reports

Results 26 - 50 of 326Sort Results By: Published Date | Title | Company Name
By: Dell EMC     Published Date: Aug 06, 2018
Download this whitepaper for 4 reasons shorter server resfresh cycles are better for business. Analyst firm IDC reports that organizations can increase agility, improve efficiency and reduce operational costs by refreshing their servers every three years.
Tags : 
     Dell EMC
By: Akamai Technologies     Published Date: Aug 11, 2017
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: HP     Published Date: Jun 24, 2014
This ESG paper reports on the results of a series of in-depth interviews with senior IT professionals from different industries.
Tags : intel, storage capabilities, storage infrastructure, storage capacity, storage requirements, backup, recovery, archive, roi of hp storage solutions, business value of hp storage solutions
     HP
By: HP     Published Date: Jul 03, 2014
This ESG paper reports on the results of a series of in-depth interviews with senior IT professionals from different industries
Tags : 
     HP
By: Adobe     Published Date: Aug 22, 2013
Web Content Management is becoming the focal point for companies who wish to deliver a truly seamless multichannel customer experience. The strategic importance of WCM is increasingly referenced in analysts' reports such as Forrester, which stress the importance for companies to move beyond using a CMS as a means to simply manage content and strategically utilise it to create digital experiences. With that said, it is concerning that just 38% of this survey's respondents agree that their CMS facilitates a 'brand enhancing digital presence.' Download this report to learn more.
Tags : content management, customer experience management, web content management
     Adobe
By: Actuate     Published Date: May 19, 2014
A white paper providing a breakdown in five steps of embedding reports, dashboards and analytics.
Tags : embedding reports, dashboards, analytics, saas, actuate, software application providers, software development
     Actuate
By: Cisco     Published Date: Sep 14, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency
Tags : 
     Cisco
By: Cisco     Published Date: Sep 21, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption. Download this whitepaper to find out more.
Tags : cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
     Cisco
By: Dell EMC     Published Date: May 08, 2019
IDC reports companies that modernize IT infrastructure for emerging technologies such as AI thrive and see results such as launching IT services faster and closing more deals. Access this comprehensive whitepaper from Dell and Intel® to learn more.
Tags : 
     Dell EMC
By: Oracle     Published Date: Aug 08, 2013
With Oracle CRM you can quickly and easily create custom reports and dashboards for more insightful selling.
Tags : customizable dashboards, crm, oracle, custom reports, dashboards, sales, data management
     Oracle
By: Oracle     Published Date: Aug 15, 2013
With Oracle CRM you can quickly and easily create custom reports and dashboards for more insightful selling.
Tags : customizable dashboards, crm, oracle, custom reports, dashboards, sales, enterprise applications
     Oracle
By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : secutiry, certificates, keys, security attacks, business
     Venafi
By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
     CA Technologies
By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Technology BUSINESS CHALLENGE Reduce the impact of malware on enterprise resources IT ENVIRONMENT Symantec antivirus, layered enterprise security SOLUTION Malwarebytes Incident Response RESULTS Saved hours per week by eliminating manual threat remediation Detected and remediated threats that otherwise would not have been found Eliminated downtime for end users with thorough scans and fast remediation Easily generated reports that keep upper management informed
Tags : 
     MalwareBytes EMEA
By: Prophix     Published Date: May 31, 2016
Watch how Prophix empowers you with monitoring reports and analytics to support a continuous process that involves the input of employees from across the organization. With Prophix, you can evaluate your corporate performance from both high-level and granular views. And by ensuring that you keep an eye on the alignment of business goals and the company’s progress, you will enjoy a valuable tool for facilitating informed decision making.
Tags : prophix, best practices, productivity, business analysis
     Prophix
By: Okta     Published Date: Mar 10, 2016
LinkedIn sees cost and time benefits from Okta’s on-demand identity and access management service; securely integrating their cloud applications with Active Directory, single sign-on, and provisioning reports.
Tags : 
     Okta
By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
"This commissioned study conducted by Forrester Consulting on behalf of Oracle reports key findings from a survey of 250 eCommerce decision makers on the shift in the marketplace from on-premises commerce infrastructures to modern SaaS solutions. Read this report to learn: - Top considerations when choosing an eCommerce SaaS platform - The factors most critical to a successful SaaS implementation - Benchmarks on eCommerce processes - Which practices distinguish high performers from all others"
Tags : 
     Oracle Commerce Cloud
By: HPE APAC     Published Date: Feb 23, 2017
Read this extract and the full reports to find out people's perceptions regarding hyperconverged infrastructure and includes overall IT challenges, sentiment around the technology and an in-depth look at key uses cases that are supported by the technology.
Tags : hyperconverged infrastructure, data center, storage, it challenges
     HPE APAC
By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
     CA Technologies
By: Juniper Networks     Published Date: Oct 20, 2015
RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors.
Tags : juniper, cybercrime, data, narkets, research, analysis, networking, security, data management
     Juniper Networks
By: Intacct Corporation     Published Date: Jan 26, 2016
Download the white paper, “Developing P&L Reports to Improve Visibility” and learn how to improve: • Insight into organizational performance through a reliable and actionable P&L statement • Visibility into operational, competitive or strategic issues • Data integrity with a single source of truth for profit and loss information
Tags : 
     Intacct Corporation
By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
     CA Technologies
By: Cardinal Health     Published Date: Dec 28, 2017
Data driven tools and analytics can uncover a wealth of new savings opportunities for surgery centers and surgical hospitals. And you usually don’t have to search far to uncover the savings. You can immediately tap into one source of data to find these opportunities. Every Electronic Health Record (EHR) and Practice Management System offers a set of standard reports. Stored inside are at least five ways to save. Download this whitepaper to learn about these five opportunities
Tags : 
     Cardinal Health
By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Application release automation (ARA) tools enable best practices in deploying and promoting applicationrelated artifacts, properties, configurations and even data across an application lifecycle in a safe, predictable and repeatable manner. Gartner reports that using an ARA tool is key to enabling DevOps and achieving continuous delivery. Wikipedia also defines five dimensions of scalability that can apply to ARA tools: • Administrative scalability • Functional scalability • Geographic scalability • Load scalability • Generational scalability This white paper will explain how each of these criteria is relevant when choosing an ARA product that is capable of scaling along with the growth of your enterprise.
Tags : 
     CA Technologies_Business_Automation
By: SambaSaftey     Published Date: Mar 15, 2019
Collaboration among compliance safety, and risk DS Services, a distributor of leading beverage brands to residential and business customers, employs more than 3,500 drivers nationwide. Tracking its drivers – and ensuring they’re qualified to be behind the wheel – isn’t easy. “Reviewing motor vehicle records (MVRs) can take weeks, as every state reports violation information differently,” says Jason Gay, DOT compliance administrator for DS Services. “I was spending 12 to 15 hours a week on paperwork alone. It was time to simplify the process.” DS Services originally turned to SambaSafety to help reduce paperwork and increase efficiency; however, by incorporating continuous driver monitoring into its safety program, DS Services is able to impact its business in . other positive ways.
Tags : 
     SambaSaftey
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com