Skip to main content
 

practitioners

Results 51 - 75 of 87Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. It’s become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Saba Software     Published Date: Aug 15, 2016
Six times a year, the HR Daily Advisor® research team conducts detailed research into pressing contemporary human resources (HR) challenges to highlight best practices and common policies and procedures. We access our exclusive database of more than 250,000 active HR practitioners to find out how HR managers are handling challenges in the real world. Dear HR Practitioner, You know that a Learning Management System (LMS) can bring value to your organization, but how do you make the business case to those outside of HR? This is one of the most common hurdles that we hear at Halogen Software from our customers, so we thought it would make for a very interesting survey topic. Like you, we wanted to know how organizations are making their decisions around HR technology for learning, including: • What role HR plays in the selection of the LMS, • Which LMS features are most important, • How organizations calculate the ROI of their LMS, and • Whether learning content is created in-house
Tags : 
    
Saba Software
Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Cloud Access Security Brokers are one of the fastest growing security technologies today because they provide cloud service visibility, data security, threat protection, and compliance. CASBs are an effective and easy way to mitigate the top cloud security threats and security practitioners look to trusted CASB providers as strategic partners to help advise on key cloud security decisions.
Tags : 
    
Oracle Security Solutions
Published By: SBE     Published Date: Nov 21, 2008
In today’s business environment, marketing practitioners must attempt to align their marketing efforts with management’s strategic vision. After all, a greater return on investment (ROI) translates into improved marketing effectiveness and increased revenue, profi t, and market share for the same amount of marketing spend.
Tags : 
archway, roi, archanalytics, marketing operations management, business intelligence
    
SBE
Published By: SAS     Published Date: Jun 05, 2017
Competitive advantage from analytics is changing, and for the better. For the first time in four years, MIT Sloan Management Review found an increasing ability to strategically innovate with analytics based on interviews with more than 2,600 practitioners and scholars globally.
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 06, 2018
Competitive advantage from analytics is changing, and for the better. For the first time in four years, MIT Sloan Management Review found an increasing ability to strategically innovate with analytics based on interviews with more than 2,600 practitioners and scholars globally. Learn more about key findings, including: Wider use of analytics, better knowledge of its benefits and greater focus on applications have reversed a trend on the benefits of analytics. Return on investment for analytics stems from the governing and sharing of data throughout the organization. Machine learning enables organizations to discover more insight from their data, allowing employees to focus on other critical responsibilities.
Tags : 
    
SAS
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Welcome to the very first edition of Modern Monitoring, a collection of articles and insights designed to help IT operations and DevOps professionals deliver more resilient, supportable and high-performance IT services. It’s perhaps a sign of the times that monitoring as a discipline is receiving much more attention within the biz tech community. And deservedly so. The new distributed application architectures being built, together with the dizzying pace of software delivery, demand new approaches in what’s traditionally been perceived as a “keeping the lights on” IT practice. Of course, there’s no better way to consider monitoring than to draw parallels with other practices in related fields. It’s why we’ve included a couple of pieces with a distinct aeronautical flavor that discuss importance of instrumentation and contextual awareness.
Tags : 
    
CA Technologies EMEA
Published By: Vectra Networks     Published Date: Aug 03, 2015
Organizations invest heavily to block advanced attacks, on both endpoints and networks. Despite all this investment, devices continue to be compromised in increasing numbers and high-profile breaches continue unabated. Something doesn’t add up. It comes down to psychology: security practitioners want to believe the latest shiny widget for preventing compromise will finally work and stop the pain.
Tags : 
data, security, threats, protection, advanced threat, ips, ids, firewall
    
Vectra Networks
Published By: ServiceNow     Published Date: Oct 24, 2019
Organizations spend a huge amount of money on enterprise software. Software asset management (SAM) practitioners still wrestle with time?consuming, inaccurate manual processes hosted in spreadsheets or legacy SAM tools. Fortunately, next?generation IT asset management solutions are starting to replace traditional SAM tools.
Tags : 
servicenow, asset, management, sam, spreadsheets, enterprise
    
ServiceNow
Published By: Oracle     Published Date: Dec 21, 2016
This research note is designed to support the near and mid-term infrastructure plans for Oracle infrastructure practitioners and DBAs, and better understand the fit of products like ODA relative to other appliances in Oracle's portfolio.
Tags : 
    
Oracle
Published By: Oracle ODA     Published Date: Oct 19, 2016
This research note is designed to support the near and mid-term infrastructure plans for Oracle infrastructure practitioners and DBAs, and better understand the fit of products like ODA relative to other appliances in Oracle's portfolio.
Tags : 
    
Oracle ODA
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. In this practical webinar, PCI DSS compliance experts walk through strategies for taking the pain out of PCI DSS reporting.
Tags : 
alienvault, pci dss reporting, pci dss compliance
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: SAS     Published Date: Mar 14, 2014
This paper explores ways to qualify data control and measures to support the governance program. It will examine how data management practitioners can define metrics that are relevant.
Tags : 
sas, data quality, business objectives, quality data, accuracy, lineage, structural consistency, relevant metrics
    
SAS
Published By: Infoblox     Published Date: Sep 04, 2013
Security challenges, costs & solutions for IT practitioners
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Online Marketing Summit     Published Date: Apr 21, 2010
Register for this free virtual event on Thursday, May 27th with the best and latest online marketing educational content including best practices, case studies, research and more. You can expect: *Seven tracks covering all major domain of online marketing, including Social Media, Search Engine Marketing and Optimization, Web Analytics, Mobile, Email and Demand Generation; * Content for all skill levels from the online novice to the eMarketing expert, there are sessions that will benefit all corporate, brand and online marketers; *Online marketing education kiosks and learning centers provide you additional access to 1-on-1 consultations, whitepapers and webcasts; *Live Q&A at the end of each session. Speakers and expert practitioners further explain the tactics learned in the session, answering questions and providing live support. Virtual Peer Networking gives you the opportunity to network, collaborate and share ideas with strategic marketers from leading companies around the world, so register now!
Tags : 
oms, online marketing summit, online marketing, emarketing, strategic marketing
    
Online Marketing Summit
Published By: Comcast Business     Published Date: Jul 10, 2017
Healthcare technologies have proven their worth for practitioners and facilities in increasing the quality of patient care while saving time and streamlining operations. In some cases, however, the benefits of these technologies are outweighed by their impact on the network, slowing network performance sometimes to the point of ineffectiveness.Software-defined networking can be the bridge to help healthcare providers update their networks and avoid disruption. SDN helps organizations save money on networking infrastructure, reduces the complexity of managing networks, enhances security through added intelligence and simplifies compliance, among other benefits.
Tags : 
healthcare, sdn, healthcare technology, patient care, technology, reducing costs, improve security, healthcare benefits
    
Comcast Business
Published By: RedHat     Published Date: May 16, 2017
This ebook aims to answer this question by drawing on best practices from leading practitioners in seven areas key to the success of effective API programs.
Tags : 
api, infrastructure, application programming interface, 3scale
    
RedHat
Published By: Puppet     Published Date: Mar 09, 2017
System administrators and other IT practitioners spend as much as 50% of their time on routine, repetitive tasks. Does the following apply to your organization? • You go from one server to the next, installing the same package on all of them. It works nine times out of 10, but the tenth time causes a failure ... and you can't identify what went wrong. • You can't scale. When the business wants to move to the cloud, or asks for faster provisioning of development and test environments, you only have so many hours in the day — and you can't meet everyone's needs. • You don't have time to get to the work that matters. You spend too much time on routine system management, and can't prepare for the projects that will bring real business value to your team — and customers. With growing demands from all corners of your organization, you simply can't keep doing it all manually. Download this paper to learn how you can benefit from automation, and how IT infrastructure can become a strategic ass
Tags : 
    
Puppet
Published By: Engage2Excel     Published Date: Apr 29, 2019
Many HR leaders praise the employee experience (EX) as the holy grail of their organizational initiatives, but things are changing. What if this view only captures a small fraction of — ironically — the employee experience? What if there were a broader understanding of the employee’s career? You would be able to see through employees’ eyes why they joined your company, what they hope to do in life and where they’re going. Then you could help them position themselves in your company to achieve their goals as well as yours. You would both win. We’ve written about the employee experience in the past, how creating great experiences and providing a framework for practitioners develops the holistic employee experience. Now we’re expanding our view on what it means to have a truly great employee experience.
Tags : 
    
Engage2Excel
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
The whitepaper is intended for security practitioners as well as developers and administrators of applications who can benefit from secure communications. The paper presents carious strategies for securing applications using Oracle Solaris 11 security and hardware-assisted cryptographic acceleration features of Oracle's SPARC processors. The paper unveils the core mechanisms, configuration, and deployment strategies, as well as the role of relevance of using Oracle Solaris Cryptographic Framework and Java Cryptography Extension-based techniques for delivering a high-performance, end-to-end security solution. With Oracle's new Software in Silicon capabilities coupled with an innovation cache and memory hierarchy, Oracle's SPARC M7 processor delivers dramatically higher processing speed and revolutionary protection against malware and software errors.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Oracle     Published Date: Nov 01, 2013
The next generation of talent management practices and solutions will largely be driven by economic evolution, demographic changes, and technology advancements. These factors are dramatically influencing the way people work, the way companies are organized, and the way talent is managed. Current business and talent management processes and technology must evolve to effectively deliver business value over the next few years. This paper explores how current business and talent management processes and technology must evolve in order to effectively deliver business value in the next 5 to 10 years. The research presented in this paper is supported by interviews with thought leaders in talent management, including practitioners, academics, and technologists from around the globe.
Tags : 
zenithoptimedia, oracle, future of talent management, economic factors, the knowledge economy, globalization, structural unemployment, generational geographies
    
Oracle
Published By: SAS     Published Date: Sep 13, 2013
If businesses are recognizing the need for a dial-tone approach to establishing “data utility” services for meeting user expectations for data accessibility, availability and quality, it is incumbent upon the information management practitioners to ensure that the organization is properly prepared, from both a policy/process level and a technology level.
Tags : 
sas, cio, chief information officer, data utility, information management
    
SAS
Published By: AlienVault     Published Date: Oct 21, 2014
Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.
Tags : 
alienvault, limited resources, it time management, it prioritization, it management
    
AlienVault
Published By: Lookout     Published Date: Mar 29, 2017
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
practitioners, enterprise, mobile security, productivity, lookout
    
Lookout
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.