assessing

Results 101 - 125 of 138Sort Results By: Published Date | Title | Company Name
By: Tripwire     Published Date: Jul 08, 2008
The Tripwire Enterprise solution provides organizations with powerful configuration control through its configuration assessment and change auditing capabilities. In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. This provides immediate visibility into the state of their systems, and through automating the process, saves time and effort over a manual efforts.
Tags : tripwire, iso, iso 27001, security, compliance, comply, isms, information security
     Tripwire
By: IBM     Published Date: Oct 12, 2016
Read this IDC analyst report to see how you can meet your digital business requirements with IBM Digital Experience on Cloud.
Tags : ibm, commerce, digital experience, idc, business value, ibm digital experience on the cloud, networking, enterprise applications
     IBM
By: IBM     Published Date: Jul 17, 2018
Ensuring your data is compliant can be a fairly straightforward task. Your IT team works their way through the checklist, and stays out of trouble with lawyers and regulatory agencies. There’s value to that. But true data protection is more than regulatory compliance. In fact, even if you’re compliant, your organization could still be at risk unless you strategically identify and protect your most valuable data. Traditionally, you’ve been presented with IT security metrics—sometimes reassuring, other times alarming. But simply reviewing IT security metrics is not meaningful in and of itself. As an executive, you don’t evaluate issues in siloes. Instead, you excel at assessing issues in the broader context of your organizational operations. In other words, technical security data and metrics lack value unless viewed through the lens of business risk. When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I
Tags : 
     IBM
By: Cisco     Published Date: Jul 11, 2016
CTOs, CIOs, and application architects need access to datacenter facilities capable of handling the broad range of content serving, Big Data/analytics, and archiving functions associated with the systems of engagement and insight that they depend upon to better service customers and enhance business outcomes. They need to enhance their existing datacenters, they need to accelerate the building of new datacenters in new geographies, and they need to take greater advantage of advanced, sophisticated datacenters designed, built, and operated by service providers. IDC terms this business and datacenter transformation the shift to the 3rd Platform.
Tags : 
     Cisco
By: Cisco     Published Date: Sep 16, 2015
There is a need to address key business and technological transitions in terms of application delivery and consumption. As such, data center managers are assessing what new capabilities their existing networks needs.
Tags : applications, systems integration, cloud, development
     Cisco
By: Cisco     Published Date: Dec 21, 2016
CTOs, CIOs, and application architects need access to datacenter facilities capable of handling the broad range of content serving, Big Data/analytics, and archiving functions associated with the systems of engagement and insight that they depend upon to better service customers and enhance business outcomes. They need to enhance their existing datacenters, they need to accelerate the building of new datacenters in new geographies, and they need to take greater advantage of advanced, sophisticated datacenters designed, built, and operated by service providers. IDC terms this business and datacenter transformation the shift to the 3rd Platform.
Tags : 
     Cisco
By: HP Enterprise Services     Published Date: Mar 24, 2014
Today’s complex, rapidly changing IT environments require dynamic continuity programs. Your peers are reassessing both the service provider model and the internal alternative for business continuity. It’s time to learn the ins and outs of enterprise-class cloud-based continuity. Examine how traditional IT operations can be recovered to the cloud. Explore the requirements of the disaster-recovery-as-a-service model. Understand the key issues to evaluate when considering a cloud-oriented approach to disaster recovery.
Tags : disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, security, data center
     HP Enterprise Services
By: Trapit     Published Date: Jun 02, 2016
In this book, you will find tips on: - Understanding your objectives and assessing your team's readiness - Assigning roles for your program - Developing a content strategy for sales - Training your team - Assessing your social selling program's progress
Tags : social selling, customer aquisition, trapit, social selling programs, content strategies
     Trapit
By: Clicktale     Published Date: Feb 25, 2016
As marketers, we rely on metrics as basic tools for assessing success and failure. But marketers are also website visitors who instantly recognize poor customer experiences when they occur. Perhaps you tried to purchase a sweater online, book an urgent flight or send a bouquet of flowers, but the website was not up to par.
Tags : marketing, business development, website development, sales, business practices
     Clicktale
By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
     Cisco
By: DocuSign     Published Date: Apr 24, 2018
"In April 2016, the Department of Labor (DOL) released its final rule regarding financial and fiduciary disclosures. Many firms are in the early stages of assessing the rule’s impact, sorting through legal interpretations, and preparing for regulatory compliance. To understand who’s affected, what’s changed, and the impact to your business, read the white paper to learn how DocuSign can help you digitize your document agreements and: • Satisfy compliance requirements by enabling you to automate disclosures with a tamper-proof audit trail. • Delight your customers by providing a greatly improved user experience compared to paper-based document transactions. • Meet critical deadlines with rapid implementation using DocuSign’s SaaS-based solution."
Tags : 
     DocuSign
By: Ring Central     Published Date: Mar 21, 2016
This Network Guide explains the challenges, benefits, and unknowns of replacing dated technology.
Tags : ring central, cloud phone service, communications, network, cloud, enterprise applications
     Ring Central
By: Thawte     Published Date: Jan 19, 2016
Download this visual reference guide to see why a highly reputable certificate authority like Thawte, the original international specialist in online security, gives you the credibility that your customers are looking for when assessing your website, no matter what sort of SSL certificate you choose.
Tags : 
     Thawte
By: Bronto     Published Date: Sep 09, 2013
Are you constantly jumping from project to project with barely enough time to breathe? When continually pressed for time, how do you efficiently and effectively measure your email marketing programs? This concise and practical guide can help.
Tags : email marketing performance, strategic email marketing
     Bronto
By: Act-On     Published Date: Aug 18, 2014
A Gleansight Deep Dive assessing the benefits and tradeoffs for the small-and-medium-size business. Should you consider transitioning from using a stand-alone email marketing solution to a full-blown marketing automation platform? What are the tradeoffs between the two technologies?
Tags : 
     Act-On
By: Schneider Electric     Published Date: Jun 07, 2019
Attracting Investors Webinar: With more than $18 billion in M&A activity in the first half of last year alone, the colocation industry is riding the bubble of rapid growth. Colocation data center providers are being evaluated by a wide range of investors, with varying experience and perspectives. Understanding the evaluation criteria is a critical competency for attracting the right type of investor and investment to your colocation business. Steve Wallage, Managing Director of Broad Group Consulting, has led more than 30 due diligence projects and will discuss specific areas of focus including assessment of financials, management, customers, business plan, competitive positioning and future strategy and exit. By attending this presentation colocation providers will: Hear how investors are assessing colocation providers Understand different types of investor strategy and positioning Explore actual case studies –success stories as well as examples where investors walked away Walk away with a greater understanding of how to not only attract investment, but the right type of investor to propel their business growth
Tags : investors, schneider electric, - colocation provider, attracting investors, colo data center
     Schneider Electric
By: IBM     Published Date: Sep 18, 2008
Powering your IT hardware often costs more than double the price of the actual machine. While this fact alone motivates businesses to build more energy efficient data centers, IBM's Project Big Green details the additional operational and social benefits for businesses. Read more on IBM's holistic approach to reducing your IT energy use to save you money.
Tags : ibm, network management, networking, green, green computing, green datacenter, green data center, data center
     IBM
By: IBM     Published Date: Mar 17, 2009
CPDA’s Product Lifecycle Management (PLM) research programs target the critical decisions in Product Lifecycle Management challenging Design, Engineering, Manufacturing, and Information Technology managers and executives. CPDA’s PLM collaborative research programs provide indepth analysis of strategies, products, issues, processes, technologies, trends, case studies, and surveys for assessing technology, business goals and objectives, and implementation road maps.
Tags : ibm, telelogic, addressing future automotive needs, model-driven systems, product value management, plm, computer-aided design, cad
     IBM
By: Spectra Logic     Published Date: Aug 21, 2009
To put it simply, data protection is complicated. Simplifying it involves assessing solutions for their near-term and long-term value. This paper examines the less obvious- but not less important - issues in simplifying backup.
Tags : backup, data protection, back-up, tape-based backup, tape backup, disk-based backup, disk backup, simple backup
     Spectra Logic
By: CCSS     Published Date: Jul 05, 2007
Is a lack of availability costing your business thousands or even hundreds of thousands of dollars? Assessing the true financial impact of unplanned downtime may surprise you. Placing a dollar amount on this issue is often the first step and biggest motivator to meeting your ongoing availability requirements.
Tags : availability, high availability, business continuity, network monitoring, server monitoring, down time, ccss, availability monitoring
     CCSS
By: Aconex     Published Date: Jun 18, 2008
In the construction industry, as in business generally, risk management involves identifying risks, assessing them and then developing strategies to manage them. Organizations that manage risk well enjoy financial savings, greater productivity and service quality, improved success rates of new projects and better decision making. It is clear that, in today's complex business environment, risk factors are wide reaching, and are intrinsically linked to achieving organizational objectives.
Tags : risk management, collaboration, web collaboration, web-based collaboration, aconex
     Aconex
By: IBM Software     Published Date: Oct 05, 2010
Read how Business analytics investments are more important than ever for business competitiveness and profitability and are becoming increasingly essential to maximize a company's return on investment.
Tags : ibm cognos, business analytics, business intelligence, bi investment, analytical methods, business planning, data analysis
     IBM Software
By: Symantec     Published Date: Jul 30, 2013
In this whitepaper we will discuss what to look for in a virtualization protection solution as well as consider the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. Download for more information.
Tags : architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization
     Symantec
By: HP     Published Date: Dec 04, 2012
IDC forecasts the worldwide enterprise network equipment market will reach $42.6 billion in revenue in 2012.
Tags : bussiness value, unified, mobility, video, reduced costs, availability, platforms, data management
     HP
Start   Previous    1 2 3 4 5 6    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com