enterprise organizations

Results 576 - 599 of 599Sort Results By: Published Date | Title | Company Name
By: Polycom     Published Date: Feb 16, 2017
" Understand the buying criteria and make informed decisions for group video conferencing systems and the features and functions needed to enable collaboration in the 5 most common workspaces in enterprises of all sizes; Small/Huddle Rooms Teaming Rooms Standard Meeting Rooms Executive Boardrooms Reconfigurable Spaces Despite video conferencing becoming a mainstream business tool, many end user organizations remain confused about how to choose the group video conferencing systems that best address their requirements. Download your guide now."
Tags : polycom, business technology, wainhouse, collaboration
     Polycom
By: IBM     Published Date: Mar 04, 2014
Technology advances are changing the way employees work, consumers buy, and enterprises conduct business. Old methods for marketing products are taking a back seat to online distribution, and mobile devices are ubiquitous access points to the Internet. The resulting environment is ripe for the creation and distribution of new software for handling a constantly expanding array of functions. When there is an app for everything, organizations have no choice but to adapt or risk getting left behind as markets enter the era of the Web application programming interface (API).
Tags : ibm, mobile, mobile app, api, api management, web application, application programming interface, app, ubm tech, mobility, cloud, mobile devices, software, software development, it management, enterprise applications
     IBM
By: Cumulus Networks     Published Date: Dec 30, 2016
By the year 2018, it is expected that over 25% of enterprise customers will adopt web-scale networking to build modern data centers. This rapid adoption can be attributed to businesses' increasing dependence on their data centers, while at the same time facing reduced IT budgets and limited staff to address their growing business needs. Fill out the form to download a TCO report on how organizations have saved an average of 45% on CapEx and approximately 74% on OpEx by adopting web-scale networking solutions from Cumulus Networks. You’ll learn how Cumulus modeled a real-life TCO calculator on the actual production path their customers took to build an agile, scalable, and cost-efficient data center.
Tags : 
     Cumulus Networks
By: IBM     Published Date: Feb 03, 2010
Join industry leaders and experts on this panel as they discuss the business value of enterprise social software and share their best practices in implementation within their organizations .
Tags : ibm ep, empowering people, collaboration, enterprise social software, forrester research
     IBM
By: Oracle     Published Date: Jan 20, 2017
"Many large enterprises struggle to decide which workloads and systems should be deployed in the public cloud versus on premise. With a strong on-premises platform in place, organizations benefit from increased reliability, speed, and security. On the other hand, by leveraging the public cloud, they gain increased flexibility and recovery capabilities. So, what goes best where? Jim Rapoza, Senior Research Analysts at Aberdeen Group and Chuck Hollis, Senior VP at Oracle, will provide guidance aimed at helping organizations choose the right platforms for their critical workloads. They will analyze how Best-in-Class enterprises effectively integrate on-premises solutions and the public cloud, and recommend steps that businesses can take to become IT infrastructure leaders."
Tags : 
     Oracle
By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
     Lookout
By: MobileIron     Published Date: Oct 21, 2016
The release of Android for Work, combined with the enterprise upgrades in Lollipop, delivers an outstanding opportunity for companies that have long waited to support Android devices as part of their BYOD mix. It also cements the need for a multi-OS EMM platform that is capable of delivering configurations across Android, iOS, and Windows devices. For organizations that want to take advantage of Android for Work, the first step will be to find an EMM provider with with a comprehensive platform and broad experience with multi-OS deployments to ensure their success. Download now to learn more!
Tags : 
     MobileIron
By: Zscaler     Published Date: May 15, 2019
Enterprise security has undergone a complete transformation as a result of rapid and sweeping changes that are remaking the way public sector organizations do business. New technologies and trends are changing the very definition of an enterprise, how and where we work, and the tools we use to do our jobs. These trends include:
Tags : 
     Zscaler
By: MobileIron     Published Date: Aug 29, 2017
The release of iOS 11 highlights Apple’s continued commitment to the enterprise by providing more options for organizations that are in the process of replacing older PCs. As a dominant player in the consumer market, Apple is now pursuing a stronger foothold in the enterprise market with many new features and capabilities released in iOS
Tags : 
     MobileIron
By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprises currently face challenges regarding the price, performance, and flexibility of traditional wide area networks (WANs). Aggressive growth in the adoption of public cloud services (a projected 86% spike between 2014 and 2018)1 is forcing organizations to look elsewhere for a more effective network solution to address distributed traffic across remote sites and branch offices. Some of the specific issues organizations face with their traditional WANs include: - High total cost of ownership (TCO) - Lengthy provisioning cycles - Performance degradation with the growth of cloud traffic - Inadequate redundancy and resiliency - Lack of application-aware connectivity To better manage WAN investments, enterprises are adopting a new approach for their distributed branch office networks. Software-defined WAN (SD-WAN) offers improved performance, agility, and operational flexibility plus significant cost savings. But not all SDWAN solutions are created equal.
Tags : 
     Fortinet EMEA
By: Sophos     Published Date: Jul 01, 2013
Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot. The rising trend of mobility consumerization has reached a point where it is increasingly difficult for IT organizations to settle on a standard mobile device. This whitepaper will help you identify each device platform’s security features—and choose the right platform for your business.
Tags : mobile device, security
     Sophos
By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. Over the years, organizations consolidated many regional data centers into a few highly available data center locations which meant that remote locations had to connect to centralized applications over WANs and all internet traffic went through these data centers as well. This introduced bandwidth constraints and latency issues. The development in WAN optimization provided incremental and measurable improvement in WAN performance and provided some bandwidth cost containment. However, that technology typically was only deployed at the most problematic sites that struggled to achieve acceptable levels of performance and user experience. It did not solve all the issues with WAN connectivity. WAN infrastructure planning was limited to increases in capacity that were met by provisioning additional carrier MPLS (multiprotocol label switching)
Tags : 
     VMware SD-WAN by VeloCloud
By: Netsuite DWASF Leads Display Q1 2015     Published Date: Jun 10, 2015
This research paper argues that it is up to the CFO to work with IT to modernize the business before it is too late. Enterprises need greater transparency into the streams of data illuminating market opportunities and market risks. They need systems that scale in step with the organization’s growth and technologies assisting a more intimate customer relationship. This paper highlights five reasons why the CFO must lead the charge to modernize their organizations now—or risk being outrun by the competition.
Tags : business management software, cloud erp, erp, business software, accounting software, business accounting software, cloud financials, small business software, enterprise software, saas, cloud, integrated software solutions, cloud computing, business software solutions, integration platform, business growth, international expansion, integrated platform, business management suite, it management
     Netsuite DWASF Leads Display Q1 2015
By: VMware AirWatch     Published Date: Nov 12, 2015
Historically in the enterprise, Macs have been managed separately from iOS devices in separate consoles, sometimes by different groups within IT. Traditional domain-joined management posed several problems for today’s modern enterprise. Nowadays, managing Macs like mobile devices means they can be configured over the air, without ever having to be domain-joined. That’s a major plus for global organizations, remote workers and companies who use contractors or freelancers. Unifying parallel device environments enables streamlined oversight, management and distribution of content across Macs and iOS devices. With AirWatch® Enterprise Mobility Management, IT can implement a BYOD program and policy for all device types, ensuring personal information remains private. IT has a consistent management experience for all device types and operating systems, enabling a single-pane-of-glass view of all endpoints in an enterprise.
Tags : vmware, emm, mac management, managing macs, airwatch, it management, data management
     VMware AirWatch
By: Dell     Published Date: Jul 08, 2016
Today’s enterprise leaders are looking for a way to make apps run faster, IT management cheaper, and provisioning easier. The advent of hyper-converged software (HCS) has meant that organizations can now get much more out of their hardware than ever before. New data center options are emerging that save time, space and money — creating an industry pivot and a new focus on hyper-converged infrastructure (HCI).
Tags : enterprise, best practices, technology, data center, hyper converged software, application
     Dell
By: Dell     Published Date: Jul 12, 2016
Today’s enterprise leaders are looking for a way to make apps run faster, IT management cheaper, and provisioning easier. The advent of hyper-converged software (HCS) has meant that organizations can now get much more out of their hardware than ever before. New data center options are emerging that save time, space and money — creating an industry pivot and a new focus on hyper-converged infrastructure (HCI).
Tags : 
     Dell
By: HPE     Published Date: Feb 11, 2015
According to ESG’s 2014 IT Spending Intentions Survey, improving data backup and recovery is the most often mentioned priority for midmarket organizations for the third year in a row. It is the third most frequently cited priority by enterprises and midmarket organizations overall. Additionally, business continuity and disaster recovery (BC/DR) also appear in the top-ten priority lists of both midmarket and enterprise respondents.
Tags : 
     HPE
By: Emulex Corporation     Published Date: Nov 07, 2013
The status quo in network monitoring is no longer adequate for large organizations. It’s simply taking too long for enterprises with mission-critical networks to resolve and find the root causes of network incidents. To speed things up, enterprises must add dedicated incident response and root cause analysis capabilities that are 100% accurate and reliable to their network management arsenals. It takes so long to diagnose, fix, and eradicate network incidents that network uptime and performance are suffering. Because of this, organizations need to embrace incident response and root cause analysis capabilities to accelerate resolution times and avoid the network downtime and service degradation that can cost them thousands, if not millions, of dollars per minute. Download this Whitepaper for more information.
Tags : network monitoring, network visibility, technology, endace, best practices, networking
     Emulex Corporation
By: Fortinet EMEA     Published Date: Nov 26, 2018
When it comes to securing all the parts of a modern distributed network, endpoints remain the most vulnerable outlier. Mobility has brought a flood of different devices that cross in and out of enterprise networks on a daily basis. This public exposure, combined with inadequate traditional endpoint security and a high degree of user autonomy, makes these devices prime targets for malware infections and other forms of sophisticated attack that seek to exploit the broader organization. And threat actors are finding enormous success along these vectors. To stay competitive, most organizations are currently embracing digital transformation (DX)—including cloud services, smart Internet of Things (IoT) devices, and greater mobility. These adaptations provide organizations with faster and more seamless access to critical information, regardless of the device being used to access it. However, as distributed networks expand and become more difficult to manage, the endpoint remains a weak link i
Tags : 
     Fortinet EMEA
By: NetApp     Published Date: -
Enterprise data is growing rapidly - reaching multiple petabytes of data or even billions of files for many organizations. To maximize the business value of this data, enterprises need a storage infrastructure to store, manage, and retrieve a massive amount of data. This ebook shows you how to address large content repository challenges with object storage. You'll learn how to effectively address long-term retention policies, find and retrieve content quickly from long-term repositories and using object storage efficiently.
Tags : object storage, storage infrastructure
     NetApp
By: McAfee EMEA     Published Date: Mar 14, 2018
As they face numerous regulations, enterprises believe data privacy can create a competitive advantage. But are they ready for the new General Data Protection Regulation (GDPR)? Here are the concerns and strategies of 800+ senior executives from industries around the world. Data in a Turbulent World Nearly half of organizations say they will migrate data as a result of regulation or changing government policies. Data Protection as a Competitive Advantage A significant majority of respondents believe proper data protection will attract new customers. Download our full report, Beyond GDPR: Data residency insights from around the world.
Tags : 
     McAfee EMEA
By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management, sim technology, compliance, fraud, netforensics
     netForensics
By: SnowFlake     Published Date: Jul 08, 2016
Today’s data, and how that data is used, have changed dramatically in the past few years. Data now comes from everywhere—not just enterprise applications, but also websites, log files, social media, sensors, web services, and more. Organizations want to make that data available to all of their analysts as quickly as possible, not limit access to only a few highly-skilled data scientists. However, these efforts are quickly frustrated by the limitations of current data warehouse technologies. These systems simply were not built to handle the diversity of today’s data and analytics. They are based on decades-old architectures designed for a different world, a world where data was limited, users of data were few, and all processing was done in on-premises data centers.
Tags : snowflake, data, technology, enterprise, application, best practices, social media, storage
     SnowFlake
By: Apstra     Published Date: Feb 21, 2019
The enterprise data center has undergone several major shifts since the introduction of computing as a business resource. Data centers have evolved from mainframes to client/server to virtual servers, and then to being “software defned,” and fnally to their current state of disaggregation. Today, we sit on the precipice of the next major data center transition—the evolution to an intent-based data center (IBDC) (Exhibit 1). Each transition saw the cost of computing decrease and the importance of the network increase, and each enabled organizations to boost the efciency of their data center operations and improve asset utilization—ultimately leading to a better experience for users
Tags : ibn, ibdc, data center infrastructure
     Apstra
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com