microsof

Results 401 - 425 of 1276Sort Results By: Published Date | Title | Company Name
By: Veeam '18     Published Date: May 01, 2019
Questo documento di facile e rapida lettura (5 minuti) spiega perché le organizzazioni devono proteggere i dati di Office 365. Questo report fa chiarezza su: • la sostanziale distinzione tra la responsabilità di Microsoft Office 365 e la responsabilità delle organizzazioni IT • 6 motivi per cui il backup di Office 365 è importantissimo • Chi controlla i dati di Office 365
Tags : 
     Veeam '18
By: Veeam '18     Published Date: May 07, 2019
In diesem fünfminütigen, leicht lesbaren Dokument wird erläutert, warum Unternehmen Office 365-Daten schützen müssen. Dieser Bericht zeigt Ihnen: • Das große Missverständnis zwischen der Verantwortung von Microsoft und den IT-Organisationen • 6 Gründe, warum die Sicherung von Office 365 von entscheidender Bedeutung ist • Wer kontrolliert Office 365-Daten?
Tags : 
     Veeam '18
By: Gameffective     Published Date: Feb 26, 2019
Read this Microsoft case study about how Microsoft's Consumer Support Services - with its global network of support centers and thousands of agents - used digital motivation to drive agent performance and learning. Microsoft wanted new ways to recognize and reward agents while increasing their productivity. The focus was to change behaviors, develop skills, encourage sales, and drive outcomes. Microsoft identi?ed gami?cation as a solution to these needs. The company believed it could be more successful at encouraging and recognizing agents for positive outcomes through each customer interaction. Read the case study to learn how Microsoft: Increased productivity through gamification Drove agent performance with rewards, to change behaviors and business outcomes Improved agent knowledge and ability to apply the new information learned.
Tags : 
     Gameffective
By: Trend Micro     Published Date: May 03, 2018
Hybrid cloud security is a hot topic, especially with the massive growth of public cloud providers like Amazon Web Services (AWS), Microsoft® Azure™ and Google Cloud. With the emergence of the hybrid cloud, where workloads are deployed across physical, virtual, and cloud, security professionals are constantly being challenged to evolve their security practices to adapt to this new architecture. Trend Micro Hybrid Cloud Security, powered by XGen™, takes a blended approach. It combines multiple cross-generational threat defense techniques for protecting hybrid environments. When one technique isn’t effective against a given threat, another will step in to eliminate the threat.
Tags : 
     Trend Micro
By: Trend Micro     Published Date: May 03, 2018
Osterman Research wants to make it clear at the outset that we believe Microsoft Office 365 to be a robust and capable platform, one that will serve most organizations well. If your organization is using Office 365, we recommend you continue to do so. If you’re not using it, we recommend you consider it. Microsoft offers a large, varied and growing number of features and functions in Office 365, and at a wide range of price points that will satisfy different markets. Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery (among others) covering workloads like Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, and Azure Active Directory. An awareness of these shortcomings enables decision makers to plan for the mitigations required to assure the proper business performance of Office 365.
Tags : 
     Trend Micro
By: Riverbed     Published Date: Feb 26, 2015
Riverbed® SteelHeadTM SaaS addresses cloud services/software as a service (SaaS) performance challenges by providing an easy-to-deploy optimization solution that meets customer needs for application performance over WAN and Internet connections. Combining private wide area network (WAN) and public internet optimization, the SteelHead SaaS is a first-of-its-kind solution, which optimizes traffic across the public Internet with Riverbed’s award-winning SteelHead optimization system (formerly RiOS or Riverbed Optimization System) technology to accelerate data and application protocols. SteelHead SaaS delivers optimized performance up to 30x for cloud services/SaaS applications, such as Microsoft Office 365 or Salesforce.com, regardless of where the end user is located.
Tags : saas, cloud services, internet connections, application performance, wide area network, optimization
     Riverbed
By: Riverbed     Published Date: Feb 26, 2015
Non-Profit Accelerates Deployment and Delivery of Microsoft Office 365 to Realize Extensive "Cloud-First" Infrastructure.
Tags : cloud computing, infrastructure, cloud first, deployment
     Riverbed
By: Riverbed     Published Date: Apr 24, 2015
Download this infographic to see the advantages of using SteelHead SaaS and Microsoft Office 365.
Tags : steelhead saas, microsoft office 365, network latency, app delivery, networking, software development, it management
     Riverbed
By: Riverbed     Published Date: Apr 24, 2015
Riverbed Technology has been addressing performance issues on private and cloud enterprise networks with Steelhead wide-area network (WAN) optimization. Since 2012, Riverbed has applied its technology to Office 365 and Salesforce with Riverbed® Steelhead® Cloud Accelerator. Steelhead Cloud Accelerator combines WAN and Internet optimization to ensure bandwidth reductions and a superior user experience.
Tags : microsoft office 365, riverbed technology, wide area network optimization, salesforce, cloud, networking, software development, it management
     Riverbed
By: Riverbed     Published Date: Apr 24, 2015
This brief focuses on performance gains when using SteelHead SaaS with Office 365 for multi-tenant cloud services.
Tags : steelhead saas, microsoft office 365, optimization, cloud services, networking, software development, it management
     Riverbed
By: Riverbed     Published Date: Nov 02, 2016
Many organizations transitioning from on-premises Microsoft applications to Office 365 will experience performance problems due to geographic factors and use of the Internet for connectivity. IT can minimize performance issues and deliver an acceptable experience to end users by paying careful attention to network design.
Tags : 
     Riverbed
By: GreenSQL     Published Date: Nov 11, 2014
This white paper contains administrative and operational best practices that should be performed from a security perspective when using Microsoft SQL server. These best practices cover operative instructions and example code snippets needed for DBAs and Server Administrators.
Tags : sql server, insider breach, insider threat, firewalls, compliance, pci compliance, sql server best practices, data protection
     GreenSQL
By: BlueJeans Network     Published Date: Jun 17, 2016
The concept of all centralizing all communication methodologies (presence, instant messaging, voice, video, and messaging services) within a single system, a.k.a. unified communications or UC, is not new. One of the most popular platforms is Microsoft. In fact, Microsoft has indicated that it has 110 million Skype for Business or Lync users around the world. However, many organizations have yet to fully embrace the video conferencing capabilities available within Skype for Business / Lync. Overall we view Skype for Business (SfB) video conferencing as an excellent choice for sessions involving only SfB users. However, the SfB experience is focused more on content sharing and less on live video. Download this whitepaper to learn 12 situations in which users may wish to use a different video conferencing tool. In this paper, Wainhouse also compares two options for companies seeking better video capabilities.
Tags : skype for business, microsoft lync, video conferencing, bluejeans, employee communications, unified communications
     BlueJeans Network
By: Microsoft Windows     Published Date: Mar 31, 2017
Windows 10 is the best Windows yet, and at Microsoft, we are excited to deliver innovative Windows 10 experiences across a wide variety of world-class devices. Get the most out of Windows 10 with innovative hardware form factors that boost user productivity while reducing security risks—delivering more value at every price point. Download this buyer's guide to discover which Windows 10 Pro devices are right for your business.
Tags : 
     Microsoft Windows
By: Microsoft Windows     Published Date: Mar 31, 2017
Endpoint computing managers should plan to spend six to nine months learning about Windows 10, developing new environments and testing their applications. Such preparation will significantly lessen time and effort spent on migration and support.
Tags : 
     Microsoft Windows
By: Microsoft Windows     Published Date: Mar 31, 2017
This IDC Executive Brief uses recent research and IDC thinking to outline some of the challenges facing client computing, security, and compliance teams. In particular, it outlines how many of these challenges can be addressed through the deployment of Windows 10. It then looks at how well current hardware takes advantage of these core functions and features, concluding that for many organizations their current approach to hardware may well fall short of expectations.
Tags : 
     Microsoft Windows
By: Microsoft Windows     Published Date: Mar 31, 2017
This Microsoft-commissioned report demonstrates how deploying Windows 10 can reduce costs and provide significant benefits to your organization. The report found an ROI of 233% with a payback period of only 14 months.
Tags : 
     Microsoft Windows
By: Microsoft Windows     Published Date: Mar 31, 2017
Worried about cybercriminals taking down your business? Outsmart them with Windows 10. The threat landscape has evolved dramatically in recent years. It seems every day we hear another headline about an organization getting breached. We've responded by changing the architecture of Windows 10 so that we’re not just building bigger walls against these attacks; we’re locking the criminals out. Windows 10 provides a comprehensive set of protections against modern security threats. Download this Infographic to learn more!
Tags : 
     Microsoft Windows
By: Microsoft Windows     Published Date: Mar 31, 2017
Today’s enterprises and government agencies face new and emerging challenges that range from a constantly shifting threat landscape to managing multiple platforms and devices in the enterprise environment. Because of this, the US Department of Defense (DoD) has joined the ranks of enterprise customers planning swift Windows 10 deployments. Download this paper to learn about some of the security features that are drawing enterprise customers - like the Department of Defense - to Windows 10.
Tags : 
     Microsoft Windows
By: Microsoft Windows     Published Date: Mar 31, 2017
Windows 10 enabled key benefits across business and IT departments. Download this Infographic to learn more of Forrester's cornerstone findings.
Tags : 
     Microsoft Windows
By: HP     Published Date: Oct 09, 2008
Increase utilization, decrease energy costs with data center virtualization In the past, IT departments have responded to demands for new services and better performance by adding more hardware, resulting in underutilized technology silos and server sprawl. Today, many organizations are turning to virtualization technologies that facilitate consolidation and increased utilization. In short, virtualization brings the ability to pool, share and dynamically reallocate data center resources – and helps fulfill the promise of higher utilization and lower energy consumption and lower costs.Join us and learn why HP is well prepared to help you assess and address your needs. Find out what key virtualization partners -- such as VMware, Microsoft and Citrix – bring to the table and how HP can help you leverage their technology and expertise.
Tags : mission critical, virtualization, hewlett-packard company, enterprise applications, data management
     HP
By: Pivotal CRM     Published Date: Dec 21, 2007
In this paper, learn how with the right CRM solution, information workers can increase productivity, improve customer service, and boost collaboration, while the business simplifies complex processes, increases sales, and reduces costs.
Tags : information worker, crm, microsoft, office, customer relationship management, user adoption, information management, data management
     Pivotal CRM
By: Pivotal CRM     Published Date: Dec 21, 2007
For more than a decade, Pivotal CRM has been the choice of Microsoft-centric organizations that want the flexibility to model their specific business practices within their customer relationship management system. The Pivotal CRM product line leverages the Microsoft technology stack to provide usability and productivity advantages through integration to Microsoft Office, and more.
Tags : pivotal, crm, customer relationship management, microsoft, partner, partnership, alliance, product
     Pivotal CRM
By: Burton Group     Published Date: Apr 08, 2008
Industry debate about the relative merits of OpenDocument Format (ODF) and Ecma 376 Office Open XML (OOXML) highlights the significance of the productivity application market shift from binary and proprietary file formats to vendor- and product-independent Extensible Markup Language (XML) models. The competitive stakes are huge, and the related political posturing is sometimes perplexing.
Tags : odf, document, open document format, burton group, xml, ooxml, office open xml, microsoft office
     Burton Group
By: Entrust Datacard     Published Date: May 15, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.
Tags : entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
     Entrust Datacard
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com