertinentes et personnalisées. Le DAM n’est pas seulement une solution de stockage. Il s’agit d’un outil stratégique de transformation digitale.
Tags : marketing, customer experience
     Adobe
By: Adobe     Published Date: Oct 05, 2016
Forbes Insights examined the ongoing transformation of HR through in-depth interviews with a number of senior executives and experts in North America and Europe, as well as third-party research.
Tags : 
     Adobe
By: Adobe     Published Date: Oct 05, 2016
Forbes Insights examined the advantages of e-signatures through in-depth interviews with a number of senior executives and experts in North America and Europe, as well as third-party research.
Tags : sales performance, sales, e-signatures, document management, security, mobility
     Adobe
By: Adobe     Published Date: Mar 21, 2017
This paper examines the ongoing transformation of HR through in-depth interviews with a number of senior executives and experts in North America and Europe, as well as third-party research.
Tags : 
     Adobe
By: ForeScout     Published Date: Mar 26, 2014
The report presents a tiered service approach to enterprise mobile security while exploring how NAC and MDM as complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures. The report also examines ForeScout's mobile security offering and presents relevant use cases.
Tags : forescout, cyberedge, cyberthreat, it security, byod, nac, mdm, reduce security, compliance exposures, mobile security, security, enterprise applications
     ForeScout
By: Mimecast     Published Date: Oct 17, 2013
Mimecast commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) global enterprises may realize by using Mimecast’s Unified Email Management (UEM) solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the full Mimecast UEM service on their organizations. Mimecast UEM is a suite of email security, archiving, and continuity services, which can also be purchased separately if required.
Tags : mimecast, forrester research, unified email management, uem, economic impact, return on investment, roi, evaluate financial impact, reduce complexity, costs of managing email, email management, email infrastructure, email backup, replication cost avoidance, business continuity, legacy security solutions, productivity gains
     Mimecast
By: Riverbed     Published Date: Jul 17, 2013
To deliver IT performance, you need complete visibility. Riverbed Cascade offers a superior network performance management solution for discovering, monitoring and troubleshooting your network and your critical applications. Now you can resolve performance problems before they impact the business, while lowering your IT management costs. Cascade has an elegant and simple design that deploys easily in complex environments and provides true integration across the Cascade family. This cleaner architecture means superior visibility, management and troubleshooting, saving our customers both capex and opex. According to IDC, Cascade customers typically experience an 83% reduction in mean time to resolution (MTTR)
Tags : it performance, cascade, riverbed cascade, riverbed, it management, mttr, idc
     Riverbed
By: Riverbed     Published Date: Jul 17, 2013
See exactly how applications and new technology are performing on your network. Download our Cascade Family brochure. Then watch a short 6-minute animated demo that shows primary business issues Cascade can help you conquer.
Tags : network, performance, network performance, cascade, riverbed, cascade family
     Riverbed
By: Riverbed     Published Date: Jul 17, 2013
Enterprises are rapidly adopting virtualization for dynamic service delivery and service management agility. IT challenges already exist in virtual environments and will only be exacerbated with the higher adoption of virtualization. The ability to proactively monitor traffic within these environments is critical for enabling predictable and reliable delivery of applications and for troubleshooting diverse IT infrastructures. Read this white paper to learn more.
Tags : traffic, virtualization, it infrastructures
     Riverbed
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com