visibility control

Results 26 - 50 of 171Sort Results By: Published Date | Title | Company Name
By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : network security, security breaches, pci, dss, hippa
     Brother
By: Lenovo - APAC     Published Date: Jan 28, 2019
Asian ICT infrastructure investment is exploding as businesses review and modernise their data-centre architectures to keep up with the service demands of a growing and increasingly sophisticated population. Demand for cloud services, particularly to support big-data analytics initiatives, is driving this trend. Frost & Sullivan, for example, believes the Asia-Pacific cloud computing market will grow at 28.4 percent annually through 2022. Despite this growth, many businesses are also rapidly realising that public cloud is not the best solution for every need as theydo not always offer the same level of visibility, performance, and control as on-premises infrastructure.This reality is pushing many companies towards the middle ground of hybrid IT, in which applications and infrastructure are distributed across public cloud and self-managed data centre infrastructure. Read about Medical company Mutoh and how it took advantage of the latest technology.
Tags : lenovodcg, nutanix, hyperconvergedinfrastructure, hci
     Lenovo - APAC
By: Lenovo - APAC     Published Date: Feb 11, 2019
Asian ICT infrastructure investment is exploding as businesses review and modernise their data-centre architectures to keep up with the service demands of a growing and increasingly sophisticated population. Demand for cloud services, particularly to support big-data analytics initiatives, is driving this trend. Frost & Sullivan, for example, believes the Asia-Pacific cloud computing market will grow at 28.4 percent annually through 2022. Despite this growth, many businesses are also rapidly realising that public cloud is not the best solution for every need as theydo not always offer the same level of visibility, performance, and control as on-premises infrastructure.This reality is pushing many companies towards the middle ground of hybrid IT, in which applications and infrastructure are distributed across public cloud and self-managed data centre infrastructure. Read about Medical company Mutoh and how it took advantage of the latest technology.
Tags : lenovodcg, nutanix, hyperconvergedinfrastructure, hci
     Lenovo - APAC
By: Gigamon     Published Date: Apr 10, 2019
Need powerful visibility and insights into network traffic while reducing risk, complexity and costs? Download the new Definitive Guide™ to Next-Generation Network Packet Brokers to learn why you should shift your infrastructure strategy to include NGNPBs, which offer new, expanded feature sets that simplify your architecture, realize the true ROI of your security tools and give you visibility into critical security threats. Learn how to see, control and secure what matters -- download now!
Tags : 
     Gigamon
By: Gigamon     Published Date: Jun 07, 2019
You know that complex microservices-based apps can be difficult to monitor, but did you know Application Intelligence provides both the visibility and the context needed to discover, manage and secure these apps? Download the Gigamon white paper “How to Gain Control of Complex Applications in the Time of Digital Transformation” to solve the challenges of capturing application traffic on the network, identifying apps and microservices, extracting information and metadata and distributing that information to tools.
Tags : 
     Gigamon
By: Acronis EMEA     Published Date: May 19, 2015
The Morse Group is now comprised of a strong network of member companies with more than $150 million in annual sales that deliver services in the electrical, energy and construction markets.
Tags : mobility, acronis access solution, increase your competitiveness, mobilised workforce, improving productivity, acronis access, secure competitive, mobile device, share documents, authentication, visibility, access control
     Acronis EMEA
By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
     Cisco Umbrella EMEA
By: Juniper Networks     Published Date: Feb 01, 2016
According to TechTarget, partnering with the right vendor to modernize your network can benefit business in three ways: Simplify the network to make management more efficient Secure the network for total visibility and control Adopt an open framework for agility and scalability
Tags : 
     Juniper Networks
By: Concur ENT     Published Date: May 11, 2018
VAT has been a valuable source of revenue for the UK Government since 1973. Yet, despite more than 40 years of getting used to calculating, paying and reclaiming VAT, businesses still struggle to adhere to HMRC guidelines. With support from SAP Concur, it doesn’t have to be this way. First, we offer an expense audit solution to check for fraud and non-compliance. Secondly, we work with tax specialists to help you comply with VAT regulations. Thirdly, we give you visibility and control over all aspects of your travel, expense and invoice spending. Crucially, we see VAT reclaim as an opportunity to reduce business costs and put money back in your budget.
Tags : 
     Concur ENT
By: Fiserv     Published Date: Nov 06, 2017
Uncover Exceptions Easily and Certify Financial Statements with Confidence. With increasing regulatory requirements for insurance organizations and the need for executive management to sign off on financial statements, it is critical to ensure that there is detailed visibility into the underlying financial data. Ongoing emphasis on having a strong internal control structure for insurers brings into light reconciliation and certification as being the critical components to making it happen.
Tags : automated reconciliation for insurers, automated reconciliation, automated certification for insurers, internal control structure, financial close, comprehensive reconciliation system, comprehensive reconciliation solution
     Fiserv
By: Citrix ShareFile     Published Date: Jun 12, 2017
Some of the biggest challenges IT teams face today stem from data loss and security risks arising from the unauthorized use of personal file sharing services by employees for business purposes. Personal file sharing services invite data leakage and compliance violations by allowing files being shared to escape beyond the visibility and control of IT. At the same time, these services meet the essential need of today’s mobile workforce to be able to access and share data wherever people work. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Tags : data loss, security, file sharing, mobile workforce
     Citrix ShareFile
By: Amazon Web Services     Published Date: Nov 28, 2017
So you’re thinking about moving to the cloud. Which means you’ve got some new (and some old) security issues to think about. Where do you start? What should you look for when you’re planning your cloud migration or expansion, and what features do you need to tick off your list when you compare partners for the project? At AWS, we’ve worked with millions of cloud users in 190 countries, from all kinds of industries – large enterprise, start-ups, non-profits, education and government. Every organisation's needs are different, but we’ve identified the top features of any successful cloud security initiative. Here are six must-haves for cloud security confidence.
Tags : integration, security, compliance, visibility, control, privacy, data, marketplace
     Amazon Web Services
By: Amazon Web Services     Published Date: Nov 28, 2017
You know that moving to the cloud is a huge opportunity for your business do great things. Be more agile, be more responsive, do things better. But convincing everyone in your business isn’t easy, especially your security and compliance people who may well see the cloud as too big a risk. This eBook is about answering those security questions – and communicating the six core benefits a data secure cloud will bring to your organisation.
Tags : cloud, aws, security, organizations, visibility, control, networks, platforms
     Amazon Web Services
By: Intel Security     Published Date: Oct 21, 2015
This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : mcafee, intel, security, data, cloud, data center
     Intel Security
By: IBM     Published Date: Jan 19, 2017
This ebook takes you on a journey to discover a cloud-based content management solution that provides greater visibility and collaborative control over business content. Meet Mike, an IT Solutions Executive, looking for an innovative way to collaborate that's secure, easy to use, immediate and accessible -- all while meeting strict governance policies.
Tags : ibm, analytics, ecm, box, box for it, content, cloud, content management, enterprise applications
     IBM
By: Symantec     Published Date: Dec 13, 2017
Enterprise’s are increasingly under threat from sophisticated attacks. In fact, research has found that threats dwell in a customer’s environment an average of 190 days1. These Advanced Persistent Threats use stealthy techniques to evade detection and bypass traditional security defenses. Once an advanced attack gains access to a customer environment the attacker has many tools to evade detection and begin to exploit valuable resources and data. Security teams face multiple challenges when attempting to detect and fully expose the extent of an advanced attack including manual searches through large and disparate data sources, lack of visibility into critical control points, alert fatigue from false positives, and difficulty identifying and fixing impacted endpoints.
Tags : investigation, exposure, attacks, endpoints, network, email, cloud, security, symantec
     Symantec
By: Fiserv     Published Date: Mar 02, 2018
Uncover Exceptions Easily and Certify Financial Statements with Confidence. With increasing regulatory requirements for financial institutions and the need for executive management to sign off on financial statements, it is critical to ensure that there is detailed visibility into the underlying financial data. Ongoing emphasis on having a strong internal control structure for insurers brings into light reconciliation and certification as being the critical components to making it happen. When done properly, they assure accuracy of information flowing into the financial close process, with minimal risk of misstatement, and a full audit trail. The white paper, Certify with Confidence: How Automated Reconciliation Lets You Sign With Certainty, explains how a comprehensive reconciliation solution should work In today's regulatory climate, and why a comprehensive, end-to-end, automated reconciliation system is essential to protecting yourself and your company.
Tags : automated reconciliation, automated reconciliation for banks, automated certification, automated certification for banks, internal control structure, financial close, comprehensive reconciliation system, comprehensive reconciliation solution
     Fiserv
By: Fiserv     Published Date: Mar 02, 2018
Uncover Exceptions Easily and Certify Financial Statements with Confidence. With increasing regulatory requirements for insurance organizations and the need for executive management to sign off on financial statements, it is critical to ensure that there is detailed visibility into the underlying financial data. Ongoing emphasis on having a strong internal control structure for insurers brings into light reconciliation and certification as being the critical components to making it happen. When done properly, they assure accuracy of information flowing into the financial close process, with minimal risk of misstatement, and a full audit trail. The white paper, Certify with Confidence: How Automated Reconciliation Lets You Sign With Certainty, explains how a comprehensive reconciliation solution should work In today's regulatory climate, and why a comprehensive, end-to-end, automated reconciliation system is essential to protecting yourself and your company.
Tags : automated reconciliation for insurers, automated reconciliation, automated certification for insurers, internal control structure, financial close, comprehensive reconciliation system, comprehensive reconciliation solution
     Fiserv
By: Ruckus Wireless     Published Date: Jul 11, 2018
Is your WLAN under increasing pressure from more users, more types of connected devices, and more bandwidth-intensive applications? It’s time to consider a better solution. With Ruckus Cloud Wi-Fi you get simple, centralized cloud-based management and the best performing Wi-Fi access points for high-density environments. Your job gets easier and your Wi-Fi gets better. Get visibility and control of your distributed Wi-Fi network with bandwidth to spare.
Tags : 
     Ruckus Wireless
By: ESET, LLC.     Published Date: May 16, 2011
Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment. As part of our Cybersecurity Masters webinar series, ESET would like to invite you to attend these expert presentations by Forrester and ESET.
Tags : eset, cybersecurity webinar, security manager, it security
     ESET, LLC.
By: Progress Software     Published Date: Sep 27, 2010
What are the top strategies to expand visibility of all business operations? How can you reduce your time-to-value? If you're looking for a better, timelier way to respond to the changing conditions and events that impact your business, register for Your Business Moves Faster When You're at the Controls.
Tags : progress, cto, business operations, webcast, idc, improvements
     Progress Software
By: Bazaarvoice     Published Date: Aug 05, 2014
The local consumer decision journey has changed. This step-by-step guide will show you how to connect with local consumers to improve visibility, gain control of your reputation, and drive more local leads and sales.
Tags : bazaarvoice, customer, local advocacy, sales, online discovery, local marketing
     Bazaarvoice
By: Technomedia-Hodes iQ     Published Date: Apr 26, 2012
Learn why hundreds of today's leading companies like Caesars Entertainment, Bell, Ingersoll Rand, Sony, UTC and Eddie Bauer turn to Technomedia-Hodes iQ to help them create the world's most successful workplaces. Download our complimentary case study and get the inside scoop. Learn how MarketStar automated processes to bring increased visibility into recruiting metrics for better talent management, spend control and decision-making.
Tags : human resources, roi, hr management, human resource management, technology, recruiting technology, recruiting
     Technomedia-Hodes iQ
By: Maxwell Systems     Published Date: Sep 11, 2013
The construction game's changed. In order to stay competitive, you need increased visibility and control of your projects, from bid to cash. That's why contractors have turned to optimized, comprehensive solutions to get the end-to-end control they need for success.
Tags : optimization, construction business, construction, profitable growth, increased visibility, contractors, comprhensive solutions
     Maxwell Systems
By: Epicor     Published Date: Dec 06, 2018
Over the last several years, manufacturers have embraced cloud applications. However, some manufacturers remain reluctant to migrate ERP systems and other business-critical applications to the cloud. Read on to discover four areas where manufacturers can benefit from a more complete understanding of how and why Epicor Cloud ERP offers unique advantages compared to on-premises deployment, including: • Increased data security • Greater financial visibility and control • Better long-term reliability • Easier access to cutting-edge tech innovation Moving an ERP environment to the cloud enables IT leaders to free up the resources they need to partner with the business and to focus on more strategic technology initiatives. Download the white paper to learn more.
Tags : epicor erp, erp system, cloud erp
     Epicor
Start   Previous    1 2 3 4 5 6 7    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com