broad

Results 251 - 275 of 621Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Sep 30, 2016
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : ibm, security, fraud prevention, technology, loss reduction, fraud, fraud management, enterprise applications
     IBM
By: IBM     Published Date: Sep 30, 2016
"The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others. "
Tags : ibm, security, web fraud, malware, cybercrime, cyber security, enterprise applications
     IBM
By: Sungard Availability Services     Published Date: Sep 28, 2016
Complexity, lack of time, and a skills shortage mean that UK IT Departments are failing to meet business expectations for digital technology.
Tags : it department, digital, digital expectations, digital technology, it management, sungard
     Sungard Availability Services
By: Sage     Published Date: Sep 08, 2016
It’s no secret that more companies are adopting cloud ERP solutions to help them grow their operations while keeping overhead costs low to better compete in the global economy. Cloud solutions deliver increased agility, responsiveness, and real-time insights to improve operational efficiency and increase profits. Although broader ERP solutions can provide value, focusing on the needs of your specific industry requirements can enhance your investment. Join this webcast, sponsored by Sage, to learn how an industry-focused cloud ERP strategy can help your business grow.
Tags : sage, cloud, erp, cloud erp, erp strategy, networking, enterprise applications
     Sage
By: CA Technologies     Published Date: Aug 26, 2016
Many breaches happen because of compromised privileged user accounts. Risks spread like wildfire in the dynamic traditional, virtualized and cloud environments common in enterprises today. One improperly authorized privileged account can cause widespread and irreparable damage to an organization’s infrastructure, intellectual property and brand equity, leading to sudden drops in market value, broad organizational disruption and costly compliance penalties. Effectively managing privileged access across your hybrid enterprise is an imperative to reducing security and compliance risks.
Tags : 
     CA Technologies
By: Silver Peak     Published Date: Aug 18, 2016
Silver Peak in conjunction with IDG Connect conducted an official survey of 160 mid-market and enterprise companies to determine the true adoption of Software Defined WANs (SD-WAN).
Tags : sd-wan, software defined wans, broadband sd-wan, cloud, security, agility
     Silver Peak
By: Silver Peak     Published Date: Aug 18, 2016
The Infographic summarizes the results of a recent survey conducted by Silver Peak and IDG Connect asking 160 IT enterprise professionals about the adoption of SD-WAN.
Tags : sd-wan, software defined wans, broadband sd-wan, cloud, security, agility
     Silver Peak
By: Okta     Published Date: Jul 27, 2016
Current Identity Governance and Administration (IGA) solutions have optimized heavily for complete customization, leaving customers with full flexibility in designing rules and workflows. The problem is that it takes these solutions too long to deploy, at too high a cost, and rarely do they deliver on the ROI that was originally anticipated. Okta believes there is a better way, and a way to reach a much broader set of organizations, by building a cloud-based IGA product that is optimized for out-of-the-box capability and is easily configurable. Read this white paper to learn the four key feature areas.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
     Okta
By: Okta     Published Date: Jul 27, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control. This whitepaper details Okta’s focus on security and reliability, how Okta enhances security and how Okta itself stays secure.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
     Okta
By: Okta     Published Date: Jul 25, 2016
Current Identity Governance and Administration (IGA) solutions have optimized heavily for complete customization, leaving customers with full flexibility in designing rules and workflows. The problem is that it takes these solutions too long to deploy, at too high a cost, and rarely do they deliver on the ROI that was originally anticipated. Okta believes there is a better way, and a way to reach a much broader set of organizations, by building a cloud-based IGA product that is optimized for out-of-the-box capability and is easily configurable.
Tags : okta, best practices, technology, optimization, identity governance, cloud computing
     Okta
By: Okta     Published Date: Jul 25, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control.
Tags : identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications
     Okta
By: SAP     Published Date: Jul 18, 2016
The broad shift from on-premises to cloud deployments has begun, and spending on cloud business analytics will grow five times faster than similar on-premises solutions. Read the white paper to learn some of drivers and the roadblocks of cloud-based business analytics solution deployments, and the offerings from SAP in this market.
Tags : 
     SAP
By: IBM     Published Date: Jul 15, 2016
"The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cyber crime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others. "
Tags : cybercrime, financial fraud, best practices, finance, banking fraud, e-commerce
     IBM
By: Equinix     Published Date: Jul 13, 2016
This report reveals how media companies and broadcasters must consider new strategies to meet rising expectations and maintain audience share due to the increasingly wide audience with an insatiable hunger for content.
Tags : media, media companies, broadcasters, content, create content, audience, deliver content, content management, create content, equinix, content performance, content performance hub, generate content
     Equinix
By: Cisco     Published Date: Jul 11, 2016
As digital workplace initiatives grow, it is vital to examine their impact through a financial business case to obtain funding, structure stakeholder dialogue and secure commitment. Here, we describe how IT leaders can create a convincing business case with a strong link to business benefits. Key Challenges: ¦ It is difficult for IT leaders to quantify the financial returns associated with digital workplace initiatives, as they often fail to recognize the broad and indirect benefits. ¦ Treating digital workplace initiatives as infrastructure rollouts obscures their business relevance and distances business stakeholders, whose commitment is vital for success. ¦ Business and finance executives are more likely to take seriously a digital workplace initiative with a credible financial impact assessment.
Tags : 
     Cisco
By: Cisco     Published Date: Jul 11, 2016
Operational efficiency and cost savings. Datadriven business insights. Organizational agility and market differentiation. Enterprises in every industry are pursuing such gains, but they cannot be achieved with a fragmented, siloed technology infrastructure. Technological integration doesn’t happen overnight, of course. It takes years of behind-the-scenes teamwork and engineering—backed by decades of expertise, research, and development—to have a broad and lasting impact. This special edition of Unleashing IT highlights the fruits of those labors, showcasing the unparalleled alignment of Microsoft, Cisco, and Intel technologies. In the following pages, you’ll read about the advancement and unique value of integrated solutions, spanning cloud environments, data centers, and management tools. You’ll also hear from organizations that are aking advantage of these converged technologies, including King County, Provincia Net, and Swinburne University.
Tags : 
     Cisco
By: Cisco     Published Date: Jul 11, 2016
CTOs, CIOs, and application architects need access to datacenter facilities capable of handling the broad range of content serving, Big Data/analytics, and archiving functions associated with the systems of engagement and insight that they depend upon to better service customers and enhance business outcomes. They need to enhance their existing datacenters, they need to accelerate the building of new datacenters in new geographies, and they need to take greater advantage of advanced, sophisticated datacenters designed, built, and operated by service providers. IDC terms this business and datacenter transformation the shift to the 3rd Platform.
Tags : 
     Cisco
By: Equinix     Published Date: Jul 11, 2016
Selevision wanted a data centre provider to host its services - Video on Demand, Live TV and Catch-up TV. It needed direct access to the world’s top CDNs, NSPs, ISPs and mobile data providers to securely stream video across the Middle East region. Selevision chose to host its services in the Equinix Internet Business Exchange (IBX) located in Dubai.
Tags : content management, content on demand, equinix, content
     Equinix
By: Equinix     Published Date: Jul 11, 2016
This report reveals how media companies and broadcasters must consider new strategies to meet rising expectations and maintain audience share due to the increasingly wide audience with an insatiable hunger for content.
Tags : media, media companies, broadcasters, content, create content, audience, deliver content, content management, create content, equinix, content performance, content performance hub, generate content
     Equinix
By: Equinix     Published Date: Jul 07, 2016
Selevision wanted a data centre provider to host its services - Video on Demand, Live TV and Catch-up TV. It needed direct access to the world’s top CDNs, NSPs, ISPs and mobile data providers to securely stream video across the Middle East region. Selevision chose to host its services in the Equinix Internet Business Exchange (IBX) located in Dubai.
Tags : content management, content on demand, equinix, content
     Equinix
By: Equinix     Published Date: Jul 06, 2016
Internet delivery and cloud hosting has transformed all aspects of content and media value chain, impacting how content is created, managed and delivered. Consumers now demand content on any device at any time, regardless of the network they are using.
Tags : media, media companies, broadcasters, content, create content, audience, deliver content, content management, create content, equinix, content performance, content performance hub, generate content
     Equinix
By: VMware     Published Date: Jul 01, 2016
Cloud computing adoption continues to expand as the overall benefits of cloud (cost efficiency, self-service, and IT standardization) are becoming more broadly recognized. While private cloud is the primary type of cloud infrastructure that is in use today, organizations are finding that cloud can no longer be a standalone IT sourcing and consumption model. Enterprises demand greater flexibility and scalability, leading them to invest in hybrid cloud models, which supply them with a seamless application, data, and management environment across all of their IT resources. IDC expects that the percentage of users who adopt private or public cloud models will diminish over the next several years, as enterprises increasingly choose to implement a hybrid cloud model.
Tags : vmware data center, vcloud air, vsphere, hybrid cloud, public cloud, private cloud, disaster recovery, data center extension, data center replacement, date center modernization, virtual private cloud
     VMware
By: Qlik     Published Date: Jun 24, 2016
This research reveals some key opportunities for these companies to broaden their analytical footprint and magnify the impact of business analytics.
Tags : qlik, analytics, business analytics, finance business intelligence
     Qlik
By: Qlik     Published Date: Jun 24, 2016
This briefing provides a snapshot of the opportunities for financial services organizations looking to broaden and deepen the reach of analytics.
Tags : qlik, finance analytics, data
     Qlik
By: Cisco     Published Date: Jun 21, 2016
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
     Cisco
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com