data assets

Results 1 - 25 of 148Sort Results By: Published Date | Title | Company Name
Published By: CloudPassage     Published Date: May 19, 2020
Enterprises large and small are migrating existing applications to the cloud and developing new applications on cloud-native infrastructure. Datacenter security practices don’t translate to cloud environments due to technical and operational changes that disrupt existing security and compliance approaches. As organizations transition to distributed DevOps models, application development velocity increases dramatically. Continuous delivery and software-defined infrastructure result in additions and changes to critical assets on-demand at any time. This webinar is for security engineers, DevOps engineers, cloud architects, and security executives. Your take-aways from this webinar will be the six “must-haves” for achieving real-world, practical cloud security. You will leave the webinar with a working understanding of: • How moving to the cloud changes development and security practices • How the concept of “practical cloud security” cuts through the noise and hype • What to expect an
Tags : 
    
CloudPassage
Published By: CloudPassage     Published Date: May 19, 2020
Based on real-world experience and research, this white paper shares insights into five of the most dangerous and common IaaS configuration mistakes that could expose your public cloud computing environment to a worst-case security scenario. These are: • Early hacked administrative credentials • Exposed data assets • Weak network access controls • Unconstrained Blast Radius • Poor event logging For each of the five security mistakes, we discuss: • The specific weaknesses those configuration mistakes can create • How those weaknesses can be exploited • The potential impacts of being exploited • How to detect those weaknesses manually or through automation
Tags : 
    
CloudPassage
Published By: Adlib Software     Published Date: Jan 13, 2014
Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.
Tags : 
content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion
    
Adlib Software
Published By: Zaloni     Published Date: Apr 24, 2019
Why your data catalog won’t deliver significant ROI According to Gartner, organizations that provide access to a curated catalog of internal and external data assets will derive twice as much business value from their analytics investments by 2020 than those that do not. That’s a ringing endorsement of data catalogs, and a growing number of enterprises seem to agree. In fact, the global data catalog market is expected to grow from US$210.0 million in 2017 to US$620.0 million by 2022, at a Compound Annual Growth Rate (CAGR) of 24.2%. Why such large and intensifying demand for data catalogs? The primary driver is that many organizations are working to modernize their data platforms with data lakes, cloud-based data warehouses, advanced analytics and various SaaS applications in order to grow profitable digital initiatives. To support these digital initiatives and other business imperatives, organizations need more reliable, faster access to their data. However, modernizing data plat
Tags : 
    
Zaloni
Published By: Hitachi Vantara     Published Date: Mar 08, 2019
Data is one of the most valuable assets in your enterprise. Ensuring that your data is protected, should the worst possible scenario occur, is vital. However, no single data protection tool can offer complete peace of mind. Use the right tools for each job but manage them from one place. Read this white paper to see how Hitachi Vantara takes a unified approach to modern data protection and simplifies data protection.
Tags : 
    
Hitachi Vantara
Published By: Hitachi Vantara     Published Date: Mar 08, 2019
In a perfect world, downtime would be a thing of the past, however, as organizations continue their digital transformation journeys, more data assets are being created—generating, in turn, higher availability demands. Delivering on availability service levels is not just a technical responsibility, but also a business imperative extending well beyond IT. The consequences of failing to meet service levels can be dire and costly. Read this white paper to learn how the right tools can minimize downtime.
Tags : 
    
Hitachi Vantara
Published By: Equinix     Published Date: May 28, 2015
This paper illustrates different perspectives on building a secure and flexible data center platform that sustains growth and innovation and delivers a serious competitive advantage.
Tags : 
data center, strategic business advantage, hybrid, technology, it demands, data center platform, equinix, equinix solutions
    
Equinix
Published By: Jumio     Published Date: Mar 03, 2020
Businesses everywhere are starting to realize something... That their biggest source of competitive advantage lies in the most granular operational details. The whole world runs on processes. Think about it. Every customer experience and business outcome is the product of an invisible flow of data and actions between your systems, assets and people. That’s why Process Mining—and by extension, process excellence—is gaining steam. It’s helping enterprises optimize each and every operational element for better outcomes, extraordinary experiences and world-class performance. To learn more, download this whitepaper today!
Tags : 
    
Jumio
Published By: Oracle EMEA     Published Date: Apr 15, 2019
Oracle Autonomous Data Warehouse Cloud is more than just a new way to store and analyze data; it’s a whole new approach to getting more value from your data. Market leaders in every industry depend on analytics to reach new customers, streamline business processes, and gain a competitive edge. Data warehouses remain at the heart of these business intelligence (BI) initiatives, but traditional data-warehouse projects are complex undertakings that take months or even years to deliver results. Relying on a cloud provider accelerates the process of provisioning data-warehouse infrastructure, but in most cases database administrators (DBAs) still have to install and manage the database platform, then work with the line-of-business leaders to build the data model and analytics. Once the warehouse is deployed—either on premises or in the cloud—they face an endless cycle of tuning, securing, scaling, and maintaining these analytic assets. Oracle has a better way. Download this whitepaper to f
Tags : 
    
Oracle EMEA
Published By: Vmware     Published Date: Dec 13, 2019
What Every CIO Should Know about Security: Cybersecurity spend continues to increase, yet breaches continue to rise. What are we doing wrong? For starters, most organizations define cybersecurity practices through preventative technologies. What these approaches are often missing, however, are the basics: cyber hygiene, asset management, and protecting the data above all else. When talking to customers, we often hear 7 common myths and misperceptions around cybersecurity, which may be putting your organization at risk. In this brief, we debunk these misperceptions and advise CIOs of the tactics they should be focusing on to protect their most valuable assets.
Tags : 
    
Vmware
Published By: Vmware     Published Date: Dec 16, 2019
What Every CIO Should Know about Security: Cybersecurity spend continues to increase, yet breaches continue to rise. What are we doing wrong? For starters, most organizations define cybersecurity practices through preventative technologies. What these approaches are often missing, however, are the basics: cyber hygiene, asset management, and protecting the data above all else. When talking to customers, we often hear 7 common myths and misperceptions around cybersecurity, which may be putting your organization at risk. In this brief, we debunk these misperceptions and advise CIOs of the tactics they should be focusing on to protect their most valuable assets.
Tags : 
    
Vmware
Published By: Panasonic     Published Date: Aug 04, 2016
Whether deploying, securing or managing mobility solutions in a professional environment, enterprise leaders must go to great lengths to ensure their investments are effective and easily assimilated into their existing workflows. In order to avoid encountering challenges with rugged mobile devices and other specialist mobile solutions, it is crucial for businesses with field workforces to leverage services and partners that can help them instill strategic best practices across the entire spectrum of mobilization, including security and data protection, installation and integration, training, maintenance and warranties, and proper disposal of old assets.
Tags : 
mobile devices, mobility, managing mobility, best practices, productivity
    
Panasonic
Published By: Akamai Technologies     Published Date: Jul 02, 2019
In today’s markets, customer identities and the personal data associated with them are among the most critical and valuable assets of any enterprise. Managing these digital identities — from first registration and login to the later stages of the customer relationship — and extracting business value from the associated data are complex tasks, commonly referred to as customer identity and access management (CIAM). When implementing a system to collect, manage, and utilize digital identity and customer data, companies have two basic choices: in-house development or buying a dedicated solution from a vendor specialized in CIAM (i.e., build vs. buy). Read this white paper for an in-depth analysis of CIAM implementation options, including: ? Must-haves for a successful, enterprise-grade CIAM system ? Pros and cons of implementation options, ranging from in-house software development to commercial off-the-shelf solutions ? A real-world case study that illustrates the ROI of an effective CI
Tags : 
    
Akamai Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management
    
CA Technologies
Published By: IBM     Published Date: Sep 22, 2011
Companies need capabilities for identifying data assets and relationships, assessing data growth and implementing tiered storage strategies-capabilities that information governance can provide. It is important to classify enterprise data, understand data relationships and define service levels. Database archiving has proven effective in managing continued application data growth especially when it is combined with data discovery.
Tags : 
ibm, application data, technology, enterprise, database archive
    
IBM
Published By: CA Technologies     Published Date: Aug 22, 2017
Across industry sectors, the boundaries of the traditional enterprise are blurring, as organizations open up their on-premise data and application functionality to partner organizations, the Web, mobile apps, smart devices and the cloud. APIs (application programming interfaces) form the foundation of this new open enterprise, allowing enterprises to reuse their existing information assets across organizational boundaries.
Tags : 
    
CA Technologies
Published By: Juniper Networks     Published Date: Aug 10, 2017
Resistance to change is futile. Financial services are becoming more embedded in the banking customer’s everyday life, driving unprecedented levels of change across the industry. The unfolding digital economy is ushering a new era of technology adoption in banking. From cloud to open banking APIs, these play a defining role in enabling banks to create new digital products and services, refresh the bank branch, find new customer segments, and monetize underutilized data and information assets.
Tags : 
opening banking, api, data, currency, cloud transformation, frictionless banking, business model disruption
    
Juniper Networks
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
When it comes to cybersecurity, you can only defend what you can see. Organizations continue to suffer breaches, oftentimes because they do not have continuous, real-time visibility of all their critical assets. With more data and applications moving to the cloud, IoT and other emerging technologies, the attack surface continues to expand, giving adversaries more blind spots to leverage. Watch a webinar with SANS where we examine how to: Discover, classify and profile assets and network communications Detect threats and decode content in real-time at wire speed Hunt for unknown threats via rich, indexable metadata Alter your terrain and attack surface with deception to slow down attackers By knowing your cyber terrain and increasing the risk of detection and cost to the adversary, you can gain a decisive advantage.
Tags : 
    
Fidelis Cybersecurity
Published By: IBM     Published Date: Apr 12, 2016
The digital transformation that organizations are striving for today requires a mindset of "no limits" in terms of securely exposing critical business assets for internal and external consumption. In order to be an agile, digital business, enterprises need to seamlessly connect across hybrid environments, applications, data and processes, keeping a keen eye on an open cloud strategy. They also need a secure integration framework to provide controlled access, a single dashboard providing performance insights, and easy access to digital assets for your developers. This webcast will explore all of these areas in depth, to support your enterprise's quest to become a next-generation digital business.
Tags : 
ibm, digital business, api economy, api management, apim, api, enterprise applications, business technology
    
IBM
Published By: Oracle     Published Date: Sep 08, 2016
This Webcast explores what the next generation of Finance function looks like. Watch this webcast now to find out: How companies are monitoring and measuring intangibles within their business. How the CFO role is evolving in this increasingly digital economy that we are all living.
Tags : 
digital technologies, digital landscape, finance, business models, next generation finance, finance function, cloud, big data
    
Oracle
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: TIBCO Software     Published Date: Mar 17, 2020
Your business teams need to manage and share vast amounts of data assets—master data, reference data, conformed dimensions, hierarchies, and metadata. The dynamism and sophistication of your data means you can no longer rely on simple office automation tools or outdated data management tools to manage these assets. You need TIBCO EBX™ software because it makes it so much easier to manage your data assets: Custom applications and purpose-built master data management (MDM) solutions are hard to change, but EBX software is flexible and agile. It uses a unique what-you-model-is-what-you-get design approach, with applications generated on-the-fly and fully configurable, eliminating the need for long, costly, and endless development projects. It includes all the enterprise-class capabilities you need to create data-driven applications. Data stewardship, workflow, data quality, and data integration are built right in. Get this whitepaper to explore all the features of EBX™ software and how i
Tags : 
    
TIBCO Software
Published By: Cisco     Published Date: Sep 15, 2015
To effectively respond to these challenges, public safety agencies must be able to rely on secure networks with integrated voice, video, and data capabilities. With these networks and their associated assets, agencies can obtain more timely and accurate information, enhancing situational awareness and improving response times. Cisco and our partners can help agencies obtain secure networks.
Tags : 
public safety, iot, law enforcement, emergency response, strategy
    
Cisco
Published By: Dell EMC     Published Date: Aug 29, 2017
Choose your Isilon hardware based on your need, all-flash; accelerate demanding file workloads with extreme performance and scalability, Hybrid; Realize performance, capacity, and value for a wide range of enterprise file workloads and Archive; Lower the cost to store and protect aging data assets while providing near-primary accessibility.
Tags : 
    
Dell EMC
Start   Previous   1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.