Skip to main content
 

leverage

Results 126 - 150 of 1025Sort Results By: Published Date | Title | Company Name
Published By: MarkLogic     Published Date: Jun 09, 2017
Your high-stakes data projects don’t have to end – as analysts predict – in failure. Don’t just rely on legacy technology and outdated thinking - the key is to start your next data project armed with the right technology and mindset to succeed. This paper will give you insights and guidelines to help you learn how to leverage all of your data to reach your data integration objectives with less time and expense than you might imagine. Change is good, and in this paper we’ll give you real-world examples of organizations that embraced change and found success.
Tags : 
    
MarkLogic
Published By: Socialbakers     Published Date: Mar 27, 2015
Social has the power to help your clients achieve larger marketing and business goals. But only 5% of brands use social to it’s fullest potential - do your clients and prospects? In this study we discuss social trends agency reps just have to know to stay ahead and ways you can leverage social to pitch prospects and preserve accounts.
Tags : 
the key agency success, social trends, social, social media, agencies, importance and content, social media marketing trends, social data, social analytics, videos, advertising agencies
    
Socialbakers
Published By: Okta     Published Date: Mar 14, 2016
Adobe wanted to enable creativity in their customers and allow them to be mobile and function in the cloud. Recognizing that identify was key to making this work they leveraged Okta to create a simple and secure customer experience. Read this case study to learn how Adobe found a way to bring IT and engineering together and overcome identify concerns.
Tags : 
    
Okta
Published By: Okta     Published Date: Mar 14, 2016
Are you facing a classic username and password proliferation problem? See how National Geographic leveraged Okta to create policy around employee usernames and passwords, prevent rogue IT scenarios, and provide significant cost savings and end-user productivity benefits.
Tags : 
    
Okta
Published By: Puppet     Published Date: Mar 09, 2017
Configuration management can play an incredibly important role in IT security due to its basis in establishing and maintaining a known and consistent state of the physical and software elements at your organization’s disposal. This white paper explores how to leverage configuration management to bolster security and meet compliance regulations. Uncover some of the key benefits, including: • Creation of a Standard Operating Environment (SOE) • Reporting on and control of configuration drift • Enhanced change remediation • Insight into configuration knowledge • And more
Tags : 
    
Puppet
Published By: CA Technologies     Published Date: Sep 25, 2017
Today’s adaptive enterprises have to leverage data to remain flexible and responsive, but they need the right data. But it isn’t easy: Many companies struggle to improve technical execution while maintaining the visibility executives need. That’s why we created CA PPM + CA Agile Central, a seamless integration of our agile-management and business-portfolio management solutions. Together, they provide unparalleled visibility into both funding and work across every level of your organization.
Tags : 
funding, increment, planning, value, roadmap, agile central, ca technologies
    
CA Technologies
Published By: Tenable     Published Date: Aug 07, 2018
"Tenable Research’s analysis shows that how the race begins is a key indicator of how it will end. But, security teams have the power to reclaim the advantage by developing a risk-centric mindset and more agile vulnerability management. Download the report now to: - Find out more about Tenable Research’s analysis of the 50 most prevalent vulnerabilities - Get recommendations on how to reduce the attacker’s seven-day window of opportunity - Learn how real-world threat actor activity can be leveraged to prioritize vulnerabilities for remediation and mitigate the attacker’s first-mover advantage"
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security
    
Tenable
Published By: Dell Server     Published Date: Aug 07, 2018
IT is in the midst of one of its major transformations. IDC has characterized this paradigm shift as the “third platform,” driven by innovations in cloud, big data, mobility and social technologies. Progressive enterprises are seeking to leverage third-platform technologies to create new business opportunities and competitive differentiation through new products such as Dell EMC PowerEdge Servers powered by Intel® Xeon® Platinum processor and services, new business models and new ways of engaging customers.
Tags : 
    
Dell Server
Published By: Juniper Networks     Published Date: Oct 20, 2015
Switching Architectures Leverage Juniper Data Center Switches to Accelerate Time to Value, Network Management.
Tags : 
data center, network management, architecture, time to value, flexibility
    
Juniper Networks
Published By: mindSHIFT     Published Date: Nov 29, 2007
To successfully adopt managed IT services to meet your business objectives, small- and medium-sized organizations (SMBs) should follow five straightforward steps.
Tags : 
msp, managed service provider, it services, it service provider, outsourcing, managed services, small business, soho, smb, smbs, mindshift
    
mindSHIFT
Published By: Dell PC Lifecycle     Published Date: Mar 07, 2018
IT is in the midst of one of its major transformations. IDC has characterized this paradigm shift as the “third platform,” driven by innovations in cloud, big data, mobility and social technologies. Progressive enterprises are seeking to leverage third-platform technologies to create new business opportunities and competitive differentiation through new products and services, new business models and new ways of engaging customers.
Tags : 
partner, dell, emc, windows, server, enterprises
    
Dell PC Lifecycle
Published By: Schneider Electric     Published Date: Jun 03, 2019
The demands of modern IIoT applications increases the complexity of systems infrastructure and puts additional pressure on IT and OT security. As the frequency and sophistication of cyber-attacks increase, operations must leverage industry standards to achieve consistent protection. This paper will address how IEC62443 can be applied to industrial control systems and help readers understand the various priorities and steps required to help mitigate cyber threats.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, ecostruxture plant, process automation, profitable safety, defence in depth
    
Schneider Electric
Published By: Okta     Published Date: Jul 01, 2015
Are you facing a classic username and password proliferation problem? See how National Geographic leveraged Okta to create policy around employee usernames and passwords, prevent rogue IT scenarios, and provide significant cost savings and end-user productivity benefits.
Tags : 
    
Okta
Published By: Okta     Published Date: Jul 01, 2015
Adobe wanted to enable creativity in their customers and allow them to be mobile and function in the cloud. Recognizing that identify was key to making this work they leveraged Okta to create a simple and secure customer experience. Watch this video to learn how Adobe found a way to bring IT and engineering together and overcome identify concerns.
Tags : 
    
Okta
Published By: Okta     Published Date: Aug 24, 2015
Are you facing a classic username and password proliferation problem? See how National Geographic leveraged Okta to create policy around employee usernames and passwords, prevent rogue IT scenarios, and provide significant cost savings and end-user productivity benefits.
Tags : 
    
Okta
Published By: Okta     Published Date: Aug 24, 2015
Adobe wanted to enable creativity in their customers and allow them to be mobile and function in the cloud. Recognizing that identify was key to making this work they leveraged Okta to create a simple and secure customer experience. Watch this video to learn how Adobe found a way to bring IT and engineering together and overcome identify concerns.
Tags : 
    
Okta
Published By: VMware     Published Date: Aug 23, 2011
One of the most difficult problems faced by today's designers is figuring out how to leverage pay-as-you-go-clouds to build optimal data mgmt platfoms
Tags : 
application server, data management, application monitoring and management, web server load balancing, enterprise messaging, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware cloud app performance, cloud performance, cloud computing, application performance management, solid-state drives
    
VMware
Published By: HP     Published Date: Jan 18, 2013
Virtualization increases the agility and flexibility of IT organizations looking to leverage automated self-service - giving birth to cloud service. Read to learn more about the troubles traditional storage systems have with cloud and keeping pace.
Tags : 
hp technology, services for storage solutions, hp teech, white papers, virtualization
    
HP
Published By: Intel® Services     Published Date: Aug 11, 2014
In this guide, Intel® Services share lessons learned about deploying and managing successful enterprise APIs.
Tags : 
intel services, enterprises, api management, enterprise apis
    
Intel® Services
Published By: MobileIron     Published Date: Aug 04, 2016
Is your organization's approach to enterprise mobility on the right track? Take our assessment today to find out! Learn how your progress in your mobile first journey compares to your industry peers Understand where you may have security risks Benchmark your performance in strategy, people, process, and technology Receive case study and best practice recommendations tailored to your situation Leverage MobileIron experts to analyze your results and guide you on a path to success
Tags : 
mobile maturity, mobileiron, mobile first, security risks
    
MobileIron
Published By: Aternity     Published Date: Feb 24, 2016
Governance, Risk Management, and Compliance (GRC) organizations are always concerned with violations of Acceptable Use Policies, the scenario of the workforce using a network, website, or system to perform inappropriate actions. But insider threats can also result from legitimate work activities that are being done for illegitimate purposes. Read how a leading insurance company leveraged an End User Experience Monitoring solution to identify employees harvesting customer data before leaving the company.
Tags : 
aternity, grc, risk management, compliance, end user experience, customer data
    
Aternity
Published By: Sitrion     Published Date: Oct 04, 2016
Communications is all about making sure all employees are engaged, aligned, and informed. It is your opportunity to leverage mobile technology and employee apps to improve your communications—connecting remote workers with the enterprise, saving money and time, and empowering employees to be more productive. Download this white paper to learn more about how mobile can help you reach and engage with your remote workforce
Tags : 
    
Sitrion
Published By: Movable Ink     Published Date: Oct 04, 2016
33% of brands kick off holiday campaigns in October, and most of them are planning now. Grab our latest report and learn how to leverage the biggest holiday trends, including triggered emails and user-generated content.
Tags : 
contextual marketing, email marketing, retail marketing, ecommerce marketing, contextual email, real-time marketing, internet marketing
    
Movable Ink
Published By: Movable Ink     Published Date: Oct 04, 2016
33% of brands kick off holiday campaigns in October, and most of them are planning now. Grab our latest report and learn how to leverage the biggest holiday trends, including triggered emails and user-generated content.
Tags : 
contextual marketing, email marketing, retail marketing, ecommerce marketing, contextual email, real-time marketing, internet marketing, e-commerce
    
Movable Ink
Published By: Red Hat     Published Date: May 11, 2016
In ESG’s opinion, the evaluation of OpenShift 3 is essential for enterprises looking to modernize application processes to meet growing demands, to stay ahead of the ever-changing market landscape, and to leverage the advantage of emerging industry standards.
Tags : 
red hat, openshift, enterprise, paas, esg
    
Red Hat
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.