dam

Results 701 - 725 of 904Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Jun 13, 2018
The General Data Protection Regulation (GDPR) takes effect May25, 2018. If you process European Union (EU) personal data, GDPR likely applies to you—even if you’re not in the EU. That’s because the regulation is truly global in scope and applies to any organization that processes EU personal data, irrespective of where the companies are based or where the data is processed. At its heart, the GDPR legislation is about ensuring privacy is respected as a fundamental right and that personal data is kept private and secure. Elizabeth Denham, of the EU Information Commissioner Office (ICO), says “This law is not about fines. It’s about putting the consumer and citizen first” and “Issuing fines has always been and will continue to be, a last resort.” However, it’s important to note the costs of noncompliance can be severe. These can include a fine of up to 4 percent of global turnover (revenues) or €20m, whichever is higher; a temporary or permanent suspension of the right to access or proce
Tags : 
     Symantec
By: IBM     Published Date: Oct 02, 2015
Like kids in a candy store, cybercriminals can’t wait to get their hands on your company's confidential information. You need security tools that detect the latest threats before they can cause damage. This paper explains how a security intelligence platform can offer you immediate protection and help you scale for the future. In addition to helpful illustrations, the paper includes short case studies from 3 organizations.
Tags : case studies, security intelligence, cyber crime, cyber criminals, security tools, security intelligence platform, ibm security, security, it management
     IBM
By: IBM     Published Date: Apr 04, 2016
When a cyber-attack occurs, you can’t fix what you can’t see. IBM BigFix employs a single agent on endpoints - internal or external, roaming or in a fixed location - for a real-time view that allows you to see vulnerabilities and threats, and instantly take action to avoid damage.
Tags : ibm, ibm bigfix, risk management, data security, security, enterprise applications
     IBM
By: IBM     Published Date: Jul 15, 2016
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance.
Tags : ibm, data, security, virtualization, data management
     IBM
By: IBM     Published Date: Jul 15, 2016
When a cyber-attack occurs, you can’t fix what you can’t see. IBM BigFix employs a single agent on endpoints - internal or external, roaming or in a fixed location - for a real-time view that allows you to see vulnerabilities and threats, and instantly take action to avoid damage.
Tags : cyberattack, ibm, security, access protection
     IBM
By: IBM     Published Date: Sep 30, 2016
Data is the lifeblood of today’s digital businesses; protecting it from theft, misuse, and abuse is the top responsibility of every S&R leader. Hacked customer data can erase millions in profits, stolen IP can destroy competitive advantage, and unnecessary privacy abuses can bring unwanted scrutiny and fines from regulators while damaging reputations. S&R pros must take a data-centric approach that ensures security travels with the data regardless of user population, location, or even hosting model; position data security and privacy capabilities as competitive differentiators; and build a new kind of customer relationship.
Tags : ibm, security, data, privacy, forrester, forrester research, data management
     IBM
By: IBM     Published Date: Jun 05, 2018
Keeping up with ever changing contract management work is challenging. Governing legal and procurement content is written by thousands of people and applied to hundreds of situations. To stay compliant, organizations employ knowledgeable professionals to analyze every sentence to determine the changes that need to be made to company contracts. The manual process of sifting through these dense, complicated documents is inefficient and prone to error. Watson Compare and Comply is trained on contract specific knowledge and classifications and can streamline contract workflows through semantic understanding. Join Director of Watson Offering Management, Adam Orentrichler, and Chief Data Scientist of SAP Ariba, David Herman, as they discuss how Watson can transform the way your company manages contract governance.
Tags : 
     IBM
By: OneSource     Published Date: Jan 07, 2010
Technology and improved access to information is making selling both harder, and easier. Our increased "connectedness" offers opportunities for the innovative, insightful, and motivated sales professional to shine. In this white paper we'll talk about what lies beyond Sales 2.0: how to marry the "best of the fundamentals" with sales enablement and social media.
Tags : one source, sales 2.0, social media, enablement, sales tools, crm, selling power, engagement
     OneSource
By: Cisco     Published Date: Jul 11, 2016
This edition of Unleashing IT showcases the groundswell of momentum surrounding Cisco® Application Centric Infrastructure (Cisco ACI™), which fundamentally transforms the way technology is delivered in support of business priorities. Hundreds of organizations are already using the year-old architecture, and we could not have achieved such rapid and widespread adoption without the enthusiasm and support of Intel®, our networking and application partners, and customers.
Tags : 
     Cisco
By: IBM     Published Date: Apr 27, 2017
It’s hard to grow your business if you can’t see what’s coming next. What will the demand be for a specific product or service and how should you adjust production? What revenue can be expected and from which channels? Where are the best areas to expand your business? Predictive analytics can provide the answers executives, analysts and business managers need to reduce costs, operate more efficiently and increase the bottom line. Join IBM SPSS and guest Mark Lack, Manager of Strategy Analytics and Business Intelligence with industrial products company Mueller Inc. for a look at how to decrease costs and improve your business’ profitability with predictive analytics. You’ll learn how Mueller extends the value of its Big Data environment by applying predictive techniques to accurately forecast sales, prevent fraud and reduce losses from damaged inventory, saving the company significant time and money.
Tags : predictive analytics, fraud detection, increase revenue, decrease costs, customer retention, hr efficiency, advanced analytics
     IBM
By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
     IBM
By: Point It     Published Date: Mar 02, 2009
Whether you’re an experienced marketing manager, or just starting your career, it’s imperative that you know the fundamentals of search engine marketing and optimization. If for no other reason, you certainly don’t want to let your boss know you’re a marketing dinosaur. This whitepaper details the top 10 myths and errors behind SEO.
Tags : point it, b2b search mistakes, seo, meta tags, meta keywords, crawl rate, pay per click, ppc
     Point It
By: Cornerstone OnDemand     Published Date: Feb 07, 2017
It’s a fact: when companies employ newer talent management tools, they see reduced hiring times and higher retention rates. But what features, tool, and apps should you look for when shopping for a next-gen talent management system? Download “How to Conquer Your First Talent Management Purchase” and learn: • The fundamentals of talent management software (and why you need it!) • How to make the talent management business case to key business units • What to look for in a talent management software provider • Why a “unified” system drives tangible workforce growth Check out this brief on how to conquer your first talent management purchase today!
Tags : 
     Cornerstone OnDemand
By: Unitrends     Published Date: Jun 15, 2010
In this document we're first going to explore the use of the insurance metaphor in terms of its most fundamental element: the broad consequences of data loss. We'll also discuss industry and regulatory consequences of data loss.
Tags : unitrends, backup, data protection, data quality, server, replication, data loss, sox
     Unitrends
By: Unitrends     Published Date: May 18, 2010
This tongue in cheek white paper explores data loss from a contrarian point of view - exploring the top 7 shortcuts you can take to ensure that you lose your data. And since a fundamental responsibility of any information technology professional, as well as any C-level executive, is to ensure that the data upon which any company is created is protected - scrupulously following these shortcuts should also ensure that you lose not only your data but your job as well.
Tags : unitrends, backup, data protection, data quality, server, replication, data loss, sox
     Unitrends
By: SAS     Published Date: Aug 28, 2018
Machine learning systems don’t just extract insights from the data they are fed, as traditional analytics do. They actually change the underlying algorithm based on what they learn from the data. So the “garbage in, garbage out” truism that applies to all analytic pursuits is truer than ever. Few companies are already using AI, but 72 percent of business leaders responding to a PWC survey say it will be fundamental in the future. Now is the time for executives, particularly the chief data officer, to decide on data management strategy, technology and best practices that will be essential for continued success.
Tags : 
     SAS
By: SAS     Published Date: Jan 30, 2019
Machine learning systems don’t just extract insights from the data they are fed, as traditional analytics do. They actually change the underlying algorithm based on what they learn from the data. So the “garbage in, garbage out” truism that applies to all analytic pursuits is truer than ever. Few companies are already using AI, but 72 percent of business leaders responding to a PWC survey say it will be fundamental in the future. Now is the time for executives, particularly the chief data officer, to decide on data management strategy, technology and best practices that will be essential for continued success.
Tags : 
     SAS
By: GoToMeeting     Published Date: Oct 11, 2011
Distributed work programs are one of the most effective ways of achieving badly-needed operational savings. To be effective, however, you need to know which practices and tools are most effective for managing remote staff. This new white paper addresses three fundamental management questions, explores key challenges of managing remote workers and provides best practices for setting up a successful remote work program.
Tags : citrix, technology, business. remote work program, management, employee
     GoToMeeting
By: GoToMyPC     Published Date: Apr 06, 2011
This Forrester white paper examines the rise in IT's prioritization of business continuity and disaster recovery (BC/DR) planning.
Tags : disaster recovery, business continuity, bc/dr, smbs, enterpriser risk management, data loss, damage control, crisis, security, ddos
     GoToMyPC
By: Cisco     Published Date: Nov 17, 2014
The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.
Tags : cloud-computing, malware, cisco, malware infection, amp, networking, security, it management, data management
     Cisco
By: Cisco     Published Date: Feb 17, 2015
Analyst brief brought to you by NSS Labs. Where the goal of cyberprevention has been to reduce the probability of an attack against the organization, cyber resilience looks to reduce the impact of these attacks through cyber risk management. A cyber resilience program still considers detection and prevention techniques, but it also assumes that a breach is likely. This stance emphasizes anticipation, agility, and adaptation. Not every attack can be prevented, but with a cyber resilience program, damage can be mitigated or avoided altogether.
Tags : cisco, nss, cyber, prevention, risk management, resilience, firewall, security, protection, epp, breach, cyberattack, operations, network
     Cisco
By: IBM     Published Date: Apr 17, 2013
IBM has used the Storwize architecture to produce multiple storage systems across different usage segments to meet different customer needs. The ability to scale with a common underlying architecture has proven to deliver multiple benefits to IBM customers. Features developed for high-end enterprise systems now meet customer needs in other, more price conscious segments. The leverage from a common base for systems helps reduce development and support costs which are reflected in product costs for customers. The Storwize architecture also builds on Intel-based hardware, which provides continued advances with each new generation yet retains the same fundamental architecture. Customers also benefit from a storage architecture that provides a consistent experience across multiple products and generations.
Tags : storwize, storage systems, benefits, high-end enterprise, intel-based hardware, customers, development
     IBM
By: SilverSky     Published Date: Mar 26, 2014
The average employee sends and receives about 110 emails each day or 29,000 emails per year. One in every 20 of those emails contains “risky” data – from sensitive attachments to social security numbers to protected health information to valuable corporate secrets that set your organization apart. All of this risky data can become toxic to your company if it’s hacked or suffers a breach – causing reputational damage, customer loss, heavy fines and decreased competitive edge. SilverSky’s Email DLP is powered by IBM technology. Download SilverSky’s Email DLP white paper to review the 5 strategies your organization should be doing to protect your email.
Tags : silversky, ibm, email, email data loss prevention, data loss prevention, email security, email dlp, information security, cloud solutions, compliance, deployment, encryption, it management, platforms
     SilverSky
By: Rackspace     Published Date: Jan 15, 2015
This white paper aims to help businesses address these fundamental questions, based on a Total Cost of Ownership (TCO) modeling methodology built from Rackspace’s extensive experience working with IT organizations of all sizes, in order to make an informed ROI assessment.
Tags : rackspace, outsource, tco, it spending, infrastructure outsource
     Rackspace
By: OutSystems     Published Date: Nov 07, 2014
New research conducted for OutSystems by independent research company Opinion Matters uncovers key mobile trend statistics. The study polled US and UK enterprises and found that organizations are currently struggling with a significant mobile backlog and unable to cope with business demands. Download this report today and learn about the key findings from this study.
Tags : mobile apps, it statistics, mobile trend statistics, mobile app backlog, it management, enterprise applications
     OutSystems
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com