dam

Results 876 - 900 of 915Sort Results By: Published Date | Title | Company Name
By: Quocirca     Published Date: Nov 13, 2007
Businesses across Europe are becoming increasingly reliant on web-enabled applications that are accessed over the public internet. One of the key drivers for this is to open up communications with external organizations that are fundamental to core business processes.
Tags : bpm, business process, web application, customer service, customer satisfaction, business management, order, order management, quocirca, it management, enterprise applications
     Quocirca
By: Nutanix     Published Date: Oct 01, 2014
This webinar will help enterprises understand the fundamentals of web-scale IT and how other companies are using web-scale principles to build private cloud-like environments.
Tags : nutanix, cloud, convergence, hyperconvergence, virtualization, web scale, it scale
     Nutanix
By: Mimecast     Published Date: Dec 20, 2018
Relying on outdated solutions like Symantec Email Security (formerly MessageLabs) to defend your organization from email-borne attacks may be risky. Others in this position have suffered from spear-phishing, ransomware and even impersonation attacks. To effectively defend against these advanced threats you need the latest protection techniques – something Mimecast delivers to tens of thousands of organizations already. Join us for this 30 min webinar to learn: • The damaging effects of ransomware, spear-phishing and impersonation attacks • What defensive strategies and technologies you should employ • Why your current Symantec Email Security solution may not be up to the task • How to enhance your email security and overall cyber resilience
Tags : email security, ransomware, spear-phishing, cyber resilience, symantec
     Mimecast
By: Altair     Published Date: Feb 19, 2014
The Weizmann Institute of Science is one of the world’s leading multidisciplinary research institutions. Hundreds of scientists, laboratory technicians and research students embark daily on fascinating journeys into the unknown, seeking to improve our understanding of nature and our place within it. Groundbreaking medical and technological applications that have emerged from basic research conducted by Weizmann Institute scientists include: amniocentesis, a prenatal diagnostic test; sophisticated laser systems for high-precision diamond cutting; living polymerization, one of the most fundamental techniques of the modern polymer industry; and ribosome structure analysis, for which the Institute’s Professor Ada Yonath was awarded a Nobel Prize in Chemistry.
Tags : 
     Altair
By: Mimecast     Published Date: Jun 02, 2016
Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the new Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them. *US Federal Bureau of Investigation, 4/2016
Tags : mimecast, whaling, phishing, email attacks, email security, internet security, security, enterprise applications
     Mimecast
By: Citrix Systems     Published Date: Nov 10, 2014
ADCs are advanced load balancers with functions and features that enhance the performance of applications. Today, companies of all sizes with geographical dispersal of people and different data constructs require ADCs to optimize their complex application environments from web applications, to Exchange, SharePoint and databases. It is interesting that before the term ADC was used more recently (in the last decade), companies relied on load balancers for website availability and scalability. In this paper we will describe the fundamentals of a load balancing system and its evolution to an ADC.
Tags : database, sharepoint, application, load balancer, performance, availability, website, scalability, function, optimization, enterprise applications, data management
     Citrix Systems
By: Citrix Systems     Published Date: Nov 23, 2015
In this paper we will describe the fundamentals of a load balancing system and its evolution to an ADC
Tags : citrix, adc, networks, applications, networking, storage, data center
     Citrix Systems
By: Jive Software     Published Date: Feb 19, 2013
Social Business represents a fundamental shift in how businesses communicate. Don’t be the last to adopt the biggest innovation in corporate communication since email.
Tags : social business software, social business, employee collaboration, employee productivity, brand loyalty, customer support
     Jive Software
By: Emulex Corporation     Published Date: Nov 07, 2013
Organizations don’t know what’s going on inside their networks, and that’s costing them real money. Deploying an intelligent recording fabric with guaranteed 100% packet capture, accuracy, and storage is fundamental to solving the problem. But how do you embrace the new paradigm? To get started, create a list of the system criteria that are mandatory to delivering reliable and complete visibility information to your engineers, so you can be sure their decision-making is on target. The impact of network performance problems on worker productivity has become a serious business risk. To mitigate it, organizations need to strategically embrace a network recording infrastructure that provides them with accurate, network-wide visibility. Only accurate visibility will empower them to slash maximum and mean response and repair times and keep network-reliant business applications and processes running. Download this Whitepaper for more information.
Tags : network monitoring, network visibility, technology, endace, best practices, networking
     Emulex Corporation
By: Cloudamize     Published Date: Apr 04, 2017
As you think about migrating to the public cloud, it’s challenging to know where to start. This guide discusses 10 key considerations to address as you think about moving to the cloud and serves as a framework to help you understand which critical decisions you need to make.
Tags : moving to the cloud, cloud computing cost, cloud cost analysis, tco cloud, cloud calculator, cost of cloud computing, cloud computing cost calculator, cloud cost management, cloud migration strategy, migrating to the cloud, cloud migration tools, cloud migration, cloud cost comparison, cloud tco, cloud cost, cloud management, cloud optimization, public cloud, cloud provisioning, capacity planning
     Cloudamize
By: MobileIron     Published Date: Jul 31, 2015
To better understand what Windows 10 means for the modern enterprise, this white paper provides a technical overview of these and other new features in the latest OS release. It also includes a brief overview of how the enterprise architecture has evolved and how Windows 10 enables IT leaders to use this fundamental architecture shift as a catalyst for business transformation.
Tags : modern enterprise, enterprise architecture, business transformation, windows 10, security
     MobileIron
By: NeighborhoodAmerica     Published Date: Oct 01, 2008
Virtually all organizations are realizing the importance of customer engagement. But in order to benefit, we must subscribe to the idea that consumers really can add value to our organization. And sometimes, that means removing the notion that we are the experts in exchange for the belief that we can learn a thing or two from our customers. The collective intelligence of the communities we serve is largely an untapped asset - a stream of valuable input that can help improve the decisions we make and shape the products we sell. This book explores the value of many - and the role that customer engagement will play in shaping the future of our businesses, our government, and our economy.
Tags : neighborhood america, social network, web 2.0, data integration
     NeighborhoodAmerica
By: Kaspersky     Published Date: Feb 06, 2017
The total amount of damage caused by cryptomalware can be divided into two parts: the ransom and the related losses. Drawing from our survey of over 4,000 small- and medium-sized companies conducted by Kaspersky Lab and B2B International, we take a closer look at the numbers behind the damage.
Tags : cryptor, ransomware, malware, encryption, business security, cyberthreat, cyberattack
     Kaspersky
By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institute’s 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : security controls, security, security applications, ssl/tls certificates, secure connection, security network, networking, software development
     Venafi
By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : web security, cybercriminals, web threats, web gateway, security
     Webroot
By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Not long ago, even the most astute executives couldn’t fully anticipate how quickly emerging technologies would transform their business operations — and even their business models. Laptops, smartphones, and other mobile devices; high-bandwidth wireless networks; and cloud-based computing services have proven to be among the most impactful of these advances, collectively untethering workers from office environments and fundamentally altering work behaviors. employees today work anytime, anywhere while accessing applications and data that reside on company servers and in the cloud. Cisco Umbrella can help your business overcome these problems, download this whitepaper today to find out more.
Tags : 
     Cisco Umbrella EMEA
By: Sprinklr     Published Date: Oct 18, 2017
How do manufacturers get beyond the obstacles and barriers to increase cognitive manufacturing maturity? The obstacles encountered by our respondents are tied to organizational maturity. Overcoming them is fundamental to increase cognitive manufacturing success. In this report, we’ll first describe cognitive computing and how it gives rise to cognitive manufacturing. Then, we’ll review specific study findings and recommend actions for electronics executives.
Tags : cognitive manufacturing, electronics, computing, organizational maturity
     Sprinklr
By: IBM     Published Date: Oct 18, 2017
How do manufacturers get beyond the obstacles and barriers to increase cognitive manufacturing maturity? The obstacles encountered by our respondents are tied to organizational maturity. Overcoming them is fundamental to increase cognitive manufacturing success. In this report, we’ll first describe cognitive computing and how it gives rise to cognitive manufacturing. Then, we’ll review specific study findings and recommend actions for electronics executives.
Tags : cognitive manufacturing, ibm, electronics, organizational maturity
     IBM
By: SAP     Published Date: Aug 22, 2018
Learn why intelligent ERP is the fundamental baseline for becoming an agile, continuous learning, and always progressing innovative organization.
Tags : sap, erp, digital transformation, procurement, intelligence erp
     SAP
By: McAfee     Published Date: Apr 25, 2014
Estimating the cost of malicious cyberactivities is complicated. But the real issue is how it affects trade, technology, and economic competition. This in-depth report takes a look at the scope of the problem and what factors determine the real cost of cybercrime.
Tags : cybercrime, cyberespionage, data loss, intellectual property loss, reputational damage, security costs, commercial espionage, business confidential information, denial of service attacks, pilferage, security, it management
     McAfee
By: Adam Phones Ltd     Published Date: Dec 21, 2010
One in three SMEs and half of larger enterprises still do not have a company policy in place to govern the procurement and management of their mobile and wireless services
Tags : mobile, wireless, data, tariff
     Adam Phones Ltd
By: Logicworks     Published Date: Jan 27, 2014
In this whitepaper, you will learn how to overcome 3 fundamental problems that organizations face in the context of managing their backup windows.
Tags : logicworks, backup, backup window, back-as-a-service, baas, restores, archiving, cloud, storage, content storage, compliance, data management
     Logicworks
By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : firewall, network security, urls, ips, adequate protection, security
     Webroot Inc
By: Mitel     Published Date: Jun 29, 2016
In Unternehmen und Organisationen auf der ganzen Welt sind Räume, die einst gefüllt waren mit langen Kabeln, schwarzen Kisten und blinkenden Lichtern, heute wie leer gefegt. Übrig geblieben sind lediglich ein einsamer verstaubter Telefonkasten oder eine vergessene Klemmleiste, möglicherweise auch ein Kickertisch, an dem die IT-Mitarbeiter Dampf ablassen können. Der Grund für diese drastische Veränderung ist die Cloud – oder genauer gesagt die cloudbasierte Kommunikation – welche die IT-Landschaft vollkommen auf den Kopf gestellt hat. Einige ITVerantwortliche haben den Sprung in die Cloud bereits vollzogen. Andere arbeiten auf den künftigen Wechsel hin. Und wiederum andere halten weiterhin an einer lokalen Bereitstellung fest, sei es auf eigenen Wunsch oder aus Notwendigkeit.
Tags : best practices, business optimization, business management, productivity, cloud services, communications
     Mitel
By: Pure Storage     Published Date: Sep 27, 2019
In der heutigen Wirtschaftswelt stellt die Geschäftskontinuität eine absolute Notwendigkeit dar. Wenn Unternehmen die digitale Transformation in Angriff nehmen und sich bezüglich aller wesentlichen Prozesse an die IT wenden, können solche Ausfallzeiten die Firma lähmen. Firmen, die in der Lage sind, Technologieausfälle transparent zu handhaben (und dadurch Geschäfte ungehindert betreiben können), erzielen hierdurch erhebliche Vorteile hinsichtlich des Wettbewerbs, der Kundenbindung und Geschäftsinnovation. Das Erreichen der höchsten Stufe der Geschäftskontinuität, also das Ziel, die Wiederherstellungspunkte (Recovery Point Objectives, RPOs) und Wiederherstellungszeiten (Recovery Time Objectives, RTOs) auf den Wert von null zu senken, war jedoch nur für die größten Unternehmen durch ihre geschäftsentscheidenden Anwendungen möglich. Den meisten Unternehmen waren die damit verbundenen Kosten und die einhergehende Komplexität zu hoch, um eine solche Stufe zu erreichen. Dies ist jedoch nic
Tags : 
     Pure Storage
Start   Previous    23 24 25 26 27 28 29 30 31 32 33 34 35 36 37    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com