data solutions

Results 801 - 825 of 993Sort Results By: Published Date | Title | Company Name
By: NetIQ     Published Date: Nov 05, 2012
The broad adoption of SIEM technology is driven by security and compliance needs. Targeted attack discovery requires effective user activity, data access and application activity monitoring. Vendors are testing demand for broader-scope solutions.
Tags : siem technology, threat management, security management, enterprise security, compliance, security
     NetIQ
By: Sponsored by HP and Intel®     Published Date: Nov 05, 2012
This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery.
Tags : dedupe, storeonce, deduplication, backup, data recovery, data management, data center
     Sponsored by HP and Intel®
By: Merkle     Published Date: Oct 19, 2012
An integrated customer communication strategy places customer needs, behaviors and value at the center of all interactions and will result in increased revenue, profit and shareholder value.
Tags : data management, customer centricity, crm, buying behaviors, segmentation, customer lifecycle, integrated, customer solutions, target segmented customers, marketing measurement, marketing strategy, competitive advantage, business strategy, customer value, kpi, optimization, integrated marketing strategies, integrated
     Merkle
By: Merkle     Published Date: Oct 19, 2012
An effective marketing investment strategy will help you take inventory of your current measurement framework and develop a more accurate, reliable and consistent strategy for assessing and improving the performance of your marketing spend.
Tags : marketing accountability, roi, data management, customer centricity, crm, buying behaviors, segmentation, customer lifecycle, integrated, customer solutions, target segmented customers, marketing measurement, marketing strategy, competitive advantage, business strategy, customer value, optimization, integrated marketing strategies, integrated, customer experience
     Merkle
By: Merkle     Published Date: Oct 19, 2012
As media and channels proliferate with the upsurge in digital touchpoints, we have access to massive volumes of customer data. This leads to the personalization of customer interactions that drive customer strategy as a business strategy.
Tags : brand experience, customer experience, customer insights, communication management, marketing accountability, roi, data management, customer centricity, crm, buying behaviors, segmentation, customer lifecycle, integrated, customer solutions, target segmented customers, measurement, marketing strategy, competitive advantage, business strategy, customer value
     Merkle
By: WatchGuard     Published Date: Oct 16, 2012
Network security intrusions and data theft incidents grab headlines almost daily. Organizations rely on WatchGuard for network solutions. Read on to understand why WatchGuard is "best-in-class by design"
Tags : watchguard, security, database security, security, it security, it infrastructure, intrusion prevention, it management, data management
     WatchGuard
By: Oracle Corp.     Published Date: Oct 15, 2012
In this paper you'll find a conducted comparison between Oracle Database Appliance and Microsoft SQL Server in order to determine the productivity differences between these two solutions.
Tags : deployment, oracle, database appliance, sql server, availability, backup and recovery
     Oracle Corp.
By: Oracle Corp.     Published Date: Oct 15, 2012
This survey, conducted by the Independent Oracle Users Group, examined more than 350 data managers and professionals regarding planned and unplanned downtime, database high availability, and disaster recovery solutions.
Tags : enterprise data, cloud computing, high availability, downtime, database infrastructure, database availability
     Oracle Corp.
By: Dell     Published Date: Sep 24, 2012
The EqualLogic family of virtualized storage solutions from Dell is fundamentally changing the way enterprises think about purchasing and managing storage.
Tags : bulk data transfer, dell, microsoft, offloaded data, storage solutions, data storage
     Dell
By: SAP     Published Date: Sep 12, 2012
Read an analysis of how the addition of SAP Sybase ASE as SAP's preferred database for SAP Business All-in-One solutions can reduce the overall total cost of ownership (TCO) for the database and optimize performance of SAP Business All-in-One.
Tags : sap, business all-in-one, crm, erp, enterprise resource planning, srm, supplier relationship management, business intelligence
     SAP
By: Symantec.cloud     Published Date: Sep 12, 2012
In this whitepaper you'll why it is important to have a backup solution that protects your data - and that can restore it with a minimum of delay at a critical time.
Tags : smbs, backup and recovery, data protection, backup solutions, data restoration, symantec, security, data management, data center
     Symantec.cloud
By: Symantec.cloud     Published Date: Sep 12, 2012
In this whitepaper, Symantec offers seven tips for how business owners can beef up and protect their company.
Tags : it security, smb, symantec, data security, disaster recovery, backup and recovery, security solutions, security, data management, data center
     Symantec.cloud
By: Oracle Corp.     Published Date: Sep 07, 2012
Dubai Customs leveraged Oracle Database and Oracle Business Intelligence, among other solutions, to achieve business intelligence from customs declarations-gaining risk assessment and risk scoring capabilities, and valuable insight.
Tags : soa, service-oriented architecture, oracle, dubai customs, case study
     Oracle Corp.
By: CDW Symantec     Published Date: Sep 06, 2012
Great new features like VMware and Hyper-V backup, bare-metal disaster recovery and "no-hardware disaster recovery" all help conveniently keep your backups easily accessible and secure.
Tags : data recovery, backup and recovery, backup solutions, symantec, deduplication, virtualization, data storage, data management, disaster recovery
     CDW Symantec
By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : archetecting, flexible, strategy, for securing, enterprise, bring, device, byod, data, loss, prevention, mobile, security, landscape, data, access, device, mobility, risks, augmenting
     ForeScout
By: HP and Intel     Published Date: Aug 13, 2012
Learn how DreamWorks Animation uses HP Converged Infrastructure technologies to boost creativity, streamline production, and save significant time as well as costs. "HP Converged Infrastructure technologies are increasing our capacity to produce state-of-the-art CG animation -- great storytelling combined with stunning visuals. And that's what audiences expect."
Tags : dreamworks animation, data storage, hp 3par, data storage solutions, storage management, entertainment industry, animation, storage
     HP and Intel
By: HP and Intel® Xeon® processor     Published Date: Aug 10, 2012
This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery. However, the changing demands on IT storage infrastructures have b
Tags : assessing, deduplication, 2.0, second, generation, storeonce, deduplication, appliance, efficiency, data, storage, backup, storage
     HP and Intel® Xeon® processor
By: IBM     Published Date: Aug 10, 2012
This brief video shows how advanced analytics can incorporate survey methods designed to help you with every aspect of survey research - everything from gathering the data, to data analysis, to reporting.
Tags : survey data, ibm, business analytics, ibm spss, patient satisfaction, analytics solutions
     IBM
By: Intel Corp.     Published Date: Aug 08, 2012
This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery. However, the changing demands on IT storage infrastructures have begun to strain the capabilities of initial deduplication products. To meet these demands, a new generation of deduplication solutions is emerging which scale easily, offer improved performance and availability and simplify management and integration within the IT storage infrastructure. HP refers to this new generation as "Deduplication 2.0.
Tags : assessing, deduplication, 2.0, second, generation, storeonce, deduplication, appliance, efficiency, data, storage, backup, storage, it management, data management, data center
     Intel Corp.
By: CDW Symantec     Published Date: Aug 02, 2012
This white paper documents the ubiquity of tablets and other mobile devices within the workplace, the sensitive data accessed on these devices and their potential IT risks, and the data loss prevention solutions Symantec provides to help CISOs make the most intelligent security decision.
Tags : ipad, data security, remote wiping, data encryption, sandboxing, compartmentalization, reverse proxy, dlp, tablets, it systems, endpoint device growth, symnatec, integration, cisos, data management, data center
     CDW Symantec
By: HP and Intel® Xeon® processors     Published Date: Aug 01, 2012
An increasingly global and mobile workforce is changing the way IT needs to support the business. Worker demographics are also changing, resulting in different expectations on how IT delivers data and applications. HP and VMware make this important move to Client Virtualization safe and easy by testing and developing the most popular solutions. On its sixth generation Client Virtualization reference architecture, HP tests many combinations of storage, networking, and blades to best handle the Client Virtualization workloads.
Tags : client virtualization, reference architecture, core design, client virtualization, active directory, local users, vdi, user data, outsourcing, work from home, branch, endpoint devices, firewall, vpn, stacking links, storage, data management
     HP and Intel® Xeon® processors
By: IBM     Published Date: Jul 24, 2012
Detect and prevent fraud by finding subtle patterns and associations in your data. IBM SPSS predictive analytics solutions have proved to be very effective at helping tax collection agencies to maximize revenues by detecting non-compliance more efficiently and by focusing investigations on cases that are likely to yield the biggest tax adjustments.
Tags : fraud, business, healthcare, taxes, government, ibm, spss
     IBM
By: Qualys     Published Date: Jul 20, 2012
Vulnerability Management (VM) means systematically finding and eliminating network vulnerabilities. Choosing a solution for VM is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security. This checklist from Qualys provides a 12 point shortlist of considerations to determine what solutions will work best for your organization.
Tags : technology, security, vulnerabilities, internet, virus, solutions, vulnerability management
     Qualys
By: Qualys     Published Date: Jul 20, 2012
Vulnerabilities are very common nowadays. Even being a safest network does not mean that it cannot be compromised. It's how you handle these vulnerability and flaws and rectify the issues. In order help the security engineers Qualys, Inc. pioneer security brings free guide on Top 10 reports for Managing Vulnerability. This paper cuts through the data overload generated by some vulnerability detection solutions.
Tags : technology, security, vulnerabilities, internet, virus, solutions
     Qualys
By: SAP     Published Date: Jul 17, 2012
Overlooking how an application fits into your overall IT landscape can lead to costly implementations. But addressing data management with middleware solutions that work seamlessly with existing applications in your company's IT environment can lead to significant benefits. Explore the value of technology decisions that support and maintain infrastructure-wide interoperability with regard to your data management solutions.
Tags : infrastructure, functionality, data management, technology, solutions, white paper
     SAP
Start   Previous    26 27 28 29 30 31 32 33 34 35 36 37 38 39 40    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com