asp

Results 301 - 325 of 564Sort Results By: Published Date | Title | Company Name
Published By: Kaspersky     Published Date: Jul 22, 2016
Learn how you can maximize the performance and security of your virtualized machines.
Tags : 
kaspersky, virtual security, virtual environment, data breach, data protection
    
Kaspersky
Published By: Kaspersky     Published Date: Jul 22, 2016
Do you have policies and plans in place to meet your user’s needs while keeping those devices—and your company’s sensitive information—secure?
Tags : 
kaspersky, byod, mobile device management, mobile workers, mobile security, remote security
    
Kaspersky
Published By: IBM     Published Date: Jul 20, 2016
A successful business case is one that enables your organisation’s business leaders to make the right decisionabout a Talent Analytics investment. In this report we highlight the key aspects you need to think about as you create your own business case for Talent Analytics, starting with getting a clear handle on why it is a worthwhile investment for your organisation, but also addressing considerations such as budget and resourcing concerns, how you can measure the success of your initiative and demonstrate ROI, and the major risks you need to bear in mind over the lifetime of the initiative.
Tags : 
ibm, mwd advisors, talent analytics
    
IBM
Published By: Cisco     Published Date: Jul 08, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
    
Cisco
Published By: Equinix     Published Date: Jul 06, 2016
Internet delivery and cloud hosting has transformed all aspects of content and media value chain, impacting how content is created, managed and delivered. Consumers now demand content on any device at any time, regardless of the network they are using.
Tags : 
media, media companies, broadcasters, content, create content, audience, deliver content, content management, create content, equinix, content performance, content performance hub, generate content
    
Equinix
Published By: IBM     Published Date: Jul 06, 2016
Web content management remains a vibrant and growing market, fueled by the aspirations of digital strategists on the demand side and continuous innovation on the supply side. IT application leaders, marketers, digital experience specialists and merchandisers all now view WCM as mission-critical.
Tags : 
ibm, mobile, applications, apps, mobile apps, customer engagement, it application, wcm, innovation
    
IBM
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015.1 However, only half of enterprises today are using some type of endpoint backup.2 That means that the volume of endpoint data that is in jeopardy is nothing short of significant.
Tags : 
encryption, data loss prevention, mobile app
    
Commvault
Published By: Puppet     Published Date: Jul 05, 2016
Our recorded Windows webinar series covers all the basics and more to help you get started with Puppet. Each 45-minute recording focuses on a specific task you can automate with Puppet, as well as a demo of how it works. You’ll learn how to use automation to: • Manage local groups and Active Directory membership. • Manage Windows services, install packages and create scheduled tasks. • Deploy IIS and ASP.NET. • Set up Windows for system and application monitoring. • Get started on Azure with Puppet. Puppet can do a lot, so start small and build on each success. Enjoy the demos!
Tags : 
    
Puppet
Published By: Cisco     Published Date: Jun 21, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
    
Cisco
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
Chemist warehouse is one of Australia's most remarkable business success stories, doubling sales and growing its national store network from 100 to more than 400 stores in just five years.
Tags : 
kaspersky, kaspersky endpoint security, security, security application, kaspersky solutions, security solutions
    
Kaspersky Lab Australia and New Zealand
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The school has a reputation for innovation and makes extensive use of technology to educate its students and to prepare them for the technologies which help shape the world of both work and higher education.
Tags : 
technology innovation, technology, technology for education, byod, education
    
Kaspersky Lab Australia and New Zealand
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
This white paper explains the benefits of using Kaspersky Security for Virtualization and its Light Agent technology.
Tags : 
security application, virtualisation, security, kaspersky, security solutions
    
Kaspersky Lab Australia and New Zealand
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
Download this paper now to learn how you can prevent such an attack and protect your business
Tags : 
prevent cyber-attacks, cyber-attacks, security application, security
    
Kaspersky Lab Australia and New Zealand
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.
Tags : 
security application, data centers, data, cyber-attacks, security, prevent cyber-attacks
    
Kaspersky Lab Australia and New Zealand
Published By: HPE     Published Date: Jun 06, 2016
This white paper presents a comprehensive guide to improving data backup and recovery, and looks at 5 key considerations for small and midsized businesses when looking at the modernization of different aspects of their production.
Tags : 
data, data recovery, data backup, midsized business
    
HPE
Published By: Siemens     Published Date: Jun 01, 2016
Researchers in the occupational electrical medical emergencies show that in a six-year period 32,840 serious but non-fatal injuries occurred, some 60% involving electric shock and 40% involving electric burns. Obviously, the electric shock injuries occurred in relation to low voltage equipment since electric shock in relation to medium voltage equipment is as a rule fatal. It is reported that in the U.S., annually about 2000 arc burn related injuries occur and require hospitalization. Thus, the impact of such injuries on workers becomes a major concern in itself, beyond the economic aspects which are not to be ignored.
Tags : 
siemens, arc defense, fault-resistant, medium voltage, electrical emergency
    
Siemens
Published By: VMware AirWatch     Published Date: May 24, 2016
Negli ultimi anni, con il diffondersi dei dispositivi mobili nelle imprese il termine “BYOD” è diventato di uso comune negli ambienti di lavoro. Tuttavia, oltre a rappresentare un trend, il suo significato va ben oltre quello letterale dell’acronimo. Il BYOD costituisce un aspetto di un trend molto più ampio e radicato: la consumerizzazione dell’IT, le cui origini risalgono ai primi anni 2000. In quel periodo, la maggior parte delle persone disponeva di un PC con cui lavorare da casa oltre l’orario di ufficio, sfruttando tutti i vantaggi derivanti dall’uso di dispositivi di propria scelta, più agevoli da impiegare rispetto a quelli aziendali forniti dai reparti IT. I fenomeni del BYOD e della consumerizzazione dell’IT hanno continuato a crescere parallelamente alla riduzione dei prezzi dei dispositivi e al miglioramento delle caratteristiche di connettività.
Tags : 
best practices, business optimization, business management, program management
    
VMware AirWatch
Published By: illusive networks     Published Date: May 18, 2016
The only way to stop cyber attackers in their tracks is to learn to think like an attacker. To give you better insight into what tools attackers are using, we've compiled a list of 15 "must-have" tools for aspiring attackers. Download this guide and learn about Open source tool cyber attackers use, such as Kali Linux and Wireshark, Password cracking tools that automatically test all possible combinations , and Tools such as Nmap, which lets users "map" a target network and its ports.
Tags : 
    
illusive networks
Published By: Kaspersky     Published Date: May 11, 2016
You don't have to be a victim of ransomware. Get the facts you need to protect your company.
Tags : 
kaspersky, ransomware, encyyption, data access, email security, company security
    
Kaspersky
Published By: Kaspersky     Published Date: May 11, 2016
As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.
Tags : 
kaspersky, cybercrime, cyber attack, ddos, hackers, roi, security breach, firewall, mobile security
    
Kaspersky
Published By: Kaspersky     Published Date: May 11, 2016
This whitepaper describes the different virtualization security solution options—conventional agent-based; agentless; and Light Agent— as well as possible scenarios for aligning the right security approach to your organization’s virtual environment.
Tags : 
kaspersky, virtualization security, security management, light agent
    
Kaspersky
Published By: SolidFire_NetApp     Published Date: May 10, 2016
Ultimate Software is a leading cloud provider of comprehensive human capital management (HCM) solutions delivered via Software as a Service (SaaS). More than 2,800 customers with employees in 150 countries count on Ultimate’s award-winning UltiPro® suite to unite all aspects of HR, payroll, and talent management throughout the employee life cycle, all supported by powerful reporting and analytics.
Tags : 
software, network management, network solutions, best practices, business intelligence, productivity, business optimization
    
SolidFire_NetApp
Published By: Cisco     Published Date: Apr 18, 2016
If you’re like most people, the reason you’re looking at OpenStack for a private cloud is because your developers fell in love with public cloud, and you want to give them the same experience, but with better economics, control, and performance of a private cloud. The reality is that instead of looking to replicate the public cloud experience, privately, we often run in to people that want to fiddle with every aspect of the infrastructure and OpenStack® itself. Companies start off looking for a public cloud experience, but quickly become more interested in the choice of hypervisor, network models and storage architecture -- none of which are even up for discussion in a public cloud. These questions aren’t wrong to ask, they just shouldn’t matter to you. What should matter is the experience your developers will have in your private cloud, how your apps will run, and how your private cloud will integrate with your existing systems and apps.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 04, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
cisco systems, mobility, going digital, midsize businesses, smb, mobility infrastructure
    
Cisco
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.