technologies

Results 1 - 25 of 3544Sort Results By: Published Date | Title | Company Name
Published By: Silver Peak     Published Date: Dec 31, 9999
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication that can: • Meet Recovery Point Objectives (RPO) by reducing remote replication times by up to 20X • Reduce bandwidth costs and extend replication distances • Lower storage costs while increasing storage flexibility • Leverage emerging cloud and virtualization technologies for better offsite disaster recovery Hear from the experts and users at Dell Compellent, Silver Peak and AlaskaUSA discuss essential data replication strategies and technologies.
Tags : 
offsite data, remote replication, reliable, storage flexibility, cloud, virtualization, technology, offsite disaster recovery, security, knowledge management, storage, business technology
    
Silver Peak
Published By: VMware     Published Date: Sep 12, 2019
You’ve heard the stories: a large Internet company exposing all three billion of its customer accounts; a major hotel chain compromising five hundred million customer records; and one of the big-three credit reporting agencies exposing more than 143 million records, leading to a 25 percent loss in value and a $439 million hit. At the time, all of these companies had security mechanisms in place. They had trained professionals on the job. They had invested heavily in protection. But the reality is that no amount of investment in preventative technologies can fully eliminate the threat of savvy attackers, malicious insiders, or inadvertent victims of phishing. Breaches are rising, and so are their cost. In 2018, the average cost of a data breach rose 6.4 percent to $3.86 million, and the cost of a “mega breach,” those defined as losing 1 million to 50 million records, carried especially punishing price tags between $40 million and $350 million.2 Despite increasing investment in security
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
cloud is no longer an option — it’s inevitable. But cloud strategies differ extensively, based on the context of your organization and investments. drivers such as industry, risk tolerance, and preparation dictate the pace, scope, and technologies you need. However, every cloud strategy should share key activities. This report guides infrastructure and operations (i&O) pros through forrester’s cloud maturity assessment so they can gauge where their firms are on their journeys and discover which core competencies they need to strengthen or develop to enable their pragmatic cloud reality. This is an update of a previously published report; forrester reviews and revises it periodically for continued relevance and accuracy.
Tags : 
    
VMware
Published By: VMware     Published Date: Sep 12, 2019
Digital transformation, through innovative customer experiences, is shaping the way organizations compete. Yet beyond introducing new technologies, winning businesses are vying for the best talent, leading to a rise in improving the digital employee experience, according to a new global survey.
Tags : 
    
VMware
Published By: MuleSoft     Published Date: Sep 11, 2019
Artificial intelligence (AI), the internet of things (IoT), and security technologies are set to disrupt every industry in the next decade. To get there, leading organizations like McDonald’s, Uber Eats, and HSBC have built adaptable digital platforms via APIs. In the ebook, MuleSoft founder Ross Mason shares his point of view on how to build a thoughtful API strategy that will help your organization take full advantage of emerging technologies like AI, chatbots, and IoT without compromising on security. Download this ebook to learn: How to unlock AI customer insights with an API strategy. How to make APIs the bedrock of IoT development. Why zero trust is key to API security in the new API economy.
Tags : 
    
MuleSoft
Published By: Akamai Technologies     Published Date: Sep 10, 2019
Small and midsize businesses (SMBs) need – and want – cybersecurity. However, with limited resources, they often have to look for outsourced solutions. ISPs are well positioned to address SMBs’ security needs with their ongoing IT relationships, established contacts, and billing connections. Security offerings can help providers improve subscriber engagement, drive incremental revenues, and increase service provider affinity. This white paper will explore the following: • SMB exposure on the internet, and unique challenges they face dealing with security threats • How ISPs can help SMBs address their security exposure • The market opportunity for SMB security, and how providers can build a business case
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 10, 2019
Contemporary internet threats are sophisticated and adaptable, they continuously change their complexion to evade security defenses. Traditional rigid, deterministic, rule-based security research are becoming less effective. Security research approaches employing data science methods to implement anomalies-based analysis across very large volumes of anonymized data are now essential. This paper will: • Briefly cover security research challenges in today’s threat landscape • Explain why DNS resolution data is a rich resource for security research • Describe how Akamai teams use DNS data and data science to create better threat intelligence • Discuss improvements in threat coverage, accuracy, and responsiveness to today’s agile threats
Tags : 
    
Akamai Technologies
Published By: MuleSoft     Published Date: Sep 09, 2019
Today’s digital era places strain on traditional financial firms, including increased customer expectations, the threat of disintermediation by market entrants, strict regulatory requirements, and more. How do banks, who face operational silos and aging systems, keep up? The answer lies in building a digital platform with APIs. In this session, hear directly from seasoned technologists to learn about the approach, tools, and operating model they use to successfully adapt and lead in the marketplace. Discover how to get more out of your existing legacy and cloud infrastructure and, in turn, deliver a flexible architecture that can easily adapt as new technologies emerge. During this session, you will learn: Why industry disruptions and increased customer expectations demand a bank that transforms into a digital platform. How an API-led approach to integration can help financial firms transform into digital platforms. SunTrust’s journey with MuleSoft’s Anypoint Platform and Salesf
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Sep 09, 2019
La capacité de votre entreprise à changer rapidement, à innover facilement et à égaler la concurrence dans tous les domaines sur lesquels elle prend de l'avance est aujourd'hui une nécessité stratégique. Elle vous permettra de prospérer sur un marché en constante évolution et de créer de nouvelles expériences clients dans de nouveaux contextes, en utilisant de nouvelles technologies. Pour façonner des expériences clients innovantes, votre entreprise a besoin que son équipe IT lui fournisse des ressources digitales sous la forme de fonctionnalités métiers clés capables de lui apporter une réelle valeur dans des contextes multiples. C'est ainsi que l'IT peut devenir l'allié des objectifs stratégiques de votre entreprise. Les organisations qui ont réussi à jeter les bases d'une innovation continue et d'une approche agile ont adopté des architectures microservices pour répondre rapidement aux innombrables exigences de leur activité.
Tags : 
    
MuleSoft
Published By: Cisco and NVIDIA Corporation     Published Date: Sep 09, 2019
The future of work means a new IT balancing act No matter what the work of your organization, today it’s likely done… …As much out of the office as in it …As much on mobile devices as traditional computers …And much more through cloud applications for core business activities and collaboration with customers and partners. The future of work has arrived, and with it comes a complex new balancing act for IT. On one side of the scale are high expectations for how IT can enable digital transformation and innovation in the business. On the other side is more accountability for mitigating risk, even as growing adoption of new technologies means more apps, more devices, and more mobile employees. This balancing act is driven by current challenges and trends in four areas.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: CloudHealth by VMware     Published Date: Sep 05, 2019
Both the speed of innovation and the uniqueness of cloud technology is forcing security teams everywhere to rethink classic security concepts and processes. In order to keep their cloud environment secure, businesses are implementing new security strategies that address the distributed nature of cloud infrastructure. Security in the cloud involves policies, procedures, controls, and technologies working together to protect your cloud resources, which includes stored data, deployed applications, and more. But how do you know which cloud service provider offers the best security services? And what do you do if you’re working on improving security for a hybrid or multicloud environment? This ebook provides a security comparison across the three main public cloud providers: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). With insight from leading cloud experts, we also analyze the differences between security in the cloud and on-premises infrastructure, debunk
Tags : 
    
CloudHealth by VMware
Published By: HERE Technologies     Published Date: Sep 05, 2019
Connected embedded navigation has suffered in recent years with the proliferation of smartphone integration combined with lengthy design cycles and a fragmented ecosystem. HERE’s Navigation On Demand service provides OEMs with the ability to offer consumers an always-fresh navigation and a compelling connected service. Download the whitepaper now to learn how you can benefit from: • the architecture of HERE Navigation On Demand and how it enables OEMs to deliver a different, more joined up, experience • the Navigation as a Service Approach, which allows an always-fresh experience without unnecessary recreation of effort • developing more impactful service
Tags : 
navigation, oem, software, consumer, cloud, demand
    
HERE Technologies
Published By: SailPoint Technologies     Published Date: Sep 05, 2019
If you’re not controlling access to documents, spreadsheets, presentations and reports stored in the cloud, your organization is significantly more vulnerable to security breaches and data privacy compliance penalties. Download this white paper to find out why. .
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Sep 05, 2019
Every day, employees upload vast numbers of presentations, PDFs, emails and reports to cloud storage providers like Box and Dropbox. Did you know this exposes your organization to serious risk of security breaches and compliance violations? Download this brief to find out the most effective way to close your security gaps.
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Sep 05, 2019
Find out how combining identity governance with privileged account management significantly decreases security risks and improves productivity. Download the brief.
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Sep 05, 2019
Short Description (1000 characters max) Want the strongest cybersecurity possible? Download this brief to find out how Identity governance, combined with privileged access management, will give you the information you need to quickly identify and respond to security risks.
Tags : 
    
SailPoint Technologies
Published By: Akamai Technologies     Published Date: Sep 04, 2019
It’s a bold claim; one that hasn’t always been accepted as truth. In the not so distant past, digital security was seen as a cost center. Those days are gone. Security is essential to the success of any digital business. If there is one thing you can always count on, however, it’s that security-related incursions are inevitable. And it’s news to no one to say that these disruptions can have dire consequences beyond downtime. Security breaches erode trust and damage reputation. Simply put, there’s no longer a choice. As a CIO, CISO, or other security or IT leader, you know it’s your job to be the central agent stressing the connections between business and digital risk. It’s your responsibility to find the talent and technology to ensure the protection of your digital assets. According to Gartner, by 2020, 100% of large enterprises will be asked to report on their cybersecurity and technology risks to their boards of directors at least annually. That’s up from 40% in 2018. Whether you’r
Tags : 
    
Akamai Technologies
Published By: Group M_IBM Q3'19     Published Date: Sep 04, 2019
In the last few years we have seen a rapid evolution of data. The need to embrace the growing volume, velocity and variety of data from new technologies such as Artificial Intelligence (AI) and Internet of Things (IoT) has been accelerated. The ability to explore, store, and manage your data and therefore drive new levels of analytics and decision-making can make the difference between being an industry leader and being left behind by the competition. The solution you choose must be able to: • Harness exponential data growth as well as semistructured and unstructured data • Aggregate disparate data across your organization, whether on-premises or in the cloud • Support the analytics needs of your data scientists, line of business owners and developers • Minimize difficulties in developing and deploying even the most advanced analytics workloads • Provide the flexibility and elasticity of a cloud option but be housed in your data center for optimal security and compliance
Tags : 
    
Group M_IBM Q3'19
Published By: Marketo     Published Date: Sep 03, 2019
Need a more significant ROI from your campaigns? Shift your thinking towards acquiring, retaining, and growing high-value accounts: companies or consumers that are high-yield and a better fit for your products or services. New channels, strategies, & technologies now help organizations of all sizes to implement an account-based marketing (ABM) strategy. Download Marketo's best-in-class Definitive Guide to Account-based Marketing and you'll learn: How to identify, prioritize, and profile the right accounts Creating a winning ABM strategy Creating the right content Which channels to leverage and how to coordinate them How to measure, analyse & optimize ABM campaigns What an ABM strategy that spans the entire customer lifecycle looks like in action
Tags : 
    
Marketo
Published By: Cornerstone OnDemand     Published Date: Sep 03, 2019
Work is changing. Rapidly. Changing technologies are demanding new skills and even new occupations. Cornerstone, in partnership with the Institute for the Future, identified five super skills that will help you and your organization meet the coming demands of the future of work.
Tags : 
    
Cornerstone OnDemand
Published By: Akamai Technologies     Published Date: Sep 03, 2019
The attacks and tools being used against financial services organizations are part of a complex ecosystem. This may seem like an obvious statement at first glance. When you read most industry reports, they tend to focus on a single aspect of the whole ecosystem, as if it were unrelated to other types of attacks. To be honest, we’ve been just as guilty of having a myopic view of attack traffic as anyone else. We wanted to do something different for this report. Instead of looking at a single type of attack, we stepped back to look at attacks against banks, credit unions, trading companies, and other organizations that make up financial services as a whole. Most defenders only see a very small segment of the overall traffic, whether they’re the target or the vendor supplying defensive tools. The breadth of Akamai’s products and our visibility into a significant portion of Internet traffic allows us to research multiple stages of the attack economy.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 03, 2019
A brief tour of the financial services criminal economy
Tags : 
    
Akamai Technologies
Published By: Dell EMC Storage     Published Date: Sep 03, 2019
Pursuing agility to truly impact business transformation requires embracing data center modernization as a core competency. Crucial to this is having the most up-to-date IT infrastructure to support the scale and complexity of a changing technology landscape. Companies must embrace this imperative by adopting software-defined data center principles, embracing modernization, and automating their IT management processes. Those that do will propel business innovation and deliver superior customer experiences with fast, secure, and reliable business technology. In December 2018, Dell Technologies commissioned Forrester Consulting to evaluate the business value of modern infrastructure in company data centers. Forrester conducted an online survey with 508 IT infrastructure technology decision makers in seven countries to explore this topic. This spotlight focuses on the 102 respondents we surveyed at midmarket businesses (MBs) with 100 to 499 employees. We found that while most midmarket f
Tags : 
    
Dell EMC Storage
Published By: Gigamon     Published Date: Sep 03, 2019
With new threats emerging every day, IT organizations need to frequently upgrade or introduce new cybersecurity tools and technologies. The problem is that it can be very difficult to set up realistic tests that show how technologies will perform under real-world conditions.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
Network performance and security are vital elements of any business. Organisations are increasingly adopting virtualisation and cloud technologies to boost productivity, cost savings and market reach. With the added complexity of distributed network architectures, full visibility is necessary to ensure continued high performance and security. Greater volumes of data, rapidlyevolving threats and stricter regulations have forced organisations to deploy new categories of security tools, e.g. Web Access Firewalls (WAFs) or Intrusion Prevention Systems (IPS). Yet, simply adding more security tools may not always be the most efficient solution.
Tags : 
    
Gigamon
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.