mine

Results 201 - 225 of 1513Sort Results By: Published Date | Title | Company Name
Published By: Google     Published Date: Oct 26, 2018
Modernizing your data warehouse is one way to keep up with evolving business requirements and harness new technology. For many companies, cloud data warehousing offers a fast, flexible, and cost-effective alternative to traditional on-premises solutions. This report sponsored by Google Cloud, TDWI examines the rise of cloud-based data warehouses and identifies associated opportunities, benefits, and best practices. Learn more about cloud data warehousing with strategic advice from Google experts.
Tags : 
    
Google
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisation’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Google     Published Date: Jan 24, 2019
Modernizing your data warehouse is one way to keep up with evolving business requirements and harness new technology. For many companies, cloud data warehousing offers a fast, flexible, and cost-effective alternative to traditional on-premises solutions. This report sponsored by Google Cloud, TDWI examines the rise of cloud-based data warehouses and identifies associated opportunities, benefits, and best practices. Learn more about cloud data warehousing with strategic advice from Google experts.
Tags : 
    
Google
Published By: IBM     Published Date: Jul 13, 2012
The new, more accessible workplace needs to be, in a word, manageable. This IBM white paper examines how today's workplace can ultimately help create greater enterprise value and offers best practice for how to best harness a flexible workplace to improve the effectiveness and efficiency of enterprises and institutions.
Tags : 
ibm, technology, workplace, budget, security, productivity, white paper, business technology
    
IBM
Published By: Workday UK     Published Date: Jan 31, 2019
Are you a finance leader looking to get on track with digitisation? With insight from over 650 global finance leaders, this report examines the top priorities for financial transformation and provides a valuable road map for successfully redefining the finance function. Download the report now.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday UK
Published By: Qualys     Published Date: Jul 20, 2012
Vulnerability Management (VM) means systematically finding and eliminating network vulnerabilities. Choosing a solution for VM is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security. This checklist from Qualys provides a 12 point shortlist of considerations to determine what solutions will work best for your organization.
Tags : 
technology, security, vulnerabilities, internet, virus, solutions, vulnerability management, business technology
    
Qualys
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Get a closer look at the roles of collaboration, self-service and engagement as we examine the results of a recent CMSWire survey.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: IBM     Published Date: Mar 13, 2014
This report will discuss IBM EXA efforts and technologies, examine the features and capabilities that new X6 solutions deliver and consider how these offerings will benefit midmarket and enterprise customers and impact the broader market.
Tags : 
ibm, server design, memory, processor, software, processing power, data, exa, enterprise, business technology
    
IBM
Published By: Rackspace     Published Date: Feb 01, 2019
Whether you’re already a Google customer or simply getting started with the public cloud, Google Cloud Platform (GCP) is an aordable, reliable, innovative and intuitive cloud solution. Rackspace can help you accelerate innovation and cost savings by taking over the intensive dayto-day operations of GCP — letting you focus on achieving your core business objectives while optimizing the performance of your applications. Rackspace works with customers to identify the scope and criticality of their applications and determine the service level that best addresses their needs. To discover how, download this whitepaper today.
Tags : 
    
Rackspace
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
In this Magic Quadrant, Gartner examines the role of SSL VPNs in remote access and the state of the market. Read this report to learn how to evaluate the suitability of SSL VPNs in a range of remote-access use cases.
Tags : 
ssl vpn, virtual private networks, magic quadrant, remote access, business technology
    
F5 Networks Inc
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring
    
Blue Coat Systems UK
Published By: Genesys     Published Date: Dec 11, 2013
Gartner recently released its Magic Quadrant for Contact Center Workforce Optimization, the annual report analyzing the workforce optimization industry. Gartner positions vendors based on Completeness of Vision and Ability to Execute. Genesys improved its 2013 position moving from Niche Player to the Challengers Quadrant. This report provides you with insights you need to determine the Workforce Optimization Solution that is right for your organization. Read Now.
Tags : 
wfo, strategic planning, recruitment, workforce management, wfm, call recording and quality management, performance management, surveying, interaction analytics, magic quadrant, workforce optimization, genesys, networking, knowledge management, business technology
    
Genesys
Published By: NetApp     Published Date: Nov 20, 2014
As business requirements drive the need for a hybrid cloud strategy, companies must determine how best to run their applications and manage their data—whether in their private data center, near the cloud, or in the cloud. Hyperscale cloud providers offer excellent flexibility by allowing customers to buy raw resources in a consumption model by the hour.
Tags : 
hybrid cloud, applications, data management, private data center, consumption model, data center
    
NetApp
Published By: SumTotal Systems     Published Date: Oct 10, 2013
What you see isn’t always what you get with HR, talent, and learning software. Did you know that, even with the rigour frequently put into selection, two-thirds of HR software projects fail to produce at least half of the expected benefits? Or how about that a recent research project from Clarkson University determined that there was no link between HR software and HR’s ability to be more strategic? Even though HR technology is often sold as “best practices in a box,” looks can be deceiving. To avoid being duped by pretty demos of software with no substance and find a partner that can meet the hidden complexities that exist in your unique processes, you need to ask the right questions.
Tags : 
sumtotal, sumtotal systems, hr technology, hr buyers, hr technology buyers, human resources, hr software, strategy, decision making process, it management, business technology
    
SumTotal Systems
Published By: Cisco     Published Date: Jun 04, 2015
This paper examines how the increasingly ubiquitous connectedness of our IoE world can help provide public safety and justice agencies with new opportunities to meet and overcome the challenges they face.
Tags : 
ioe, public safety, justice, emergency response, networking
    
Cisco
Published By: Cisco     Published Date: Sep 15, 2015
This paper examines how the increasingly ubiquitous connectedness of our IoE world can help provide public safety and justice agencies with new opportunities to meet and overcome the challenges they face. It specifically examines this topic through applications in law enforcement, emergency response, corrections, courts, and national security, and shows how IoE can help transform agencies to better protect citizens and make communities safer. Finally, this paper will provide recommendations on strategy implementation to enable agencies to take the next steps.
Tags : 
public safety, iot, law enforcement, emergency response, strategy
    
Cisco
Published By: Dyn     Published Date: Mar 30, 2016
IPM offers unparalleled visibility across the Internet allowing you the ability to optimize infrastructure costs, mitigate risk, and protect your revenue. Unlike APM and NPM which only provide visibility into your applications or internal network respectively, IPM provides a complete end-to-end view of the public Internet so you can: - Decide where to host content and applications for top performance - Determine the impact website partners, such as cloud providers and ISPs, have on web responsiveness - Identify optimal cloud hosts, NSPs, CDNs, and SaaS providers for Internet traffic, by region - Monitor and measure service provider performance and SLA compliance
Tags : 
dyn, internet performance management, online performance, ipm, apm, npm
    
Dyn
Published By: Arbor Networks     Published Date: Mar 13, 2015
Enterprises are under attack. Any business that depends on the Internet is a target for distributed denial-of-service (DDoS) attacks, which overload a network and its components, effectively shutting down the network. These attacks are more than an inconvenience — they can harm an organization's reputation or, worse, cost lots of money in lost customers, revenue, and data. This Technology Spotlight describes DDoS attacks and their rise in the business market. After a discussion of the costs of these attacks and current mitigation solutions, the paper examines Arbor Cloud, a DDoS service from Arbor Networks. This Technology Spotlight also provides advice for organizations evaluating DDoS mitigation solutions.
Tags : 
ddos, network, enterprise
    
Arbor Networks
Published By: Monetate     Published Date: Sep 30, 2014
One company dominates all the rest in the quest for consumer budgets—Amazon. The secret to this success is laser-focused on one objective: delivering a customer experience that converts. But how do they do it? This white paper examines five features and sales tactics that Amazon uses to convert shoppers (and five tactics it doesn’t use) to show you how you can achieve equal?or even higher?growth rates than Amazon.
Tags : 
online retail, amazon, customer experience, sales tactics
    
Monetate
Published By: Dell     Published Date: Feb 02, 2018
Technology is quickly moving to the forefront of business priorities as organizations undertake digital and IT transformation projects that enable strategic differentiation in a world where users leverage applications and data in new ways. Organizations in all industries must better align with changing customer preferences to avoid being disrupted by a new crop of nimble competitors. Technology will increasingly determine how businesses define and distinguish themselves in the market. IDC has noted that most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on an IT transformation initiative to modernize and automate their legacy infrastructure to prime themselves to achieve their digital business goals and initiatives
Tags : 
    
Dell
Published By: CA Technologies     Published Date: Jul 13, 2015
Issuers need to balance eCommerce payment transaction security and a smooth customer checkout experience. The crux of the matter is how to provide a seamless checkout experience for legitimate customers so they won’t abandon their transaction or use a different form of payment while at the same time stopping illegitimate attempts to transact. The use of behavior-based authentication to determine which transactions should be impacted by requiring the customer to go through additional means of authentication is critical for reducing customer friction while creating better assurance that the transaction is legitimate. Rules are an important component when providing this risk- and behavior-based authentication. When models are added, and used to guide the application of risk-based rules, the impact upon illegitimate authentication attempts can be greatly increased while the impact on legitimate customers is decreased, providing a better experience for the cardholder and loss reduction for
Tags : 
ecommerce, 3dsecure, risk analytics, behavioral
    
CA Technologies
Published By: Storiant     Published Date: Feb 09, 2015
This report examines the issues that are driving organizations to replace older archive and backup-and restore systems with business continuity and always-available solutions that can scale to handle extreme data growth while leveraging a cloud-based pricing model. The report also looks at the role of Storiant and its long-term storage services solution in the strategically important long-term storage market.
Tags : 
storiant, storage, data management, storage solutions, storage services, backup, recovery, it management
    
Storiant
Published By: NetApp     Published Date: Nov 13, 2017
This easy to read eBook examines the benefits of cloud backup solutions and features examples of companies that are using cloud storage to reduce costs and increase operational efficiency.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Mar 05, 2018
This architecture comparison examines five essential criteria to consider when evaluating flash arrays. Find out the key design differences between the Dell EMC X2 and NetApp AFF flash storage systems and how they compare in terms of scalability, quality of service, application integration, future-proof architecture and cloud integration.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Okta     Published Date: May 11, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
    
Okta
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.