face face

Results 26 - 50 of 175Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Oct 02, 2018
VMware surveyed approximately 200 senior IT leaders at enterprise, commercial, and SMB organizations worldwide to shed light on the evolving role of IT. In the face of increased pressures, IT oganizations are needing to accelerate development and delivery of applications that power faster time-to-market for the business. In this paper, we chart the progress of CIOs, CTOs and other IT leaders and discuss the top challenges they face in building more nimble, responsive organizations to support their business objectives. We also show how data centre modernization can help organizations deliver the agility required to meet ever-increasing demands for faster innovation through a flexible, service-oriented IT model that employs both private and public clouds. Submit the form to discover the access this latest paper and set the pace in today’s digital economy.
Tags : 
    
VMware
Published By: BeyondTrust     Published Date: Apr 02, 2020
The utilization of “always-on” privileged accounts has been the default mode for administrative access for the last 40 years. However, always-on access presents a massive risk surface as it means the privileged access, rights, and permissions are always active and ready to be exercised - for legitimate activities as well as for illicit ones. And this risk surface is rapidly expanding alongside the growing use of virtual, cloud, and DevOps environments and internet of things (IoT) devices. Of course, cyber threat actors are wise to what is essentially the over-provisioning of privileges via the always-on model. Against this backdrop, it’s no surprise that the abuse and/or misuse of privileges play a role in almost every cybersecurity breach incident today, as has been widely reported by the top industry analysts and other research. With privileged access in hand, an attacker essentially becomes a malicious insider, and that’s an alarming scenario for any IT professional, all the way up
Tags : 
    
BeyondTrust
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
When it comes to cybersecurity, you can only defend what you can see. Organizations continue to suffer breaches, oftentimes because they do not have continuous, real-time visibility of all their critical assets. With more data and applications moving to the cloud, IoT and other emerging technologies, the attack surface continues to expand, giving adversaries more blind spots to leverage. Watch a webinar with SANS where we examine how to: Discover, classify and profile assets and network communications Detect threats and decode content in real-time at wire speed Hunt for unknown threats via rich, indexable metadata Alter your terrain and attack surface with deception to slow down attackers By knowing your cyber terrain and increasing the risk of detection and cost to the adversary, you can gain a decisive advantage.
Tags : 
    
Fidelis Cybersecurity
Published By: CA Technologies     Published Date: Aug 24, 2017
Dans l’économie numérique, les interfaces de programmation d’applications ou API (Application Programming Interfaces) sont essentielles pour mettre rapidement en oeuvre vos idées et saisir les nouvelles opportunités du marché. Elles sont les éléments fondateurs de la transformation numérique, permettant aux organisations d’offrir une expérience client exceptionnelle, de générer de nouveaux flux de revenus et d’offrir aux employés, partenaires, applications et périphériques un accès aux données, partout et à tout moment.
Tags : 
    
CA Technologies
Published By: TIBCO Software     Published Date: Mar 17, 2020
Organizations today understand the value to be derived from arguably their greatest asset — data. When successfully aggregated and analyzed, data can unlock valuable insights, solve problems, improve products and services, and help companies gain a competitive edge. However, analytics executives face significant challenges in collecting, validating and analyzing data to deliver the right analytic insight to the right person at the right time. This e-book is designed to help. First, we’ll explore the growing expectations for data analytics and the rise of the analytics executive. Then we’ll explore a range of specific challenges those executives face, including those around data blending, analytics, and the organization itself, and offer best practices and strategies for meeting them. We’ll also provide a short overview of TIBCO Statistica, an easy-to-use predictive analytics software solution designed to turn big data into your biggest competitive advantage.
Tags : 
    
TIBCO Software
Published By: EMC     Published Date: Apr 15, 2011
This white paper discusses Unisphere for VNXe. It describes the Unisphere for VNXe interface, and explains how an IT generalist can easily complete storage-related tasks using this intuitive, easy-to-use interface.
Tags : 
emc unisphere, vnxe, storage management, connection utility, configuration wizard, cifs, iscsi, nfs
    
EMC
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Feb 03, 2015
A step-change in the pace of business today brings enterprise resource planning (ERP) systems face-to-face with the largest transformation in their role since they were first introduced in the early 1990s. The rise of a new generation of business automation demands real-time information processing and visibility on a scale that was unthinkable just a few years ago. Coupled with—and in large part enabled by—this new wave of business automation, there has been a surge in the pace of business itself. Learn how Real-Time ERP puts you and your business at the forefront of this change.
Tags : 
real-time erp, enterprise, business automation demands, information processing and visibility
    
Netsuite DWASF Leads Display Q1 2015
Published By: Longi Engineering     Published Date: Jan 23, 2018
Longi Engineering was engaged to assist a Private Equity Firm in implementing a SharePoint deal management system as an additional component to their existing on premise SharePoint server solution. The organization faced multiple challenges in that they did not possess an efficient technology solution that allowed them to manage their deals and associated history. One of the organization’s goals was to create a centralized, easily accessible dashboard interface from which they could rapidly determine the status of a deal as well as manage their deals. Their deal lifecycle had multiple stages depending on whether a deal was New, in a diligence phase, on Hold or Dead.
Tags : 
software development, it consulting services, net software solutions, microsoft sharepoint
    
Longi Engineering
Published By: TIBCO Software     Published Date: Aug 15, 2018
TIBCO Spotfire® Data Science is an enterprise big data analytics platform that can help your organization become a digital leader. The collaborative user-interface allows data scientists, data engineers, and business users to work together on data science projects. These cross-functional teams can build machine learning workflows in an intuitive web interface with a minimum of code, while still leveraging the power of big data platforms. Spotfire Data Science provides a complete array of tools (from visual workflows to Python notebooks) for the data scientist to work with data of any magnitude, and it connects natively to most sources of data, including Apache™ Hadoop®, Spark®, Hive®, and relational databases. While providing security and governance, the advanced analytic platform allows the analytics team to share and deploy predictive analytics and machine learning insights with the rest of the organization, white providing security and governance, driving action for the business.
Tags : 
    
TIBCO Software
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprises currently face challenges regarding the price, performance, and flexibility of traditional wide area networks (WANs). Aggressive growth in the adoption of public cloud services (a projected 86% spike between 2014 and 2018)1 is forcing organizations to look elsewhere for a more effective network solution to address distributed traffic across remote sites and branch offices. Some of the specific issues organizations face with their traditional WANs include: - High total cost of ownership (TCO) - Lengthy provisioning cycles - Performance degradation with the growth of cloud traffic - Inadequate redundancy and resiliency - Lack of application-aware connectivity To better manage WAN investments, enterprises are adopting a new approach for their distributed branch office networks. Software-defined WAN (SD-WAN) offers improved performance, agility, and operational flexibility plus significant cost savings. But not all SDWAN solutions are created equal.
Tags : 
    
Fortinet EMEA
Published By: Fortinet     Published Date: Apr 14, 2020
"Organizations face a number of different potential emergency situations, such as illness, flood, hurricanes, and power outages. Implementing a business continuity plan is essential to ensuring that the organization is capable of maintaining operations in the face of adversity and preparing for potential disasters. An important consideration for organizations developing a business continuity plan is that the organization may not be capable of sustaining normal operations onsite. The ability to support employees working remotely is essential to ensuring both business continuity and security. Fortinet solutions offer an integrated solution to support telework."
Tags : 
    
Fortinet
Published By: Crowdstrike     Published Date: Apr 23, 2020
All organizations can be the target of ransomware. Although big game hunting is on the rise – where ransomware operators target large enterprise organizations to gain huge payouts, ransomware is frequently aimed at small & medium-sized organizations, which are often more vulnerable to attacks. Small businesses are targeted for several reasons, from money and intellectual property (IP) to customer data and access. Smaller organizations face different challenges than larger ones, and they also know that smaller organizations often face the same threats and need the same standard of protection. This paper explains the impact of ransomware on small and medium-sized organizations, explores factors that lead to increased vulnerability and offers advice on how to protect and secure your organisation with a next generation endpoint protection platform that uses an array of complementary prevention and detection methods to fight against constantly shifting ransomware techniques.
Tags : 
    
Crowdstrike
Published By: HERE Technologies     Published Date: Feb 12, 2019
Rising urbanization has brought unprecedented levels of traffic and congestion to our major towns and cities. Departments of transport are battling to ensure their regions aren’t negatively impacted by increased pressure on their road networks. On the frontline are traffic operators and planners. Every day, they face complex challenges as they attempt to improve traffic flow, minimize incidents, and unearth solutions to network issues. This eBook explains how traffic planners and operators can use data to help overcome some of the challenges they face.
Tags : 
public sector, urbanization, traffic management
    
HERE Technologies
Published By: HERE Technologies     Published Date: May 23, 2019
Rising urbanization has brought unprecedented levels of traffic and congestion to our major towns and cities. Departments of transport are battling to ensure their regions aren’t negatively impacted by increased pressure on their road networks. On the frontline are traffic operators and planners. Every day, they face complex challenges as they attempt to improve traffic flow, minimize incidents, and unearth solutions to network issues. This eBook explains how traffic planners and operators can use data to help overcome some of the challenges they face.
Tags : 
public sector, urbanization, traffic management
    
HERE Technologies
Published By: Dassault Systèmes     Published Date: Sep 22, 2017
The manufacturing landscape faces dramatic change. Creating and capturing value in this new environment requires aerospace companies to not just understand what’s driving these changes, but also grasp just how consequential a role digital transformation will play in determining their future. Download this white paper now to find out how the manufacturing landscape faces dramatic change.
Tags : 
aerospace, aviation, manufacturing, product development, product lifecycle management, automation, data
    
Dassault Systèmes
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Dans les organisations agiles d’aujourd’hui, les équipes de production se trouvent face à un défi de taille : déployer en production les nouvelles versions immédiatement après les phases de développement et de test. Pour assurer la réussite d’un tel déploiement, il est nécessaire de mettre en œuvre un processus automatique et transparent. ce processus, nous l’avons baptisé Zero Touch Deployment™. cet article examine deux approches du Zero Touch Deployment : une solution basée sur les scripts et une plate-forme d’automatisation de la mise en production. Il indique comment chacune de ces approches peut résoudre les principaux défis technologiques et organisationnels face auxquels se trouvent les organisations agiles lorsqu’elles décident d’implémenter un système de déploiement automatique. cet article commence par retracer le contexte commercial et technologique qui pousse les organisations agiles à se tourner vers des solutions d’automatisation du déploiement.
Tags : 
zero touch deployment, continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, test, ca test data manager
    
CA Technologies EMEA
Published By: Ping Identity     Published Date: Feb 12, 2016
A key technical underpinning of the cloud and the Internet of Things are Application Programming Interfaces (APIs). APIs provide consistent methods for outside entities such as web services, clients and desktop applications to interface with services in the cloud.
Tags : 
    
Ping Identity
Published By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, pam/pim solutions, illusive networks
    
Illusive Networks
Published By: Relay Network APAC     Published Date: Jun 17, 2020
Now more than ever, your customers are struggling to find the answers and support they need. Financial institutions are in a state of forced digital transformation, and many are finding that they're ill-equipped to effectively engage customers with limited face-to-face interactions. Apps and portals lack personalization, and traditional methods of outreach like emails and calls get lost in the clutter. So, how can you properly reach and support your customers to achieve desired outcomes now and in the future? This guide will walk you through 5 ways leading banks are using personalized, proactive mobile experiences to drive powerful engagement, education and adoption of core account services that increase lifetime value and reduce operational costs.
Tags : 
    
Relay Network APAC
Published By: Cisco     Published Date: Apr 20, 2016
Go ahead. Create and join meetings easily from your computer or mobile device. Invite participants to share content in real time. See who you’re talking to. All in a highly secure environment. This is now reality for government agencies, thanks to Cisco WebEx® Web Conferencing, a FedRAMP-compliant service. As a FedRAMP-compliant solution provided by the market leader in web and video conferencing, Cisco WebEx Web Conferencing lets you: • Easily meet face to face with meeting participants from other locations • See and hear the same information at the same time with attendees • Collaborate and increase productivity without the need for travel • Make meetings more engaging with high-definition (HD) video, audio, and content sharing
Tags : 
cisco webex, web conferencing, productivity, connectivity, government agencies, fedramp, video conferencing, networking, security, wireless, business technology
    
Cisco
Published By: Oracle     Published Date: Sep 26, 2019
It’s not uncommon to find slick-looking user interfaces, well-run product demos, and exciting sales narratives when evaluating a data management platform (DMP), but don’t let those features distract from the elements needed for day-to-day and long-term strategic success of a DMP. Whether you’re looking to invest in a DMP for the first time or want to switch to a new provider, there are a few crucial factors to consider before signing on the dotted line. Key functionality, architecture, and partnership dynamics are all important factors, but they rarely surface until your team is hands-on and using the platform. Once you dig in, it can quickly become apparent that a shiny interface and smart storytelling are a distraction from what really matters—at this point, it’s often too late. Avoid buyer’s remorse by considering these seven facets of all DMP providers before making your decision.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Sep 30, 2019
In the past, B2B transactions occurred in face-to-face meetings as a sales professional worked a product demo, business luncheon, or boardroom presentation to influence a customer – and close the deal. Today, however, B2B stakeholders perform much of their product and service research online. In fact, 93 percent of B2B buying starts with online searching, according to a Pinpoint Market Research study. This research occurs long before a customer engages with sales. As your prospects research and evaluate your offerings, they leave behind valuable clues to their intent. Understanding these clues – cracking the code – can help you tailor your messages to them, thereby providing them a more tailored, relevant experience. As a result, business-savvy marketing and sales departments have embraced marketing automation platforms, so their respective teams can work together on one common platform, reach B2B customers online, and drive revenue. Marketing automation platforms automate repetitive
Tags : 
    
Oracle
Published By: Dell EMC     Published Date: Oct 30, 2019
Midmarket firms face many of the same data center security risks as their enterprise counterparts with far fewer resources at their disposal to mitigate them. Downtime, data theft, and regulatory non-compliance all pose existential threats to these organizations and as they drive for continuous innovation and advantage in an increasingly competitive landscape, they must ensure valuable data and IT assets are secure, protected, and available at all times. How can midmarket organizations succeed in the face of these challenging market dynamics? This Research Insights report shows that the success organizations have enjoyed varies greatly, and further that organizations enjoying the greatest success demonstrate a clear organizational commitment to prioritizing security and operate fundamentally more secure data center environments. Download this report from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Red Hat     Published Date: Sep 25, 2014
When a company sells services to a consumer audience primarily through a Web user interface (UI), that Web UI had better be online and available, all the time, especially if you are an airline. Such is the real-world scenario that faces Chris Skretowski, Linux Specialist at Devon, United Kingdom-based Flybe, Europe's largest regional airline. Despite being a relatively small IT function, it powers a regional airline with over 1,700 employees and 55 aircraft, and the company has big ambitions, driven top down by a new CEO who believes that technology adoption and use can make a real difference in the company's bottom line. Having a board that is supportive of IT as a strategic business driver means there is lots of open air ahead for Skretowski, who is responsible for all the Linux infrastructure that front ends the company's missioncritical Web presence. Flybe was one of the 21 companies that were interviewed for quantitative results on their operations as part of an IDC ROI analys
Tags : 
web user interface, it function, it infrastructure, roi analysis, it management, data management
    
Red Hat
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.