dam

Results 501 - 525 of 856Sort Results By: Published Date | Title | Company Name
By: Recorded Future     Published Date: Apr 18, 2019
This white paper outlines current approaches to implementing SIEM and enriching security products with threat intelligence.
Tags : 
     Recorded Future
By: Oracle     Published Date: Nov 16, 2017
The fundamental reasons to move to a cloud computing environment are the business agility, high efficiency, scalability, and availability that the pooling of elastic computing resources provides, along with significant cost reductions and support for business growth. Oracle has invested deeply in developing a broad collection of cloud services with solutions at every layer of the technology stack.Customers who deploy these solutions in Oracle Cloud derive huge benefit from the fact that they have access to Oracle’s entire technology stack in the cloud, just as they did in on-premises deployments. This white paper explains how you, as an existing Oracle E-Business Suite customer, can take advantage of cloud computing right now, by exploiting the capabilities of Oracle’s Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) offerings to support growth, enhance business agility, and reduce costs and risks.
Tags : 
     Oracle
By: SDL Web Content Management Solutions     Published Date: Jan 22, 2010
This white paper provides examples of how organizations can use BluePrinting technology to achieve a smooth, global Web operation-and explains how organizations can combine Content Management technology with translation technologies for even greater efficiency.
Tags : sdl tridion, a/b, crm, ecm, blueprinting, flysn, wcm, dam, websites, translation
     SDL Web Content Management Solutions
By: SDL Web Content Management Solutions     Published Date: Jun 01, 2009
Forrester evaluated 11 leading Web content management (WCM) vendors across 190 external site content management and delivery criteria and found that European vendor SDL Tridion has established clear leadership in enabling organizations to manage and deliver persuasive content customer experiences.
Tags : sdl tridion, a/b, crm, ecm, dam, wcm, web content management, multisite functionality
     SDL Web Content Management Solutions
By: SDL Web Content Management Solutions     Published Date: Jan 22, 2010
This paper examines the ways in which organizations can tap into Web 2.0 interaction as part of the marketing strategy and tactics to create customer engagement by matching your visitors' passion and to figure out the "best fit" for the new opportunities that present themselves.
Tags : sdl tridion, a/b, crm, ecm, web 2.0, social networks, dam, wcm, web content management, wcm, customer experience
     SDL Web Content Management Solutions
By: Oliver Russell     Published Date: Oct 05, 2009
Can you name the 7 Deadly Sins of B2B Direct Marketing? Are you committing them? This entertaining and educational epistle written for B2B marketing disciples will describe the seven most damning mistakes made in B2B Direct Marketing, and identify the pathway to glorious B2B salvation.
Tags : oliver russell, measurability, b2b, b2b marketer, direct marketing, b2b direct marketing
     Oliver Russell
By: Genesys     Published Date: Jun 19, 2019
Contact center technology plays a major role in the success of your customer experiences and business operations. Having the optimal solutions, infrastructure and provider in place are fundamental to meeting current and future goals and expectations. If you’re struggling with outdated contact center systems that limit channels and customer information, the best path forward is to migrate to a solution that lets you overcome those technology limitations. And the first step is to download this comprehensive checklist to evaluate key solutions and vendor considerations. You’ll learn how to: Identify business goals and outcomes that are most important for your organization Evaluate deployment options based on necessary flexibility and capabilities Understand your technology needs and priorities Assess vendor viability
Tags : 
     Genesys
By: Amazon Web Services     Published Date: Jun 02, 2017
451 Research ist ein herausragendes IT-Forschungs- und Beratungsunternehmen. Mit der Gewichtung auf technologischer Innovation und Marktstörung liefert es wichtige Erkenntnisse für führende Unternehmen der digitalen Wirtschaft. Mehr als 100 Analysten und Berater stellen diese Erkenntnisse durch syndizierte Forschung, Beratungsdienste und Live-Events für über 1.000  undenorganisationen in Nordamerika, Europa und auf der ganzen Welt bereit. 451 Research wurde im Jahr 2000 mit Hauptsitz in New York gegründet und ist ein Geschäftsbereich von The 451 Group.
Tags : cloud, cloud platform, amazon, aws, microsoft
     Amazon Web Services
By: McAfee EMEA     Published Date: Nov 15, 2017
Time has become a critical capability in being able to extract the business value enterprises want from their data and computing infrastructure, as well as to protect the business value that has already been created. In multiple areas of cyber security, time is currently working in favor of the attackers — and time is the strategic advantage that the defenders need to regain. In this report, Aberdeen Group provides four illustrative examples of how recapturing an advantage of time can help defenders to reduce their risk, in the fundamental categories of data protection, threat detection and incident response, data center / cloud security, and endpoint security.
Tags : cyber, security, defenders, business value, infrastructure, data, business, protection
     McAfee EMEA
By: McAfee EMEA     Published Date: Mar 20, 2018
Bedrohungsvektoren entwickeln sich stetig weiter. In dieser Situation müssen IT-Sicherheitsentscheider effektive Lösungen für die Sicherheit von Endgeräten finden. Bei mehr als zwei Drittel der Unternehmen wurden im vergangenen Jahr sensible Daten kompromittiert. Die Reaktion auf solche Vorfälle ist mit großem Zeit- und (manuellem) Arbeitsaufwand verbunden – und selbst damit lassen sich die Probleme häufig nur für einen Teil der Endgeräte lösen. Sicherheitsentscheider wünschen sich deshalb integrierte Lösungen, die bei allen eingesetzten Endgerätetechnologien für mehr Effizienz, Übersicht und Schutz sorgen. Im Januar 2017 beauftragte McAfee Forrester Consulting, gängige Tools und Strategien für das Endgeräte-Sicherheits-Management sowie deren wahrgenommene Effektivität zu evaluieren.
Tags : 
     McAfee EMEA
By: Adobe     Published Date: Jun 29, 2012
Customers and employees are becoming increasingly empowered by social technologies. This change is dramatically changing the way they communicate and collaborate. Find out how to succeed in this new social world by making fundamental changes to resources, skills, tools, processes, and culture.
Tags : marketing, forrester, social media, digital marketing, emerging marketing, social maturity
     Adobe
By: Darktrace     Published Date: Apr 02, 2019
The current era in cyber security is characterized by three fundamental challenges: the complexity of the enterprise network and connected infrastructure, the speed of newage attacks, and the strain of overwhelmed incident responders. In many ways, the expansion of networks and continual adoption of new technologies - from cloud services to the Internet of Things - has expanded the attack surface and introduced new entry-points through which attackers can gain a foothold. This, combined with the ready availability of exploit kits on the Dark Web, has led to the ‘vicious circle of the SOC’, where incident responders are so busy fire-fighting that they rarely have time to implement the critical patches that would prevent the problem at source. As security teams struggle to keep up with the rising volume of routine attacks, a new generation of cyberthreat has also emerged, characterized in large part by fast-moving threats that make an impact well before humans have time to respond. Thes
Tags : 
     Darktrace
By: Darktrace     Published Date: Apr 02, 2019
This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks. While all threat scenarios were distinct, some fast-moving and others slow and stealthy, in all cases the subtle indicators of suspicious activity were only detectable using Darktrace AI, which learns what is normal for the business environment and autonomously responds to attacks – before damage is done.
Tags : 
     Darktrace
By: Javelin Strategy & Research     Published Date: Jul 02, 2008
Javelin Strategy & Research has released a study covering data breach victims, which highlights the acute awareness among consumers about data security and the significant implications security breaches represent to businesses once consumer trust is compromised. Read this report, which also reveals Javelin's recommendations to institutions to address consumer security concerns and expectations in the event of a data breach.
Tags : javelin, debix, customer service, customer experience, damage control, data breach, security breach
     Javelin Strategy & Research
By: DataMotion     Published Date: Oct 20, 2008
Almost every task one performs at work includes the exchange of information in one form or another and much of that is exchanged via email and its attachments. Yet too many enterprises view e-mail as a mature technology that simply accomplishes a rather mundane but necessary task, taking e-mail for granted. They rarely seek to leverage it beyond its most fundamental function. However, the messaging services that form the basis of e-mail are far more valuable than the e-mail itself, and can be used innovative ways to save time and money in our every day tasks. Download to learn more.
Tags : certifiedmail, datamotion, microsoft exchange, security, e-mail security, maintenance
     DataMotion
By: Dell Windows Server     Published Date: Jan 16, 2009
The Dell EqualLogic™ PS Series is fundamentally changing the way enterprises think about purchasing and managing storage. Built on breakthrough virtualized peer storage architecture, the EqualLogic PS Series simplifies the deployment and administration of consolidated storage environments.
Tags : dell, dell equallogic, virtual storage, storage management, storage purchase, peer storage architecture, consolidated storage environments, storage
     Dell Windows Server
By: Compuware     Published Date: Jul 20, 2010
Cloud computing is driving a fundamental shift in the way organizations build, deploy and use applications, and it's raising expectations on how quickly and cost-effectively new IT functionality can be made available to the business.
Tags : compuware, cloud, computing, borderless applications, diversity chain, on-demand, virtualization
     Compuware
By: SAS     Published Date: Jun 26, 2019
To support open government initiatives and uphold the values of transparency, participation and collaboration in the US, federal agencies today make their data open, or publicly accessible. Citizens can use this open data to assess college affordability, the economy, educational issues, environmental damage, health care, taxes, agriculture, the climate and more. Governments can use APIs to pull this open data into SAS Visual Analytics as a way to identify trends and patterns and obtain all sorts of new insights. With public health surveillance, for example, governments can monitor and evaluate indicators that point to high-risk areas so they’ll know where and how to focus efforts. Such public health surveillance can serve as an early warning system for impending emergencies, document the impact of an intervention, track progress toward public health goals, and clarify health problems to inform public health policies and strategies.
Tags : 
     SAS
By: Okta     Published Date: Feb 24, 2015
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Identity management problems such as controlling who is granted access to which applications and data and how to control access to these applications leveraging on premise directories such as Active Directory, have become increasingly important. Single Sign-On and user management solutions that are optimized for the cloud are necessary to help address these challenges. This whitepaper presents the eight biggest identity and access management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them.
Tags : identity and access management, saas applications, single sign-on, active directory, management solutions
     Okta
By: Okta     Published Date: Aug 12, 2015
With the exploding adoption of software-as-a-service (SaaS) applications, enterprise IT is fundamentally changing. While on-demand services provide tremendous ROI, they also introduce new challenges that must be overcome to truly capitalize on their potential. Read this report to learn the 8 most common IAM challenges.
Tags : 
     Okta
By: EMC Corporation     Published Date: Mar 20, 2014
This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident. It provides a framework to help organizations determine where they are in the security journey and where they want to be.
Tags : emc, incident response, malware detection, security journey, reduce risk, improve security, security
     EMC Corporation
By: Achievers     Published Date: Jan 17, 2014
Today’s workforce is fundamentally changing. Organizations are flatter, more agile, and require even better retention strategies. HR professionals and business leaders agree on the importance of attracting, retaining, and cultivating top talent. An employee rewards and recognition program that has the buy-in and support of business leaders can transform your corporate culture, making your organization a great place to work, building your brand as a top employer, delighting your customers with your service, and reaping the financial benefits that come from Employee Success. Download this white paper, Obtaining executive buy-in for recognition programs, and obtain best practices to sell the vision of a rewards and recognition program to your CFO.
Tags : employee success, employee recognition, employee engagement
     Achievers
By: Dell     Published Date: Mar 02, 2012
By now the fundamentals of computer and network security are familiar to almost everyone who interacts with a PC on a regular basis: install antivirus software, choose good passwords and protect them and download and install software updates. Despite these measures, businesses of all sizes continue to suffer security breaches.
Tags : dell, mobile data, mobile devices, smartphones, it planning, technology, it management, small business, technology trenfs
     Dell
By: Egencia     Published Date: Aug 04, 2014
Over the past decade, procurement fundamentals have redefined travel management. As the industry refreshes its position on traveler satisfaction, however, travel management and procurement concepts find a new balance in best-in-class programs.
Tags : egencia, modern travel management, business travel, managing expenses, travel dollars, travel policy, enterprise applications
     Egencia
By: Kaseya     Published Date: Mar 12, 2015
The risks of irregular maintenance and non-compliance of IT and security policies can cost the organization much in terms of fines, lost opportunities and a damaged reputation. With such a serious and complex challenge, employing an efficient and comprehensive solution is paramount to minimize risk and instill confidence in the organization’s ability to fulfill on its compliance requirements.
Tags : it systems, systems management, financial institutions, banking sector, compliance hurdles
     Kaseya
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com