partners

Results 751 - 775 of 779Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
     CA Technologies
By: Determine (Selectica)     Published Date: Sep 13, 2016
The sponsor named below commissioned Ardent Partners to write this report. While the report topic In 2015, collaboration is the name of the game in procurement and frequently entails working with key internal stakeholders (like line-of-business managers and legal departments) or preferred suppliers to drive greater value through sourcing and procurement. For Chief Procurement Officers ("CPOs") and other supply management leaders, collaboration has taken on many new and innovative forms over the years, causing these executives to leverage new (and, in some cases, existing) processes, relationships, and technologies to enhance compliance, decrease risk, and increase savings. One such business process, contract management, has been reborn with digital, automated features that can shift the way procurement teams collaborate, mitigate risk, drive performance, and realize greater savings for the enterprise.
Tags : 
     Determine (Selectica)
By: Veracode     Published Date: Oct 26, 2016
20% of enterprises have suffered a security incident related to a business application or IT service consumed from external partners. With breaches like these making headlines, and enterprises’ growing reliance on third-party software, security of the cyber supply chain will garner increased attention. Download this joint Veracode/Enterprise Strategy Group (ESG) report to explore enterprises’ challenges in securing their cyber supply chain and get best practices for ensuring that every application – regardless of its origin – is secure.
Tags : veracode, security, supply chain security, web applications, application security, enterprise applications
     Veracode
By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
     IBM
By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : application management, application development, organization optimization, authentication, application security, enterprise applications, app blocking
     IBM
By: IBM     Published Date: May 16, 2017
When the CMO Council recently asked more than 200 senior marketing decision makers how effectively they have aligned physical and digital experiences, half admitted that these integrated experiences were selective, at best. Yet it is alignment, consistency and connection that drive the foundational relationship between the brand and the buyer. The CMO Council, in partnership with IBM, will host a one-hour interactive webcast with industry-leading media, entertainment and telecommunications marketers to discuss how audience insights across the digital and physical experience have been turned into action, allowing these brands to personalize and enrich each engagement. Multiple case studies will also be discussed during the webcast that focus on the power of segmentation and innovations around cognitive computing.
Tags : technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
     IBM
By: IBM     Published Date: Sep 11, 2017
A partnership for the next generation of project automation
Tags : automation anywhere, webinar, project automation
     IBM
By: IBM     Published Date: Oct 26, 2017
With the growing demand of business for tighter communication and collaboration with external parties such as business partners and customers, IT has to provide the technical foundation for such integration. Web Access Management and Identity Federation are key technologies for that evolution. They enable organizations to manage access both from and to external systems, including cloud services, in a consistent way. Organizations have to move forward towards strategic approaches to enabling that integration, in support of the Extended and Connected Enterprise.
Tags : access management, identity federation, it strategies, security, infrastructure
     IBM
By: Datastax     Published Date: Aug 15, 2018
With DataStax Enterprise 6 (DSE 6), we upped the bar substantially for us, our partners, our customers, and our competitors. We also came out and said that DSE 6 was twice as fast as open source Apache Cassandra™, and now, we have a third-party validation of this claim. Read this benchmark report from zData to get the results of their test of DSE 6 against Cassandra, for which they ran a different series of workloads on an AWS-built cluster.
Tags : 
     Datastax
By: Juniper Networks     Published Date: Jun 22, 2017
This study was conducted with independent global research firm Wakefield Research between November 24 through December 14th, 2015. The data was based on an online study of 20 content questions, plus screeners and demographics of 2704 respondents, in 8 markets: US, China, Australia, Japan, India, UK, Germany, and France. All respondents were restricted to the following industries: service provider organizations, healthcare, retail, and financial services. In this case, the definition of service provider includes companies offering web content services, cable, internet service providers, or telecom. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. Our team co-innovates with customers and partners to deliver automated, scalable and secure networks with agility, performance and value. Visit www.juniper.net for more information.
Tags : security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
     Juniper Networks
By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
     Juniper Networks
By: Juniper Networks     Published Date: Aug 10, 2017
In today’s business and IT landscape, the network is no longer simply a basic IT function. It is an essential business asset. The ability of your network users—whether they be employees, customers, or partners—to have fast, real-time access to online resources is directly correlated to financial success.
Tags : software as a service, platform as a service, infrastructure, cloud service provider, virtual data center, sdsn
     Juniper Networks
By: Datavail     Published Date: Nov 03, 2017
“One of the most popular MDM solution is Oracle Hyperion Data Relationship Management. Oracle DRM is used to resolve the challenges across the people, processes, and tools that go into the tasks of data management. Although Oracle DRM is a powerful software, it nevertheless presents challenges for organizations seeking to integrate it with other Oracle applications such as PeopleSoft Financials – DRM is unable to automatically push updates made within its system to PeopleSoft. As a result, changes in DRM to cost centers, project centers, trees, and hierarchies must be manually updated in PeopleSoft Financials – a tedious process that can take hours every day. The good news is that these challenges can be easily addressed with the support of partners such as Datavail.
Tags : 
     Datavail
By: Sage     Published Date: Oct 17, 2019
Imagine a factory which connects information and interconnectivity—a model of quiet efficiency. Where intelligent machines collaborate with each other, run by a team of analytical, well-trained workers. A center of innovation—the hub of a supply chain that combines customers, suppliers, distributors, and partners with advanced analytical systems. Now imagine the future—the Smart Factory, where there’s minimal downtime, neglect, waste, and inefficiency. Where factory managers, financial experts and boardroom executives use cutting-edge technology to understand data and production—reaching the pinnacle of technology and manufacturing development. The Smart Factory dream is closer than you think.
Tags : 
     Sage
By: Oracle     Published Date: Mar 22, 2019
Argyle CIO Webcasts, in partnership with Oracle, brings together top IT executives for an innovative, discussion-based webcast exploring the promises and perils of transformational technologies on the financial services industry.
Tags : 
     Oracle
By: Box     Published Date: Jun 22, 2018
• Business is changing faster than ever, and disruptors doing things in digital ways are leading the charge in just about every market. If you're not already managing your content in the cloud, it’s time to make a shift. • With Box, teams are unified, collaboration is sped up and productivity is amplified. This ebook illustrates how real Box customers are using the power of the cloud to get every part of their extended enterprise working together, from mobile productivity to streamlined business processes. o Marketing collaboration is integrated when internal teams and external partners work from one digital hub o Sales teams and workers in the field are empowered across any device with mobile productivity o HR streamlines processes for better team workflow and a stronger onboarding experience • To read how Box customers are using Cloud Content Management to enact practical transformation across teams, and to find out how you too can use Box to benefit every line of business within
Tags : 
     Box
By: Box     Published Date: Jun 22, 2018
Like other IT leaders, you know you have to modernize your IT infrastructure to become more productive, efficient, agile and competitive. So what's holding you back? Many organizations are still devoting anywhere from 60% to 80% of their time, energy, human resources and budget to supporting legacy systems rather than develop transformative solutions. Our new eBook, Your 3-step roadmap to IT modernization, will help you align your approach to IT with the way your business works today — and the way you will work in the digital age: • Increased mobility, multiple device formats and distributed workgroups • Greater collaboration with outside organizations, including customers, suppliers and partners • Essential enterprise risk management features such as compliance, legal, security and data governance Here you'll learn the three stages of IT modernization — from realigning your infrastructure to updating business processes — so you take the right steps.
Tags : 
     Box
By: SAP     Published Date: Oct 11, 2018
Today's supply chains typically include multiple partners, with services and sourcing managed across several organizations and across the world. Companies are increasing their use of third-party suppliers in the execution of key strategic imperatives. This leads to complexity in the supply chain and increased scale and intensity of operations, all of which contribute to global warming.
Tags : 
     SAP
By: Workday Italy     Published Date: Sep 19, 2018
People analytics is increasingly on the agenda for organisations. With the rise of workplace technology allowing leaders to track employees’ performance, productivity and wellbeing, we partnered with the CIPD to survey over 3,000 business professionals to understand how people analytics is being used. And the results are in. 65% of respondents who work in an organisation with a strong people analytics culture, say their business performance is strong compared to competitors. As well as outlining the key opportunities leaders can capitalise on, this report covers: - How different professions are using people data - The various types of people data that are being used - How people analytics adds value to organisations - What the future holds for people data
Tags : 
     Workday Italy
By: BetterUp     Published Date: Oct 29, 2018
"Workday has grown at a rapid pace since the company’s inception. Though this growth was indicative of the company’s success, it had an unintended side effect. Workday faced the same challenge experienced by nearly every high growth company: a tension between growth and culture. The company needed a way to bring all of its employees into its values system quickly, and ensure that people leaders were truly growing and leading in alignment with Workday’s culture. The company also needed a way to help people leaders newer to management learn and on-ramp quickly, in alignment with the speed of the business. One of the steps Workday took to protect and nurture its special culture was reaching out to BetterUp to try out its leadership coaching. In partnership with Workday, BetterUp introduced an initial pilot program focused on people managers, with the goal of helping Workday support and grow its people leaders in the future."
Tags : 
     BetterUp
By: ipoque     Published Date: Feb 14, 2019
Area of business ? Leader in virtualized mobile networks, providing virtualized network solutions to top-tier CSPs Challenge ? vEPC helps CSPs transform their network architecture in order to move to SDN/NFV, reducing overall costs ? Providers of virtualized network solutions have to create a market differentiator to assert their position successfully in an increasingly competitive marketplace Solution ? By embedding the easy-to-implement highperformance DPI-engine R&S®PACE 2 from Rohde&Schwarz, the vEPC vendor can focus on their core competencies in NFV and gain a competitive advantage in the rapidly growing NFV market Benefits ? The strong partnership between the vEPC vendor and Rohde&Schwarz ensures the high performance of the vEPC solution ? Sourcing R&S®PACE 2 guarantees a rap
Tags : 
     ipoque
By: SailPoint Technologies     Published Date: Oct 25, 2019
With digital transformation, securing your identities and data has never been more important. Find out how oil and gas companies are using identity governance to make sure employees, contractors, suppliers, business partners and bots are only accessing the right information, at the right time.
Tags : 
     SailPoint Technologies
By: Stratasys EMEA     Published Date: Feb 21, 2019
The adage “never stop learning” is alive and well for both the students at Milwaukee School of Engineering (MSOE) and its Additive Lab Consortium members. The school of 2,900 students, located in the heart of downtown Milwaukee has ties with 47 manufacturing companies, including Kohler, Snap-on Tools, Baxter Medical and Master Lock. The Consortium was born out of necessity 27 years ago when MSOE was faced with a 50 percent shortfall in the funds needed to get an additive lab up-and-running. The school approached industry and opened partnership talks around additive technology. Four founding partners came on board, each contributing one-eighth of the cost of the lab. In turn they were provided with non-competitive, shared access. Currently, consortium members pay yearly dues in return for lab hours and access to additive manufacturing expertise.
Tags : 
     Stratasys EMEA
By: Loop Commerce     Published Date: Mar 08, 2019
Loop Commerce invented the $600B G-Commerce industry by building the first digital solution that makes it simple to shop for others and partnering with retailers like Target, Uniqlo, and Neiman Marcus along the way. After an acquisition by Synchrony, their deep consumer financial services experience and strong retail partnerships makes this the most exciting innovation in an always changing industry. See how the top retailers on the planet are embracing the huge customer segment shopping for others and seeing spikes in revenue because of it.
Tags : 
     Loop Commerce
By: Loop Commerce     Published Date: Mar 11, 2019
Loop Commerce invented the $600B G-Commerce industry by building the first digital solution that makes it simple to shop for others and partnering with retailers like Target, Uniqlo, and Neiman Marcus along the way. After an acquisition by Synchrony, their deep consumer financial services experience and strong retail partnerships makes this the most exciting innovation in an always changing industry. See how the top retailers on the planet are embracing the huge customer segment shopping for others and seeing spikes in revenue because of it.
Tags : 
     Loop Commerce
Start   Previous    18 19 20 21 22 23 24 25 26 27 28 29 30 31 32    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com