group

Results 251 - 275 of 1462Sort Results By: Published Date | Title | Company Name
By: Polycom     Published Date: Oct 17, 2016
This IDC study uses the IDC MarketScape model to provide an assessment of the 11 top vendors in the worldwide enterprise video conferencing equipment market. The IDC MarketScape is an evaluation based on a comprehensive framework and a set of parameters that assess vendors relative to one another and to those factors expected to be most conducive to success in a given market during the short term and the long term.
Tags : 
     Polycom
By: Polycom     Published Date: Oct 17, 2016
Software video infrastructure, video as a service and innovative form factors are reshaping video collaboration. We review eight vendors with the necessary reach, scale and interoperability for the global enterprise market so that IT infrastructure and operations leaders can make an informed choice. Download to learn more.
Tags : 
     Polycom
By: Polycom     Published Date: Oct 17, 2016
To select the group video conferencing systems that best address their requirements, customers should do the following: 1) Understand the types of spaces to be video- (or collaboration-) enabled and the common use cases for each. 2) Review the requirements described in the tables above. 3) Meet with various solution vendors, ask for details about their group video offerings, and see how closely those systems address the needs of each type of space. Download to learn more.
Tags : 
     Polycom
By: Workforce Software     Published Date: Feb 02, 2015
The Aberdeen Group has taken a fresh look at two very important questions: How does automating a total workforce management strategy elevate business performance? What types of measurable gains can you expect to achieve? If you want a thorough and persuasive argument for automating workforce management processes across the enterprise, this is a must-read.
Tags : workforce software, software, automation, budgets, costs, compliance, visibility, labor, productivity, risk, attendance, work ours, pay rate, absence, alerts, support, policies, integration
     Workforce Software
By: Workforce Software     Published Date: Feb 02, 2015
Getting the right solution for your business has a major impact on ROI, but how much does the delivery method matter? A lot, according to new research from Aberdeen Group on the benefits of deploying a cloud-based workforce management solution. This paper—exclusively available from WorkForce Software—illustrates how opting for the cloud can get you even greater returns from workforce management technology. Learn about the cloud’s connections to employee retention rates, administrative costs, and maximizing revenues in this short and focused read.
Tags : workforce software, software, automation, budgets, costs, compliance, visibility, labor, productivity, risk, attendance, work ours, pay rate, absence, alerts, support, policies, integration, cloud, enterprise
     Workforce Software
By: Dell EMC     Published Date: May 15, 2015
See how XtremIO redefined paradigms in the legal services marketplace for the US-based company, Clutch Group.
Tags : emc, storage all-flash, array, architectures, workload, data center, scale, storage, hybrid, vendor profiles, legal services, clutch, compliance, data management
     Dell EMC
By: Zoom     Published Date: Mar 29, 2016
Trend Micro resolved the following issues by purchasing Zoom: • Overly complex or difficult communications platforms • Expensive hardware or software systems • Unreliable or poor service quality • Using too many different solutions • Difficulties connecting remote teams or sites • The need for a more efficient/effective way to reach customers and other external parties Read more to learn about the benefits of using Zoom and which features are used more frequently by Trend Micro.
Tags : zoom, trend micro, screen sharing, mobile meetings, group messaging, video webinar, networking, it management
     Zoom
By: Zoom     Published Date: Mar 31, 2016
Founded in 2011 by Eric S. Yuan and other senior executives and engineers from WebEx and Cisco, California-based Zoom Video Communications (Zoom) offers cloud-based collaboration services. When first launched, Zoom was heavily focused on video conferencing. Over time, the company has expanded its service to include additional capabilities such as audio dial-in with local numbers around the world, group messaging, wireless presentation, content co-annotation, and more.
Tags : 
     Zoom
By: Vectra Networks     Published Date: Aug 03, 2015
Recent research from Kaspersky has revealed a massive criminal campaign that was able to infiltrate more than 100 different banks and steal upwards of $1 billion from the affected institutions. Kaspersky dubbed this operation the Carbanak APT due to a connection between the malware used in the attacks and the now infamous Carberp banking botnet. You may recall the headlines in 2013 that revealed the Carberp source code had been leaked into the wild, making it accessible to virtually any would-be criminal group that may want it. The accessibility of Carberp source code could easily have provided a starting point for the Carbanak as they built their malware.
Tags : threat, data, security, it management, malware, banking, cyber theft, remote access tool, remote access trojan, carberp, carbanak
     Vectra Networks
By: Okta     Published Date: Jul 19, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : best practices, business optimization, business management, productivity, cloud services, mobile, identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
     Okta
By: IBM Watson Health     Published Date: Nov 30, 2015
This case study examines in more detail BSVMG’s approach to transitioning to value-based care—and outlines Phytel’s recommended roadmap to successful population health management.
Tags : ibm, watson health, phytel, bon secours, value-based care, healthcare, software development, it management
     IBM Watson Health
By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2017, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors, the global threat landscape, and security trends: • The global WCry and NotPetya campaigns reinforced the need for a layered approach to security. • Attacks used obfuscated malicious files and scripts to bypass filtering and deliver malware. • A Chinese threat group has had repeated success using compromised websites to attack targeted organizations. • Threat actors have been stealing intellectual property from Japanese enterprises.
Tags : 
     Secureworks
By: Lookout     Published Date: Sep 25, 2017
Dieses eBook enthält die Daten einer Umfrage, die im Auftrag von Lookout von der Enterprise Strategy Group durchgeführt wurde – einem Anbieter von IT-Forschungs-, Analyse-, Strategie- und Validierungsdienstleistungen.
Tags : 
     Lookout
By: Carbonite     Published Date: Oct 10, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses
Tags : 
     Carbonite
By: CA Technologies EMEA     Published Date: Aug 07, 2017
A lot can be learned from getting a group of experienced CIOs in a room and encouraging them to talk freely about the topics at the front of their minds. Rarely do they want to discuss technology, and even the latest IT industry ‘hot topics’ usually don’t get that much airplay. Conversations, and sometimes quite heated debates, tend to revolve around broader business-related trends, how these are changing stakeholder and user behaviour and expectations, and how best to respond to such dynamics.
Tags : development tools, code management, software build, service virtualisation, automation management, platform building, sdlc, mttr, continuous testing, testing effort, service virtualisation, delivery ecosystem
     CA Technologies EMEA
By: PwC     Published Date: Jun 13, 2019
A CEO scans the competitive landscape, and decides it’s time to implement new strategies or to examine internal factors that are limiting growth. With buy-in from senior leadership, the company makes a significant investment in a months-long process designed to yield actionable insights. A few areas may be singled out for a deep-dive examination of how work is performed and where pain points exist. After interviewing employees at various levels, creating detailed documentation, and making recommendations, the company is ready to pilot changes, measure results, and roll out strategies to larger groups of stakeholders.
Tags : 
     PwC
By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
     Splunk
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
“We ruled out Zscaler due to its overly complex architecture and PAC file requirements. The ongoing management would have been a nightmare.” - Marc Tournier, Information Security and Compliance Manager (CISO), Avril Group
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
In 2018, the Enterprise Strategy Group (ESG) completed a research survey of 450 cybersecurity, IT, and networking security professionals with knowledge of or responsibility for the policies, processes, and controls used for remote office/branch office (ROBO) security. This report is the summary of ESG's conclusions from the study.
Tags : 
     Cisco Umbrella EMEA
By: Workday APAC     Published Date: Jul 18, 2019
See the infographic to learn how InterContinental Hotels Group has benefited from Workday.
Tags : 
     Workday APAC
By: Group M_IBM Q119     Published Date: Mar 08, 2019
The transformation imperative is now the imperative of the entire enterprise. The challenge to leaders of top financial services firms is to build operating models that are ready for anything. Join American Banker Editor-at-Large, Penny Crosman, and former IBM Global leader for strategy and design, Robert Schwartz, as they discuss this idea, pulling clips from a recent event for industry leaders, including: Bridget van Kalingen, IBM on redefining success with cloud, AI, quantum and blockchain Shari van Cleave, Wells Fargo on rethinking data strategies in the age of AI Bret King, Moven on rebuilding the bank from the ground up Rob Bauer, AIG on the ways to get started with transformative projects Marty Lippert, MetLife on creating space for innovation by migrating core operations off of legacy infrastructure and many more
Tags : 
     Group M_IBM Q119
By: Group M_IBM Q119     Published Date: Feb 08, 2019
Banking engagement is about to come full circle. Over the past few decades, banks have pushed customers to digital and self-service channels, with significant consequences. As customers take their transactions from the branches to the digital channels, banking has become less and less personal. Conversational Banking allows banks to have the best of both worlds as this always-on, personalized banking will be available at a fraction of the cost of relying on human agents alone. It is both instantaneous and personal. It feels intimate but is cost-effective. Read more to see how banks can start.
Tags : 
     Group M_IBM Q119
By: Group M_IBM Q2'19     Published Date: Mar 29, 2019
The vast increase in dark data—all of the unstructured data from the Internet, social media, voice and information from connected devices—is overwhelming many executives and leaving them completely unprepared for the challenges their businesses face.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Mar 29, 2019
Banking engagement is about to come full circle. Over the past few decades, banks have pushed customers to digital and self-service channels, with significant consequences. As customers take their transactions from the branches to the digital channels, banking has become less and less personal. Will this trend continue? To predict the future let’s first review how we got here.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q3'19     Published Date: Jul 15, 2019
Read how Cheniere  is transforming the maintenance of complex assets at the upgraded Sabine Pass facility with IBM Maximo.
Tags : 
     Group M_IBM Q3'19
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com