dam

Results 826 - 849 of 849Sort Results By: Published Date | Title | Company Name
By: Dell-EUC (Dell/Intel Logo) Webinar     Published Date: Feb 13, 2018
Traditional PC lifecycle management is an inefficient and expensive process that will cost your business both time and money. Dell EMC’s PC Lifecycle as a Service (PCaaS) will transform your company’s approach to IT infrastructure. We have identified three distinct employee personas representative of a modern workforce. Each persona has specific hardware needs. With remote work becoming an everyday aspect of modern business, the risks of critical data becoming compromised has increased dramatically. Loss of data can be crippling, resulting in loss of business, damaged reputation and even punitive fines. Intel Inside®. Intel i?lemciler ile daha yüksek verimlilik. Learn more about Dell solutions powered by Intel®.
Tags : 
     Dell-EUC (Dell/Intel Logo) Webinar
By: Dell PC Lifecycle     Published Date: Mar 13, 2018
Fresenius Medical Care North America ist der führende Anbieter erstklassiger Gesundheitsleistungen für Patienten mit Nieren- und anderen chronischen Beschwerden. In den USA leben 640.000 Personen mit Nierenerkrankungen im Endstadium. Mehr als drei Millionen Menschen weltweit leiden an chronischem Nierenversagen. Über das branchenführende Netzwerk von 2.200 Dialysezentren in den USA, ambulanten Herz- und Gefäßlaboren und Notversorgungszentren – sowie Nordamerikas größtes Angebot an Krankenhaus- und Postakut-Versorgungsanbietern – sorgt Fresenius Medical Care North America für die koordinierte Behandlung für mehr als 180.000 US-amerikanischen Patienten.
Tags : 
     Dell PC Lifecycle
By: Dell Server     Published Date: Aug 08, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management soft
Tags : 
     Dell Server
By: Dell EMC & Intel     Published Date: Sep 06, 2018
Zusammenfassung Der Schwerpunkt der Verbesserungen im Rechenzentrum lag bisher hauptsa?chlich auf Kostensenkungen und punktuellen Lo?sungen. Serverkonsolidierung, Cloud-Computing, Virtualisierung und die Implementierung von Flash-Speicherfunktionen haben alle dazu beigetragen, das unkontrollierte Wachstum von Servern und die damit verbundenen Personal- und Anlagenkosten zu reduzieren. Konvergente Systeme, bei denen Rechner, Speicher und Netzwerk in einem einzigen System kombiniert werden, ko?nnen Unternehmen auf besonders effektive Weise bei der Reduzierung von Betriebs- und Personalkosten unterstu?tzen. Fu?r diese softwarebasierten Systeme sind nur begrenzte Benutzereingriffe erforderlich. In die Software eingebetteter Code u?bernimmt die Konfiguration der Hardware und die Automatisierung zahlreicher ehemals manueller Prozesse und sorgt so fu?r eine drastische Reduzierung von Bedienerfehlern.
Tags : 
     Dell EMC & Intel
By: Turbonomic     Published Date: Nov 12, 2018
The hybrid cloud has been heralded as a promising IT operational model enabling enterprises to maintain security and control over the infrastructure on which their applications run. At the same time, it promises to maximize ROI from their local data center and leverage public cloud infrastructure for an occasional demand spike. Public clouds are relatively new in the IT landscape and their adoption has accelerated over the last few years with multiple vendors now offering solutions as well as improved on-ramps for workloads to ease the adoption of a hybrid cloud model. With these advances and the ability to choose between a local data center and multiple public cloud offerings, one fundamental question must still be answered: What, when and where to run workloads to assure performance while maximizing efficiency? In this whitepaper, we explore some of the players in Infrastructure-as-a-Service (IaaS) and hybrid cloud, the challenges surrounding effective implementation, and how t
Tags : 
     Turbonomic
By: DigiCert     Published Date: Jun 19, 2018
No organization is safe from cyber attacks. Organized crime drives the rapid growth and sophisticated evolution of advanced threats that put your entire website ecosystem at risk. And the threat landscape will only grow more dangerous as attackers create more innovative and damaging ways to profit from their efforts. That’s why you need Complete Website Security to harmonize and fortify your website security. Across the board, we deliver best-in-class solutions for securing your website environment. Secure your websites. Protect your business.
Tags : 
     DigiCert
By: DigiCert     Published Date: Jun 19, 2018
Your organization’s websites are some of its most valuable assets. But they are vulnerable to security issues and criminal attacks. Fortunately, many of these problems are preventable with effective, integrated website security management. For ecommerce sites, you can calculate the cost of downtime in terms of lost revenue. You can add to this the considerable cost of remediation, and beyond this, the damage to customer confidence and trust that may be intangible but will be significant. Even when there are no security issues, inefficient processes result in deployment of additional resource that drives up cost. This article explains why in comparison to the above costs, investing in security management, particularly across SSL/TLS Certificate management, can be a highly efficient and cost effective measure to take.
Tags : 
     DigiCert
By: DigiCert     Published Date: Jun 19, 2018
Our Secure App Service helps protect your business against major financial impacts and brand damage from mismanaged code signing. You get no-worry code signing visibility, agility, and trusted security. We safeguard your keys in our highly secure data centers. You gain complete control over and insight into all code signing activity to protect application life and sales. Our Secure App Service simplifies and scales up code signing for all your target platforms. Backed by the global cyber security leader, you can trust our security, service, and support to protect your business and code signing efforts.
Tags : 
     DigiCert
By: DigiCert     Published Date: Jun 19, 2018
The Internet of Things (IoT) has rapidly transformed the digital landscape and the world we live in. Intelligent devices and sensors connect smart cars, robotic manufacturing equipment, smart medical equipment, smart cities, industrial control systems, and much more in a way that improves lives and saves businesses billions of dollars. But along with its benefits, rapid IoT growth introduces a new dimension of security vulnerabilities that dramatically escalates the nature and seriousness of cybercrime risks. In addition to traditional confidentiality cyber risks, IoT threats include attacks that can: • Render smart appliances useless • Shut down city power grids • Threaten lives through hacked pacemakers and other medical devices. Such security flaws not only endanger lives, frustrate customers, and disrupt business operations, but they create significant cost and public relations damage for IoT developers and manufacturers.
Tags : 
     DigiCert
By: Oracle     Published Date: Aug 09, 2018
Respaldar es una cosa, recuperarlo es todo. Sin duda usted aprecia la importancia crítica de su base de datos Oracle para el éxito de su empresa. Pero, ¿qué pasa si experimenta un corte de luz o un ataque cibernético? ¿Puede estar seguro de recuperar rápidamente todos sus datos? Las soluciones de respaldo tradicionales dejan los datos expuestos a pérdidas y su negocio está en riesgo. El Zero Data Loss Recovery Appliance de Oracle elimina la exposición y ahorra tiempo, esfuerzo y el estrés de recuperar datos. Descubra cómo nuestros clientes están recuperando sus datos sin drama.
Tags : 
     Oracle
By: Workday Spain     Published Date: Sep 20, 2018
Quali caratteristiche deve avere un buon leader? Questo articolo di Ashley Goldsmith, Chief People Officer di Workday, rivela le lezioni che hanno influenzato di più la sua leadership. Leggilo per sapere perché leadership significa essere al servizio dei clienti e uscire dalla comfort zone è fondamentale per avere successo.
Tags : 
     Workday Spain
By: Uberall     Published Date: Oct 08, 2018
Retail is struggling. Stuck in the past, it relies on old methods to draw customers to stores, and oftentimes is afraid of new technologies — even though it’s clear how to get the fundamental, proven levers right first.
Tags : digital, customer, fundamental, technologies
     Uberall
By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
The cloud — at one point it was a revolution in the workplace. But the cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply another part of the business. The availability of mobile devices and cloud services has redefined not only the way we work, but where we work. Critical infrastructures, applications, and massive amounts of sensitive data are now stored in the cloud, leaving companies at risk of damage if cloud accounts are compromised. With the cloud fast becoming the new normal, network security solutions need to adapt. Download this ebook to learn how Cisco Cloud Security helps you securely adopt and use the cloud, and better manage security for the way the world works today.
Tags : 
     Cisco Umbrella EMEA
By: Intapp     Published Date: May 10, 2019
How many hours did your professionals spend on this client, on that project, on those tasks? Those are the cornerstone metrics of Old Time. They answered the question, “how much should we bill?” This is still a valuable query, but in this new world in which data is pored over and mined for every bit of its value, it is only one of many questions that firms must ask of its time data. Are our professionals working efficiently? Are we pricing future contracts competitively? Are our projects on budget? Did we miss billable hours? Are our professionals spending too many hours tracking their time? Intapp Time provides the superior business intelligence with which to answer these questions and change your firm’s fundamental relationship with Time.
Tags : 
     Intapp
By: UPS Capital     Published Date: Feb 13, 2019
Commerce today involves an increasingly complicated supply chain ecosystem. Companies rely on suppliers and buyers across the globe, most of whom they’ve never met. They use multiple carriers and modes of transportation, across international borders, with different languages, currencies and laws. This ever-changing landscape means that companies of all sizes must be more diligent than ever when it comes to managing their supply chain — and their risk. In addition, e-commerce has revolutionized purchase behaviors, creating loftier customer expectations, and putting increased pressure on sellers to find new ways to meet those needs. Global networks and tight time constraints can amplify the impact from unpredictable events, like theft, damage, weather and natural disasters. This puts even more pressure on a company’s supply chain, and its bottom line.
Tags : 
     UPS Capital
By: Darktrace     Published Date: Jun 21, 2019
Cyber security is today an unavoidable concern for law firms and the legal sector at large, which oversees disproportionately large volumes of sensitive data and which is therefore an attractive target for sophisticated threat actors. From confidential information about mergers and acquisitions to disclosures made under attorney-client privilege, today’s law firms are inundated with data that would be disastrous if leaked, both for the results of individual cases and for these firm’s long-term reputations. Indeed, this reputational damage diminishes the very trust upon which the legal profession is predicated, jeopardizing client relationships and hindering customer acquisition. Legal organizations lose 5% of their clients following a data breach, while significant or high-profile breaches can even prompt a firm’s eventual collapse, as was the case for Mossack Fonseca in the infamous Panama Papers breach. In today’s increasingly digital business world, even the most private legal docum
Tags : 
     Darktrace
By: Darktrace     Published Date: Jun 17, 2019
With the safeguarding of intellectual property at the heart of its business model, the media and entertainment sector has learned through experience the necessity of fortifying its cyber defenses. Devastating breaches of industry giants such as Sony, Netflix, and HBO have shown that even the sector’s leading companies cannot defend against cyber threats without a fundamental shift in their security practices.
Tags : 
     Darktrace
By: Darktrace     Published Date: Jun 21, 2019
With the safeguarding of intellectual property at the heart of its business model, the media and entertainment sector has learned through experience the necessity of fortifying its cyber defenses. Devastating breaches of industry giants such as Sony, Netflix, and HBO have shown that even the sector’s leading companies cannot defend against cyber threats without a fundamental shift in their security practices.
Tags : 
     Darktrace
By: Darktrace     Published Date: Jun 21, 2019
Cyber-attacks targeting technology and telecommunications firms represent the most significant threat to their sensitive customer data and invaluable intellectual property. When successful, such attacks cost these firms dearly, not only in terms of immediate loss of revenue but also in the form of subsequent reputational damage. Technology firms that provide digital services or house vast quantities of user information are particularly at risk, as demonstrated in the Uber breach that exposed the personal information of more than 25 million users. Regulations around personal data, such as GDPR, increasingly require technology firms to adopt a robust cyber defense strategy that can detect cyber-threats at an early stage. Cyber-attacks aimed at technology firms with lucrative IP have also become a fact of life in the Information Age. Often perpetrated by nation-state actors with advanced capabilities, these attacks are now remarkably subtle and stealthy, with some of the latest examples b
Tags : 
     Darktrace
By: Darktrace     Published Date: Jun 17, 2019
In recent years, the oil and gas industry has seen accelerated digitization of its operations. As the sector reaps tremendous benefits such as greater efficiency and increased agility, this move has also fundamentally shifted the security paradigm. Oil and gas companies must now protect connected field devices, sensors and control systems, as well as legacy systems, often in low-bandwidth, remote, and challenging environments.
Tags : 
     Darktrace
By: Darktrace     Published Date: Jun 17, 2019
This white paper discusses Darktrace's Industrial Immune System, a fundamental innovation that views data from an Industrial Control System network in real time, and establishes an evolving baseline for what is normal for operators, workstations and automated systems within that environment.
Tags : 
     Darktrace
By: Darktrace     Published Date: Jun 25, 2019
The rapid adoption of cloud and SaaS services has transformed the digital business and fundamentally reshaped the challenge of defending the enterprise against advanced attacks.
Tags : 
     Darktrace
By: BeyondTrust     Published Date: Apr 04, 2019
The WannaCry ransomware attack in May 2017 crippled the UK’s National Health Service (NHS) and disrupted a range of organizations across 150 countries. Despite being a relatively unsophisticated attack, WannaCry was able to make such a global impact due to preventable vulnerabilities that had largely gone unaddressed. There were many more attacks in 2017, including high-profile breaches at Uber and Equifax, where heeding cyber-security recommendations may have reduced the impact and fallout. The scale and sophistication of cyber-attacks is not slowing down – ranging from phishing scams to cryptocurrency-based cyber-attacks, to statesponsored attacks on industrial control systems. These attacks present an ever growing challenge and serve as a reminder that organizations cannot afford to be complacent in the face of cyber threats. We’re living in a time when cyberattacks are a matter of when, not if, and security professionals must focus on mitigating their extent and damage. Our 2018 re
Tags : 
     BeyondTrust
By: Commscope     Published Date: Jun 24, 2019
The less you hear about your building’s network, the better. Enterprise networks rarely make the news unless the news is bad—and an unplanned outage is about as bad as it gets. In 2017, a tech’s typo at one of the world’s largest cloud services providers took a large swath of servers offline for four agonizing hours. According to one estimate, it cost S&P 500 companies $150 million—and U.S. financial-service companies $160 million—in lost revenue. Of course, the financial hit is just one aspect of an outage. The true cost also includes lost productivity and damage to your reputation. As our reliance on ITC infrastructure increases, the cost of an unplanned outage will only go up. >
Tags : 
     Commscope
Start   Previous    20 21 22 23 24 25 26 27 28 29 30 31 32 33 34     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com