Skip to main content
 

aps

Results 226 - 250 of 624Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: May 24, 2019
In today’s business environment, branch offices are more important than ever. For the average enterprise, branches generate the vast majority of revenue, but security at the branch is limited, if it exists at all. Learn how to enable secure branch transformation from the branch to cloud edge – without gaps.
Tags : 
    
Cisco Umbrella EMEA
Published By: Group M_IBM Q2'19     Published Date: Apr 11, 2019
This report describes the results from a groundbreaking global study by Thycotic that reveals major risk and compliance gaps in how organizations manage and secure their privileged accounts and access to sensitive systems, infrastructure and data. The 2018 Global State of Privileged Access Management (PAM) Risk & Compliance report highlights where many organizations are failing to fully put security controls in place to protect their most critical information assets.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
To learn more about the insurance platform download our recently published white paper now.
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Aug 28, 2019
Webinar: Utilities are facing incredible challenges today driven by flattening demand, aging infrastructure, knowledge gaps, and challenging customer satisfaction requirements.  Watch this webinar to learn how IBM Maximo for Energy & Utilities can help.
Tags : 
    
Group M_IBM Q3'19
Published By: Workplace by Facebook     Published Date: Jun 24, 2019
With endless media, services and products available in just a few taps on a smartphone, people are becoming accustomed to a new level of instant access. Whether it’s a ride to a party, payment sent to a friend or streaming a movie, speed is everything. Thanks to technology, Gen Y has come of age in the on-demand economy. Meeting these expectations is crucial to Workplace’s mission to empower people to work together efficiently and effectively. In order to better understand this generation's expectations – and how to cater to them – we’ve partnered with behavioural insights agency, Canvas8 to explore how this desire for immediacy is reshaping the future of work. In this report, we uncover why employees want companies to pick up the pace and what on-demand looks like at work.
Tags : 
    
Workplace by Facebook
Published By: Sierra Wireless     Published Date: Jun 19, 2019
In addition to e-books, on-demand video and GPS devices, one of the future technological innovations envisioned by AT&T in its famous early 1990s series of “You Will” commercials was an Electronic Toll Collection (ETC) system that enabled drivers to wirelessly pay their tolls as they drove through a toll booth. While that prediction was perhaps not as bold as the others (Europe began developing similar ETC systems in the 1980s), today we take for granted E-ZPass in the U.S. and similar systems where drivers can enter toll roads, HOV lanes, bridges and tunnels without having to stop at a tollbooth to pay. Typically, these systems require a driver to put an OBU (On Board Unit, which can be called transponder or “edge” IoT device) in their vehicle and, when their vehicle passes through a toll booth, the toll booth wirelessly connects to the edge to automatically deduct the toll from their bank account.
Tags : 
    
Sierra Wireless
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System or DNS is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct online asset (website, application, etc) efficiently. Knowing the complexities and best practices of this layer of your online infrastructure will help your organization build redundancy, improve end-user performance and establish a top notch DR plan. Download this guide to DNS top terms and actionable concepts including: • Anycast vs. Unicast networks • CNAME • DDoS and Hijacking • Load Balancing and GSLB Learn more! "
Tags : 
    
Oracle + Dyn
Published By: Sage EMEA     Published Date: Jul 16, 2019
Running a retail company has never been so challenging – perhaps more so for mid-sized businesses. With high customer expectations, shrinking margins, and intense competition from start-ups and global retail giants alike, it’s difficult to know which areas of your business to prioritise for improvement. In this guide, we’ll discuss some of the key challenges for growing retailers. We’ll also look at the digital tools that could help you overcome them, and keep your competitive edge.
Tags : 
    
Sage EMEA
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
Do you know what your employees are doing on your network? Do you know about the latest ransomware attack your security team is battling? How about your business partners? Are they secure? With all of these questions swirling around in your head, it’s hard to feel secure about network security. But there is one thing that could help: a solid plan. Perhaps you’re aware that your organization should have a formal incident response plan. Or maybe you already have one. But are you completely clear on all the components that should make up such a plan? Or what to do when things go wrong? Or how to get help when you need it? Over the next few pages, we’ll provide you with some insight to help you build and strengthen your organization’s incident response plan.
Tags : 
    
Cisco Umbrella EMEA
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
In today’s complex network environments, applications, infrastructure and threats are dynamic. As such, relying upon various, single-purpose security devices that don’t integrate with each other results in dangerous security gaps. These devices are poorly coordinated and unable to provide comprehensive security and threat prevention. To protect against today’s advanced attacks requires a natively integrated, next-generation approach to security – an approach that can keep up with the latest application and infrastructure trends and recognize and stop today’s most advanced threats.
Tags : 
firewall, optimization, network, environments, applications, infrastructure, security, palo alto
    
Palo Alto Networks
Published By: Cybric     Published Date: Oct 30, 2017
How a security rationalization process helps CISOs optimize your security infrastructure while improving the bottom line. Whether you’ve over-invested in security tools, under-invested, don’t know the extent of your security capabilities or you’re facing new regulations that require you to demonstrate and continually maintain compliance — there is a path forward. To understand and optimize what you have in place, as well as gaps you may have, develop a security rationalization process to calculate the return on your security investments. Read this paper to learn the five steps needed to get started.
Tags : 
cybersecurity, cyber security, ciso, security visibility, security assurance, security resilience, application security tools, appsec, security audit
    
Cybric
Published By: Sage     Published Date: Nov 28, 2017
"Your business may be competitive and successful today, but how will it perform in the future? It’s all too easy to be immersed in—perhaps even obsessed by—your daily operations. That’s why thinking about what your business and the market will look like one year, five years, even a decade from now needs to be a critical part of your thinking. It’s all about looking ahead, about being proactive. Marching confidently into the future requires a solid foundation for that empire you’re building. That’s why your planning efforts need to include a dedicated exploration into the types of innovative, evolving technologies that will accommodate the business of the future. This eGuide addresses the essential business principles that will always apply regardless of the stage your business is in. This resource helps you focus on the key points that should put you well on the way toward future-proofing your business."
Tags : 
    
Sage
Published By: Citrix     Published Date: Jun 15, 2018
The ADC market continues to evolve, with various new cloud-integrated and software-centric use cases having arisen. This report provides infrastructure and operations leaders with a snapshot of the market's transition and profiles vendors representative of emerging and very different approaches.
Tags : 
    
Citrix
Published By: Endace     Published Date: Dec 28, 2012
Your company is a voracious consumer of bandwidth - perhaps a very large enterprise, a research lab, or a service or content provider of some description. Running on ultra high speed data links may blind you from seeing real issues arising.
Tags : 
endace, 100g, networking, bandwidth, speed traffic
    
Endace
Published By: Technomedia-Hodes iQ     Published Date: Apr 25, 2012
Get your complimentary copy now! Time to Switch: Knowing When and How to Make a Talent Management Solution Change lays out the hardball questions you need to ask to assess what you expect from your talent management system, and the five steps to take to determine if you're in fact getting what you need-and how to switch if you're not.
Tags : 
human resources, talent management, hr management, employee, employee management
    
Technomedia-Hodes iQ
Published By: Workday     Published Date: Sep 19, 2018
Hoarding data isn’t doing much to help your financial services firm if you can’t easily combine data from multiple sources and quickly run analytics. But there is a way to turn those heaps of data into actionable insights to get clearer answers to your biggest questions and better drive your firm’s strategy. Read the blog to learn how to improve your back end to go from data hoarding to decision-making.
Tags : 
    
Workday
Published By: uberVU via HootSuite     Published Date: Apr 07, 2014
No brand, no matter how small or large, or how big its marketing budget, is safe from social media mishaps. This e-book from uberVU via Hootsuite will review 9 types of social media fails, discuss how they happened and detail how they could have been avoided. We'll also provide actionable lists of what your brand can do to prevent social media fails.
Tags : 
social media, social media fails, avoiding mistakes, branding, failproof
    
uberVU via HootSuite
Published By: The Starr Conspiracy     Published Date: Jun 23, 2017
2015 and 2016 were big for HCM tech startups. Hundreds of new companies were launched and hundreds of sophomore companies received new and bigger rounds of investment from angels, venture capitalists, private equity firms, rich uncles, and poor saps. It’s a bona fide gold rush.
Tags : 
    
The Starr Conspiracy
Published By: Tintri     Published Date: Jun 04, 2013
Powerful VM and application acceleration with Tintri
Tags : 
replication, cloning, snapshots, data management, vm-aware storage, tintri, virtualization, storage virtualization, virtual machine storage, ssd performance
    
Tintri
Published By: Emulex Corporation     Published Date: Nov 07, 2013
Flying blind at 100G It might go something like this: Your company is a voracious consumer of bandwidth – perhaps a very large enterprise, a research lab, or a service or content provider of some description. Today you are running multiple 10Gbps network connections in the core of your network, but these links are rapidly approaching capacity. An upgrade in the not-too-distant future to 40/100G ultra-high-speed links now looks inevitable.
Tags : 
network monitoring, network visibility, technology, endace, best practices
    
Emulex Corporation
Published By: FireEye     Published Date: Mar 05, 2014
From sophisticated new forms of malware to nation-state sponsored attacks and the advanced persistent threat, cybersecurity incidents have evolved at a rapid pace and are taking down entire networks, successfully stealing sensitive data and costing organizations millions to remediate. In this white paper this report, you'll receive a comprehensive overview of survey results and expert analysis on: The top security threats for global organizations in 2013; The largest gaps in organization's detection and response to threats; How these gaps will be filled in the coming year - new staff, tools or services; What organizations must do to stay ahead of these advanced threats.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: Ipswitch     Published Date: Dec 01, 2014
It’s easy to understand why many organizations are confused about the need for a Managed File Transfer (MFT) system. There are a lot of different products in the market, file transfer product functionality is not clearly defined and often overlaps with other solutions, “MFT” is not fully understood, and there are a lot of mixed messages in the marketplace.
Tags : 
ipswitch, lendingtools, streamlines, file trasnfer, flexibility, moveit, transfer scripts, streamlined solution, audit trail, transfer security, automation
    
Ipswitch
Published By: Epicor     Published Date: Apr 04, 2017
Emerging technologies and trends are disrupting the status quo for manufacturers around the globe. The Epicor “Factory of the Future” eBook explores the megatrends and disruptive technology that is shaping the future of manufacturing—and, more importantly, the eBook offers recommendations to help you grow your business amidst all this change. View the eBook to explore these topics and more: • Demographic shifts in manufacturing • Globalization • Resource scarcity • Knowledge and gender gaps • How to future-proof your manufacturing business
Tags : 
erp software, enterprise resource planning software, fabrication, manufacturing
    
Epicor
Published By: Epicor     Published Date: Sep 21, 2018
Does your current software give your business the visibility and flexibility you need to be responsive and competitive, or is outdated software negatively impacting business growth and excellent service? The retail world is becoming more complex. eCommerce has grown in the U.S.—from $42 billion to $236 billion in the last decade*—and lifestyle shopping is raising customer expectations. Having the right retail management software solution—one that can keep up with your business needs and the increasing pace of technology—is critical. Given the recent advancements in technology—and higher customer expectations—perhaps it’s time to ask if your retail management software is up to the task of nurturing and managing your growth over the coming decade. Epicor has been a part of successful retail businesses for years. Here are some risks you may face from using outdated software: 1. Excessive labor costs and hiring gaps 2. Operational inefficiencies 3. Insufficient data and insights 4. Dimi
Tags : 
retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas, advantages of retail store software
    
Epicor
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.