it operation

Results 276 - 300 of 2191Sort Results By: Published Date | Title | Company Name
By: Secureworks     Published Date: Nov 11, 2016
This paper explores why the older “all or nothing” kind of relationship between business organisations and information security services providers (ISSPs) is giving way to a hybrid model that security professionals can leverage to augment their operations and effectiveness.
Tags : managed security services, cybersecurity, issps, security, threat and vulnerability management
     Secureworks
By: Cloud Blue     Published Date: Jul 20, 2018
Digital-native enterprises are first to accelerate cloud commerce business. IDC explains how cloud platforms like CloudBlue are key to evolving business models and architecture to scale operations and innovate faster than traditional businesses in preparation for the Future of Commerce.
Tags : 
     Cloud Blue
By: Oracle Linux     Published Date: Oct 29, 2018
Learn how customers are improving security, reducing downtime, simplifying operations, and saving money by switching to Oracle Linux support.
Tags : 
     Oracle Linux
By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
This whitepaper provides an overview of how Craigs International leveraged Alibaba Cloud’s technology solutions, including Cloud Enterprise Network (CEN), Virtual Private Network (VPN) Gateway, and Smart Access Gateway (SAG), to build a global enterprise network. Alibaba Cloud’s solutions helped them improve business operations, increase efficiency, maximize profitability, and reduce OPEX and CAPEX costs. Craigs International wants to move to the cloud to build a global hybrid enterprise network by partnering with a technology player that has such solid experience within Mainland China.
Tags : data center, cloud computing, networking, security, china, global expansion
     Alibaba Cloud SEA
By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
     CA Technologies
By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : cloud security, cloud management, it protection, api integration, credential verification, security efficiency
     CA Technologies
By: MalwareBytes EMEA     Published Date: May 10, 2019
Ransomware has taken the world by storm. CryptoWall extorted an estimated $18 million, and WannaCry locked up more than 230,000 computers across the globe in 2017. Companies of all sizes are sitting up and taking notice. Even brands with a strong security investment have fallen victim. We’ve seen ransomware cripple businesses: nearly 19% of businesses stop operations immediately after discovering a ransomware attack.1 Hospital emergency rooms forced to turn people away; global shipping logistics experience massive disruption; and even a summer blockbuster movie held up for ransom. The FBI estimates ransomware is now a billion-dollar business. Ransomware has been around for a while, and it has spiked in recent years. It secured 5th place as the most common variety of malware in 2017, up from 22nd place in 2014.2 Originally ransomware targeted individuals and was considered a consumer nuisance. It has now become a business menace.
Tags : 
     MalwareBytes EMEA
By: Adobe     Published Date: Feb 20, 2014
The City of Almere in the Netherlands uses Adobe® Acrobat® Pro to enhance collaboration among officials and improve the delivery of government services to citizens.
Tags : adobe, adobe acrobat pro, software, collaboration, streamlining, productivity, file management, document management, cost of operations, delivery, distribution, pdf files, electronic documentation, document management system, software development, it management
     Adobe
By: Adobe     Published Date: Aug 05, 2014
In 2014, there will be more than 2 billion smartphones global. Mobile is becoming not on the new digital hub but also the bridge to the physical world. That's why mobile will affect more than just your digital operations- it will transform your entire business. 2014 will be the year that companies increase investments to transform their business with mobile as a focal point. This fifth annual mobile trends report highlights new mobile trends that we expect to see this year as well as some over hyped topics that we believe will fail to provide real business value in the short term.
Tags : forrester, mobile trends, mobile, digital operations, business value, smartphones, enterprise applications
     Adobe
By: Adobe     Published Date: Aug 05, 2014
En 2014, il y aura plus de 2 milliards de smartphones dans le monde. Le mobile est non seulement le nouveau hub digital, mais il fait aussi le lien avec le monde physique. C’est pour cette raison que le mobile affectera bien plus que vos opérations digitales : il va transformer votre activité toute entière. En 2014, les entreprises vont développer leurs investissements pour centrer leurs activités autour du mobile. Ce cinquième rapport annuel sur les tendances du mobile met en avant les grandes lignes de ce que nous réserve cette année ainsi que les thèmes ultra-médiatisés dont nous pensons qu’ils ne constituent pas une valeur commerciale réelle à court terme.
Tags : forrester, mobile trends, mobile, digital operations, business value, smartphones, enterprise applications
     Adobe
By: Adobe     Published Date: Aug 05, 2014
2014 werden weltweit mehr als zwei Milliarden Smartphones im Einsatz sein. Mobile wird nicht nur Dreh- und Angelpunkt der neuen digitalen Welt, sondern auch die Verbindung zurphysischen Welt. Der Mobile-Trend betrifft daher nicht nur Ihre Aktivitäten im Bereich digitaler Medien. Er wird einen Wandel für Ihr gesamtes Geschäft bewirken. 2014 werden Unternehmen verstärkt investieren, um diesen Trend aufzugreifen und ihr Geschäft mit dem Schwerpunkt Mobile neu auszurichten. Dieser jährliche Bericht zu den Trends im Mobilbereich untersucht neue mobile Trends, die wir für dieses Jahr erwarten, sowie einige überbewertete Themen, dieunserer Meinung nach kurzfristig keinen echten Geschäftswert bieten werden.
Tags : forrester, mobile trends, mobile, digital operations, business value, smartphones, enterprise applications
     Adobe
By: Prophix     Published Date: May 31, 2016
Prophix gives you a clear picture of all your operational costs and connects them with key factors that are driving your revenues. That increased line-of-sight is made possible because Prophix tracks and monitors all day-to-day operational planning activities. Improving operational outcomes for the short-term and providing insights into your future operations
Tags : prophix, best practices, database management, productivity, business analysis
     Prophix
By: Riverbed     Published Date: Jul 17, 2013
Highly complex IT environment with multi-tier application architectures delivering apps and services, detecting and diagnosing code level performance problems can be like looking for a needle in a haystack. While it may be plain to the end user that there is a problem, understanding where that problem originates and exactly what is causing it is difficult, and time consuming. Riverbed OPNET AppInternals Xpert addresses this challenge by combining end-user experience, transaction tracing, and application component monitoring for deep end-to-end application visibility. This latest release facilitates bi-directional workflows between operations and application development to expedite problem resolution. Register to read the full report.
Tags : apm, esg, big data, end-user experience, application visability
     Riverbed
By: Schneider Electric     Published Date: Oct 17, 2016
Questo documento descrive dei principi di gestione esclusivi e fornisce una panoramica completa e di alto livello degli elementi necessari del programma per gestire uno stabilimento mission-critical in modo efficiente ed affidabile nel corso dell'intero ciclo di vita. Vengono forniti anche suggerimenti e consigli pratici di gestione.
Tags : 
     Schneider Electric
By: Schneider Electric     Published Date: Oct 17, 2016
This white paper analyzes these costs and presents a flexible architecture to accommodate a well-specified density, and discusses the importance of operational policies in enforcing the specification.
Tags : 
     Schneider Electric
By: EMC     Published Date: Oct 12, 2015
This white paper looks at the approaches that oil and gas companies are taking to improve the management and implementation of large capital project management (LCPM) initiatives.
Tags : large capital project management, lcpm. content management system, technology, operational excellence, manage and share data
     EMC
By: Zendesk     Published Date: Dec 02, 2016
The importance of agility in business is not breaking news. With the rise of technology, connectivity, and mobility, chances are that you’ve had to rework everything from logistics and operations to how you process employee payroll. Changing the way you work, and the tools you work with, extends to your customer base, too. These relationships also need to be maintained and are just as dynamic as what’s happening in-house.
Tags : retail, ecommerce, web ecommerce, customer service, customer service, global support
     Zendesk
By: Schneider Electric     Published Date: Aug 21, 2017
This TRA whitepaper will outline why this is the case and why that is important for your customers experience in future.
Tags : digital transformation, data centers, cloud, applications, customer experience
     Schneider Electric
By: Oracle     Published Date: Mar 28, 2017
The ubiquitous nature of mobile devices can seemingly diminish their value, making them a commodity to be taken for granted. But their true power hasn’t begun to be tapped — especially by hoteliers. If seen as a gateway to operational efficiency, enhanced guest experiences and, most importantly, a better bottom line, mobility wouldn’t be overlooked. Which is exactly why it’s time to view it through a different prism — or risk being left behind by your competitors who will.
Tags : mobility, mobile, hoteliers, guest experience, oracle
     Oracle
By: RedHat     Published Date: May 10, 2017
To reduce IT costs and improve performance, Indesso successfully deployed a SAP application on Red Hat Enterprise Linux. Migrating to Red Hat Enterprise Linux has lowered IT maintenance costs by 45% and hardware costs by 65%. In addition, the company has gained improved operational efficiency across its business. Read on to find out more.
Tags : red hat, linux, enterprise linux, reduce costs, improve efficiency
     RedHat
By: Q2 eBanking     Published Date: Jul 30, 2017
Banks and credit unions face multiple challenges to operational efficiency: tightening budgets, limited headcount, a challenging regulatory climate, ongoing security concerns and others. Efficiency and process enhancements can limit the impact these challenges could have on your institution. The following five questions—and your responses—may help your financial institution (FI) as you look to drive operational efficiencies, improve compliance and security, keep account holders happy and attract new ones.
Tags : 
     Q2 eBanking
By: Tenable     Published Date: Feb 27, 2019
"Unlike other business disciplines (CRM, ERP, HR), cybersecurity lacks clear business metrics that help frame decision-making in language the C-suite and board easily understand. To evaluate which metrics matter most, Tenable commissioned Ponemon Institute to study the effects of cyber risk on business operations. The study, which surveyed 2,410 IT and infosec decision-makers in the US, UK, Germany, Australia, Mexico and Japan. Download the report now to: -See why organizations are vulnerable to multiple cyber attacks. Compare your own practices for measuring the business costs of cyber risk against those of peers in six countries. -Explore the seven key reasons why organizations struggle to evaluate the business impact of cyber events. -Get five tips, based on the research, that you can use today to start improving your ability to mitigate cyber risks in your own organization."
Tags : 
     Tenable
By: Dell EMC & Intel     Published Date: Dec 12, 2018
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. It sounds like another current term, “digital transformation.” But in fact, effective digital transformation doesn’t happen without IT Transformation. A company that undergoes IT infrastructure transformation no longer has to rely on rigid, manual, siloed, legacy technologies. It sees a boost in IT operational speed, efficiency, scale, and cost effectiveness—tasks are automated, processes streamlined, and resources are freed up. Those IT-level improvements fuel a larger-scale digital transformation, allowing the company to thrive in today’s digital economy. It is able to out-innovate, out-think, and out-pace its competitors—ultimately becoming the disruptor, not the disrupted.
Tags : 
     Dell EMC & Intel
By: Dell EMC & Intel     Published Date: Dec 12, 2018
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. Although not synonymous with digital transformation, the two concepts are fundamentally linked together, as effective digital transformation cannot happen without IT Transformation. A company that transforms its IT infrastructure no longer has to rely on rigid, manual, siloed, legacy technologies. It sees a boost in IT operational speed, efficiency, scale, and cost effectiveness—tasks are automated, processes streamlined, and resources are freed up. Those IT-level improvements fuel a larger-scale digital transformation, allowing the company to thrive in today’s digital economy. It is able to out-innovate, out-think, and out-pace its competitors—ultimately becoming the disruptor, not the disrupted.
Tags : 
     Dell EMC & Intel
By: Red Hat     Published Date: Feb 25, 2019
Red Hat can help you deliver 348% ROI and achieve agile, high-performing infrastructures Linux® has become the standard operating system for cloud infrastructure as well as the preferred delivery vehicle for modern applications. This is, in part, thanks to it being reliable environment that offers scale, security, and robust application support. Red Hat® Enterprise Linux expands on this trust and credibility by offering a supported, hardened, enterprise environment that delivers on more efficient operational costs, better reliability and availability, and better scalability. These translate into a better return on investment (ROI) for our enterprise customers. IDC’s study, “The Business Value of Red Hat Enterprise Linux,” interviewed 12 organizations to see how they’re using Red Hat Enterprise Linux to support their business operations. These organizations reported that Red Hat provides a cost-effective, efficient, and reliable operating environment. There’s a lot to gain with Red H
Tags : 
     Red Hat
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com