erp capabilities

Results 176 - 200 of 276Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Mar 07, 2016
This ebook examines the role of enterprise asset management (EAM) tools in the era of the Internet of Things, and explores how you can use these capabilities to take full advantage of data, boost operational efficiencies and make better decisions faster.
Tags : ibm, oil, gas, iot, asset management, data, operations, enterprise applications
     IBM
By: Palo Alto Networks     Published Date: Apr 25, 2017
A new survey commissioned by Palo Alto Networks and conducted by Enterprise Strategy Group explores why enterprise IT leaders are embracing CASB products, where they are using them, and what capabilities are most important to them. One of the most critical needs is securing the use of SaaS applications. Here’s what you need to know.
Tags : 
     Palo Alto Networks
By: Microsoft Office 365     Published Date: Dec 11, 2017
Embrace the GDPR with the most complete, secure, and intelligent solution for digital work. The GDPR is compelling every organization to consider how it will respond to today’s security and compliance challenges. This may require significant changes to how your business gathers, uses, and governs data. Microsoft has brought together Office 365, Windows 10, and Enterprise Mobility + Security into a single, always-up-to-date solution called Microsoft 365—relieving organizations from much of the cost and complexity of multiple, fragmented systems that were not necessarily designed to be compliant with current standards Read this white paper for an in-depth exploration of: The GDPR and its implications for organizations. How the capabilities of Microsoft 365 Enterprise edition can help your organization approach GDPR compliance and accelerate your journey. What you can do to get started now.
Tags : 
     Microsoft Office 365
By: IBM     Published Date: Jul 19, 2016
Learn how IBM Cognos Analytics has come to market with a substantial refresh of its new user experience and self-service access to core enterprise capabilities.
Tags : ibm, ibm cognos analytics, analytics, business intelligence, business analytics
     IBM
By: IBM     Published Date: Mar 30, 2016
The IBM Enterprise Health Analytics solution delivers immediate value for an organization’s specific business analytics while laying the foundation for future analytics capabilities that may be added as needs evolve.
Tags : ibm, healthcare, healthcare analytics, big data, ibm enterprise health analytics
     IBM
By: BlackBerry Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT® was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : cyber, threat, protection, av-test, cylance
     BlackBerry Cylance
By: SAS     Published Date: Mar 06, 2018
As explored in this paper, the SAS Fraud Framework supports a complete, modular, enterprise-level program integrity solution that helps payers prevent, detect and manage fraud, waste and abuse across all silos and lines of business. Its fully integrated components offer both top-down and bottom-up functionality for exposing hidden and risky networks. This approach gives payers enhanced detection capabilities, greater insight into case management and improved operational efficiency while decreasing overall cost of ownership. The result is highly effective, early, and even preventative detection of fraud, waste, abuse and corruption that improves operational efficiency and reduces health care costs.
Tags : 
     SAS
By: Sunbelt     Published Date: Jan 15, 2009
This white paper, sponsored by Sunbelt Software, addresses the variety of issues facing organizations today in the context of their system management challenges, and discusses the capabilities of VIPRE Enterprise, an integrated platform that provides high-performance, integrated endpoint protection capabilities.
Tags : sunbelt software, system management, vipre enterprise, malware, anti-virus models, anti-spyware tools, security
     Sunbelt
By: WinMagic Inc.     Published Date: Apr 23, 2013
This paper examines common misconceptions about data encryption and describes how new approaches dispel earlier myths. WinMagic solutions demonstrate that a centrally managed approach to data security using current-generation processor capabilities and modern disk technologies can effectively meet enterprise requirements.
Tags : data, encryption, solutions, security, enterprise, requirements, capabilities, winmagic
     WinMagic Inc.
By: IBM     Published Date: Apr 23, 2013
The current business environment is still characterized by skittishness, tenuous demand and sporadic growth. It’s no surprise then, that 60% of CFOs plan to make major changes to critical finance practices and processes, according to the 2010 IBM Global CFO Study. In fact, 70% of CFOs claim to be taking a more prominent role in enterprise decision making beyond the traditional role of finance. Yet many CFOs admit to significant gaps in their ability to deliver on this expanded agenda, particularly in their ability to measure and monitor business performance. The IBM study found that those companies that invest in capabilities to expand their business insight are better able to anticipate and react to the unpredictable external forces affecting the economy.
Tags : dynamic planning, forecasting, financial forecasting, finance, cfo, enterprise
     IBM
By: Intel Corp.     Published Date: Aug 08, 2012
Evaluator Group worked with HP to access the features, performance and enterprise capabilities of the HP StoreOnce B6200 Backup system. HP labs and equipment were utilized, with testing under the direction of on-site Evaluator Group personnel. Testing focused on validating high availability features, performance, and application integration.
Tags : evaluator, group, storeonce, b5200, backup, lab, validation, paper, b6200, backup, system
     Intel Corp.
By: Cisco     Published Date: Sep 07, 2016
This white paper highlights the maturation of big data technologies and strategies, and how companies are transitioning from one-off pilot projects to powerful enterprise capabilities that can be leveraged on a daily basis.
Tags : 
     Cisco
By: QTS Data Centers     Published Date: May 01, 2017
In every industry, IT professionals are watching their roles and objectives evolve rapidly. The world is now digital and data is at the core of how enterprises, governments and individuals manage their core functions. Now, more than ever, CIOs and CTOs are challenged to build sustainable IT strategies against a constantly changing backdrop. Enterprises are quickly realizing that the resources required are exceeding their in-house capabilities. So, who are they trusting with these most valued assets? Data center providers. Learn how IT strategies are evolving and the role data centers play in those strategies.
Tags : 
     QTS Data Centers
By: Polycom     Published Date: Sep 07, 2016
"For over a decade Polycom and Microsoft have been addressing the challenge facing businesses across the globe—how to create the next generation workplace and allow employees to truly collaborate from anywhere. The recent rollout of Office 365 by Microsoft has made the next generation workplace a reality and Polycom is the only provider of voice and video solutions built for this new environment. In this webinar, Polycom and Microsoft experts will discuss Microsoft’s new Office 365 services and how Polycom’s portfolio of enterprise voice and video products will drive collaboration across an entire organization from desktops to conference rooms and beyond. This webinar will cover the following product and industry discussions: •What you need to know about Microsoft’s new voice capabilities in Office 365 •How to outfit your organization with voice solutions that integrate natively with Skype for Business and Office 365 •How to prepare your organization for video collaboration around Sk
Tags : 
     Polycom
By: ForgeRock     Published Date: Oct 08, 2014
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : identity access management, dynamic iam solution, public-facing, secure, business enabler, revenue-generating services, security, enterprise applications
     ForgeRock
By: ForgeRock     Published Date: Mar 10, 2015
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : iam, forgerock, irm, relationship management, software development
     ForgeRock
By: Intel Security     Published Date: Apr 06, 2016
As a companion to the Gartner Magic Quadrant for SIEM, the Gartner Critical Capabilities report for SIEM helps IT security organizations compare their requirements with the most common SIEM use cases. Discover in-depth how Gartner rates McAfee SIEM by critical capabilities.
Tags : siem, mcafee enterprise security manager, gartner, critical capabilities, siem use cases, threat management, collect, store, forensics and regulatory compliance
     Intel Security
By: Tripwire     Published Date: Jul 08, 2008
The Tripwire Enterprise solution provides organizations with powerful configuration control through its configuration assessment and change auditing capabilities. In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. This provides immediate visibility into the state of their systems, and through automating the process, saves time and effort over a manual efforts.
Tags : tripwire, iso, iso 27001, security, compliance, comply, isms, information security
     Tripwire
By: IBM     Published Date: Nov 05, 2014
IBM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.
Tags : ibm, ibm threat protection, security, it security, protection system, threat protection system, prevention, detection
     IBM
By: IBM     Published Date: Feb 11, 2015
BM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.
Tags : ibm, threat protection system, automated response capabilities, it security practices, security, it management, data management
     IBM
By: IBM     Published Date: Apr 09, 2015
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects. It then provides a checklist for evaluating solutions and defines the capabilities required to address security complexity, compliance and cost.
Tags : access management solution, ibm, security risk, security compliance, networking, security, it management, data management
     IBM
By: IBM     Published Date: Jul 14, 2015
Begin your journey toward becoming a cognitive enterprise and start gaining unprecedented value from your own data. Watson Explorer reduces unnecessary research time and allows enterprises to work smarter and faster. Read this brochure to learn how Watson Explorer combines content and data with cognitive computing capabilities to help your organization work more efficiently and make better decisions.
Tags : ibm, watson, software, explorer, applications, developer, cloud
     IBM
By: IBM     Published Date: Oct 08, 2015
Sign up for this 20-minute webcast to better understand how this mobile enterprise application platform and associated application deployment and management capabilities can be leveraged to win, serve, and retain customers.
Tags : ibm, mobile, forrester, app development, mobilefirst, enterprise, enterprise applications
     IBM
By: IBM     Published Date: Oct 13, 2015
IBM Security and IBM Information Management solutions for security work with the IBM System z platform to allow the mainframe to serve as an enterprise security hub, providing comprehensive, centralized security capabilities for organizations with distributed, multiplatform IT environments.
Tags : ibm, security management, mainframe cloud, information management, security, data, networking
     IBM
By: IBM     Published Date: Jan 07, 2016
In this study, we set to explore, with the help of ISMG, how enterprises view mobile security risks, what capabilities they are currently deploying vis-a`-vis the four pillars of the framework and what their short-to- medium-term plans are to extend these capabilities.
Tags : ibm, security, maturity, mobile, wireless
     IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com