inel

Results 1 - 25 of 29Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: May 24, 2017
Sicherheit und Performance wurden einst als separate Aspekte angesehen, für die ganz unterschiedliche Lösungen erforderlich sein sollten. Cyberkriminelle haben jedoch neue und überaus effektive Möglichkeiten gefunden, die Ihre Website in beiderlei Hinsicht gefährden. Erfolgreiche Lösungen müssen daher Sicherheitslöcher stopfen und parallel die Performance am Frontend optimieren. Wie ist das möglich? In diesem Bericht gehen wir auf browserbasierte Lösungen ein, welche gleichzeitig die Sicherheit optimieren und die Performance für den Endnutzer verbessern. Wir untersuchen verschiedene Techniken für den Umgang mit inhaltsbezogenen Browserproblemen, wie z. B. HSTS, Inlineframe und Prefetching. Der Bericht behandelt zudem Service-Worker- und browserbasierte Skripts, die viele Sicherheits- und Performanceoptionen bieten. Laden Sie den Bericht jetzt herunter und erfahren Sie, wie Sie Sicherheit und Performance gleichermaßen verbessern können.
Tags : 
     Akamai Technologies
By: Cisco     Published Date: Aug 03, 2015
County Integrates Wired and Wireless Networks.
Tags : 
     Cisco
By: Hewlett Packard Enterprise     Published Date: Jul 13, 2016
Download this asset to learn CRM and BI solutions can help you deliver insights to meet those expectations. They’re not just for the enterprise anymore – but to make the most of them, you’ll need plenty of compute power and scalable data storage. Sponsored by: HPE and Intel®
Tags : best practices, inel, hpe, bi solutions, enterprise, data storage, backup, recovery
     Hewlett Packard Enterprise
By: Cisco     Published Date: Jan 05, 2015
Be inspired by these mobility success stories by downloading these case studies: • Pinellas County Integrates Wired and Wireless Networks • Cisco Meraki Architecture Construction - C&S Companies • Hospital Pioneers Wi-Fi Patient Apps with Cisco BYOD Solution • Cisco CMX Connects Evergreen Brickworks Video
Tags : mobility, business solutions, cisco, mobile applications, secure mobile
     Cisco
By: Salesforce     Published Date: Dec 29, 2015
App Cloud gives Crossmark the speed and precision necessary to support Crossmark’s team of field agents who routinely collect data in stores via mobile devices.
Tags : salesforce, crossmark, success, app cloud, customers, enterprise applications, data management
     Salesforce
By: Salesforce     Published Date: Jan 14, 2016
App Cloud gives Crossmark the speed and precision necessary to support Crossmark’s team of field agents who routinely collect data in stores via mobile devices.
Tags : salesforce, crossmark, success, app cloud, customers, enterprise applications
     Salesforce
By: UL EduNeering     Published Date: Jul 05, 2012
Third party intermediaries have played starring roles in some of the most highly publicized global corruption trials. By any measure, third party intermediaries routinely rank high on the list of compliance worries for brand companies.
Tags : fda, gmp, gcp, gxp, cms, osha, qsr, 21 cfr part 11
     UL EduNeering
By: Juniper Networks     Published Date: Aug 07, 2017
Warum maschinelles Lernen entscheidend zur Cybersicherheit beiträgt
Tags : 
     Juniper Networks
By: CA Technologies EMEA     Published Date: Aug 07, 2017
In a world where customers and citizens expect so much more from technology, the race is on to develop a finely tuned high performance IT function. Hopefully by reading this book you're in a better position to see how DevOps supports this imperative and can develop the strategies needed to reignite your business.
Tags : digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies
     CA Technologies EMEA
By: Brainloop     Published Date: Nov 09, 2011
This paper advocates that for any document sharing application to genuinely add value, it must augment or complement the organization's existing document security infrastructure.
Tags : brainloop, enterprise, information management, security options, technology, business
     Brainloop
By: Cherwell Software     Published Date: Sep 22, 2015
The next generation user expects more do-it-yourself IT offerings. Whether it’s self-service portals with interfaces to rival Amazon or personal mobile devices with 24/7 business access, users are requesting more self-service functions and capability. To the modern user of technology “consumer-grade” has become a standard, and it’s ITs’ job to not only appease but genuinely satisfy contemporary users. This research highlights four ways to satisfy the modern user who brings their own knowledge, devices, applications and technical expectations to the workplace.
Tags : business enablement, cloud applications, cloud computing, cloud infrastructure, cloud strategy
     Cherwell Software
By: Adaptive Growth     Published Date: Mar 12, 2008
It is a truism that in any complex activity, the critical, defining decisions should be made as early in the process as possible.  In ERP implementation projects this principle is routinely undermined by the nearly universal practice of separating acquisition and implementation activities into separate projects, performed by separate teams operating under separate control.
Tags : erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
     Adaptive Growth
By: F5 Networks Inc     Published Date: Jan 22, 2009
On March 10, 2008, F5, a leader in application delivery, and WhiteHat Security, an innovator in application security assessment, announced they would be partnering to create an integrated Web application assessment and firewall technology. This product integration will incorporate WhiteHat’s Sentinel assessment technology and F5’s ASM attack blocking technology into a single solution.
Tags : web application assessment, defense technologies, whitehat security, web application vulnerabilities, security, enterprise applications
     F5 Networks Inc
By: Sophos     Published Date: Jul 01, 2013
Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot. The rising trend of mobility consumerization has reached a point where it is increasingly difficult for IT organizations to settle on a standard mobile device. This whitepaper will help you identify each device platform’s security features—and choose the right platform for your business.
Tags : mobile device, security
     Sophos
By: Microsoft Dynamics CRM     Published Date: Mar 30, 2010
This report reveals how Best-in-Class firms distinguish themselves from all others by routinely benchmarking and measuring their service performance; implementing effective measuring, monitoring and tracking systems; integrating service KPIs with company-wide CRM or ERP systems, wherever possible; and establishing a formal process for automatically collecting and disseminating data.
Tags : microsoft dynamic crm, service benchmarking, metrics, customer satisfaction, data management, mttr, kpi, metrics measuring program
     Microsoft Dynamics CRM
By: NetIQ     Published Date: Aug 05, 2011
In this white paper, you'll learn about how Novell Sentinel can make protecting your system against these costly security threats easy and efficient. Keep security threats out and your data safe.
Tags : novell, novell sentinel, netiq, bulldog solutions, identity and security, security management, siem solutions, log management
     NetIQ
By: IBM     Published Date: Dec 21, 2012
Interact with trusted BI content and enjoy the same user experience whether you are online at the office, using a smart phone or tablet computers on the road or offline.
Tags : ibm, cognos, mobile, inelligence, business intelligence
     IBM
By: DocuSign     Published Date: May 29, 2014
Few business processes are as security sensitive as those involving electronic signatures. eSignature transactions routinely contain information that is critical to you, your business, and your customers. This information may include personally identifiable Information (PII), pricing details, proprietary business terms, intellectual property, and more. That is why DocuSign’s number one priority is customer security. DocuSign leads the industry in designing and delivering the most secure digital transaction solution available.
Tags : docusign, security, esignatures, personally identifiable information, pii, customer security, digital transactions, enterprise applications
     DocuSign
By: SAS     Published Date: Mar 20, 2012
The banking sector routinely manages massive amounts of data, ranging from financial transactions to customer, operational and regulatory data. All this data means big challenges - but also big opportunities - for the industry. Find out more now!
Tags : sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics
     SAS
By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : endpoint security, security, threat prevention, threat detection, security solution
     Symantec
By: IBM     Published Date: Feb 17, 2016
In our benchmark research, at least half of participants that use spreadsheets to support a business process routinely say that these tools make it difficult for them to do their job. Yet spreadsheets continue to dominate in a range of business functions and processes. At the heart of the problem is a disconnect between what spreadsheets were originally designed to do, and how they are actually used today in corporations.
Tags : ibm, spreadsheets, ventana research, switch, spreadsheets, software development, it management
     IBM
By: Silverpop Engage B2B     Published Date: Mar 24, 2009
B2B marketers, like their B2C colleagues, have diligently worked at perfecting the art of shaping customer and prospect perceptions. They have years of experience developing precisely targeted communications comprised of finely tuned content directed at the specific audiences they want to influence. Traditional brand marketing requires the engineering of messages that engender the right impressions about the company’s products in the marketplace. The traditional art of branding has grown and flourished for many years. But that’s all begun to change.
Tags : silverpop b2b, b2b, engagement marketing, engagement marketing, online customer engagement, crm, push marketing, pull marketing
     Silverpop Engage B2B
By: Cisco     Published Date: Apr 10, 2015
Let these case studies show how you can succeed with mobility, too. Pinellas County Integrates Wired and Wireless Networks Cisco Meraki Architecture Construction - C&S Companies Hospital Pioneers Wi-Fi Patient Apps with Cisco BYOD Solution Cisco CMX Connects Evergreen Brickworks Video
Tags : cisco, case study, byod, wireless, wifi, network integration, cmx
     Cisco
By: McAfee     Published Date: Dec 09, 2009
Despite the six-year-old CAN-SPAM Act, spammers routinely abuse the law and continue to deliver their obnoxious email. One year ago, a major spam-hosting ISP was shut down, causing an impressive drop in botnet activity. Today, however, spam authors are more active and smarter than ever. Spammers love to tailor their messages to the news and the season. Read this report to gain a greater understanding of current spam threats.
Tags : mcafee, spam, risk management, vulnerability, can-spam, anti-spam, virus, botnet
     McAfee
By: SAS     Published Date: Apr 20, 2017
Enterprises routinely claim to be focused on the customer experience, yet few really keep that promise. What’s in the way? Fragmentation and complexity in both customer data and customer-facing processes. IIA spoke with Wilson Raj, Global Director of Customer Intelligence, and Jonathan Moran, Customer Intelligence Product Marketing at SAS Institute Inc. about how organizations can leverage technology platforms and analytics to become more completely and genuinely customer-centric – making connections in the right way, at the right time, and on the right device.
Tags : 
     SAS
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com