Skip to main content
 

nist

Results 176 - 200 of 823Sort Results By: Published Date | Title | Company Name
Published By: Storiant     Published Date: Apr 27, 2015
Emerging storage vendors offer data center managers and storage administrators new antidotes for their storage challenges. This research details five companies that provide innovative storage capabilities via new architecture and deployment methods, and looks back at two past Cool Vendors.
Tags : 
storage technologies, it storage vendors, storiant, storage infrastructures, automated storage
    
Storiant
Published By: Lenovo     Published Date: Jul 07, 2015
"Lenovo® XClarity™ is a new centralized systems management solution that helps administrators deliver infrastructure faster. This solution integrates easily into Lenovo System x® M5 and X6 rack servers and the Lenovo Flex System™ — all powered by Intel® Xeon® processors — providing automated discovery, monitoring, firmware updates, configuration management, and bare metal deployment of operating systems and hypervisors across multiple systems. Lenovo XClarity provides automated resource management with agentless, software virtual appliance architecture. It features an intuitive graphical user interface. Download now to find out more about Lenovo XClarity! Sponsored by Lenovo® and Intel®"
Tags : 
lenovo, xclarity, server value, system management, automated discovery, configuration management
    
Lenovo
Published By: Okta     Published Date: May 09, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
    
Okta
Published By: Box     Published Date: Nov 24, 2015
The adoption of enterprise content collaboration solutions has exploded as individuals sought ways to easily access, manage, and collaborate on content. Accordingly, businesses want to leverage those easy-to-use solutions but can’t compromise when it comes to enterprise-grade administrative control, security, and business insights.
Tags : 
box, dropbox, business, productivity, collaboration, content, enterprise
    
Box
Published By: Akamai Technologies     Published Date: Sep 10, 2019
Contemporary internet threats are sophisticated and adaptable, they continuously change their complexion to evade security defenses. Traditional rigid, deterministic, rule-based security research are becoming less effective. Security research approaches employing data science methods to implement anomalies-based analysis across very large volumes of anonymized data are now essential. This paper will: • Briefly cover security research challenges in today’s threat landscape • Explain why DNS resolution data is a rich resource for security research • Describe how Akamai teams use DNS data and data science to create better threat intelligence • Discuss improvements in threat coverage, accuracy, and responsiveness to today’s agile threats
Tags : 
    
Akamai Technologies
Published By: Oracle ODA     Published Date: Oct 19, 2016
Listen as Oracle Executive Vice President of Converged Infrastructure Dave Donatelli announces the expansion of the Oracle Database Appliance portfolio, and explains how Oracle can provide organizations with a pathway to the cloud. Discover how your organization can reduce database complexity, simplify database administration, and better control costs.
Tags : 
    
Oracle ODA
Published By: Oracle ODA     Published Date: Dec 06, 2016
IT leaders must consider new approaches to database administration, implementation, and security, including proactive management, to reduce time-consuming administrative tasks. This, in turn, will free them to develop strategies for capitalizing on the new data-driven initiatives that can help transform the enterprise. Learn more about these opportunities as well as how products, such as an integrated Database Appliance, can streamline the management of these tasks, while reducing costs and time.
Tags : 
    
Oracle ODA
Published By: CA Technologies     Published Date: Jun 01, 2018
Challenge Businesses today must reduce the risk of security breaches to protect the valuable data within their organizations. At the same time, IT auditors are increasingly enforcing ever more stringent requirements on the business. The bottom line is that privileged accounts and privileged access are being targeted by hackers as a new attack surface and focused on by auditors who are insisting on greater controls around privileged accounts. Opportunity The right privileged access management solution provides comprehensive protection for your missioncritical servers with powerful, fine-grained controls over operating system-level access and privileged user actions. Capable of enforcing access controls on powerful native Superuser accounts—like the UNIX® and Linux® root and Microsoft® Windows® administrator—this system-level, host-based privileged access management solution controls, monitors and audits privileged user activity, improving security and simplifying audit and compliance. B
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
    
CA Technologies
Published By: Carbonite     Published Date: Oct 12, 2017
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses.
Tags : 
ransomware, malware, cybercrime, lockscreen, encryption
    
Carbonite
Published By: WorkBook from Deltek     Published Date: Jul 20, 2018
1200 people. 14 companies. Multiple projects across multiple billing structures. Imagine what an administrative nightmare that would be.
Tags : 
    
WorkBook from Deltek
Published By: Workday     Published Date: Jul 19, 2017
MGM Resorts International made its reputation, quite simply, by being the best. Bellagio, Luxor, and Mandalay Bay in Las Vegas are among its properties, and the company is rapidly building its premium brand in the United States and worldwide. Its commitment to the highest quality guest experience is legendary in the industry. Realizing that engaged and motivated employees are the key to providing that customer experience, MGM Resorts looked for the best partner to help make that possible. And they found Workday.
Tags : 
absence management, benefits administration, compensation management, performance management, payroll, employee engagement, guest service
    
Workday
Published By: ADP     Published Date: Aug 28, 2017
If you spend a lot of time on administrative tasks, compliance and HR issues, you may benefit from a Professional Employer Organization.
Tags : 
    
ADP
Published By: CA Technologies     Published Date: Aug 22, 2017
Data is the most valuable asset a business has, and the most important data lives on the mainframe. This critical information fuels the new apps and services that differentiate your business. And it’s rapidly growing, with each new app creating a new source of data. What’s more, usage demands are increasing as developers seek access to mainframe-based data to promote innovation.
Tags : 
database, administration, management, performance optimization, sla, ca technologies, security
    
CA Technologies
Published By: Longi Engineering     Published Date: Feb 15, 2018
SharePoint is a technology that most organizations have access to these days, yet it is one that is open not utilized fully. This is in part due to organizations not being fully aware of the breadth of SharePoint’s capabilities. Most SharePoint power users/administrators are aware they can leverage SharePoint as a document repository and to share data seamlessly with a group of colleagues, however, they often are not aware of how to leverage some of SharePoint’s key foundational components effectively. As someone who implements SharePoint, one of the biggest complaints we hear from organizations is users aren’t using it, adoption is low. Without user adoption no technology implementation project can be successful. It is difficult to pinpoint one reason that causes adoption to be low, however, taking steps to effectively build your SharePoint site with a solid foundation along with an end goal of high user adoption is a great way to start.
Tags : 
software development, it consulting services, net software solutions, microsoft sharepoint
    
Longi Engineering
Published By: Gigamon     Published Date: Jun 21, 2019
Organisations have invested heavily in cybersecurity tools and yet more than five million data records are lost or stolen every day. The problem is not that today’s cybersecurity tools are badly designed or missing features, the problem is that surging volumes of network traffic overwhelm security tools, causing administrators to use sampling or disable advanced features in order to preserve application performance. Also, security tools and IT staff don’t get all the data they need to detect and respond to outside attacks and insider incidents, because they are faced with “blind spots” in data collection. Read this business brief in local language to find out how
Tags : 
    
Gigamon
Published By: Automation Anywhere APAC     Published Date: Aug 15, 2019
The University of Melbourne deployed Automation Anywhere’s Robotic Process Automation (RPA) technology to reduce manual work and automate a range of administrative processes across student admissions, faculty administration, and supplier tracking. The deployed software bots now automate the entry of all data and attachments for new admission applications, and the university has slowly expanded its automation capabilities for staff across other faculties. This has allowed the University of Melbourne to increase the efficiency of critical business processes, boost staff engagement, and improve customer experience for its teachers and student body.
Tags : 
rpa, roi, digital workforce, customer story
    
Automation Anywhere APAC
Published By: athenahealth     Published Date: May 24, 2012
Health care providers cope with an avalanche of complex rules, regulations, and administrative processes just to run their practices. At the same time, costs are increasing and reimbursement rates are declining. The only way for a practice to achieve financial health in this demanding environment is to learn how to operate at peak performance level.
Tags : 
healthcare, cost, ibm, asset management, service management, technology, health analytics, business intelligence, financial / revenue cycle management, claims processing
    
athenahealth
Published By: HP     Published Date: Aug 12, 2014
HP's Peter Mansell, reveals why HP decided to build CloudSystem around open standards and APIs, and Freeform Dynamics' Dale Vile, who explains how you can avoid building yourself into a silo.
Tags : 
cloudsystem, avoid building yourself into a silo, cloud migration, cloud administration
    
HP
Published By: HERE Technologies     Published Date: May 28, 2019
Loss of life in traffic death accidents in the U.S. is on the same scale as 25 full Boeing 747s crashing and leaving no survivors, in six months. It is a stark statistic which explains why the US Department of Transportation and the National Safety Council want to eliminate traffic deaths in the US within 30 years with their Road to Zero campaign. HERE location intelligence already supports more than half of the new elements included in the Federal Highway Administration (FHWA) guidance on crash reporting In the U.S. alone HERE currently works with more than 20 departments of transport and several large cities on improving traffic safety. As the world’s leading location platform, HERE also supports the global drive to Vision Zero.
Tags : 
impact, traffic, data, security, transportation, congestion, highway, crashes, vision, intelligence
    
HERE Technologies
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Protect the network, use the network to protect students Your schools use a growing amount of networked information and devices as an essential part of teaching and administration. Research on the Internet, laptops in class, distance learning, and online homework are some of the official technologies that your students use. Unofficially, this list extends to mobile phones (with cameras), digital music and video players, blogs, instant messaging, social networking sites, and networked or online gaming. Behind the scenes are databases with student information, class schedules, attendance records, copies of exams and answers, financial transactions, and even video surveillance. All of these rely on a robust and secure network infrastructure. Cisco Umbrella can provides these, download this whitepaper to find out more!
Tags : 
    
Cisco Umbrella EMEA
Published By: ETQ     Published Date: Jul 10, 2019
The FDA has announced plans to transition to standard ISO 13485:2016 for medical devices in 2019. In addition, the Medical Device Single Audit Program, MDSAP, has gained traction with full implementation set for 2019. Download this paper to learn more about these two changes from the U.S. Food and Drug Administration’s proposal to harmonize and modernize its Quality System Regulation (QSR).
Tags : 
    
ETQ
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Diebstahl und Missbrauch sensibler administrativer Anmeldeinformationen verursachen Sicherheitsverletzungen und Betriebsunterbrechungen. CA Privileged Access Manager verbessert die IT-Security, Unternehmenseffizienz und Compliance durch den Schutz privilegierter Anmeldeinformationen und Ressourcen sowie durch die effiziente Überwachung, Kontrolle und Verwaltung der Aktivitäten privilegierter Anwender.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it, datensicherheit, privilegierter accounts, privilegierte anwender
    
CA Technologies EMEA
Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: IBM     Published Date: May 26, 2017
This white paper is intended for: • Potential users such as analysts and investigators who want information about i2 Analyst’s Notebook Premium and the benefits it provides • System administrators who wish to gain a high-level understanding of the product and the system prerequisites that are needed to install and run the application • Users who wish to learn how to exploit the maximum value of i2 Analyst’s Notebook Premium This document provides an overview of the i2 Analyst’s Notebook Premium product.
Tags : 
ibm, ibm i2, ibm i2 analyst, notebook premium
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.