Skip to main content
 

large scale enterprises

Results 1 - 9 of 9Sort Results By: Published Date | Title | Company Name
Published By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle CX
Published By: Oracle     Published Date: Sep 21, 2016
Overhauling your processes, rewiring your product focus, creating a new culture: large-scale, transformative organizational development and change is messy, difficult—and usually fails. This digibook contains a step-by-step guide to leading process management and overcoming the cultural and procedural challenges, with case studies and examples of how smart CFOs are leading the transformation of their enterprises.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle
Published By: HP Data Center     Published Date: Apr 08, 2009
Unified Communications (UC) aims to unite securely and seamlessly all the different business communications channels that exist in a company. That includes voice, video, data, IM, mobility and the Web etc. This report examines in detail the key industry drivers and benefits that are inspiring large scale enterprises to adopt a Unified Communications strategy.
Tags : 
business communications, voice, video, data, mobility, industry drivers, unified communications strategy, just in time, jit, cross-functional, hp data center, cisco, crm, workflow, workforce management, total cost of ownership, tco, voice response (ivr), automatic call distributor (acd), disaster recovery
    
HP Data Center
Published By: Viavi Solutions     Published Date: Apr 14, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
network security, security validation, technical security, cyber attacks, database security, it security, traffic analytics, data report
    
Viavi Solutions
Published By: RMG Networks     Published Date: May 08, 2014
Download to learn how large scale enterprises can improve quality, efficiency, productivity, and time from raw material to the point of purchase.
Tags : 
rmg networks, large scale enterprises, historical performance tracking, productivity data, visual communications, enterprise video, real time data
    
RMG Networks
Published By: Microsoft Azure     Published Date: Apr 11, 2018
The 2017 study, The Total Economic Impact™ of Microsoft Azure IaaS, gives insight into both the costs and benefits of large-scale Azure infrastructure as a service (IaaS) implementation. This commissioned study conducted by Forrester Consulting analyzes the return on investment and business impact that several enterprises experienced when moving from a primarily on-premises environment to Azure. The companies interviewed come from a variety of industries and locations (global/multinational, North American, and European). In addition to a 435 percent overall return on an Azure IaaS investment*, the businesses also experienced: Reduced data center and outsourcing costs. Website scale and performance improvements. Ease of experimentation through virtualized environments. Developer and tester improvements. Download the study to learn about the potential ROI that could be realized by shifting some or all of your management and operations to Azure.
Tags : 
    
Microsoft Azure
Published By: Cisco     Published Date: Nov 17, 2014
The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.
Tags : 
cloud-computing, malware, cisco, malware infection, amp
    
Cisco
Published By: Viavi Solutions     Published Date: Jan 04, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
    
Viavi Solutions
Search      

Add Research

Get your company's research in the hands of targeted business professionals.