Skip to main content
 

cto

Results 276 - 300 of 2395Sort Results By: Published Date | Title | Company Name
Published By: BMC Software     Published Date: Aug 12, 2013
While many companies have begun using external cloud infrastructure services, and a smaller number have embarked on internal “cloud-like” initiatives, others are just starting out and trying to determine how to best use cloud computing. This paper written by BMC’s Deputy CTO Herb VanHook, provides an overview of the major models of cloud infrastructure services (IaaS) and the business benefits and best uses of each model.
Tags : 
cloud, bmc, cloud infrastructure
    
BMC Software
Published By: Oracle     Published Date: Dec 31, 9999
Employee Services Systems and Technology Manager Trent Filth out talks about the benefits of choosing on-premises Oracle Fusion Human Capital Management.
Tags : 
pcl constructors inc, mobile, oracle, fusion, human capital management, hcm
    
Oracle
Published By: Oracle     Published Date: Aug 09, 2013
Hear how a leading construction company headquartered in Canada with operations in North America and Australia, plans to enable mobile HR transactions with Oracle Fusion Human Capital Management.
Tags : 
pcl constructors inc, mobile, oracle, fusion, human capital management, hcm
    
Oracle
Published By: Oracle     Published Date: Aug 09, 2013
United Rentals Director of HR Operations Linda Luman discusses how her organization invests in people to drive efficiency.
Tags : 
united rentals, optimize, workforce, oracle hcm
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Employee Services Systems and Technology Manager Trent Filthout talks about the benefits of choosing on-premises Oracle Fusion Human Capital Management.
Tags : 
pcl constructors inc, mobile, oracle, fusion, human capital management, hcm
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Hear how a leading construction company headquartered in Canada with operations in North America and Australia, plans to enable mobile HR transactions with Oracle Fusion Human Capital Management.
Tags : 
pcl constructors inc, mobile, oracle, fusion, human capital management, hcm
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
United Rentals Director of HR Operations Linda Luman discusses how her organization invests in people to drive efficiency.
Tags : 
united rentals, optimize, workforce, oracle hcm
    
Oracle
Published By: Flexera     Published Date: Sep 16, 2016
Watch this webinar to learn more about understanding software vulnerabilities in your organization and how to protect your organization from attacks.
Tags : 
software vulnerabilities, security, attack vectors, data breach, commercial software, flexera, security threat
    
Flexera
Published By: Pega     Published Date: May 24, 2016
In today’s “always on” digital world every point of engagement with a customer—from a service call to a marketing email—is a critical moment for retail banks where the customer relationship is put to the test over and over again. And while in most cases banks are delivering satisfactory customer service to their clients, they are missing key opportunities to provide deeper personalization. With nearly one in four consumers saying they would start looking for a new bank if they received poor customer service, banks need to evolve with their customers and always be looking at innovative ways to communicate and service them more efficiently. Download this research study and get a deeper understanding of the challenges facing today’s banks and the technology solutions they must embrace to keep pace with consumer demands.
Tags : 
    
Pega
Published By: Pega     Published Date: May 24, 2016
Organizations operating in the retail financial services sector – banks and insurers – need to work smart and fast to keep pace with the increasing demands of their customers. We may have a 24/7 love affair with our smartphones but it is clear that in the future we will be sharing information and making payments via fitbands, cars, TVs and white goods, as the Internet of Things fuses the physical and digital worlds. For incumbent banks and insurers, the challenge will be to leverage the possibilities of this new hyper-connected world to embed themselves in their customers’ daily lives. They need to change the way operate, which includes how they market, engage and communicate with their customer base. This will be a key defense against the growing ranks of digital newcomers seeking to disrupt and dislodge incumbents through an array of innovative and smart new offers. However, too many are moving too slowly, either from an excess of caution or complacency. This report should serve as a
Tags : 
    
Pega
Published By: CA Technologies     Published Date: Aug 26, 2016
It’s impossible for a day to pass in which we don’t hear news of yet another data breach, with its resulting loss of proprietary secrets, financial records or personal information. These incidents span all sectors of the economy: commerce, education and government
Tags : 
    
CA Technologies
Published By: Secureworks     Published Date: Nov 11, 2016
To ensure that “quasi-insiders” or third parties do not contribute to your enterprise’s attack vector, it’s imperative to develop a third-party governance process to mitigate risk. Read on to find out how.
Tags : 
managed security services, risk management, security, threat and vulnerability management, attacks, insider attacks, cyber security
    
Secureworks
Published By: Secureworks     Published Date: Nov 11, 2016
In this white paper we will discover what the evolving path ahead for security leaders looks like, the importance of communication from top to bottom, focusing on how proactive measures can stop threat actors from derailing businesses, and how building a security architecture that protects the most critical assets will support the overall goals of an organisation.
Tags : 
managed security services, security, threat and vulnerability management, security, security architecture, cyber security
    
Secureworks
Published By: QAD     Published Date: Jan 19, 2018
QAD anticipa los problemas que pueden afectar a sus clientes y provee soluciones antes de que se den cuanta de que tienen un problema. Nos aseguramos de que nuestro producto no solo se ocupe de los principales retos si no que recomendamos soluciones para sus problemas, aparte de nuestras soluciones y servicios. Nuestro objetivo es ayudar a nuestros clientes a formar la Empresa Efectiva.
Tags : 
    
QAD
Published By: QAD     Published Date: Jan 19, 2018
El ambiente en el que actualmente se encuentra la economía mexicana al parecer no es tan alentador para la industria manufacturera. Factores externos e internos, como la salida de Reino Unido de la Unión Europea, la desaceleración de la economía de Estados Unidos, la devaluación de distintas monedas de Latinoamérica frente al dólar y la renegociación del TLCAN, motivan a percibir un panorama de incertidumbre para la industria.
Tags : 
    
QAD
Published By: QAD     Published Date: Jan 19, 2018
El ambiente en el que actualmente se encuentra la economía mexicana al parecer no es tan alentador para la industria manufacturera. Factores externos e internos, como la salida de Reino Unido de la Unión Europea, la desaceleración de la economía de Estados Unidos, la devaluación de distintas monedas de Latinoamérica frente al dólar y la renegociación del TLCAN, motivan a percibir un panorama de incertidumbre para la industria.
Tags : 
    
QAD
Published By: QAD     Published Date: Jan 19, 2018
El ambiente en el que actualmente se encuentra la economía mexicana al parecer no es tan alentador para la industria manufacturera. Factores externos e internos, como la salida de Reino Unido de la Unión Europea, la desaceleración de la economía de Estados Unidos, la devaluación de distintas monedas de Latinoamérica frente al dólar y la renegociación del TLCAN, motivan a percibir un panorama de incertidumbre para la industria.
Tags : 
    
QAD
Published By: QAD     Published Date: Jan 19, 2018
El ambiente en el que actualmente se encuentra la economía mexicana al parecer no es tan alentador para la industria manufacturera. Factores externos e internos, como la salida de Reino Unido de la Unión Europea, la desaceleración de la economía de Estados Unidos, la devaluación de distintas monedas de Latinoamérica frente al dólar y la renegociación del TLCAN, motivan a percibir un panorama de incertidumbre para la industria.
Tags : 
    
QAD
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
DPI software is made to inspect packets at high wire speeds and a critical factor is the throughput and resources required. Keeping the amount of resources that integrated DPI and application classification technology requires low is critical. The fewer cores (on a multi-core processor) and the less on-board memory an engine needs, the better. Multi-threading provides almost linear scalability on multi-core systems. In addition, highly-optimized flow tracking is required for handling millions of concurrent subscribers.
Tags : 
detection, rate, performance, efficiency, accuracy, encrypted apps, integration, metadata, updates
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe, qos, security
    
Rohde & Schwarz Cybersecurity
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
CA Technologies
Published By: Skillsoft     Published Date: Apr 27, 2015
This paper examines five important factors to consider when designing and implementing a Health & Safety Compliance training programme.
Tags : 
workplace safety programme, training, safety, heatlh, heath and safety, compliance, workplace safety programme, compliance training programme, quality and safety
    
Skillsoft
Published By: Absolute Software     Published Date: May 31, 2016
The US healthcare industry has historically lagged behind others in the maturity of security capabilities, only recently catching up on data security and privacy in response to HIPAA. But there is a wide range of other mounting risks unique to healthcare that S&R pros in healthcare can’t ignore — greater regulatory pressure, increasing targeted attacks, the frightening uncertainty of IoT security, and global economic pressures. This report outlines the most important security capabilities for security leaders in this sector to implement in the face of these challenges.
Tags : 
healthcare, security capabilities, data security, best practices, security
    
Absolute Software
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.