it strategy

Results 326 - 350 of 1439Sort Results By: Published Date | Title | Company Name
Published By: Veritas     Published Date: Oct 03, 2016
The information explosion has exposed organizations to an overwhelming amount of risk. Whether financial, legal, security, productivity, or reputational risk, there is a high likelihood that your organization is currently trending toward an information ecosystem that is not sustainable and highly out of control. The time to act is now to deploy an Information Governance strategy. Are you prepared to climb out of your information hole?
Tags : 
    
Veritas
Published By: Microsoft     Published Date: Oct 24, 2016
This report explores the four elements of an enterprise mobility strategy and how to address the challenges that your enterprise may face in a mobile environment.
Tags : 
enterprise mobility management, mobility, mobile devices, bring your own device
    
Microsoft
Published By: Infor     Published Date: Mar 03, 2017
This whitepaper reveals the seven steps every distributor should take right now to develop a sharp, focused digital strategy.
Tags : 
digital strategy, digital, software, enterprise, enterprise applications
    
Infor
Published By: Teradata     Published Date: May 02, 2017
As companies consider incorporating enterprise-level cloud services offered by Amazon Web Services, Microsoft Azure, Teradata, and others, many challenges arise related to data security, integration into existing data architecture, and analytics activities themselves. Download this article to understand these and other considerations for evaluating and adopting a cloud strategy for your enterprise, and what it means for analytics.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Teradata
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Limeade     Published Date: Feb 02, 2017
Culture is the most important factor in any organizationís success or failure. If your culture doesnít align with and support your strategy, your strategy will fail. Be a culture architect: Take 10 steps to proactively support your business strategy.
Tags : 
    
Limeade
Published By: IBM     Published Date: Jan 06, 2016
Replay of the September 24, 2015 webcast on API Economy & API Management with speaker George Nealon, IBM API Economy and Integration Sales Manager Worldwide.
Tags : 
ibm, digital, business, cloud strategy, applications, data. integration
    
IBM
Published By: IBM     Published Date: Apr 18, 2016
This e-book describes how a data refinery can make trusted data available quickly and easily to people and systems across your organization. It includes simple steps you can take to start exploring - and implementing - this strategy for handling the challenges of hybrid data environments.
Tags : 
ibm, trusted data, data optim, big data, hybrid data environments, data management
    
IBM
Published By: IBM     Published Date: Apr 19, 2016
The use of analytics will define the successful midmarket business of the next decade, just as it will define the successful larger organization in this information age. The past decade has seen rapid change in the business climates with an explosion of global competition and economic uncertainty. Despite this, many midmarket companies have thrived by using their size and agility as a competitive advantage. Certainly they have fewer resources than large corporations who are able to invest large sums in IT. However, small yachts can turn and adjust their course much quicker than large cruise ships. The same came be said for midmarket companies. The most successful organizations are ones that can react the quickest to changes in the market place. Midmarket companies can take advantage of their smaller size by being more agile and quicker to change, or even reinvent themselves, to respond to the market.
Tags : 
ibm, ibm pure data system, big data, data analytics, analytics architecture, competitive advantage, midmarket organization, data management
    
IBM
Published By: IBM     Published Date: Jul 06, 2016
This e-book describes how a data refinery can make trusted data available quickly and easily to people and systems across your organization. It includes simple steps you can take to start exploring - and implementing - this strategy for handling the challenges of hybrid data environments.
Tags : 
ibm, trusted data, data optim, big data, hybrid data environments, data management, data center
    
IBM
Published By: IBM     Published Date: Oct 13, 2016
This e-book describes how a data refinery can make trusted data available quickly and easily to people and systems across your organization. It includes simple steps you can take to start exploring - and implementing - this strategy for handling the challenges of hybrid data environments.
Tags : 
ibm, trusted data, data governance, governance, big data, hybrid data environments, data management, business technology, data center
    
IBM
Published By: IBM     Published Date: Oct 13, 2016
Cloud-based data and processing services present too much opportunity for organizations to ignore. How can organizations realize the obvious financial benefits of the cloud while ensuring information culled from cloud sources is secure and trustworthy? Good hybrid information governance implies several priorities for IT and the business which are based on these foundational pillars: - Broad agreement on what information means - Clear agreement on how owned information assets will be maintained and monitored - Standard practices for securing strategic information assets - Enterprise data integration strategy
Tags : 
ibm, trusted data, big data, governance, data governance, data management, business technology, data center
    
IBM
Published By: IBM     Published Date: Mar 29, 2017
No matter the vintage or sophistication of your organizationís data warehouse (DW) and the environment around it, it probably needs to be modernized in one or more ways. Thatís because DWs and requirements for them continue to evolve. Many users need to get caught up by realigning the DW environment with new business requirements and technology challenges. Once caught up, they need a strategy for continuous modernization.
Tags : 
data, warehouse, modernization, ibm, cloud
    
IBM
Published By: Trend Micro     Published Date: Feb 01, 2013
This whitepaper will explore the anatomy of targeted attacks: the inner workings of the APT lifecycle. It will also provide an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks. Deep Discovery is at the heart of the Trend Micro Custom Defense solution against targeted attacks.
Tags : 
advanced persistent, threat challenge, custom defense solution, trend micro, risk management
    
Trend Micro
Published By: Symantec     Published Date: Nov 24, 2014
This solution brief is aimed at helping you to implement the right security strategy now.
Tags : 
implementing a security strategy, preparing for malware attacks, understanding attacks
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This solution brief is aimed at helping you to implement the right security strategy now.
Tags : 
implementing a security strategy, preparing for malware attacks, understanding attacks
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This solution brief is aimed at helping you to implement the right security strategy now.
Tags : 
implementing a security strategy, preparing for malware attacks, understanding attacks
    
Symantec
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security, wireless security, mobile device management
    
CA Technologies
Published By: CA SM     Published Date: Jun 02, 2008
The potential benefits of adopting a Knowledge Management strategy are significant and have far-reaching implications for a business when implemented correctly. The correct use of Knowledge Management techniques and technology makes a company agile and more responsive to the needs of the customer, resulting in enhanced business performance and greater return on investment.
Tags : 
ca sm, ca service management, service management, knowledge management, custoer service, return on investment, roi, best practices, it support
    
CA SM
Published By: CA WA 2     Published Date: Oct 01, 2008
Given the increased complexities and requirements thrust onto data center management environments over time, a more holistic management approach is necessary for efficient and cost effective delivery of IT services. Authors and analysts Judith Hurwitz and Robin Bloor bring their research and extensive experience to light in respect to the state of data center management by building the case for automation as a key strategy for efficient and cost effective management.
Tags : 
datacenter automation, data center automation, network management, ca wa, ca wa 2, it management
    
CA WA 2
Published By: Znode     Published Date: Jan 10, 2011
Using a Multi-Store Ecommerce Strategy to Significantly Increase Customer Acquisition. As Ecommerce becomes a leading strategy for businesses, online retailers are presented with a challenge: how to increase sales by personalizing the customer shopping experience and strengthening the brand. The solution is to develop a multi-store strategy that "divides and conquers" this challenge. Retailers can develop several online stores that cater to distinct customer demographics, optimize separate checkout flows based on product, or improve conversion rates in marketing campaigns.
Tags : 
znode, marketing, ecommerce, online distribution, retail, development, integration, erp
    
Znode
Published By: SailPoint     Published Date: Feb 08, 2011
This guide is designed to help ensure a successful identity governance strategy can move your organization toward sustainable compliance, reduced risk, improved service levels and lower operational costs.
Tags : 
sailpoint, identity governance, compliance, risk management, access management, password management, reporting and analytics
    
SailPoint
Published By: Citrix Systems     Published Date: Jan 29, 2013
This paper provides IT executives with guidance to develop a complete BYOD strategy which gives people optimal freedom of choice while helping IT adapt to consumerization - at the same time addressing requirements for security, simplicity and more.
Tags : 
ipad, android, tablet, mobility, byo, smartphone, citrix, knowledge management, data management, business technology, data center
    
Citrix Systems
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.