Skip to main content
 

control

Results 301 - 325 of 2321Sort Results By: Published Date | Title | Company Name
Published By: Damballa     Published Date: Nov 13, 2012
How Advanced Malware Morphs to Remain Stealthy and Persistent
Tags : 
advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper
    
Damballa
Published By: NetApp     Published Date: Dec 10, 2014
IT leaders are required to deliver improved performance and increase efficiencies while maintaining an enterprise-class infrastructure for their customer’s database environments. A complete portfolio consisting of flash in the storage controller, flash in disk shelves, and all-flash arrays is the best way to solve complex database performance requirements at multiple levels in your environment. The NetApp flash portfolio is capable of solving database performance and I/O latency problems encountered by many database deployments.
Tags : 
it leaders, flash, database environments, netapp, infrastructure
    
NetApp
Published By: NetApp     Published Date: Sep 18, 2014
The NetApp flash portfolio is capable of solving database performance and I/O latency problems encountered by many database deployments. The majority of databases have a random I/O workload that creates performance problems for spinning media, but is well-suited for today’s flash technologies. NetApp has a diverse enterprise-class flash portfolio consisting of flash in the storage controller (Flash Cache™ intelligent caching), flash within the disk shelves (Flash Pool™ intelligent caching), and all-flash arrays (EF-Series and All-flash FAS). This portfolio can be used to solve complex database performance requirements at multiple levels within a customer’s Oracle environment. This document reviews Oracle database observations and results when implementing flash technologies offered within the NetApp flash portfolio.
Tags : 
database performance, database deployment, flash technology, enterprise techology
    
NetApp
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Very little data is available on how effectively enterprises are managing private cloud deployments in the real world. Are they doing so efficiently, or are they facing challenges in areas such as performance, TCO and capacity? Hewlett Packard Enterprise commissioned 451 Research to explore these issues through a survey of IT decision-makers and data from the Cloud Price Index.
Tags : 
    
Hewlett Packard Enterprise
Published By: IBM     Published Date: Jan 09, 2015
This report explores that security in a fast-paced technology-infused world cries for an “invest once and deploy everywhere” approach. For this to be realized, security must be planned in advance and built-in, yet still be fluidly adaptable to circumstances, and singularly controllable.
Tags : 
best practices, it security, cloud infrastructure services, it business solutions
    
IBM
Published By: IBM Smarter Analytics     Published Date: Sep 04, 2013
Organizations that have virtualized their environments are discovering that the journey's not over. In many ways, it's just beginning. The full benefits of virtualization -- from cost savings and increased speed to resource transparency and control -- can only be fully realized by optimizing all of the interdependent components. In this webcast, IBM leaders discuss how organizations can get more from their virtualization investments with best practices gleaned from years of transforming traditional data centers and building world-class clouds.
Tags : 
virtualization, best practices, optimizing, ibm webinar, traditional data, data management
    
IBM Smarter Analytics
Published By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam
    
Secure Computing
Published By: Oracle Corp.     Published Date: Oct 15, 2012
During this webcast Kamal Tbeileh, Sr. Principal Product Manager at Oracle, will discuss database access control best practices for all database users, including highly privileged users using Oracle Database Vault.
Tags : 
database, database access control, database security, database consolidation, compliance, oracle
    
Oracle Corp.
Published By: Nevis Networks     Published Date: Sep 04, 2007
Companies are yearning for a solution to guard their network from security risks such as external or untrusted users, and unmanaged endpoints on their internal LAN. NAC technology works well, but a strategic solution is required to fully address the problem of the dissolving network perimeter.
Tags : 
lan, local area networking, nac, access control, network security, infrastructure, lan security, nevis
    
Nevis Networks
Published By: Salesforce     Published Date: Dec 29, 2015
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : 
salesforce, cloud, security, webinar, best practices
    
Salesforce
Published By: Salesforce     Published Date: Jan 15, 2016
Join specialists from Salesforce and PwC to learn how you can improve security and compliance in the cloud by leveraging the core trust services of Salesforce — and the additional controls from the new Salesforce Shield suite of products.
Tags : 
salesforce, cloud, security, webinar, best practices
    
Salesforce
Published By: Soffront     Published Date: Aug 21, 2009
In the decade since customer relationship management (CRM) software first appeared on the market, implementation of the enterprise application suite that helps businesses find new customers, retain existing customers and otherwise increase revenues have gained a reputation as being risky ventures, subject to user rejection, cost overruns, and missed deadlines.
Tags : 
crm, customer relationship mangement, crm software, crm application, crm app, customer retention, customer satisfaction, lead generation
    
Soffront
Published By: Prophix     Published Date: May 31, 2016
The continual changes in the business climate constantly challenge companies to find more effective business practices. However, common budgeting limitations are preventing companies from moving forward; they have become so universal and accepted in the marketplace that it is becoming more difficult to move ahead and progress the business. Flexibility, accuracy and control over the budgeting process are three prominent factors slowing this progression.
Tags : 
best practices, budgeting, business efficiency, productivity, competitive advantage
    
Prophix
Published By: HP     Published Date: Jan 12, 2012
Once the cloud migration begins, finalizing SLAs with third parties, locking down the security of virtualized environments and investing in identity management, access control and reporting tools to support the new cloud business models will be essential steps to success.
Tags : 
cloud computing, cloud environment, virtualization, technology
    
HP
Published By: Infoblox     Published Date: Sep 09, 2014
With trends like virtualization and BYOD making networks more complex, the need for accurate and dynamic IP address management (IPAM) is growing. Learn how to implement an IPAM solution that centralizes information to create highly efficient teams.
Tags : 
infoblox_dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns
    
Infoblox
Published By: SERENA Software, Inc     Published Date: Jun 23, 2009
Learn what you can do to unify development processes, drive down development costs and improve productivity and coordination across distributed teams. Leverage existing investments in tools, systems and methodologies to increase visibility, control and effectiveness with your application development processes.
Tags : 
process management, visibility, control, application development, unified development, serena software, best practices, serena
    
SERENA Software, Inc
Published By: Alere Wellbeing     Published Date: Sep 26, 2011
Alere Wellbeing evaluation and client feedback have shown that incentives are a successful part of a comprehensive tobacco control strategy. This brief defines what premium differentials and surcharges are and provides best practices from our clients.
Tags : 
alere, tobacco control strategy, free & clear evaluation, premium differential, surcharge, tobacco cessation program, quit for life program®, productivity
    
Alere Wellbeing
Published By: SAP     Published Date: Jan 28, 2008
Many CFOs and the finance organizations they lead have started to take on new strategic roles within the enterprise. Their goal is to enforce stricter control processes to ensure legal and regulatory compliance, offer strategic insights into the internal and external business environment, and connect the business strategy with daily operations through performance tracking.
Tags : 
apqc, spend management, cost control, cost, financial, financials, workforce, workforce management
    
SAP
Published By: Lumension     Published Date: Jan 22, 2013
Join this webcast to learn the practical steps to guide you in the deployment of devices control and encryption technology as we dive into a technical discussion of what the critical items to address.
Tags : 
best practices, devices control, encryption, security, business continuity
    
Lumension
Published By: Citrix Systems     Published Date: Oct 07, 2014
Bring-your-own-device (BYOD) programs and policies empower people to choose the best device to get their work done, including personally-owned consumer smartphones, tablets and laptops. This white paper provides guidance for introducing BYOD to help people become more mobile and productive while IT adapts to consumerization in a simple, secure and controlled manner.
Tags : 
best practices, secure, simple, consumerization, byod, program, device, smartphones
    
Citrix Systems
Published By: Zebra Technologies     Published Date: Jul 06, 2017
Stay ahead of risks inherent in modern connectivity, mobile integration and securing thermal barcode printers. This paper helps you leverage your IT know-how, by evaluating common security risks and tightening control with remote device management systems.
Tags : 
printer intelligence, industrial printers, desktop printers, mobile printers, highly durable printers, improving warehouse, manufacturing productivity, shipping accuracy
    
Zebra Technologies
Published By: Nevis Networks     Published Date: Sep 04, 2007
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.
Tags : 
security policies, policy management, authentication, access control, lan, lan security, 802.1x, nevis
    
Nevis Networks
Published By: SevOne     Published Date: Jul 07, 2015
Because inventory is usually one of the biggest numbers on their balance sheet, effective inventory control and management is a vital function to help insure the continued success of distribution and manufacturing and companies.
Tags : 
erp, inventory management, big data, manufacturing, distribution
    
SevOne
Published By: Sage     Published Date: Jul 08, 2015
Download this white paper to learn more about how to improve your organization's inventory management and control.
Tags : 
inventory management, big data, inventory control, cost containment, customer service
    
Sage
Published By: Flexera     Published Date: May 06, 2019
Using new technology to set your business apart can make the difference between getting ahead or falling behind. But staying in control of the growing complexity is a challenge. Enterprise Architecture (EA), IT Service Management (ITSM) and Security teams need enriched technology asset data and accurate analytics so they can keep the enterprise running like a well-oiled machine. Join us to hear R “Ray” Wang, Principal Analyst and Founder of Constellation Research, and Alan Lopez, Senior Director of Global Product Marketing from Flexera, discuss use cases where asset data and analytics are becoming business-critical. Watch the webinar.
Tags : 
    
Flexera
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.