rsa

Results 76 - 100 of 663Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Apr 27, 2017
La gestión de la red a través de la nube otorga mayor rendimiento y versatilidad, por una fracción del coste y sin la complejidad de las soluciones tradicionales.
Tags : 
cisco, gestión de red, meraki
    
Cisco
Published By: Schneider Electric     Published Date: Oct 17, 2016
Die Kostenverursacher der TCO warden quantifiziert. Es wird gezeigt, dass der größten Kostenverursacher unnötige Kosten aufgrund einer überdimensionierten Infrastruktur sind.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Oct 17, 2016
Ce livre blanc propose d'améliorer concrètement l'alimentation, le refroidissement, les baies, la sécurité physique, ainsi que la surveillance et l'éclairage. Il s'intéresse aux petites salles serveurs et succursales d'une charge informatique de 10 kW.
Tags : 
    
Schneider Electric
Published By: Zendesk     Published Date: Dec 10, 2018
Não importa qual o tipo ou o horário de operação da sua empresa: sua porta está sempre aberta. Atualmente, os clientes fazem perguntas a qualquer hora do dia ou da noite e esperam ser respondidos (desde que não demore muito). Isso representa um desafio para a maioria das empresas: como antecipar os canais que o cliente vai querer ou dos quais vai precisar? E como determinar se esses canais serão eficientes para a sua organização? A resposta simples é: sim, você precisa. E este guia vai explorar exatamente isso. Os clientes querem entrar em contato com as empresas de várias formas e esperam que cada interação com a marca seja consistente com as conversas que teve antes e as que terá depois. Aprenda como com a solução omnichannel do Zendesk.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Jan 04, 2019
Não importa qual o tipo ou o horário de operação da sua empresa: sua porta está sempre aberta. Atualmente, os clientes fazem perguntas a qualquer hora do dia ou da noite e esperam ser respondidos (desde que não demore muito). Isso representa um desafio para a maioria das empresas: como antecipar os canais que o cliente vai querer ou dos quais vai precisar? E como determinar se esses canais serão eficientes para a sua organização? A resposta simples é: sim, você precisa. E este guia vai explorar exatamente isso. Os clientes querem entrar em contato com as empresas de várias formas e esperam que cada interação com a marca seja consistente com as conversas que teve antes e as que terá depois. Aprenda como com a solução omnichannel do Zendesk.
Tags : 
    
Zendesk
Published By: Tenable     Published Date: Feb 27, 2019
"CISOs and other security leaders know they can't find and fix every vulnerability. Yet, that's what’s expected. So, what can you do? The short answer: Work smarter, not harder. To do that, you need to reduce the vast universe of potential vulnerabilities down to a subset of the vulnerabilities that matter most. Download the “How to Prioritize Cybersecurity Risks: A Primer for CISOs” ebook now to learn: -How to adopt a risk-based approach to prioritization – beyond what CVSS scores tell you -Why visibility into all your company’s IT assets is key to understanding the scope of vulnerabilities and taking appropriate remedial action -How to change the conversation from “How many vulnerabilities do we have?” to “Which vulnerabilities pose the greatest risk?”"
Tags : 
    
Tenable
Published By: SendBird     Published Date: Nov 14, 2019
Media brands are beginning to see that while their content generates excitement, all of their audience engagement takes place on external platforms. As a result, companies such as Facebook and Twitter control the audience’s experience — and reap the many benefits of hosting conversations and interactions surrounding content they did not create. For customers, this fragmented landscape creates a disjointed user experience because they’re forced to constantly switch between applications and risk missing the action in the process. They use one app to consume content, another app to discuss with friends, and yet another app to chat with the broader community.
Tags : 
    
SendBird
Published By: IBM APAC     Published Date: Aug 25, 2017
There is a tectonic shift in the way we work. We expect the same kind of intuitive, tactile experience with our workplace technology that we now take for granted with our smartphones, tablets and gaming systems. We expect our devices to talk to each other and update automatically. Virtual meetings should be as easy to set up as a video chat, and whatever we need to do our jobs should be as easy to tailor as a streaming music or video application.
Tags : 
personal profile, news and alerts, conversation recall, system updates, productivity tips
    
IBM APAC
Published By: Workday Italy     Published Date: Sep 20, 2018
In che cosa è differente Workday in termini di sicurezza? Diversamente dai sistemi legacy, la sicurezza è parte integrante del sistema, non una funzione aggiuntiva. Guarda il video, scoprirai in che modo il nostro speciale approccio alla sicurezza elimina gli accessi non autorizzati tipici dei sistemi legacy, aumenta le funzioni di conformità e audit e garantisce la sicurezza di dati, transazioni, processi di elaborazione e applicazioni.
Tags : 
    
Workday Italy
Published By: Workday Italy     Published Date: Feb 04, 2019
In che cosa è differente Workday in termini di sicurezza? Diversamente dai sistemi legacy, la sicurezza è parte integrante del sistema, non una funzione aggiuntiva. Guarda il video, scoprirai in che modo il nostro speciale approccio alla sicurezza elimina gli accessi non autorizzati tipici dei sistemi legacy, aumenta le funzioni di conformità e audit e garantisce la sicurezza di dati, transazioni, processi di elaborazione e applicazioni.
Tags : 
workday, workforce technology, digital strategy
    
Workday Italy
Published By: Logrhythm     Published Date: Sep 11, 2017
Threat Lifecycle Management ist die entscheidende Voraussetzung, um Angriffe in einer möglichst frühen Phase ihres Lebenszyklus zu erkennen und zu stoppen. TLM vereint zahlreiche Fähigkeiten und Funktionen, die es ermöglichen, neue Bedrohungen und Angriffe auf die Unternehmenssysteme zu erkennen; festzustellen, welche Risiken sie mit sich bringen; die Risiken zu minimieren; und die nötigen Maßnahmen zu ergreifen, um den Normalbetrieb wieder aufnehmen zu können. TLM hat das Ziel, schädliche Cybervorfälle, die durch erfolgreiche Angriffe auf Systeme, Netzwerke und Daten verursacht werden können, umfassend zu bewältigen beziehungsweise zu verhindern.
Tags : 
einleitung, menschen, prozesse, technologien, eine strategie entwickeln
    
Logrhythm
Published By: Schneider Electric     Published Date: Oct 28, 2019
Einige potenzielle Nutzer von Colocation-Datacenter empfinden die bewährte Verfahren zur Stromversorgung und Kühlung als einschränkend. Allerdings können effektive Nutzungsbedingungen Ausfallzeiten aufgrund von thermischer Abschaltung und menschlichem Versagen verkürzen, Kapazitätseinschränkungen aufgrund von unnötigem Energieverbrauch verringern und die Lebensdauer der anfänglichen Mietfläche verlängern und somit Kosten für zu groß dimensionierte Reserveflächen vermeiden. Dieses Dokument erläutert einige Ursachen für unnötigen Energieverbrauch, Kühlung und Flächennutzung in Datacentern für Colocation-Services und erläutert, wie Stromverteilung, Luftabsaugung und andere Verfahren die Verfügbarkeit und Effizienz in kompakten Racks steigern können. Es werden Beispiele für Nutzungsbedingungen gegeben, die zur Lösung dieser Probleme beitragen.
Tags : 
colocation-datacenter, schneider electric, cloud und service-anbieter
    
Schneider Electric
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Cloud computing no longer is simply the most dominant topic of conversation among the IT community and its business stakeholders: It is now a gigantic marketplace that is reshaping how IT services are provided and, more important, is helping organizations become more agile, responsive and efficient.
Tags : 
private cloud, cloud computing, agile, responsive, efficient
    
Dell & Microsoft
Published By: Cisco     Published Date: Oct 06, 2015
Learn how Cisco combines the power of Cisco Collaboration Cloud with the versatile toolbox of Cisco Unified Contact Center Express (Unified CCX) to provide multiple channels for customer engagement.
Tags : 
cisco, cisco collaboration cloud, customer care, unified ccx, customer engagement, legacy metrics, networking, it management, wireless, business technology
    
Cisco
Published By: GE Healthcare     Published Date: Feb 23, 2015
Given the wide range of technology options available, it's important for healthcare IT executives to pick the right image management technology and approach for a long-term sustainable solution delivering the desired performance and ROI. This whitepaper explores solutions for multi-layered neutrality, a standards-based framework for unifying medical images and clinical documents across the enterprise and community.
Tags : 
enterprise imaging, advanced visualization, universal viewer, centricity pacs, 3d imaging, radiology imaging solutions, diagnostic medical imaging, radiology medical imaging, medical imaging technology, medical imaging pacs, medical imaging systems, medical imaging services, medical imaging technologies, smart reading protocols, multi-modality reading, unified view of patient images
    
GE Healthcare
Published By: GE Healthcare     Published Date: Jun 11, 2015
Radiological Associates of Long Island implemented Universal Viewer to give radiologists PACS reading tools and advanced features across the enterprise and anywhere Internet access is available.
Tags : 
enterprise imaging, advanced visualization, universal viewer, centricity pacs, radiology imaging solutions, diagnostic medical imaging, radiology, medical imaging, medical imaging technology, medical imaging pacs, medical imaging systems, medical imaging services, medical imaging technologies, smart reading protocols
    
GE Healthcare
Published By: Dell EMC     Published Date: Nov 02, 2015
If you are considering Hybrid Cloud, tune in to this revealing conversation with EMC’s Chad Sakac and Wikibon Analysts, Dave Vallente and Stu Miniman.
Tags : 
emc, wikibon, analysis, virtualization, cloud, hybrid, business technology, data center
    
Dell EMC
Published By: Mimecast     Published Date: Oct 02, 2018
Informationen zur aktuellen Bedrohungslage, zu fehleranfälligen Schutzmechanismen und zu menschlichem Versagen –und wie eine Cyber Resilience Strategie Sie vor Cyber Angriffen schützt.
Tags : 
    
Mimecast
Published By: Akamai Technologies     Published Date: May 06, 2019
Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks. The people behind these attacks realize the value of an account, whether it’s to a streaming site, a game, or someone’s social media account. And, they’re willing to do whatever it takes to steal them. This report provides an overview of the recent credential stuffing attacks against these sectors and the risks these attacks pose. We’ll also explore some of the ways adversaries conduct these attacks.
Tags : 
    
Akamai Technologies
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Fast alles, das mit einer Anwendung in Berührung kommt, verbessert oder verschlechtert ihre Performance. Die Herausforderung liegt in der Ermittlung der Ursache: Codeänderung, API, Netzwerk, Anwendungsarchitektur oder verbundener Service? Lesen Sie dieses eBook und erfahren Sie, welche komplexen Umgebungen erforderlich sind für ein modernes digitales Unternehmen und welches APM Modell die entscheidungsrelevanten Einblicke bieten kann, die zur Maximierung der Performance erforderlich sind.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Auf einen Blick Mitarbeiter von heute sind es gewohnt, privat digitale Technologien zu nutzen, die eine problemlose Kommunikation ermöglichen und die Abläufe des täglichen Lebens vereinfachen. Bedauerlicherweise können viele Unternehmenstools nicht Schritt halten. Die meisten Projekt- und Portfoliomanagementlösungen, die heute eingesetzt werden, bieten keine unkomplizierten Optionen, um alltägliche Aufgaben auszuführen. Sie ermöglichen keine kontextbasierte Kommunikation, mit der sich Probleme lösen lassen, und verfügen nicht über entscheidende Funktionalität. Dazu zählen z. B. die Möglichkeit, den Fokus auf relevante Daten einzuschränken, das Durchführen von Drilldowns, um zusätzliche Informationen zu erhalten, sowie die Vorhersage finanzieller Entwicklungen und das Modeling von Ergebnissen.
Tags : 
    
CA Technologies EMEA
Published By: NTT Ltd.     Published Date: Aug 15, 2019
As businesses are driven to digital transformation by changing market forces and customer expectations, many are looking to new technologies, including new infrastructure environments, as enablers. As a result, we are seeing a near-universal appetite for hybrid outcomes as business functions are executed across multiple on-premises and external infrastructure environments in pursuit of agility, cost, performance and other business benefits. Hybrid IT has become a key strategic imperative for a large portion of enterprises, impacting their IT objectives and expectations, and likely leading to new engagements with service provides for help designing, building and operating hybrid environments.
Tags : 
    
NTT Ltd.
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
When it comes to cybersecurity, you can only defend what you can see. Organizations continue to suffer breaches, oftentimes because they do not have continuous, real-time visibility of all their critical assets. With more data and applications moving to the cloud, IoT and other emerging technologies, the attack surface continues to expand, giving adversaries more blind spots to leverage. Watch a webinar with SANS where we examine how to: Discover, classify and profile assets and network communications Detect threats and decode content in real-time at wire speed Hunt for unknown threats via rich, indexable metadata Alter your terrain and attack surface with deception to slow down attackers By knowing your cyber terrain and increasing the risk of detection and cost to the adversary, you can gain a decisive advantage.
Tags : 
    
Fidelis Cybersecurity
Published By: IBM UK&Ireland     Published Date: Nov 14, 2017
The key to order management success is to recognize that the product alone is no longer what is being sold, but the entire purchase experience from the point of view of the customer. Each retail task is a challenge that brings the customer and their needs to the center of the conversation. With the help of IBM Order Management and Watson Order Optimizer, your company can address the key challenges of optimizing inventory and minimizing cost-to-serve while delivering omni-channel services that satisfy your customers.
Tags : 
success management, optimization, watson order optimizer, customer success, omni channel, ibm
    
IBM UK&Ireland
Published By: Dell SB     Published Date: Jan 24, 2019
Dell Precision delivers versatile designs, top performance & reliability to conquer the industry’s most demanding applications. From award-winning filmmakers and animators to architects and engineers our expansive portfolio enables you to customize the workstation for your creative expertise.
Tags : 
    
Dell SB
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.