Skip to main content
 

era

Results 13851 - 13875 of 14258Sort Results By: Published Date | Title | Company Name
Published By: GE Power     Published Date: Oct 05, 2016
With any innovation, early adopters forge the path forward, testing the limits of new technology, proving solutions that deliver value and dispensing those that don’t. Each power organization approaches the use of data and analytics from their own point of reference, technology maturity and propensity for change. In this eBook, learn how 14 global power companies achieved real business results for their business with digital solutions.
Tags : 
digital power plant, digital power, digital power station, distributor solution, efficiency of power generation, industrial power
    
GE Power
Published By: CBRE     Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
Tags : 
    
CBRE
Published By: Veracode     Published Date: Oct 26, 2016
As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. This whitepaper provides advice for secure development and delivery of applications throughout the software development lifecycle.
Tags : 
veracode, security, application security, software applications, software development lifecycle
    
Veracode
Published By: Veracode     Published Date: Oct 26, 2016
Can DevOps be one of the most disruptive trends ever to hit application security, or even software development? DevOps enables developers to integrate security testing, validation and monitoring into both application development and deployment. Download this free whitepaper now to review the components of the current DevOps framework and how to put security into the processes of DevOps.
Tags : 
veracode, security, devops, application security
    
Veracode
Published By: Veracode     Published Date: Oct 26, 2016
When a high-profile, or simply branded, vulnerability is disclosed, security teams are expected to abandon their planned activities and react. But, these responses can be time-consuming and costly. Even if the vulnerability is achieving mainstream awareness, enterprises need to balance responses against risk. Download this handy report for guidance on preparing for a high-profile vulnerability disclosure so risk-management or security teams can respond with the appropriate level of urgency.
Tags : 
veracode, security, vulnerability, high-profile vulnerability disclosure, vulnerability disclosure
    
Veracode
Published By: Veracode     Published Date: Oct 26, 2016
20% of enterprises have suffered a security incident related to a business application or IT service consumed from external partners. With breaches like these making headlines, and enterprises’ growing reliance on third-party software, security of the cyber supply chain will garner increased attention. Download this joint Veracode/Enterprise Strategy Group (ESG) report to explore enterprises’ challenges in securing their cyber supply chain and get best practices for ensuring that every application – regardless of its origin – is secure.
Tags : 
veracode, security, supply chain security, web applications, application security
    
Veracode
Published By: Veracode     Published Date: Oct 26, 2016
Web application attacks are now the most frequent pattern in confirmed breaches, and organizations know that application security is key to protecting their data. But many organizations lack the resources to develop a comprehensive AppSec program, and need to look to external services. Download this guide for a straightforward, four-step method for acquiring the services you need to support a comprehensive AppSec program.
Tags : 
veracode, application security, sans, security
    
Veracode
Published By: Juniper Networks     Published Date: Aug 21, 2017
Mit Schnelligkeit zur Agilität Eine Infrastruktur, bereit für den technologiebasierten Wandel
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 21, 2017
En route vers l'agilité Une infrastructure prête pour la transformation technologique
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 21, 2017
Agiles Denken ist wichtig, wenn Sie mit den Herausforderungen eines Umbruchs konfrontiert werden
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Feb 05, 2018
At Juniper, we believe in building coherent networks to help simplify both the physical topology as well as the operations of the network itself. Once having done that, we can then secure it. And, by moving to micro parameters, we can do a much better job of protecting the applications. Then finally, automation, particularly as we get into micro parameters, micro segments and the need for agility, is where SDN really pays off.
Tags : 
network, applications, cloud, enterprises, foundation, principles
    
Juniper Networks
Published By: Citrix ShareFile     Published Date: Oct 04, 2019
The Definitive Guide to Selecting the Right ADC for the Digital Transformation Era In this eBook, you’ll learn how adopting the right ADC equips you to embrace change—from deploying the latest microservice apps to guarding against emerging security threats. To guide you toward the right ADC for your needs, this eBook will show you: • Digital transformation’s impact on the ADC landscape • Why your ADC should be software-based for better flexibility • How a modern ADC protects against security threats
Tags : 
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Oct 04, 2019
Discover why ninety-four percent of organizations surveyed are already modifying, overhauling, or reassessing their network infrastructure to facilitate application delivery in hybrid- and multi-cloud environments. Read this e-book to learn why you should re-architect your network infrastructure to optimize application delivery: • Ensure end-to-end network visibility for your operations • Gain real-time analytics for application optimization and uptime • Scale your application infrastructure according to workload demand
Tags : 
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Oct 04, 2019
Your employees want easy and quick access to files from any device—but if you don’t provide this flexibility, they will go around you and upload company data to unauthorized cloud services. It’s time to prevent data leakage with a file sharing solution that combines security and convenience. In this white paper, you’ll learn how file sharing goes beyond storage to accelerate your business with: • Flexible access to files from any device and any location • Streamlined security and access control • Choice of private and public cloud storage
Tags : 
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Oct 04, 2019
For emerging businesses, investing in the right technology can accelerate their growth and enhance their bottom lines. As more companies expand their workspaces with virtual teams and work-from-home policies, a good first step is to invest in a secure, flexible content collaboration solution—one that is easy to integrate and use. It should give you and your teams secure access to files, apps, and data from any device and any location to accelerate productivity. Not all file sharing solutions are the same. Download our white paper to determine if a modern content collaboration platform can help you: • Streamline workflows • Improve operational efficiencies • Make the organization more secure and compliant • Deliver the desired ROI
Tags : 
    
Citrix ShareFile
Published By: 8x8 Inc.     Published Date: Nov 17, 2016
Effective quality management lets you improve the performance of contact center agents—and deliver the customer experience your business expects. The ICMI Tool Kit: Quality Management in the Contact Center provides valuable tips you can apply to start improving your contact center operations today. Developed by International Customer Management Institute (ICMI), a leader in contact center training and consulting, the tool kit lays out the foundations of an effective quality management program and offers a step-by-step approach to creating an effective program. Then it provides details to help you: • Perform effective coaching using the SAFE coaching framework • Calculate the ROI of your training and coaching investments • Developing a peer mentor program
Tags : 
    
8x8 Inc.
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
WMPH has nine sub-brands, each of which sells cruises to customers through distinct websites, including iCruise.com, AlaskaCruises,com and HawaiiCruiseOutlet.com. Given that each consumer has unique expectations from a cruise, the organization uses its websites as a touch-point to educate buyers about different options. Once buyers learn the different options available, they are then encouraged to interact with the contact center for a one-on-one consultation to help design a cruise which meets their unique needs.
Tags : 
wmph, icruise.com, alaskacruises.com, hawaiicruiseoutlet.com, touch-point, cloud contact center
    
8x8 Inc.
Published By: IBM     Published Date: Jan 11, 2017
Read this i360Gov Book to understand the importance of: - Transforming federal fortifications into intelligence-driven defense - Intensifying focus on cyber intelligence - Needing a well trained cybersecurity force
Tags : 
ibm, analytics, government, public sector, security, cyber threat, cyber threat analysis, risk
    
IBM
Published By: IBM     Published Date: Jan 20, 2017
Banks have been using ECM for years, capturing, archiving and discovering documents. Some banks have adopted capture capabilities to digitize content for faster and easier access to content. Today’s leading banks are using content management systems that leverage cloud, mobile and analytics to deliver superior customer interactions. Watch this short video to learn how today’s leading banks are applying new ECM capabilities that help provide consistent customer experiences across all channels.
Tags : 
ibm, ecm, analytics, smarter content, ecm for banking
    
IBM
Published By: IBM     Published Date: Jan 20, 2017
Government agencies are taking advantage of new capabilities like mobile and cloud to deliver better services to its citizens. Many agencies are going paperless, streamlining how they interact with citizens and providing services more efficiently and faster. This short video will show real examples of how government agencies are applying new capabilities like cognitive and analytics to improve how they ingest, manage, store and interact with content.
Tags : 
    
IBM
Published By: IBM     Published Date: Mar 30, 2017
To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize its value, and integrate it at a more granular level than ever before—focusing on the individual transaction level, rather than on general summary data. As data volumes continue to explode, clients must take advantage of a fully scalable information integration architecture that supports any type of data integration technique such as extract, transfer and load (ETL), data replication or data virtualization.
Tags : 
data integration, data security, data optimization, data virtualization, database security
    
IBM
Published By: IBM     Published Date: Mar 30, 2017
In today’s competitive on-line world, the speed of change in customer behaviour is increasing. In addition, in industries such as retail banking, car insurance and to some extent retail, the Internet has become the dominant way in which customers interact with an organisation. Yet in many data warehouses today, being able to analyse customer on-line behaviour is often not possible because the clickstream web log data needed to do this is missing. It is a key point because customer access to the web has made loyalty cheap.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
IBM
Published By: IBM     Published Date: Apr 18, 2017
Master data management (MDM) programs provide ways to ensure that data is consistent in different systems throughout an organization, but poorly managed initiatives are large and complicated affairs. This handbook will provides practical advice on how to develop and implement successful MDM programs that can pay big business dividends. Discover expert advice on: - Strategies and tactics for effective MDM processes - The technology considerations that should be factored into project plans - The ramifications of incorporating pools of “big data” into MDM efforts - And more
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Do Android’s dessert-named updates improve device and data security enough to work for the enterprise? Android has long ruled the consumer market. Now, the latest security advancements from Google and device manufacturers, and support for Android by leading EMM solution providers, are expanding its presence in the enterprise. To help ensure security and compliance with industry standards and government regulations, enterprises need a way to protect and manage the wide range of available devices, versions, and idiosyncrasies of the world’s most popular mobile operating system.
Tags : 
access management, security information, event management, database security, application development, risk management, endpoint management, next generation intrusion protection
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
IBM
Start   Previous    548 549 550 551 552 553 554 555 556 557 558 559 560 561 562    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.