ber

Results 1 - 25 of 4590Sort Results By: Published Date | Title | Company Name
Published By: Dell APAC - EMC     Published Date: May 19, 2020
In the digital era, a skilled and effective workforce is essential and the technology to support them is equally vital. It’s the task of technology decision makers to provide every worker with an ecosystem of hardware, software and additional equipment that maximizes each worker’s ability to contribute to the organization. In the search to uncover the facts about worker experience across a broad range of global regions and industries, a survey commissioned by Dell points the way to greater worker effectiveness and organizational competitiveness. The survey found that motivation and engagement are keys to optimizing the performance of every workforce member. And motivation and engagement, in turn, are fueled by technology that meets user needs for power, durability and convenience.
Tags : 
    
Dell APAC - EMC
Published By: Forcepoint     Published Date: Feb 03, 2020
Mobile devices and cloud-based applications that empower teams to work anywhere have been a boon for business productivity, agility, and innovation. However, this new way of working presents a new challenge for cybersecurity teams: securing mobile devices accessing cloud applications that store sensitive data outside the control of on-premises security solutions.
Tags : 
    
Forcepoint
Published By: Veeam APAC     Published Date: Apr 26, 2020
"Microsoft Active Directory is the basis for every Microsoft?oriented networking environment. However, it’s not always a solid basis. With thousands of network environments under their belts, Sander Berkouwer (Microsoft MVP) and Veeam’s® Andrey Zhelezko know their Active Directory. Join this webinar to benefit from their best practices, including: - Protecting and (automatically) expiring passwords - Leveraging the Protected Users group and other protections - Using the Active Directory Recycle Bin - Putting Veeam Backup & Replication™ to good use"
Tags : 
    
Veeam APAC
Published By: Hewlett Packard Enterprise     Published Date: May 01, 2020
CRAFTING A COMPREHENSIVE APPROACH TO CYBERSECURITY
Tags : 
    
Hewlett Packard Enterprise
Published By: City Pantry     Published Date: Feb 14, 2020
"Rachael, Office Manager at Zoom, shares her experience with City Pantry. Zoom, an enterprise video communications company based in Holborn, joined City Pantry back in October 2017. Download the Case Study to learn more about how to make your office a friendlier place, and make your people happier."
Tags : 
    
City Pantry
Published By: City Pantry     Published Date: Mar 06, 2020
At City Pantry we think it's important to shine a light on the office heroes who keep work moving. Whether an Office Manager, or an Executive Assistance, it's important to understand how these vital members of staff feel about their roles. Read great insight, such as: What is enjoyed most at work What is enjoyed least Recognition and role perception Perks and benefits Download the report now to learn more.
Tags : 
    
City Pantry
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state
    
Aberdeen
Published By: Automation Anywhere APAC     Published Date: May 08, 2020
Most employees spend up to 20 percent of their time on mundane, repetitive tasks. But with RPA, you can automate cumbersome chores and give employees up to 10 hours a week to focus on higher-value work, improving productivity and innovation. Our new in-depth eBook, ‘The Intelligent Digital Workplace: A Business Leader’s Guide to RPA’ explains how. • Automation can save employees up to nine weeks of effort annually • RPA can dramatically increase your company’s capacity • Bots significantly reduce errors
Tags : 
    
Automation Anywhere APAC
Published By: F5 Networks Singapore Pte Ltd     Published Date: Apr 20, 2020
"Containerized applications need an application delivery infrastructure designed for containers. Organizations use container platforms such as Kubernetes or RedHat OpenShift in combination with agile development methodologies to speed up application development and deployment. Containers are foundational infrastructure components for developing cloud-native applications as they enable flexibility and portability that allow developers to “write once, run anywhere.” Containers reduce dependencies and allow component-level scaling, which is key to modernizing applications using microservices. Download this guide to learn how to deliver optimal performance to your containerized apps."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Apr 20, 2020
"Agile platforms need agile protection. Container platforms such as Kubernetes and RedHat OpenShift combine with agile development methodologies to speed up application development and deployment. By allowing developers to break applications up into smaller components (also known as microservices), containers can help reduce dependencies, allow component-level scaling, and encourage rapid release lifecycle Download this guide to learn how you can keep up with rapid release cycles in containerized environment securely through automated responses to container events."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Tableau     Published Date: May 11, 2020
Zuverlässige Daten für fundierte Entscheidungen in Unternehmen bereitstellen – diese Aufgabe hat sich seit Jahrzehnten nicht grundlegend geändert. Trotz der massiven technologischen Fortschritte und neuer taktischer Herangehensweisen verfolgen IT-Organisationen heute weiterhin dasselbe Ziel: Daten ab dem Moment ihrer Erstellung weiterzuleiten und den Entscheidungsträgern zum Zeitpunkt des Bedarfs verfügbar und verständlich zu machen. Zwar ist das Ziel gleich geblieben, doch heute haben sich die Hürden für die erfolgreiche Erstellung und Verwaltung einer einzigen zuverlässigen Datenquelle für Analysen im Unternehmen exponentiell vervielfacht.
Tags : 
    
Tableau
Published By: Tableau     Published Date: May 11, 2020
Dieses Dokument bietet einen Überblick über wichtige Überlegungen im Hinblick auf Ihre Governance, wenn Sie mit Tableau unternehmensweit moderne Selfservice-Analytics bereitstellen möchten. Unser Ziel ist es, der IT-Abteilung die wichtigen Rollen, Verantwortlichkeiten und wiederholbaren Prozesse verständlich zu machen, die Voraussetzung für die Zusammenarbeit mit der Geschäftsabteilung sind, darunter die Delegation administrativer Aufgaben. Auf diese Weise können Sie Ihre Analytics-Lösung skalieren und die datengesteuerte Entscheidungsfindung im gesamten Unternehmen zur Norm machen.
Tags : 
    
Tableau
Published By: Tableau     Published Date: May 11, 2020
Dieser Evaluierungsleitfaden soll IT-Abteilungen bei der Evaluierung und Auswahl einer modernen BI- und Analytics-Plattform unterstützen, die sich umfassend und unternehmensweit bereitstellen lässt. Die Umstellung auf ein modernes BI-Modell auf Selfservice-Basis verlangt von der IT-Abteilung eine veränderte Ausrichtung auf einen auf Zusammenarbeit angelegten Ansatz, der das Unternehmen in allen Aspekten des gesamten Programms einbezieht (siehe Neudefinition der Rolle der IT-Abteilung in einer modernen BI-Umgebung). Dieser Leitfaden behandelt den Aspekt der Evaluierung und Auswahl der Plattform für ein modernes BI-Programm. Er ist für IT-Abteilungen gedacht, die damit gemeinsam mit Geschäftsanwendern und Analysten die Möglichkeiten der Plattform zur Einrichtung eines modernen Analytics-Workflows bewerten und den vielfältigen Anforderungen von Benutzern im Unternehmen gerecht werden können.
Tags : 
    
Tableau
Published By: Tableau     Published Date: May 11, 2020
Seit ihrer Einführung vor mehr als zwei Jahrzehnten war das vorrangige Ziel der Business Intelligence die Erstellung einer einzigen zuverlässigen Datenquelle, auf deren Basis Unternehmen KPIs und Leistungskennzahlen mit statischen Berichten und Dashboards ermitteln können. Dieser Wunsch entstand als Reaktion auf den Wildwuchs von Spreadsheets und Berichtssilos der Unternehmen, die oft unterschiedliche und widersprüchliche Ergebnisse nach sich zogen. Mit diesem neuen Auftrag wurden spezielle BI-Teams – oft in den IT-Abteilungen – gebildet, die bei dieser Aufgabe nach dem Prinzip traditioneller IT-Projekte verfahren sind: Geschäftsanwender führen eine Anfrage bei der IT-Abteilung durch, diese stellt ein Ticket aus und kommt der Anfrage mit der„Wasserfallmethode“ nach.
Tags : 
    
Tableau
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay.¹ As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: AppDirect     Published Date: Mar 23, 2020
Discover the Trends Impacting Your Industry 4.0 Initiatives New survey data from AppDirect explores the state of the industry and how manufacturers are using digital strategies to succeed. Sixty-five percent of manufacturing executives believe that, in five years, only businesses that have digitally transformed will survive. GET THE INFOGRAPHIC
Tags : 
    
AppDirect
Published By: AppDirect     Published Date: Mar 23, 2020
Are you spending too much on your digital commerce go-to-market initiatives? Companies rarely want to share what they spend, and concrete numbers can be hard to come by. This quick guide can help you see how you stack up against the average company. It includes the cost and time to market for selling: Core products Third-party products Through the channel And on devices Fill out the form to download the quick guide.
Tags : 
    
AppDirect
Published By: AppDirect     Published Date: Mar 23, 2020
The telecom industry provides the infrastructure that is powering the global digital revolution, but industry profits are in decline. Can today’s communications service providers (CSPs) reverse course? This infographic gives an overview of the major trends that are driving change in the telecom industry, including: The factors driving down telecom industry revenues The new threats of over-the-top (OTT) players and digital disruption Innovations that are creating new revenue opportunities, including a focus on SMBs, the Internet of Things, and improvements in the customer experience Fill out the form to download the infographic.
Tags : 
    
AppDirect
Published By: Zebra Technologies (Bulldog)     Published Date: May 18, 2020
Background • Surveyed Nurse managers, IT decision makers and recently hospitalized patients • Hospitals and patients • Better understand the role of technology in acute care hospitals. Highlights The global healthcare industry is facing a seemingly insurmountable number of challenges – from aging populations and staff shortages to rising costs – that are placing enormous pressure on institutions, doctors, workers, patients and communities. As a result, there is a higher demand for services and support that are not sustainable with existing resources and methods. Hospitals are increasingly turning to technology and automation to reduce the strain on an already fragile system.
Tags : 
    
Zebra Technologies (Bulldog)
Published By: ServiceNow     Published Date: May 27, 2020
More and more enterprises are turning to containers to increase efficiency and help enable multi?cloud IT operations. Read our white paper to see how you can get visibility to cloud native applications through container orchestration products, such as Kubernetes, and drive efficiency in the DevOps CI/CD process.
Tags : 
    
ServiceNow
Published By: CheckMarx     Published Date: Mar 09, 2020
Finanzdienstleister unterliegen strengen regulatorischen Vorgaben – und das zu Recht: Die Assets und Informationen, die von ihnen verarbeitet werden, sind wertvoll und sensible und stehen täglich im Visier von Angreifern. Die von Fintech- Unternehmen verarbeiteten personenbezogenen Daten (PII) unterliegen daher strengen Compliance-Bestimmungen wie dem Gramm-Leach-Bliley Act (GLBA), den Payment Card Industry Data Security Standards (PCI DSS) und dem Sarbanes-Oxley Act. Von zentraler Bedeutung ist auch die Datenschutzgrundverordnung (DSGVO), die den Umgang mit personenbezogenen Daten von EU-Bürgern regelt. Finanzdienstleister, die für US-amerikanische Bankkunden tätig sind, müssen darüber hinaus die Einhaltung von Absatz 5 (Unfair or Deceptive Acts or Practices) des Federal Trade Commission Acts und weiterer Verbraucherschutzvorgaben auf US-bundesstaatlicher Ebene im Blick behalten.
Tags : 
    
CheckMarx
Published By: Proofpoint     Published Date: May 05, 2020
Email fraud costs companies around the world billions, and can destroy brand reputation and consumer trust in a matter of minutes. Highly-targeted, low volume business email compromise (BEC) scams are arguably the most dangerous, costing organizations around the globe $26.2 billion since 2016, according to the FBI. The DMARC (Domain-based Message Authentication Reporting & Conformance) standard, unveiled by a group of leading email organizations in February 2012, is one of the most powerful and proactive weapons to date in the fight against phishing and spoofing. It has reshaped the email fraud landscape, disrupting long standing phishing strategies and forcing cybercriminals to abandon preferred targets. DMARC has the potential to nullify an entire class of fraud within the next few years. In this guide, we’ll cover what DMARC is, how it works, its key benefits, and what it means to your organisation.
Tags : 
    
Proofpoint
Published By: Proofpoint     Published Date: May 05, 2020
AN IN-DEPTH LOOK AT USER AWARENESS, VULNERABILITY AND RESILIENCE Do you have a good sense of how well users understand cybersecurity terms and best practices? Do you know the top issues infosec teams are dealing with as a result of phishing attacks? How about the ways organisations are fighting social engineering attacks? Our sixth annual State of the Phish report delivers critical, actionable insights into the current state of the phishing threat, including: • End-user awareness and knowledge gaps that could be hurting your cybersecurity defences • Impacts of phishing attacks and the ways infosec pros are trying to combat these threats • How Proofpoint customers are approaching phishing awareness training and the ways we’re helping them measure success With this report you will learn how organisations can take a more inward, people-centric view of their vulnerabilities and empower users to become a stronger line of defence.
Tags : 
    
Proofpoint
Published By: Pure Storage     Published Date: Jun 01, 2020
Konvergente Infrastruktur (CI)-Plattformen, die Rechen-, Speicher- und Netzwerktechnologie in einer ganzheitlichen Lösung integrieren, erleichtern die schnelle Bereitstellung bewährter IT-Infrastrukturen. Alle Komponenten in diesen Systemen werden von den Anbietern gemeinsam auf Kompatibilität getestet. Damit vereinfachen diese Systeme Kauf, Bereitstellung, Management, Erweiterung und Support. Dies sind die Hauptgründe, aus denen Kunden heute konvergente Infrastrukturlösungen kaufen. Wenn diese Angebote All-Flash-Arrays (AFAs) umfassen, entsteht eine IT-Infrastrukturlösung, die auf alle Kanäle einwirkt: Das bedeutet konstant hohe Leistung, extrem effiziente IT-Infrastruktur (in Bezug auf Leistungs- und Speicherdichte, einfache Verwaltung und Kostensenkung), hohe Verfügbarkeit der Verfügbarkeitsklasse 6 („Six Nines“) und Gesamtkosten (Total Cost of Ownership, TCO), die allgemein 50 - 80 % niedriger sind als bei einer vergleichbar konfigurierten Lösung mit Festplatten (HDD).
Tags : 
    
Pure Storage
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.