apt

Results 1 - 25 of 1419Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC & Intel     Published Date: Dec 12, 2018
La transformation de l’IT est un concept qui trouve un meilleur écho auprès des entreprises qu’il y a 12 mois. Il ressemble fortement à un autre terme actuel, la « transformation numérique. ». Mais en réalité, la transformation de l’IT est indispensable à une transformation numérique efficace. Une entreprise qui transforme son infrastructure IT se libère de la dépendance vis-à-vis de ses technologies héritées cloisonnées en silos, rigides et manuelles. Elle peut constater un gain significatif en matière de vitesse opérationnelle IT, d’efficacité, d’évolutivité et de rentabilité. Les tâches sont automatisées, les processus rationalisés et de nombreuses ressources sont libérées. Ces améliorations au niveau IT alimentent une transformation numérique à plus grande échelle et permettent à l’entreprise de prospérer dans l’économie numérique d’aujourd’hui. L’entreprise transformée est capable d’innover, de progresser et de s’adapter plus rapidement que ses concurrents : elle devient actrice
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Dec 12, 2018
La transformation de l’IT est un concept qui trouve un meilleur écho auprès des entreprises qu’il y a 12 mois. Bien que ce ne soit pas un synonyme direct de la transformation numérique, ces deux concepts sont fondamentalement liés, dans la mesure où une transformation numérique efficace est indissociable d’une transformation de l’IT. Une entreprise qui transforme son infrastructure IT se libère de la dépendance vis-à-vis de ses technologies héritées, cloisonnées en silos, rigides et manuelles. Elle peut constater un gain significatif en matière de vitesse opérationnelle IT, d’efficacité, d’évolutivité et de rentabilité. Les tâches sont automatisées, les processus rationalisés et de nombreuses ressources sont libérées. Ces améliorations au niveau IT alimentent une transformation numérique à plus grande échelle et permettent à l’entreprise de prospérer dans l’économie numérique d’aujourd’hui. L’entreprise transformée est capable d’innover, de progresser et de s’adapter plus rapidement q
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC Storage     Published Date: Dec 18, 2018
La transformation de l’IT est un concept qui trouve un meilleur écho auprès des entreprises qu’il y a 12 mois. Il ressemble fortement à un autre terme actuel, la « transformation numérique. ». Mais en réalité, la transformation de l’IT est indispensable à une transformation numérique efficace. Une entreprise qui transforme son infrastructure IT se libère de la dépendance vis-à-vis de ses technologies héritées cloisonnées en silos, rigides et manuelles. Elle peut constater un gain significatif en matière de vitesse opérationnelle IT, d’efficacité, d’évolutivité et de rentabilité. Les tâches sont automatisées, les processus rationalisés et de nombreuses ressources sont libérées. Ces améliorations au niveau IT alimentent une transformation numérique à plus grande échelle et permettent à l’entreprise de prospérer dans l’économie numérique d’aujourd’hui. L’entreprise transformée est capable d’innover, de progresser et de s’adapter plus rapidement que ses concurrents : elle devient actrice d
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Dec 18, 2018
La transformation de l’IT est un concept qui trouve un meilleur écho auprès des entreprises qu’il y a 12 mois. Bien que ce ne soit pas un synonyme direct de la transformation numérique, ces deux concepts sont fondamentalement liés, dans la mesure où une transformation numérique efficace est indissociable d’une transformation de l’IT. Une entreprise qui transforme son infrastructure IT se libère de la dépendance vis-à-vis de ses technologies héritées, cloisonnées en silos, rigides et manuelles. Elle peut constater un gain significatif en matière de vitesse opérationnelle IT, d’efficacité, d’évolutivité et de rentabilité. Les tâches sont automatisées, les processus rationalisés et de nombreuses ressources sont libérées. Ces améliorations au niveau IT alimentent une transformation numérique à plus grande échelle et permettent à l’entreprise de prospérer dans l’économie numérique d’aujourd’hui. L’entreprise transformée est capable d’innover, de progresser et de s’adapter plus rapidement qu
Tags : 
    
Dell EMC Storage
Published By: Workday APAC     Published Date: Dec 18, 2018
Careers today are no longer narrowly defined by jobs and skills, but are instead viewed as ways for workers to gain valuable experiences and develop new skills. Learn what’s behind this shift in employee expectations and how to adapt your HR practices to meet them.
Tags : 
    
Workday APAC
Published By: Gigamon     Published Date: Dec 13, 2018
Perimeter-based solutions for network security do not work, leading to tool sprawl and performance issues. Read CSO Magazine’s interview with Gigamon CISO, Simon Gibson, to learn why a new, more intelligent approach is needed to build resilience into technology operations. “Security Should Be an Enabler” talks about an architectural approach that distributes only relevant data to appropriate tools, enabling an adaptable, simplified model at a reduced cost. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Download the Gigamon white paper, "Addressing the Threat Within: Rethinking Network Security Deployment," to learn how evolving cybersecurity threat conditions are changing the trust model for security. See how a structured and architectural approach to network security gives security solutions better access to network traffic while enabling them to scale cost effectively. Learn how a security delivery platform can be the foundational building block for deploying adaptable security solutions. Read now.
Tags : 
    
Gigamon
Published By: Spredfast     Published Date: Aug 24, 2018
Looking for a general primer or quick tactical reference on social marketing? We wrote the 2018 version of the Social Media Pocket Guide for you. In engaging, easy-to-read chapters, the Pocket Guide provides a broad overview of social media’s evolution — including current themes like pay to play, digital integrations, social care, and more. We also break down the latest tips and tactics for the four most common social objectives and explore specific use cases like product launches, events, and capitalizing on real-time trends. Do you learn by example? This guide is packed with fresh strategy inspiration from 15 different global brands and media properties. Keep The Social Media Pocket Guide on hand as your quick and definitive reference on all things social strategy.
Tags : 
social branding, social media branding, social media marketing courses, social media courses, social media management tools, social media monitoring, social media training, online marketing, social media manager, social media marketing companies, social media analytics, social media marketing, social media software, digital marketing, social media marketing tools, social media monitoring tools, social media agency
    
Spredfast
Published By: Pattern     Published Date: Jan 09, 2019
As an eCommerce professional you're always looking for ways to sell more online. With Amazon capturing roughly 49.1 percent of all online retail spend in the United States it is the perfect platform to boost sales and awareness of your products. But with the number of sellers and products added to Amazon every day, how can your product rank number one in an Amazon search? Our Ultimate Guide to Amazon SEO will give you the tips and tricks you need to make the most out of your Amazon product listings and get to the top of Amazon's search results.
Tags : 
    
Pattern
Published By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, agile development
    
Black Duck Software
Published By: Forcepoint     Published Date: Dec 27, 2018
Digital transformation has driven unprecedented connectivity throughout government agencies. Users want to work in dynamic applications that reside on premises, in the cloud or in a hybrid environment. They also expect to access data, including Controlled Unclassified Information (CUI), from anywhere - and from any type of device.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 03, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. Yet, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
We are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Watch this webcast where we examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Tags : 
analytics, behavioral analytics, ueba, insider threat, cybersecurity, predictive analytics, behavior analytics, security analytics, risk, risk adaptive
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
We are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Watch this webcast where we examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Tags : 
analytics, behavioral analytics, ueba, insider threat, cybersecurity, predictive analytics, behavior analytics, security analytics, risk, risk adaptive
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. Yet, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: BMC ASEAN     Published Date: Dec 18, 2018
From the impact of disruptive technologies to the imperative of digital transformation, businesses today must find new ways to innovate or risk being left behind. While data flowing rapidly between the Internet of Things and multi-cloud computing environments brings tremendous opportunity, there’s also a great deal of complexity. Artificial intelligence (AI) and machine learning (ML) are part of the new wave of solutions capturing the minds of enterprise leaders to respond to these new opportunities and complexities. Digitally literate leaders who are highly cognizant of this wave, are jumping in headfirst and applying AI and ML to solve real business challenges—making enterprise goals of enabling cost savings via smarter operations and decision making come to fruition. BMC Cognitive Service Management (CSM) addresses the complexities of multi-cloud computing by applying intelligence, automation, and predictive capabilities. CSM employs a differentiated approach with a more holistic
Tags : 
    
BMC ASEAN
Published By: Okta APAC     Published Date: Dec 19, 2018
Multifactor authentication (MFA) is a critical security requirement for every organization, regardless of size and industry. But not every MFA solution is created equal. Your investment in MFA should be well-thought-out. Not only does your chosen MFA solution need to meet the requirements you have today, but it needs to enable and secure the future growth and evolution of your business. This evaluation guide will help you understand the key factors you need to consider when investing in MFA. Your MFA choice determines how well you can protect access to all your internal resources, as well as your ability to provide frictionless experiences for your internal employees and external customers. Your MFA choice also impacts your ability to grow your business and take advantage of emerging technologies and future innovations. As part of Okta’s identity-led security framework, Okta Adaptive MFA delivers on the key considerations that need to be part of your search for a solution that meets a
Tags : 
    
Okta APAC
Published By: MuleSoft     Published Date: Nov 27, 2018
Today’s digital era places strain on traditional financial firms, including increased customer expectations, the threat of disintermediation by market entrants, strict regulatory requirements, and more. How do banks, who face operational silos and aging systems, keep up? The answer lies in building a digital platform with APIs. In this session, hear directly from seasoned technologists to learn about the approach, tools, and operating model they use to successfully adapt and lead in the marketplace. Discover how to get more out of your existing legacy and cloud infrastructure and, in turn, deliver a flexible architecture that can easily adapt as new technologies emerge. During this session, you will learn: Why industry disruptions and increased customer expectations demand a bank that transforms into a digital platform. How an API-led approach to integration can help financial firms transform into digital platforms. SunTrust’s journey with MuleSoft’s Anypoint Platform and Salesf
Tags : 
    
MuleSoft
Published By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
    
CrowdStrike
Published By: Extensis     Published Date: Jun 08, 2010
Metadata Management is the process of ensuring that all metadata associated with a digital asset is captured, organized, stored and made available for use by and within other applications. Metadata Management begins at the moment the digital asset is created by an application or captured by digital imaging.
Tags : 
metadata, management, extensis, digital asset management'
    
Extensis
Published By: AdaptivCOOL     Published Date: Jan 11, 2012
The Effects of Real-time Airflow & Cooling Management
Tags : 
data center
    
AdaptivCOOL
Published By: Precision Fiber Products     Published Date: Sep 19, 2012
Global Supplier of quality fiber optic products: PM connectors, optical attenuators, adapters, ferrules, MIC patch cords & cable assemblies, polishing film, fixtures, Miller tool kits & more.
Tags : 
    
Precision Fiber Products
Published By: UMEED SOFTWARE SOLUTIONS PVT LTD     Published Date: Feb 18, 2013
OUR ORGANIZATION IS A PRIVATE LIMITED COMPANY AND EXTREMELY SOUND IN SOLAR PV APPOINTMENT SETTING/SURVEY,EVERY INFORMATION GETS CAPTURED VERY CAREFULLY SO THAT THOSE ARE QUALIFY-PRO AND REAL TIME CONVERTIBLE.
Tags : 
    
UMEED SOFTWARE SOLUTIONS PVT LTD
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.