Skip to main content
 

nist

Results 351 - 375 of 822Sort Results By: Published Date | Title | Company Name
Published By: Tenable     Published Date: Feb 07, 2018
While multinational companies can likely meet some of the GDPR requirements right now, most will find the path to full compliance requires many changes to business-as-usual security practices. Read this paper to learn how you should be preparing your information security program for compliance with the GDPR. Written for InfoSec leaders, the paper includes: - A glossary outlining key concepts of the Regulation - 13 essential steps you should take to help ensure GDPR compliance - A summary of infosec considerations posed by the EU Data Protection Directive 95/46/EC and GDPRD
Tags : 
security frameworks, compliance, iso 27000, cis controls, nist, pci, security regulation
    
Tenable
Published By: Tenable     Published Date: Feb 07, 2018
"Basing your infosec program on an established security framework gives you the controls, KPIs and vocabulary needed for building – and operating – a structured, scalable, and effective practice. For insights into how this works in the real world, download and read Economic, Operational and Strategic Benefits of Security Framework Adoption, a collection of brief essays from 28 global infosec leaders. Topics covered include: - Meeting customer and partner requirements - Improving security practices - Enabling effective communications with corporate leaders - Addressing global compliance challenges - Adapting the framework to fit your needs"
Tags : 
security frameworks, gdpr, general data protection regulation, compliance, iso 27000, cis controls, nist, cyber, ciso, experts, ebook
    
Tenable
Published By: Veeam '18     Published Date: May 07, 2019
Alors que les entreprises accélèrent l'adoption de divers services cloud comprenant les clouds publics, privés et hybrides, la nécessité d’administrer ces environnements multicloud et d’en tirer parti devient critique. Veeam assure la disponibilité de ces environnements en protégeant les données vers, depuis et à l’intérieur des infrastructures multicloud.
Tags : 
    
Veeam '18
Published By: Absorb     Published Date: May 09, 2018
eLearning has become the prevailing approach to employee onboarding, compliance training, and professional development. The efficiencies that eLearning affords stem from automation, customization and self-service. These attributes allow end users (employees and others) to access just the right training at just the right time. They also provide Learning and Development administrators the peace of mind that training will be delivered as needed, in a consistent manner and that tracking the progress of individuals will also be made simpler by automation.
Tags : 
lms, employee, training, efficiencies, elearning, automation
    
Absorb
Published By: Motorola Solutions     Published Date: Jul 02, 2018
We all want our nation’s schools to be safe, secure learning environments where students can realize their full potential. This requires reliable, continuous communication among school personnel, both onsite and district-wide, plus the ability to instantly connect with first responders in an emergency. This seamless communication must be delivered over any network, from any location, using any device. Team Communications from Motorola Solutions provides this seamless integration, helping schools preserve the all-important safety of their students. Team Communications empowers educational institutions to transform how they communicate, enabling individuals to share real-time information to make schools safer and staff more productive. Schools across the U.S. use Team Communications from Motorola Solutions to deliver unified voice and data to administrators, teachers, maintenance, security, coaches, and other personnel, improving decision making, increasing visibility into school activit
Tags : 
    
Motorola Solutions
Published By: BMC ASEAN     Published Date: Dec 18, 2018
Today’s IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainable—it’s dangerous. Delays in responding to security threats and compliance issues can have devastating effects: • Security breaches • Failed audits • Financial losses • Loss of customers and reputation • Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
    
BMC ASEAN
Published By: Blue Prism     Published Date: Mar 28, 2019
Robotic process automation describes the use of technology to automate tasks that are traditionally done by a human being. The technology itself mimics an end user by simulating user actions such as navigating within an application or entering data into forms according to a set of rules. RPA is often used to automate routine administrative tasks that typically require a human being to interact with multiple systems, but RPA technology is evolving to support the automation of increasingly sophisticated processes at scale within enterprise architectures rather than on the desktop. Over the past two years, RPA has been adopted by a number of business process outsourcing (BPO) providers and a growing number of end-user organizations are now deploying the technology themselves to create “virtual workforces” of robotic workers.
Tags : 
    
Blue Prism
Published By: DataCore     Published Date: Jul 10, 2019
With a software-based approach, IT organizations see a better return on their storage investment. DataCore’s software-defined storage provides improved resource utilization, seamless integration of new technologies, and reduced administrative time - all resulting in lower CAPEX and OPEX, yielding a superior TCO. A survey of 363 DataCore customers found that over half of them (55%) achieved positive ROI within the first year of deployment, and 21% were able to reach positive ROI in less than 6 months. Download this white paper to learn how software-defined storage can help reduce data center infrastructure costs, including guidelines to help you structure your TCO analysis comparison.
Tags : 
software defined storage, virtualization, storage, storage costs, data center costs, infrastructure costs, tco, roi, total cost of ownership, return on investment, software-defined storage, storage infrastructure
    
DataCore
Published By: Five9     Published Date: Aug 01, 2019
It’s become abundantly clear that the cloud is no longer the future— but the new normal. Enterprises rely on cloud computing for web-based meetings, email, file sharing, and more every day to reduce costs and administrative burdens while enhancing productivity. With the wealth of benefits to be gained by moving to the cloud—including speed of deployment, cost-efficiencies, and easy scaling—it’s no wonder the shift toward all things virtual has been so pervasive and swift. What’s more, as the cloud has matured, the potential drawbacks that once made enterprises hesitant to make the move are disappearing. Security is now robust, application integration happens with ease, and reliability is a given, not a question mark. So now that the cloud has become not just viable, but essential, to stay competitive in a rapidly changing world, it’s time to explore how the cloud can significantly improve your contact center operations and guest experiences. This paper will provide one compelling r
Tags : 
    
Five9
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
La sfida Come ci si può aspettare, le aziende che intraprendono un percorso di digital transformation devono affrontare maggiori problemi correlati a rischi e sicurezza. Le iniziative di digital transformation aumentano inevitabilmente il numero dei punti di accesso all'infrastruttura aziendale che sfuggono ai controlli esistenti, sono accessibili a un numero superiore di set di identità diversi e proliferano all'interno di un'infrastruttura distribuita e dinamica. L'opportunità Conoscere i propri utenti con privilegi significa conoscere i rischi. Di per sé, gli strumenti di privileged access management devono essere in grado di supportare l'automazione nel processo di autorizzazione e garantire la scalabilità attraverso il supporto di operations dinamiche e infrastrutture effimere, come gli account amministrativi Amazon Web Services (AWS) per le identità umane.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Défi Les organisations engagées dans un processus de transformation numérique sont davantage préoccupées par des questions liées au risque et à la sécurité, ce qui n’a rien de surprenant. Les initiatives de transformation numérique entraînent inévitablement une augmentation du nombre de points d’accès à l’infrastructure de l’entreprise qui se situent en dehors des contrôles existants et sont accessibles par des identités plus nombreuses et plus variées qui prolifèrent à l’intérieur d’une infrastructure distribuée et dynamique. Solution Connaître vos utilisateurs privilégiés, c’est connaître vos risques. Les outils de gestion des accès à forts privilèges doivent eux-mêmes être en mesure de supporter l’automatisation du processus d’autorisation et permettre l’évolutivité grâce à la prise en charge des opérations dynamiques et de l’infrastructure éphémère, comme les comptes d’administration AWS (Amazon Web Services) pour les identités humaines.
Tags : 
    
CA Technologies EMEA
Published By: Pure Storage     Published Date: Feb 02, 2017
Read on to find out how your business can: - Simplify IT Management and Administration - Improve Performance and Application Availability - Reduce Total Cost of Ownership - Enhance IT and Business Agility
Tags : 
flash storage, cloud applications, cost, performance, it management, business agility
    
Pure Storage
Published By: Pure Storage     Published Date: Feb 02, 2017
- Simplifier la gestion et l'administration de l'informatique - Améliorer la performance et la disponibilité des applications - Réduire le coût total de possession - Améliorer l'agilité informatique et de l'entreprise
Tags : 
stockage flash, applications cloud, coût, performance, gestion du système d’information, l'agilité en affaires
    
Pure Storage
Published By: Pure Storage     Published Date: Feb 02, 2017
- Vereinfachung von ITManagement und -Administration - Verbesserung von Performance und Anwendungsverfügbarkeit - Senkung der Gesamtbetriebskosten - Steigerung der IT- und Geschäftsflexibilität
Tags : 
flash-speicher, cloud-anwendungen, kosten, leistung, it-management, business agility
    
Pure Storage
Published By: Bluewolf     Published Date: Apr 07, 2011
This white paper from Bluewolf looks at the Operational and cost benefits of implementing a remote DBA system.
Tags : 
remote dba, roi, bluewolf, database monitoring, heineken case study, bluewolf beyond, remote database administration, market conditions
    
Bluewolf
Published By: GreenSQL     Published Date: Nov 11, 2014
This white paper contains administrative and operational best practices that should be performed from a security perspective when using Microsoft SQL server. These best practices cover operative instructions and example code snippets needed for DBAs and Server Administrators.
Tags : 
sql server, insider breach, insider threat, firewalls, compliance, pci compliance, sql server best practices, data protection, database security
    
GreenSQL
Published By: Ascentis     Published Date: Oct 19, 2010
Most HR departments spend up to five hours of every day with tedious data-related administrative issues and reactionary tasks. The right HRIS software will automate your critical processes and free your time to be more accelerated, responsive and strategic. Learn how HRIS technology will help you to: . Eradicate benefit errors . Manage attendance . Automate compliance
Tags : 
ascentis, open enrollment, automation, accuracy, self-service, human resources, errors, hris, insurance, benefits
    
Ascentis
Published By: ALE     Published Date: Jan 10, 2019
Providing an effective teaching and learning environment is the primary goal of all educational institutions. Traditionally, administrators concentrated on providing faculty with the tools to properly deliver the curriculum and structuring the learning process to sufficiently engage students. But, violent incidents over the past decade along with government regulations have put pressure on administrators to focus on the physical security and safety of staff, faculty, and students. To find out more download this whitepaper today.
Tags : 
    
ALE
Published By: Brother     Published Date: Nov 23, 2015
The Center for Digital Education (CDE) surveyed over 130 K-12 decision-makers on the classroom use of printer and scanner technologies in September 2014 and found scanning materials for digital use in the classroom is a key concern, with ease of use, cost containment and flexible deployment among the most critical needs. In the context of this study, this white paper will build a case for the use of scanners to revolutionize K-12 teaching, learning and administration.
Tags : 
scanners, brother, scanning solution, digital learning, touchscreen, education technology
    
Brother
Published By: Burton Group     Published Date: Jul 07, 2008
Data modeling has evolved from an arcane technique for database designers into an entire family of interrelated techniques that serves many constituencies, including techno-phobic business stakeholders and users. The new maturity of modeling tools and techniques arrives in the nick of time, because new technical and regulatory realities demand that enterprises maintain scrupulous awareness of their data and how it is used. Data modeling is no longer for databases only, no longer for technologists only, and no longer optional.
Tags : 
modeling, data modeling, data management, data mining, business intelligence, dba, database administration, burton group
    
Burton Group
Published By: Infoblox     Published Date: Feb 03, 2009
IP address management (IPAM) provides the ability to effectively manage, control, monitor, and assign the IP address space within a company. An IPAM solution reduces operations costs and improves network uptime by minimizing administrative effort and network downtime.
Tags : 
infoblox, integrated ip management solution, ipam, data migration, dhcp
    
Infoblox
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
F5's Application Ready Solution Templates are designed to ensure that the savings realized through consolidation are protected by reducing the time, effort, and application-specific knowledge required of administrators to optimally deploy applications that are secure, fast, and available through the use of BIG-IP devices.
Tags : 
application, solution, template, design, device, administrator, knowledge, ease, big-ip
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
BIG-IP devices have long been a tool for applying "rolling upgrades" to the applications and systems that sit behind the BIG-IP device. With Live Install, this "stage->reboot->go live" sequence can now be applied to the BIG-IP device directly, creating a rolling upgrade scenario like those of the application systems behind it. Live Install also enables snapshot versioning for future versions of the BIG-IP system, a critical feature for both production and testing environments.
Tags : 
big-ip, tool, application, system, device, installation, upgrade, production, testing, reboot, go live, stage, administrator, knowledge, solution
    
F5 Networks Inc
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.