end user

Results 226 - 250 of 955Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Jun 26, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jul 20, 2017
Mainframes continue to provide high business value by combining efficient transaction processing with high-volume access to critical enterprise data. Business organizations are linking mobile devices to mainframe processing and data to support digital applications and drive business transformation. In this rapidly growing scenario, the importance of providing excellent end-user experience becomes critical for business success.This analyst announcement note covers how CA Technologies is addressing the need for providing high availability and a fast response time by optimizing mainframe performance with new machine learning and analytics capabilities.
Tags : 
     CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
     CA Technologies
By: Skillsoft     Published Date: Dec 13, 2016
Skillsoft has created an entirely new business skills portfolio based on in-depth research with end-users and eLearning enterprise buyers. The end result is a content pipeline of over one thousand, 3-5 minute micro-videos, packaged into over 240 new courses. Multi-dimensional and micro-sized, the new courses are flexible training and development solutions that target the need of diverse populations, at all stages of their career. The courses feature purposeful application of video treatments, including: • Well-acted, interactive scenarios • High-end animations • “TED-talk” style presentations • “How-to” videos • Whiteboard tutorials Watch a sample scenario-based course, Mobilizing Your Team to Take Action.
Tags : business skills, training and development
     Skillsoft
By: VMware     Published Date: Jul 24, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
     VMware
By: VMware     Published Date: Jul 24, 2017
The mobile-cloud era is here. It is not merely about delivering apps; it is about simplifying processes so you can accomplish more. The mobile-cloud era is redefining productivity by enabling workflows through the key foundations of identity and contextual experiences, mobile collaboration, united endpoint management and security, and windows apps and desktops. Today people work primarily from mobile sources and expect a strikingly continuous experience across all their devices, regardless of which device they select to best accomplish any given task. Once access is established, organizations are looking to transform processes to mobile so they can increase efficiency and workflows for end users, thereby driving productivity to the next level.
Tags : 
     VMware
By: Pure Storage     Published Date: Nov 02, 2017
The tremendous growth of unstructured data is creating huge opportunities for organizations. But it is also creating significant challenges for the storage infrastructure. Many application environments that have the potential to maximize unstructured data have been restricted by the limitations of legacy storage systems. For the past several years—at least—users have expressed a need for storage solutions that can deliver extreme performance along with simple manageability, density, high availability and cost efficiency.
Tags : high performance, tco, multi protocol, management simplicity, the blade, elasticity software, performance, capacity
     Pure Storage
By: Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017     Published Date: Jul 12, 2017
Enterprises tend not to view project management as a holistic process. Much like the disparate systems they have in place, they see a disparate collection of issues. They typically look to solve specific pain points with single applications. Rather than migrate an entire enterprise to a new system, they are looking to manage a problem spot and have it flow into a specific component (e.g., cost, human capital leverage, or how demand is driven) as needed. In many cases, however, the pain points are symptoms of a larger issue, and to remove them the situation must be viewed in the context of the full project life cycle. Oracle Project Portfolio Management (PPM) Cloud, part of the integrated suite that is Oracle ERP Cloud, not only does this, but it’s also built with the user in mind… solving the PPM pain points through role-based analytics, social collaboration, optimization, costing, control, and mobile solutions for today’s project team.
Tags : ppm, project portfolio management, erp, oracle, cloud
     Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017
By: Longi Engineering     Published Date: Feb 15, 2018
SharePoint is a technology that most organizations have access to these days, yet it is one that is open not utilized fully. This is in part due to organizations not being fully aware of the breadth of SharePoint’s capabilities. Most SharePoint power users/administrators are aware they can leverage SharePoint as a document repository and to share data seamlessly with a group of colleagues, however, they often are not aware of how to leverage some of SharePoint’s key foundational components effectively. As someone who implements SharePoint, one of the biggest complaints we hear from organizations is users aren’t using it, adoption is low. Without user adoption no technology implementation project can be successful. It is difficult to pinpoint one reason that causes adoption to be low, however, taking steps to effectively build your SharePoint site with a solid foundation along with an end goal of high user adoption is a great way to start.
Tags : software development, it consulting services, net software solutions, microsoft sharepoint
     Longi Engineering
By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : control, visibility, customer, financial risk, web fraud, bots, infrastructure
     Akamai Technologies Australia
By: Carbon Black     Published Date: Aug 20, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a Kaspersky Lab customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these issues, then your endpoint security products may actually be creating more problems than they solve. Ask these questions and find out for yourself.
Tags : 
     Carbon Black
By: Carbon Black     Published Date: Aug 20, 2018
Companies are facing massive cyber security challenges – many of which are rooted in the endpoint. In fact, according to IDC, 70% of successful breaches begin at the endpoint. If you are a McAfee customer, and still have breaches in your endpoint security, then something isn’t working. Perhaps you’re struggling to prevent advanced attacks, or your security team may be burdened by maintaining overly complex policies. You and your end users may even be facing performance issues. If you are experiencing any of these challenges, then your endpoint security products may actually be creating more problems than they solve. Ask yourself these questions for a cybersecurity reality check.
Tags : 
     Carbon Black
By: Trifacta     Published Date: Nov 02, 2018
In the latest report, Forrester evaluated 10 top data preparation solutions against 18 criteria, grouped into categories of Current Offering, Strategy and Market Presence. See how each data prep provider compares and who received the highest scores. Download your copy today to review: What are the key technical differentiators for data preparation solutions Which user personas do data preparation solutions focus on Why ownership of data preparation is transitioning from IT to business end users
Tags : 
     Trifacta
By: Intel     Published Date: Dec 13, 2018
Robots play a key role in achieving manufacturing efficiencies and reducing labor intensive operations across diverse industries. Traditional machine vision has its limitations, however—typically, it can only conduct defect detection and classification based on fixed rules and work in fixed environments. To add on, the complexity of robotic system design poses challenges for many manufacturers to identify and integrate subsystems from multiple vendors. The future of robot and machine solutions is a production environment where devices, machines, robots, and sensors are interoperable. Find out how NexCOBOT integrates AI-driven vision capabilities into robotics to improve quality and accuracy over traditional machine vision—as well as providing an open and modular solution for users to develop a robot control system that best fits their particular application requirements.
Tags : 
     Intel
By: Cisco     Published Date: Dec 27, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption.
Tags : 
     Cisco
By: TIBCO Software     Published Date: May 31, 2018
Ask the average business user what they know about Business Intelligence (BI) and data analytics, and most will claim to understand the concepts. Few, however, will profess to know how analytics works or to have the skills needed to put it into practice. Despite being knowledgeable about their industry and experienced in running their organizations, the majority of business users lack expertise in analytics and visualization techniques—but that doesn’t stop them from wanting to have a go. This situation has led to ease of use and accessibility becoming the main focus for recent updates from all the leading BI vendors—but making tools easier and more widely accessible is only part of the answer. A better approach is to work both sides of the gap. To make tools that can empower business users to discover and unlock value in their data—and that extend capabilities for experts, so they can share the analytics workload, improve efficiency, and focus on higher level work. Unfortunately, the
Tags : 
     TIBCO Software
By: Oracle     Published Date: Jul 05, 2017
Improve the performance, security and reliability of your DNS infrastructure by adding a supplemental DNS service to your IT environment. Best-of-breed managed DNS service providers have the global DNS infrastructure and deep DNS network operations expertise to ensure your success. Adding a secondary DNS service can help you deliver consistent, high-quality user experiences across the world and mitigate outage risk. To learn more read our white paper: High Availability DNS Reduces Downtime Risk and Improves End-User Experience
Tags : dns, service, serve traffic, corporate firewall, service features, api daemon
     Oracle
By: Oracle     Published Date: Nov 30, 2017
Today’s network edge is increasingly taking on a critical role in connecting users to the digital content and web services that they need to reach. This is driving a new approach to load balancing that starts at the edge. Powered by DNS, edge-based global load balancing (GLB) steers user traffic to destination endpoints based on IT-defined policies. GLB works independently or in concert with site-based, or on premises, load balancing technologies in a “federated” system. This approach applies load balancing and traffic steering policies at each layer from the user edge to the host—whether virtual or physical—where the request is actually served.
Tags : geo-zoning, path, optimization, resource, asset, balancing, virtual, resource
     Oracle
By: Oracle     Published Date: Nov 30, 2017
Before Bad Things Happen – Be Prepared Providing a great user experience is always the goal, and the best way to achieve that is by having a well-thought-out digital business continuity strategy. You can’t always know what type of disruption you’ll face next, but you can be sure that there will be one. It may come in the form of a broken connection but, even more likely, the availability of the application or host. DNS active failover ensures real-time failover to healthy endpoints, allowing you to extend your business continuity solution to the user edge.
Tags : dns, digital, business, geographically, server, online, retailers
     Oracle
By: Oracle     Published Date: Nov 30, 2017
Secondary DNS (sometimes referred to as multi-DNS) operates in an “always on” manner to complement your existing infrastructure as an additional authoritative DNS service. When an end user’s recursive server initiates a DNS request, both the “primary” DNS service and the “secondary” DNS will respond as soon as they receive the request. The response that reaches the recursive server first will be passed back to the end user, completing their request.
Tags : dns, service, server, infrastructure, technology, business, optimization
     Oracle
By: Oracle Dyn     Published Date: Dec 06, 2017
Secondary DNS (sometimes referred to as multi-DNS) operates in an “always on” manner to complement your existing infrastructure as an additional authoritative DNS service. When an end user’s recursive server initiates a DNS request, both the “primary” DNS service and the “secondary” DNS will respond as soon as they receive the request. The response that reaches the recursive server first will be passed back to the end user, completing their request.
Tags : dns, service, server, infrastructure, technology, business, optimization
     Oracle Dyn
By: Oracle Dyn     Published Date: Dec 06, 2017
Today’s network edge is increasingly taking on a critical role in connecting users to the digital content and web services that they need to reach. This is driving a new approach to load balancing that starts at the edge. Powered by DNS, edge-based global load balancing (GLB) steers user traffic to destination endpoints based on IT-defined policies. GLB works independently or in concert with site-based, or on premises, load balancing technologies in a “federated” system. This approach applies load balancing and traffic steering policies at each layer from the user edge to the host—whether virtual or physical—where the request is actually served.
Tags : geo-zoning, path, optimization, resource, asset, balancing, virtual, resource
     Oracle Dyn
By: Oracle Dyn     Published Date: Dec 06, 2017
Before Bad Things Happen – Be Prepared Providing a great user experience is always the goal, and the best way to achieve that is by having a well-thought-out digital business continuity strategy. You can’t always know what type of disruption you’ll face next, but you can be sure that there will be one. It may come in the form of a broken connection but, even more likely, the availability of the application or host. DNS active failover ensures real-time failover to healthy endpoints, allowing you to extend your business continuity solution to the user edge.
Tags : dns, digital, business, geographically, server, online, retailers
     Oracle Dyn
By: SecureAuth     Published Date: Nov 13, 2017
A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies. This eBook provides a simple guide to explain both penetration testing's purpose and a basic guide to getting you there. Download now and start testing your network today.
Tags : 
     SecureAuth
By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
As a secure internet gateway, Cisco Umbrella helps you tackle the challenges of mobility, SaaS, and branch transformation by offering a single platform that secures access to and use of the cloud, SaaS applications, branch offices, and endpoints. It's your first line of defense against threats -- anytime and anywhere your users access the internet, traffic goes through Umbrella first. To understand how a secure internet gateway provides 360-degree security for access to and use of the cloud, read the ebook.
Tags : 
     Cisco Umbrella EMEA
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com