dam

Results 526 - 550 of 927Sort Results By: Published Date | Title | Company Name
By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : data security, compliance, technology, network security, regulatory compliance, security, enterprise applications, data management
     Intralinks
By: Javelin Strategy & Research     Published Date: Jul 02, 2008
Javelin Strategy & Research has released a study covering data breach victims, which highlights the acute awareness among consumers about data security and the significant implications security breaches represent to businesses once consumer trust is compromised. Read this report, which also reveals Javelin's recommendations to institutions to address consumer security concerns and expectations in the event of a data breach.
Tags : javelin, debix, customer service, customer experience, damage control, data breach, security breach
     Javelin Strategy & Research
By: Jive     Published Date: Feb 12, 2015
Relive this webinar with leading industry analyst Brian Vellmure. Flanked by seasoned CIOs (and Jive customers) Tony McGivern of FICO and Patrick O’Hare of Spectrum Health, Brian explores how CIOs are taking the lead in guiding their organizations through a rapidly evolving technology landscape. Topics covered include: • Navigating internal politics to overcome technological inertia • Choosing infrastructure and platforms that allow rapid technology adoption at scale • Shifting focus to exploit a fundamentally different technological landscape • Balancing and evolving the role of CIOs from cutting costs to driving business strategy
Tags : enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication
     Jive
By: Jive Software     Published Date: Feb 19, 2013
Social Business represents a fundamental shift in how businesses communicate. Don’t be the last to adopt the biggest innovation in corporate communication since email.
Tags : social business software, social business, employee collaboration, employee productivity, brand loyalty, customer support
     Jive Software
By: Juniper Networks     Published Date: Oct 19, 2015
Customers looking to cloud technologies for better application agility and more efficient support of their entire IT operations are finding that broader use of virtualization across hardware is fundamental to achieving these goals.
Tags : juniper, software, data center, cloud, vmware, application agility, networking, it management
     Juniper Networks
By: Juniper Networks     Published Date: Feb 05, 2018
The role of IT is fundamentally changing from a cost-efficient enablement technology to a more strategic element of the enterprise. For companies born before the digital era, IT is a key player on their path to digital transformation; for more recent businesses designed with technology at their core, IT represents a foundational pillar on top of which everything else is built. With this shifting role, IT’s decades-long emphasis on TCO is being eclipsed by a new-found focus on security and automation. Whether it’s the continuous risks posed by a dynamic threat landscape, the threat of digital disruption, or an inability to keep pace with the latest trends, virtually every enterprise needs to be more agile. And, with the continued evolution of compute, storage, and applications, networks have been exposed as a bottleneck to change.
Tags : enterprise, cloud, data, center, networking, juniper
     Juniper Networks
By: Juniper Networks     Published Date: Aug 10, 2017
The digital, connected world is fundamentally changing the dynamics of the financial services industry. Consumers expect anytime and anywhere access with a customer experience commensurate with the Internet world, while fintech start-ups disrupt established value chains, driving a need to deliver faster innovation. This is creating tremendous pressure on the network, with escalating demands for performance and agility, while cost control and compliance imperatives remain as dominant as ever. This paper looks at optimal strategies for CIOs and CTOs, exploring how the future network needs to evolve to both drive operational effectiveness and enable business change, while assessing key investment and strategic considerations for equipping the network for the digital financial institution.
Tags : security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure
     Juniper Networks
By: Juniper Networks     Published Date: Jul 31, 2019
Cybercrime has rapidly evolved, and not for the better. What began in the 1990s as innocent pranks designed to uncover holes in Windows servers and other platforms soon led to hacker Kevin Mitnick causing millions of dollars in malicious damages, landing him in prison for half a decade and raising the awareness of cybersecurity enough to jump-start a multimillion-dollar antivirus industry. Then came the script kiddies, unskilled hackers who used malicious code written by others to wreak havoc, often just for bragging rights. If only that were still the case.
Tags : application management, application performance, network infrastructure, network management, network security
     Juniper Networks
By: Kaseya     Published Date: Mar 12, 2015
The risks of irregular maintenance and non-compliance of IT and security policies can cost the organization much in terms of fines, lost opportunities and a damaged reputation. With such a serious and complex challenge, employing an efficient and comprehensive solution is paramount to minimize risk and instill confidence in the organization’s ability to fulfill on its compliance requirements.
Tags : it systems, systems management, financial institutions, banking sector, compliance hurdles
     Kaseya
By: Kaspersky     Published Date: Feb 06, 2017
The total amount of damage caused by cryptomalware can be divided into two parts: the ransom and the related losses. Drawing from our survey of over 4,000 small- and medium-sized companies conducted by Kaspersky Lab and B2B International, we take a closer look at the numbers behind the damage.
Tags : cryptor, ransomware, malware, encryption, business security, cyberthreat, cyberattack
     Kaspersky
By: KEMP Technologies     Published Date: Aug 04, 2008
Websites have become critical components of most businesses’ core operations. They support the brand and ordering process, serve as data information resources and assist in overall customer care. Having poor website performance or poor reliability can destroy or severely damage a business and its reputation. The increasing importance of these websites leads to critical requirements of security, reliability and scalability. Delivering these, however, can leave an SMB stretched beyond its resources.
Tags : load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
     KEMP Technologies
By: Kofax     Published Date: Aug 24, 2017
Are you ready for the digital revolution? Digital transformation is fundamentally reshaping the way insurers do business. From automated data integration, mobile implementation and analytics, digital transformation spans across your enterprise operations This white paper provides you with the roadmap you need to build a comprehensive enterprise-wide digital transformation plan that makes your insurance organization not only competitive, but differentiated. • Understand the forces behind digital disruption: customers, competitors, costs and compliance • Learn how to map, prioritize and identify opportunities for digital transformation • Leverage a process maturity model to advance your digital position
Tags : digital future, digital revolution, data integration, positioning
     Kofax
By: KPMG     Published Date: Oct 19, 2018
A modular, holistic approach to change Digital disruption is forcing companies to fundamentally rethink how they compete. You probably used to solve this challenge by buying better technology. But in today’s complex, fast-changing business world, that single-minded approach is destined for failure. KPMG’s Technology Strategy and Selection (TSS) framework is a modular, holistic approach that drives lasting, long-term value from technology change. This article walks through the four key phases of the leading edge framework—creating a transformation vision, blueprinting the future organization, selecting the supporting technology, and implementing the new tools.
Tags : 
     KPMG
By: KPMG     Published Date: Jun 06, 2019
In a world where digital is mainstream, the IT function lives or dies on the way it delivers technology services, responds to issues and manages expectations. Are you ready for the future? Download this report to discover: • what role IT has to play in developing a future-ready, connected enterprise • why fundamental changes to the IT operating model are necessary • six key areas where IT must deliver to avoid getting left behind.
Tags : 
     KPMG
By: KPMG     Published Date: Aug 21, 2019
CEOs seeking to disrupt their sector rather than be disrupted, are turning to Agile development methods in order to accelerate development and rapidly adapt to changes in business requirements. Agile development is a group of methodologies, utilising incremental, iterative work sequences or sprints delivered by cross-functional teams and represents a fundamentally different way of working from traditional waterfall development. One of the major barriers to successful adoption of Agile ways of working, is a lack of industry consensus on how to successfully contract for Agile. The traditional Time & Materials approach is slow, and can obstruct collaboration. This paper discusses the alternative models for sourcing Agile and gives recommendations that benefit both customer and suppliers.
Tags : 
     KPMG
By: KPMG     Published Date: Sep 04, 2019
Operational resilience is high on the regulatory agenda in the UK. A joint discussion paper in 2018 took a broader view of operational resilience to cover all risks to the provision of critical business services with a greater emphasis on recovery and response when incidents occur. Regulators now place the same importance on operational resilience as on financial resilience. This represents a fundamental shift that companies are at different stages of addressing. Based on discussions with clients and regulators here are ten conversations to help guide you through this new landscape.
Tags : 
     KPMG
By: KPMG     Published Date: Oct 15, 2019
The asset and fund management industry has grown signifcantly in the last decade, with surveys indicating about 65 percent growth since 2007, to over USD 80 trillion in assets under management worldwide. As its importance to the world financial system – linking those with money to invest with enterprises and activities that require funding – is increasingly recognized, so both the industry and the regulators that police the sector become more prominent. The industry and regulators are coming under pressure from a range of “external” voices – demanding investors and consumer groups, clamoring political and economic needs, changing priorities and hopes of civil society, an increasingly noisy press, the explosion in social media and the rapid growth of new technologies. This sea of voices is directly influencing the regulatory agenda and increasing expectations on the industry. A fundamental rethink of firms’ mindset and investment offerings is required.
Tags : 
     KPMG
By: LeftHand Networks, Inc.     Published Date: Jan 15, 2009
Carefully protecting and managing the storage that holds a company’s data has become one of the most important missions of today’s Information Technology (IT) organizations. With data being a company’s most valuable asset, many are turning to Storage Area Networks (SANs) as a way to meet a number of challenges.  This White Paper looks at how a well built SAN can provide real benefits to your organization and improve overall efficiency within you network.
Tags : lefthand networks, san, storage area networks, simplification of storage, central data storage
     LeftHand Networks, Inc.
By: LifeSize, a division of Logitech     Published Date: Feb 01, 2013
Seeing is believing -- The Lifesize Icon Series gives you a radically simplified user experience, meaning, it's fast and easy to collaborate since screen options logically follow what you want to do over video. Read on to learn more features.
Tags : lifesize, icon, series, lifesize icon series, experience video, easily, easy ui, simple ui
     LifeSize, a division of Logitech
By: Limelight     Published Date: Feb 16, 2018
When it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questions. In this paper we’ll explore the 5 things you should know about multi-CDN in order to determine if it might make sense for your business.
Tags : content delivery network, cdn, multi-cdn, multiple cdns, website performance, website acceleration, digital content delivery, mobile delivery
     Limelight
By: Limelight Network     Published Date: Aug 12, 2019
Cyber-criminals are increasingly sophisticated and targeted in their attacks. If you are in charge of ensuring the security of your company’s website, it has not been easy going as these notable security incidents reveal: • Sabre Systems—The reservation software company had data from Hard Rock Hotels, Google, Loews, and others, stolen as a result of the breach1. • CIA—WikiLeaks obtained and published documents detailing the intelligence agency’s hacking efforts1. • Virgin America—Thousands of employees and contractors had their login information compromised1. • Equifax—The credit rating agency had a breach into highly sensitive personal information of 143 million U.S. consumers1. • Universities and Federal Agencies—More than 60 universities and US federal organizations were compromised with SQL injections1. There are numerous lessons to be learned from these breaches. Despite the growing stream of news stories about highly damaging attacks that compromise customer info
Tags : 
     Limelight Network
By: Limelight Networks     Published Date: Mar 02, 2018
Can your business afford to lose $9,000 per minute? According to the Ponemon Institute $9,000 is the average cost of an unplanned outage. In some cases the costs are much higher. The catalogue of cloud outages over recent years is well publicized and reads like a “who’s who” of the technology industry. It seems no one is immune. But when it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questi
Tags : content delivery network, cdn, multi-cdn, multiple cdns, web performance, web acceleration, digital content delivery, mobile delivery
     Limelight Networks
By: Limelight Networks     Published Date: Mar 02, 2018
Can your business afford to lose $9,000 per minute? According to the Ponemon Institute $9,000 is the average cost of an unplanned outage. In some cases the costs are much higher. The catalogue of cloud outages over recent years is well publicized and reads like a “who’s who” of the technology industry. It seems no one is immune. But when it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questi
Tags : content delivery network, cdn, multi-cdn, multiple cdns, web performance, web acceleration, digital content delivery, mobile delivery
     Limelight Networks
By: Localytics     Published Date: Jul 18, 2014
Whether your business model is driven by in-app advertising, purchases, or paid subscriptions, driving your revenue is fundamentally dependent on personalization and engagement. The metrics are available, but identifying which are the most important for tracking engagement and are the most actionable can be tricky.
Tags : app metrics, app measurement, app users, app screenflow, track users, user segmentation, segment user, user retention
     Localytics
By: Logicworks     Published Date: Jan 27, 2014
In this whitepaper, you will learn how to overcome 3 fundamental problems that organizations face in the context of managing their backup windows.
Tags : logicworks, backup, backup window, back-as-a-service, baas, restores, archiving, cloud
     Logicworks
Start   Previous    15 16 17 18 19 20 21 22 23 24 25 26 27 28 29    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com