information

Results 3376 - 3400 of 3512Sort Results By: Published Date | Title | Company Name
Published By: U.S. Cellular     Published Date: Aug 24, 2016
Primary internet connections fail for a variety of reasons: severe weather, downed poles and lines or simply heavier than usual network congestion. Business continuity solutions provide businesses with back-up internet access via a cellular network when primary Wide Area Network (WAN) connections fail or are over-loaded. These solutions enable businesses to: Maintain seamless, uninterrupted access to the internet Process credit card transactions Access to important information stored online This paper will provide an overview of business continuity solutions, examples of in-use scenarios and a path to adoption in an easy to understand and digestible way. Download now.
Tags : 
    
U.S. Cellular
Published By: Microsoft Office 365     Published Date: Mar 04, 2016
Discover how easy it is to mobilize, improve, and do more for your business when you download the free eBook: Anytime, anywhere – Learn more about how a mobile employee’s working style lead to less stress and increased productivity. Safety first – Learn about moving to cloud storage and how it can lift the burden of securing your data from your shoulders. Teamwork makes the dream work – Read more about syncing your information so your teams’ devices can enable them to stay agile and responsive.
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: Oct 14, 2016
“Hi, this is Kevin from IT. We've been notified of a virus on your department’s machines.” Add some authentic hold music, and a social-engineering attacker can trick employees into sharing company info, like passwords. Learn how to use technology and prevention strategies to guard against dumpster diving, spear phishing, and other tactics with: Real-world prevention strategies Tools to spot suspicious actions Real-time behavioral malware analysis
Tags : 
protection, prevention, malware, security, cyber attacks, information
    
Microsoft Office 365
Published By: SAP     Published Date: Jan 15, 2016
The next frontier for big data is the individual.
Tags : 
sap, data, information technology, data management, business technology
    
SAP
Published By: SAP     Published Date: Jan 21, 2016
Information is the catalyst for transformation in today's increasingly online business environment.
Tags : 
sap, finance, digital, enterprise, information technology, data, data management, business technology
    
SAP
Published By: Datadog     Published Date: Oct 27, 2016
How to detect them, why they occur and how to resolve them
Tags : 
datadog, aws, ec2 performance, information technology, software development, scalabilty, cloud monitoring, it management
    
Datadog
Published By: Akamai Technologies     Published Date: Aug 30, 2019
The financial services industry is one of the largest and most sought-after targets for attackers. This particular industry revolves around trust and security, and because of this, these elements are quite often the key focal point for criminals. Successful attacks can quickly translate into the dissemination of massive amounts of personal information and monetary gains by the attacker. Criminals targeting the financial services industry do so by leveraging various attack surfaces, such as people, processes, applications, or systems. Regardless of where the financial institutions are located in the world, staying aware of the forefront of new attack trends is imperative for keeping their systems and customers safe. Understanding the ecosystem of attacks, how different layers interact, and the booming economy spawned by it gives financial services organizations the edge they need.
Tags : 
    
Akamai Technologies
Published By: DocuSign     Published Date: Aug 09, 2016
Whoever made up the saying “It’s not worth the paper" it’s printed on obviously had no idea just how much that piece of paper costs from a business standpoint. One study from Resources Information Systems Inc. (RISI) estimates companies spend about $8 billion per year just managing paper. And that's only in the US. Expand that globally, and it’s a world of pain.
Tags : 
docusign, digital, digital transaction management, papeless, paper cost
    
DocuSign
Published By: DocuSign     Published Date: Apr 24, 2018
We live in a mobile, digital era where health information is at our fingertips. With the touch of a button, patients can see test results, track prescriptions, and sign up for clinical research. And yet it still takes over a decade to bring breakthrough treatments to market. Scientific productivity must improve: clinical trials are costly and time-consuming, and regulations mandate increased scrutiny and compliance. The patients who rely on your scientific leadership are expecting more. How are you meeting their needs? While intensive research and study are still a prerequisite for success, there is a better way to develop new products and therapies. Download the eBook for best practices to drive digital adoption in life sciences.
Tags : 
    
DocuSign
Published By: IBM     Published Date: Mar 31, 2016
"The market buzz around APIs has distorted executive's thought processes about how to make money from APIs. Our guest speaker, Forrester analyst Randy Heffner, will tell the real truth about how to drive value from APIs. Who Should Read/View This webcast: business audience Attend to also learn how to: Provide business users with real-time information for more informed decision making Leverage the latest cloud, mobile, and analytics enhancements in IIB v10 Use the IIB Healthcare Pack to accelerate development and deployment of integration solutions Who Should Attend this Webcast: business audience"
Tags : 
ibm, api, integration, application program interface, middleware
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
Discover the new Zero Trust Model approach to security and how intrusion prevent systems (IPS) are important due to its visibility, alerting and protection capabilities.
Tags : 
technology, security, information technology, best practices, ips, zero trust model, business technology
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
Smart organizations are consistently looking for ways to determine just how effective and capable candidates can be in the workplace. Sure, these candidates have said they can solve this algorithm or resolve that customer problem, but how do they stack up with internal success standards? That's why pre-hire assessments are valuable - they provide extensive insights into candidates' skill sets, pain points, ideal working environments, and more. Such information can then be used to make more informed hiring decisions that can be a game changer for the future success of any company.
Tags : 
ibm, recruiting, talent acquisition, pre-hire assessments, aberdeen group, human resource technology
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
Whether it's through using pre- or post-hire assessments, applying managerial feedback or learning results, identifying high potentials is a huge win for determining who will lead your company forward. With such information, businesses can ensure that their most valued employees are promoted, challenged, and encouraged to succeed - and that they stay with your business. Without this data, companies risk losing the talent that keeps them competitive and successful.
Tags : 
ibm, aberdeen group, talent acquisition, recruitment, human resource technology
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
To succeed today, organizations need to take advantage of information technology in every area of their business. Talent acquisition is no exception. Robust, reliable technology can help recruiters more effectively engage with candidates.
Tags : 
ibm, talent acquisition, human resources, recruiting, human resource technology
    
IBM
Published By: IBM     Published Date: Dec 05, 2016
IBM Watson enables a global Aerospace and Defense company to use cognitive technologies to assess its portfolio enhancements, assess its offering competitiveness, and evaluate its supply and sales opportunities. Democratizing knowledge is key for success. Especially in an environment of constant change within corporate transformations, employees lose access to key information in order to support the company's operational stability during these changes. Watson takes over the role of a human expert to support a fast and fact-based steering of the company.
Tags : 
ibm, watson, leadership, knowledge management, aerospace, defense, enterprise applications, business technology
    
IBM
Published By: OpenText     Published Date: May 26, 2017
Manufacturing has changed dramatically over the last decade. Developments in IT and the internet have enabled companies to transform from regional manufacturers into global, connected enterprises that provide better products at lower costs. These products are designed and engineered by collaborative teams in design centers around the world to take advantage of unique talent pools.
Tags : 
opentext, eim, solutions, development
    
OpenText
Published By: OpenText     Published Date: May 26, 2017
The global nature of today’s manufacturing industry means that it is more important than ever to ensure that all participants in the design and engineering process are able to access digital information relating to a product any time, or anywhere around the world.
Tags : 
opentext, manufacturing, design, engineering, information management
    
OpenText
Published By: OpenText     Published Date: May 26, 2017
Today’s fast-moving consumer market is putting pressure on manufacturers to be able to share digital product information seamlessly and quickly across retail and distribution channels. A centralized digital asset management platform helps to simplify the distribution of digital information across the extended enterprise.
Tags : 
opentext, manufacturing, retailer, distributor
    
OpenText
Published By: AWS     Published Date: May 18, 2018
We’ve become a world of instant information. We carry mobile devices that answer questions in seconds and we track our morning runs from screens on our wrists. News spreads immediately across our social feeds, and traffic alerts direct us away from road closures. As consumers, we have come to expect answers now, in real time. Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 30, 2018
How Snapper Further Protects Data in Amazon S3 Using CWP for Storage Abstract: Snapper, a New Zealand-based company that develops custom account-based solutions, was creating an online concessions payment program for local students and needed a way to enhance the security of their personal information on Amazon Web Services (AWS). The solution had to further protect online student profiles and associated payment details stored in Amazon Simple Storage Service (Amazon S3) against malware and threats. Snapper chose Symantec Cloud Workload Protection for Storage (CWP for Storage) for its advanced malware protection, elastic scalability, and simple deployment requiring only a few hours.
Tags : 
snapper, data, amazon, cwp, storage
    
AWS
Published By: AWS     Published Date: Oct 07, 2019
Pokémon experienced massive growth in the number of downloads for their most popular gaming app. Ensuring customer data was managed, secured, and private was a top priority for their Information Security team. Join us to learn how Pokémon leveraged Sumo Logic on AWS to implement a security analytics solution to scale with their rapid growth. Pokémon will also discuss how they strengthened their overall security posture, gained a unified view of operations, and delivered on their core values of trust and child safety.
Tags : 
    
AWS
Published By: Cloudroute     Published Date: Jun 01, 2016
Cloud computing has changed the way businesses and people think about using technology to serve their needs. Too many, cloud computing is nothing but hype and overblown as the new direction for Information Technology. But to many more, cloud computing represents the future of how every business should plan, operate and execute applications, systems and processes. Goldman Sachs forecasts spending on cloud computing infrastructure and platforms will grow at a 30% compound annual growth rate (CAGR) from 2013 through 2018 compared with 5 percent growth for overall enterprise IT. Moreover, Forrester recently revised its 2011 forecast of the public cloud market size upward by 20 percent. Regardless, it is important to know what cloud computing is.
Tags : 
    
Cloudroute
Published By: Jamf     Published Date: Mar 13, 2018
The word is out. Apple has officially arrived in the enterprise. Once thought of as only for consumers, Apple has not so quietly created a $25 billion enterprise business — with no signs of slowing. If you want to join the Apple at work movement, but have questions yourself about security best practices or, more likely, need to alleviate the security concerns of your executives or information security team, we can help. Topics covered include: • How the Apple ecosystem is structured • How Apple management differs from Windows • What security features are unique to the Apple ecosystem • What to consider when adding new Apple devices • What Apple integrations are available to leverage what you already have
Tags : 
    
Jamf
Published By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Thanks to numerous, headline-making incidents in recent years, cybercrime has risen toward the top of the concern list for many organizations—and the customers with whom they do business. You’ve heard many of the stories. Major health insurers, such as Anthem, Premera BlueCross and CareFirst had personal information for millions of their customers stolen. Sony Pictures experienced a breach that not only embarrassed employees and adversely impacted the release of the high-profile film, “The Interview,” but also damaged systems and applications—making it extremely difficult for the company to conduct business. The list goes on. Some you maybe haven’t heard, like the one about CodeSpaces, a provider of version management services to developers. When attackers were able to gain access to its cloud-based management consoles, they deleted the company’s entire infrastructure and backups—ultimately forcing CodeSpaces out of business. The bad news for organizations like yours is, thanks to the
Tags : 
    
CA Technologies
Start   Previous    127 128 129 130 131 132 133 134 135 136 137 138 139 140 141    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.