management information

Results 351 - 375 of 475Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: May 04, 2017
Should you modernize with Hadoop? If your goal is to catch, process and analyze more data at dramatically lower costs, the answer is yes. In this e-book, we interview two Hadoop early adopters and two Hadoop implementers to learn how businesses are managing their big data and how analytics projects are evolving with Hadoop. We also provide tips for big data management and share survey results to give a broader picture of Hadoop users. We hope this e-book gives you the information you need to understand the trends, benefits and best practices for Hadoop.
Tags : 
    
SAS
Published By: Q1 Labs     Published Date: Feb 01, 2012
Is it time? Are you waving the white flag? Has your first gen SIEM failed to meet expectations despite your investment? If you are questioning whether your existing product or service can get the job done, you are not alone. Read this Securosis white paper to learn how easy it can be to replace your SIEM with a next generation solution.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
In this study, IANS interviewed two Q1 Labs customers using QRadar to assess their Return On Security (ROS). The two customers were providers of service to the U.S. Government and had highly secure environments dealing with extremely sensitive data. The data yielded from the interviews showed substantial benefit to the organizations for the cost, both in money and staff time.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, continuous monitoring
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
A leading retailer with stores worldwide was seeking a more innovative tool to protect customer privacy and intellectual property. PCI compliance mandated log collection, but a vast number of different tools generated an overwhelming amount of log data, making it difficult for the small security team to review it effectively. The solution the company chose had to fit into a diverse network, provide intelligent reporting and offer a centralized management console.
Tags : 
siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, pci compliance, log management, log data, log management solution
    
Q1 Labs
Published By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence, it security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, log management solution, threat detection, fraud prevention, risk management
    
Q1 Labs
Published By: IBM     Published Date: Aug 21, 2013
Enterprise Marketing Management, or EMM, is a software technology solution for marketing organizations that provides a comprehensive marketing platform for managing customer and prospect interactions throughout the customer lifecycle. Before introducing the IBM® Enterprise Marketing Management suite, here are some recent observations about today’s marketing environment that set the context in which IBM is seeking to meet the needs of marketers. The practice of marketing is challenging these days because of the rise of the “empowered customer.” Today’s customers are well-informed, use other people as their primary information source, interact with companies through multiple channels, touch points and media, and want (but rarely get) a superior customer experience—and have outlets for venting frustration when they don’t get what they want.
Tags : 
marketing, enterprise marketing management, interactive marketing, marketing channels, emm, ibm, customer relationship management, marketing environment, marketing landscape, customer experience, crm, business technology
    
IBM
Published By: Hewlett-Packard Company     Published Date: May 15, 2014
Traditional server management and provisioning can create unnecessary burdens for many organizations. Information technology (IT) administrators in today’s business environments need a more streamlined process to manage servers throughout the IT life cycle, including tools to help them diagnose problems and procedures for efficiently resolving errors. This white paper provides an in-depth look at the key capabilities of HP Integrated Lights-Out (iLO) embedded in every ProLiant Gen8 server, the solution’s scalable licensing offerings, and mobile-app features that support IT staff—anywhere, anytime.
Tags : 
server management, ilo, proliant gen8 server, it management
    
Hewlett-Packard Company
Published By: DocuSign     Published Date: Apr 12, 2017
In the last decade, customer relationship management (CRM) platform adoption has increased rapidly to meet the speed of business. Enterprises of all sizes and types are adopting CRMs as the norm. CRMs offer a single source of customer information and reduction in paper. Most importantly, they allow companies to do business more rapidly and with greater agility. Read this eBook to learn how you can extend the value of your CRM system to see increases in operational efficiency, lead conversion, customer satisfaction, and sales revenues.
Tags : 
    
DocuSign
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Mar 03, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: IBM     Published Date: Oct 22, 2013
Info-Tech Research Group Vendor Landscape reports recognize outstanding vendors in the technology marketplace. This report notes that "IBM offers a comprehensive suite of products aimed at testing the most demanding and complex apps." For more, download the report today.
Tags : 
ibm, info-tech, quality management, test champion report, microsoft, parasoft, software testing, vendor selection, market share, vendor landscape, infrastructure testing, future changes, development platform toolset, leveraging tool, testing functionality, product selection, vendor selection, information gathering, software testing solutions
    
IBM
Published By: IBM     Published Date: Feb 27, 2014
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, ibm software, systems engineering, business agility, smart products, traceability, engineering information, collaboration, engineering disciplines, business objectives, change management, compliance standards, systems age, engineering process, information integration, communication, it management
    
IBM
Published By: Marketo     Published Date: Jul 12, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders
Tags : 
access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
    
Marketo
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault
Published By: Schneider Electric     Published Date: Jun 07, 2019
Because electricity is a key commodity for business it represents significant financial risk. Yet many power management systems remain isolated and separate from the rest of the business enterprise. The result is poor access to incomplete information, with only limited knowledge of risk exposure. An integrated, comprehensive power management system that includes metering, software, and power quality mitigation equipment offers the most holistic, systems-based approach to managing this risk exposure.
Tags : 
financial risk, power management system, quality migration, schneider electric, pms
    
Schneider Electric
Published By: Clearvale by BroadVision     Published Date: Aug 21, 2009
This white paper considers the drivers behind the move to e-government, the need for relationship management and the complexity of e-government value chains. It also outlines a solution that government entities can deploy to address this top priority of information management and sharing.
Tags : 
collaboration, egovernment, government, e-government, customer relationship management, constituent, constituents, citizens, citizen, information management, broadvision
    
Clearvale by BroadVision
Published By: Creekpath     Published Date: Aug 21, 2009
There is an impression today that Information Lifecycle Management is a new concept. Management of the information lifecycle has been with us since the dawn of the computer age. While recent legislation and shifts in media cost have spawned a mini-boom in replication start-ups and new storage technologies, the fundamentals of information management have not changed.
Tags : 
information lifecycle, project life cycle, information lifecycle management, ilm, storage, information management, creekpath
    
Creekpath
Published By: Creekpath     Published Date: Aug 21, 2009
Imagine a world where storage management is simplified; everything works together; there are no configuration issues when upgrading, and vendors all cooperate to allow information to be easily stored and retrieved seamlessly. This was a reality in the mainframe world, but the deployment of open systems shattered these concepts.
Tags : 
virtualization, storage virtualization, storage management, storage array, storage arrays, creekpath, storage, data management
    
Creekpath
Published By: Datalink     Published Date: Aug 21, 2009
In this paper we look at how these two challenges must be addressed together, and in fact how the definition of storage management must be expanded to consider the business driven lifecycle demands placed on stored information.
Tags : 
information management, enterprise resource planning, enterprise software, storage management, project life cycle, ilm, erp, integration, datalink
    
Datalink
Published By: IBM     Published Date: Dec 12, 2006
This white paper addresses the value of a company’s ability to integrate, analyze and optimize all types and sources of information throughout the product life cycle. 
Tags : 
it spending, product lifecycle management, data integration, data analysis, plm, product information management, data management, mdm, master data management, ibm
    
IBM
Published By: IBM     Published Date: Dec 12, 2006
This white paper will examine the potential of a technological breakthrough to reduce trust-based risks and change the way organizations reach a harmonious balance between consumer privacy and information sharing.
Tags : 
identity management, compliance, knowledge management, contact management, information management, privacy, customer privacy, privacy policy, privacy policies, ibm
    
IBM
Published By: IBM     Published Date: Dec 12, 2006
This case study outlines their success in achieving global simultaneous product launches, correct information for catalogs and advertising, faster price change notifications and better Point of Sale (POS) integration.
Tags : 
data integration, product lifecycle management, information management, sales & marketing software, collaboration, business management, catalogging, catalog, cataloging, product information management, ibm
    
IBM
Published By: IBM     Published Date: May 29, 2008
The lack of trusted information - information that is accurate, timely and relevant - is on the minds of CEOs and senior executives around the world. The cost and complexity of managing increasing volumes of data and content, combined with the need to provide trusted information to every user for every transaction, is driving CIOs to rethink their approach to information delivery.
Tags : 
information management, data management, best practices, ibm, ibm li, li campaign, leveraging information
    
IBM
Published By: IBM     Published Date: May 30, 2008
This white paper, authored by industry analyst IDC, explores the problems confronting IT organizations today as they seek to bring data together from disparate sources in order to achieve better information coherence, operational efficiency, and more effective overall governance. Specifically, the paper considers the problems posed by the complexity of "data integration" technology in terms of its configuration and maintenance. It looks at the utility of a grid computing approach in providing scalability and manageability for "data integration" and considers how an appliance approach can further reduce cost and risk for customers.
Tags : 
information management, data integration, blade server, ibm, leveraging information, ibm li, li campaign, data management
    
IBM
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.