network knowledge

Results 1 - 25 of 31Sort Results By: Published Date | Title | Company Name
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
In 2018, the Enterprise Strategy Group (ESG) completed a research survey of 450 cybersecurity, IT, and networking security professionals with knowledge of or responsibility for the policies, processes, and controls used for remote office/branch office (ROBO) security. This report is the summary of ESG's conclusions from the study.
Tags : 
     Cisco Umbrella EMEA
By: Iovation     Published Date: Aug 02, 2019
You may have heard that storing device data for more than a few months has no value because fraudsters frequently switch devices. Our data shows otherwise. Over a typical 30-day period, iovation saw 2M transactions from devices with a history of fraud that was first seen on our network 3+ years earlier. That number is even more sobering for devices first seen 1-2 years earlier: 16M transactions. Fortunately, iovation’s unique device history capability provides our customers with the knowledge of whether a device has a history of fraud.
Tags : 
     Iovation
By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Every good story needs a villain — and the world of network security has plenty of them. We’ve got a fun new diversion for you for when you need a break from fighting the bad guys. Test your malware IQ (and your knowledge of fairy tales) by taking our quiz, Malware or Maleficent?
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: May 24, 2019
Do you know DNS Security? Users are working off-hours, off network and off VPN. Are you up on all the ways DNS can be used to secure them? Test your knowledge.
Tags : 
     Cisco Umbrella EMEA
By: Gigamon     Published Date: May 23, 2019
A new report from Gigamon ATR helps security practitioners understand how Emotet, LokiBot and TrickBot traversed enterprise networks without detection in 2018. It particularly focuses on the malwares’ command and control (C2) and lateral movement, as these behaviors expose opportunities to observe network traffic, discover these threats and reduce risk. The goal: shorter mean time to detection and response, a more mature security program and a balanced approach to mitigating risk.
Tags : 
     Gigamon
By: Motorola Solutions     Published Date: Apr 26, 2019
ffective communications are the foundation for any good team, and the transportation and logistics (T&L) sector is no exception. Charged with managing the warehousing, inventory, and movement of freight across the supply chain — both through internal and external distribution networks — T&L professionals rely on high levels of team collaboration to get the job done right. By helping companies leverage the knowledge, talents, and insights of their people, effective team communications ensures that customers get their deliveries when, how, and where they want them. Meeting those expectations in today’s fast-paced, demanding distribution environment requires reliable, clear voice and data logistics communications that start at the warehouse and end at the point of delivery. In this white paper, we explore the key challenges that T&L companies are facing in today’s business environment and hear how instant push-to-talk and advanced video surveillance can help them develop streamlined suppl
Tags : 
     Motorola Solutions
By: Gameffective     Published Date: Feb 26, 2019
Read this Microsoft case study about how Microsoft's Consumer Support Services - with its global network of support centers and thousands of agents - used digital motivation to drive agent performance and learning. Microsoft wanted new ways to recognize and reward agents while increasing their productivity. The focus was to change behaviors, develop skills, encourage sales, and drive outcomes. Microsoft identi?ed gami?cation as a solution to these needs. The company believed it could be more successful at encouraging and recognizing agents for positive outcomes through each customer interaction. Read the case study to learn how Microsoft: Increased productivity through gamification Drove agent performance with rewards, to change behaviors and business outcomes Improved agent knowledge and ability to apply the new information learned.
Tags : 
     Gameffective
By: Oracle     Published Date: Mar 22, 2018
Paris Lodron University Salzburg is the biggest educational institution in the Salzburg region of Austria. The university undertakes innovative research and sees itself as an internationally networked knowledge hub at the heart of Europe. An Oracle Exadata Database Machine was deployed for these applications in 2012. The objectives pursued at the time—uninterrupted operation, resource conservation, and reduction of the CO2 footprint—were fully achieved. Facing increasing growth and with the undertaking of specialized projects, Paris Lodron University was faced with the task of adapting its IT infrastructure to new requirements.
Tags : 
     Oracle
By: Group M_IBM Q1'18     Published Date: Dec 20, 2017
Hyper-complex production meets cognitive computing. Electronics manufacturing is surrounded by continuous complexity. Executives face rising resource costs in traditionally low-cost production markets. They must address increasing customization, shorter lead times, frequently changing requirements and shrinking order sizes – all while managing a sophisticated supply network. They need to examine automation potential and maintain critical institutional knowledge. Thinner margins and increased competition threaten consistent quality, risk greater downtime and reduce desired flexibility. Investments in new equipment and automation systems are increasing the amount of data available from the shop floor, but most is not used to its full potential. Now, cognitive manufacturing is transforming production to address such complexity.
Tags : cognitive manufacuring, electronics manufacturing, production transformation, automation systems, manufacturing
     Group M_IBM Q1'18
By: Citrix ShareFile     Published Date: Jun 12, 2017
Data fuels workforce productivity. But corporate data typically resides in disparate silos spread across on-premises networks and cloud repositories. Knowledge workers are forced to repeatedly disrupt daily workflows to gather information from this data sprawl — a time-consuming and inefficient activity that diminishes productivity. They need a single point of access to all data sources, available from any device, where they can share and manipulate the content resources required to do their jobs.
Tags : sharefile, productivity, security, mobility, workflow
     Citrix ShareFile
By: Oracle     Published Date: Feb 10, 2016
There is little question that cloud is well established as a way to deliver business applications. Based on IDC research, over 70% of manufacturing companies are using hosted applications somewhere within their supply chain, with another 25% considering it. The most popular supply chain management (SCM) application areas are transportation related (transportation management, global trade management), where the "network effect" (i.e., carrier pooling, regulatory impact) can leverage both shared knowledge and existing connectivity along with sales and operations planning, demand signal management, and business intelligence/analytics. The concern that cloud is "risky" is increasingly taking a back seat to the perceived benefits of the technology. Indeed, those benefits, both achieved and anticipated, are significant, including cost, speed of implementation, and the ability to "consume" new capabilities and functionality easily and transparently.
Tags : oracle, supply chain cloud, supply chain best practices, idc research, it management, data management
     Oracle
By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : on-the-job training, it professionals, cyber security services, security programs, security
     Symantec
By: Riverbed     Published Date: Feb 26, 2015
In the world of network management, knowledge is power. But many organizations know a lot less about their network than they think. With proper network auditing and configuration, businesses can fill this knowledge gap.
Tags : network management, network auditing, automation, key network management processes, audit, network infrastructure
     Riverbed
By: Actiance, Inc.     Published Date: Jan 15, 2015
But what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA for use of these networks. Adopting new technologies that allow employees to share information and exchange ideas with each other and with your customers is often the best way to achieve better business results, but doing so can involve considerable risk. That’s because the content people create using these technologies is subject to the scrutiny of regulators, legislators, and litigators. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Pharmaceuticals companies must be knowledgeable of, and abide by, specific information retention regulations in every country where they do business, including those countries that prohibit data from leaving the countries’ borders. Not having technology in place to help manage these requirements and increasing risks, or
Tags : collaboration, social media risk and reward, retention regulations, data, business requirements, it management, enterprise applications
     Actiance, Inc.
By: HPE     Published Date: Dec 05, 2014
The HP Flex-Bundles for SMB with SQL Server 2014 were created to include everything that a business needs to easily build a new environment or upgrade an existing one. The following sections cover the server, storage, networking and services building blocks that make up these pre-defined configurations. HP Flex-Bundles are built on the HP ProLiant servers that include some of the latest and most powerful Intel processors. In designing the latest generation of the HP ProLiant server families, HP wanted to not only draw on 24 years of server experience, but also gain from the depth of knowledge and insight from customers.
Tags : platform, technology, lync, server, sql, flex-bundles, proliant, processors
     HPE
By: Cisco     Published Date: Nov 17, 2014
The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.
Tags : cloud-computing, malware, cisco, malware infection, amp, networking, security, it management
     Cisco
By: EMA     Published Date: Oct 21, 2014
Everyone knows that effective network management practices start with establishing a full foundational understanding of the network. But simply monitoring individual elements can only get you so far. Historically, going the next step requires manually building and maintaining the knowledge of how those disparate elements are connected and how they interact with one another to deliver applications and communications. In other words, you need to understand network-level dependencies.
Tags : network management, network monitoring, network dependencies, network discover tools, network automation
     EMA
By: Logicalis     Published Date: Aug 20, 2014
We are pleased to present the findings of The Impact of IT Transformation on Enterprise Computing sponsored by Logicalis. The objective of this research is to better understand how the different stages of IT transformation can affect an organization, the challenges of advancing through each stage, and how successful progression can improve an organization’s IT effectiveness.
Tags : logicalis, it transformation, it strategy, it budget, it solutions, it system, it priorities, networking
     Logicalis
By: IBM     Published Date: Feb 14, 2014
A social business is an organization whose culture and systems encourage networks of people to create business value. Social businesses connect individuals, so they can rapidly share information, knowledge and ideas by having conversations and publishing informal content. They analyze social content from multiple channels and sources, in addition to structured data, to gain insights from both external and internal stakeholders. When those things happen, innovation and business execution rates increase, better decisions are made, and customers and employees are more engaged and satisfied. Social businesses enjoy lower operating costs, faster speed-to-market, improved customer and employee engagement, and increased profitability. Many organizations don’t fully appreciate the magnitude of the value creation potential of social business.
Tags : ibm, social business, marketing, social media, marketing management, analytics, marketing research, trends
     IBM
By: Achievers     Published Date: Jan 17, 2014
Knowledge and strategic relationships fuel many organizations in today’s rapidly changing, global economy. As such, organizations need to leverage the individuals—and their networks—that possess the most relevant knowledge, whether they are current employees or are only loosely connected to the organization. To do this, organizations should create and leverage peer collaboration networks that enable them to identify and connect with individuals who have the unique skills, knowledge, and capabilities these organizations need. Bersin’s Research, Why Reputations and Networks Matter in the Open Talent Economy, indicates that this approach works in driving value—organizations that have effectively used internal reputation networks and profile databases have been able to increase key metrics such as employees’ time to productivity and innovation levels.
Tags : talent management, employee enagement, human resources
     Achievers
By: Achievers     Published Date: Jan 17, 2014
Knowledge and strategic relationships fuel many organizations in today’s rapidly changing, global economy. As such, organizations need to leverage the individuals—and their networks—that possess the most relevant knowledge, whether they are current employees or are only loosely connected to the organization. To do this, organizations should create and leverage peer collaboration networks that enable them to identify and connect with individuals who have the unique skills, knowledge, and capabilities these organizations need.
Tags : 
     Achievers
By: Oracle     Published Date: Jan 16, 2014
In this whitepaper, learn how Oracle Social Network: -Drives enterprise collaboration through natural Conversations -Enables purposeful social networking without the noise -Builds cross-enterprise knowledge by integrating conversations with CRM, HCM, and other business applications
Tags : marketing mix, social media marketing, marketing channels, digital marketing, internet marketing, marketing strategy
     Oracle
By: IBM     Published Date: Jan 10, 2014
Building an effective sales team starts with hiring the best talent and then making them productive as quickly as possible.
Tags : social collaboration, social networking, social business, communication, social media, mobile, bid data, cloud
     IBM
By: ServiceNow     Published Date: Feb 07, 2012
Download the white paper to find out more about next-gen IT solutions - and how IT in the cloud will help your organization not only keep up with today's complex IT ecosystem, but manage it more efficiently than ever before!
Tags : powering, transformation, cloud, investments, integration, access data, performance, revolution
     ServiceNow
By: ServiceNow     Published Date: Aug 24, 2011
This white paper takes a look at the adoption and evolution of social IT within ServiceNow.
Tags : social it, social media, build relationships, improve service, collaboration, post it, tag it, tweet it
     ServiceNow
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com