san

Results 351 - 375 of 1192Sort Results By: Published Date | Title | Company Name
Published By: Equinix EMEA     Published Date: Mar 21, 2019
Le manuel de la frontière numérique pour les paiements et le commerce décrit la façon dont les leaders du secteur transforment actuellement la frontière de leur réseau pour tirer parti d'une chaîne de valeur basée sur des écosystèmes, et obtenir des renseignements en temps réel et une expérience sans faille. Notre stratégie élémentaire en trois étapes vous fournit les meilleures pratiques éprouvées pour repenser l'architecture de votre présence, intégrer les fonctionnalités cloud et SaaS, et mettre en place de nouveaux services reposant sur la collaboration interconnectée.
Tags : 
    
Equinix EMEA
Published By: HERE Technologies     Published Date: Jul 23, 2019
Discover how cities and private companies can better work together for more harmonized urban mobility. As a city authority, or new mobility company, you now need to start working more closely with “the other side” for better urban mobility. But how can you work together, while maintaining your values, vision, privacy and sanity? This is a practical guide on how to collaborate better with other organizations. Learn how cities like Vienna, Dallas and others are breaking down barriers and explore the benefits of a united approach and the perils of working in silos. Build your technical infrastructure for better data sharing with the ultimate aim of improving the lives of people working, living and exploring your city. Inside, you’ll learn: Why open collaboration is key to better urban mobility The 3Ts of creating a smoother working relationship: trust, tech and talk 3 things you can do right now to start opening up Examples of five great city-company collaborations Ready to start coll
Tags : 
here tech, mapping, location data, smart cities, location intelligence
    
HERE Technologies
Published By: Aerohive     Published Date: Jun 15, 2015
Ce document explique comment éliminer la complexité et les coûts des réseaux sans fil traditionnels et créer un réseau prêt pour la mobilité.
Tags : 
mobility, wireless, wlan, wi-fi, mobile applications, mobile users, networks, wireless networks
    
Aerohive
Published By: Aerohive     Published Date: Jun 15, 2015
Découvrez comment les organisations peuvent intégrer facilement et de manière sûre une gamme d’utilisateurs et de terminaux en fournissant des clés pré-partagées individuelles sur le même SSID.
Tags : 
wi-fi security, wlan, secure network, network, firewall, security, wireless security
    
Aerohive
Published By: HPE     Published Date: Jun 06, 2016
This case study illustrates how Vallejo Sanitation & Flood Control District relies on HPE StoreOnce Backup and HP StoreVirtual Storage to support virtualized environment.
Tags : 
data, hpe storage, hpe, virtualization, hpe solutions
    
HPE
Published By: Zscaler     Published Date: Oct 26, 2018
Cloud computing is rapidly changing enterprise IT with applications like Salesforce and Office 365, which are improving productivity, reducing costs, and simplifying management. Now, organizations are discovering that those same advantages can be achieved by migrating security to the cloud. In fact, in its 2016 Magic Quadrant report on Secure Web Gateways, Gartner reported, “Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period.” Organizations understand that protecting users with a consistent and enforceable policy requires much more than simple URL or web filtering. Thousands of companies have already switched their IT security from appliances to experience the benefits of the Zscaler™ Security Cloud. Download this whitepaper today to find out why.
Tags : 
    
Zscaler
Published By: Arbor     Published Date: Sep 15, 2014
Sicherheitsanalysen stellen eine neue Anforderung im laufenden Wettrüsten zwischen Angegriffenen und Angreifern dar
Tags : 
security analytics, it security, cyber defenses
    
Arbor
Published By: Mimecast     Published Date: Dec 20, 2018
Relying on outdated solutions like Symantec Email Security (formerly MessageLabs) to defend your organization from email-borne attacks may be risky. Others in this position have suffered from spear-phishing, ransomware and even impersonation attacks. To effectively defend against these advanced threats you need the latest protection techniques – something Mimecast delivers to tens of thousands of organizations already. Join us for this 30 min webinar to learn: • The damaging effects of ransomware, spear-phishing and impersonation attacks • What defensive strategies and technologies you should employ • Why your current Symantec Email Security solution may not be up to the task • How to enhance your email security and overall cyber resilience
Tags : 
email security, ransomware, spear-phishing, cyber resilience, symantec
    
Mimecast
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Why Cisco Umbrella is the simplest decision you can make to improve your company’s security. You have to make some serious security decisions when you’re an IT leader. That’s because both the volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses alone are no longer adequate. More effective blocking of attackers is particularly important because under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, firewalls, and sandboxing alone. Umbrella is a proven service provider whose security services are completely nondisruptive. Download this whitepaper to find out more.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Why Cisco Umbrella is the simplest decision you can make to improve your company’s security. You have to make some serious security decisions when you’re an IT leader. That’s because both the volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses alone are no longer adequate. More efective blocking of attackers is particularly important because under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, frewalls, and sandboxing alone. A mere 30 minutes from now, any business can be more secure than it was before. That’s the simple reality of DNS-layer security.
Tags : 
    
Cisco Umbrella EMEA
Published By: KPMG     Published Date: Jun 06, 2019
High-volume administrative tasks are a feature of every business. We helped a global bank develop a machine learning algorithm to help with the task of reviewing over 100,000 ‘sanctions alerts’ every day. Read this story to find out: • what other benefits AI can deliver beyond cost savings • how AI tools achieve greater accuracy than human reviewers • what it takes to apply AI and Machine Learning successfully in a regulated sector.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 09, 2019
Complying with financial and economic sanctions is likely to pose new challenges after Brexit. Explore the issues with KPMG experts Karen Briggs and Neal Dawson, with Maya Lester QC and Arjun Ahluwalia, Head of Sanctions Advisory at HSBC UK. Listen now to discover: • Details of current sanctions policy and post-Brexit implications • How financial and economic sanctions impact the private sector • How manage compliance better by using sanctions technology.
Tags : 
    
KPMG
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
In seinem Buch „Die Psychologie der Wissenschaft“ von 1966 vertrat der US-Psychologe Abraham Maslow die Position, dass Psychologen multiperspektivische Behandlungsansätze verfolgen und neue Konzepte einführen sollten, statt weiter nur die Theorien von Verfahren anzuwenden, die Freud und seine Nachfolger vor langer Zeit entwickelt hatten. Maslow wusste, dass es schwierig ist, einen neuen Blickwinkel einzunehmen, und schreibt: „Es ist bestechend, in jedem Problem einen Nagel zu sehen, wenn man als Werkzeug nur einen Hammer hat.“ Wir alle kennen das. Wir gewöhnen uns so sehr an althergebrachte Abläufe, dass wir die Gründe dafür manchmal nicht infrage stellen.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Banken, Vermögensberater, Zahlungsanbieter und andere Finanzinstitutionen erleben tief greifende Veränderungen in Form von sich entwickelnden Marktanforderungen und neuen Vorschriften. Diese Unternehmen müssen ihre etablierten Prioritäten, Prozesse und Produkte überdenken, um das Fundament für den künftigen Erfolg zu legen. Software ist der Schlüssel.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices
    
CA Technologies EMEA
Published By: Workday France     Published Date: May 17, 2019
Lisez cette analyse d'experts de SMB Group pour découvrir comment l'utilisation d'un seul système pour la gestion financière, les RH et la paie peut faire toute la différence dans votre entreprise. Vous pouvez également obtenir des conseils pratiques pour choisir la solution la mieux adaptée à votre entreprise.
Tags : 
    
Workday France
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
CA Privileged Access Manager améliore la sécurité IT, l’efficacité opérationnelle et la conformité avec la réglementation en protégeant les informations d’identification à forts privilèges, en défendant les ressources à forts privilèges et en supervisant, contrôlant et gérant de façon efficace les activités à forts privilèges.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Au cours de ces dernières années, la gestion des accès à forts privilèges, un processus englobant différentes fonctionnalités de contrôle, de supervision et d’audit visant à réduire les risques associés aux utilisateurs, aux comptes et aux identifiants à forts privilèges, est devenue une priorité majeure pour les entreprises et organisations de tous secteurs. Cet intérêt accru est motivé par différents facteurs.
Tags : 
identification à forts privilèges, activités à forts privilèges, sécurité, entreprise, violations de données, menaces internes, infrastructure de l’entreprise, privileged user access
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Faites passer rapidement vos idées du stade de la conception au stade du développement, sans sacrifier la qualité, grâce à un écosystème de livraison continue de bout en bout capable de mettre en œuvre des tests rigoureux selon la fonctionnalité utilisateur souhaitée.
Tags : 
continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, test
    
CA Technologies EMEA
Published By: Aerohive     Published Date: Oct 27, 2015
Ce webinaire s’adresse à tous les professionnels de l’informatique qui veulent en savoir plus sur les réseaux sans fil, et souhaitent déployer ou étendre ces derniers dans leur entreprise
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive
Published By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
Published By: Lenovo - APAC     Published Date: Oct 11, 2018
Lenovo’s VMware vSAN-based hyperconverged solution reduces TCO by 40% within the datacenter. VMware-based hyperconverged solutions from Lenovo come with a set of certified components that can be deployed to create platforms that support a broad array of workloads, performance, and budgetary requirements. With VMware vSAN pre-installed, pre-configured, and pre-tested, Lenovo’s VMware-based hyperconverged solutions help improve productivity, and cut complexity quickly and easily. VMware-based hyperconverged solutions from Lenovo represent proven solutions that are enterprise-class and are already being leveraged within mission-critical environments around the world. Download IDC’s Infobrief on “The Real-World Value of Hyperconverged Infrastructure” and learn how you can: • Cut the cost of scaling infrastructure • Reduce time spent on infrastructure provisioning • Improve application performance • Eliminate complexity and cost related to refreshing traditional infrastructure
Tags : 
    
Lenovo - APAC
Published By: NetApp     Published Date: Feb 22, 2010
This paper outlines the considerations for architecting an efficient SAN data storage infrastructure with a focus on the NetApp solutions for increased utilization, improved performance and streamlined protection to reduce operational costs.
Tags : 
netapp, san environment, data storage infrastructure, utilization, multiprotocol unified storage, data reduction, storage virtualization, backup
    
NetApp
Published By: EMC Corporation     Published Date: Oct 01, 2014
With ScaleIO you can easily deploy a flexible, scalable and high performance software defined Server SAN - delivering elastic, converged storage to your business on a ‘pay as you grow’ model. This converged infrastructure delivers hyper scalability and increased performance levels whilst reducing storage TCO.
Tags : 
storage, scalable performance software, converged storage, elastic storage, increase storage performance, storage tco
    
EMC Corporation
Published By: LogMeIn     Published Date: Jan 03, 2013
In this whitepaper, BoldChat® - with thousands of customers across 70 countries - shares analytic techniques, reporting recommendations and realistic timelines for implementing a pro-active chat program. Read on to learn more!
Tags : 
roi, live chat, bold chat, logmein, log me in, enterprise, collaboration, wireless
    
LogMeIn
Published By: Allscripts     Published Date: Jun 05, 2013
This paper examines these technologies in the context of a four step process that many successful practices are using to optimize their revenue cycles. The “Four Steps to Transformation” methodology represents the distillation of best practices from thousands of medical groups across the United States who leverage technology to improve their bottom lines.
Tags : 
physician, revenue cycle, technology, physician compensation, billing, reimbursement
    
Allscripts
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.