hr cloud

Results 251 - 275 of 622Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Mar 29, 2017
Not just some data—all of it. Internal, external, structured, unstructured, historical, real-time. And what if you could do it without a huge infrastructure project? You can. Take a closer look at how three companies capitalized on more data—almost instantly—with IBM® BigInsights® on Cloud.
Tags : 
analyze, data, cloud, ibm, analytics
    
IBM
Published By: Arbor     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.
Tags : 
cyber threats, security, ddos, data breaches, atlas, frost & sullivan, cloud, hosting, cloud computing, network
    
Arbor
Published By: KPMG     Published Date: Jul 10, 2018
The Oracle and KPMG cloud threat report 2018 provides an up-to-date review of the cybersecurity implications and challenges of rapid cloud adoption. Is your organisation prepared? Read this report to find out: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
    
KPMG
Published By: EMC Corporation     Published Date: May 27, 2014
Explore three key Cloud computing models—integrated infrastructure systems, reference architectures, and “build your own” solutions. See how EMC gives you the freedom to chose the optimal path to your private Cloud—and the solutions to support your deployment.
Tags : 
emc, cloud computing, hybrid cloud, private cloud, cloud infrastructure, itaas, it-as-a-service, it services, cloud architecture
    
EMC Corporation
Published By: Brightcove     Published Date: Sep 17, 2014
Salesforce ExactTarget Marketing Cloud, a digital marketing company, adopted Brightcove’s Video Cloud to manage the development and publication of video content to its Web site through a custom video portal to increase user engagement and increase the amount of time users spend learning about the brand. Nucleus found that using Brightcove enabled ExactTarget Marketing Cloud to better leverage its online video presence to increase its engagement with users and more effectively manage its digital brand.
Tags : 
digital marketing, video content, online video presence, custom video portal, emerging marketing, interactive marketing, marketing software
    
Brightcove
Published By: Citrix Systems     Published Date: Sep 17, 2015
While the Google Chrome platform is ideal for accessing Google Apps, SaaS and other cloud-based services, Microsoft Windows applications continue to play an essential role in most organizations. Read this paper to learn more.
Tags : 
google chrome, windows, cloud, microsoft
    
Citrix Systems
Published By: IBM     Published Date: Jul 13, 2012
Read through this essential resource to uncover the benefits of a cloud-based approach to disaster recovery. Don't put your enterprise at risk by practicing DR methods that require you to compromise.
Tags : 
ibm, technology, cloud computing, organizations, virtualizing, recovery, cloud
    
IBM
Published By: Oracle     Published Date: Apr 27, 2015
In order to ensure that your modern procurement solution supports a modern approach, we've outline 5 primary tenets of a modern procurement solution through the cloud.
Tags : 
ppm, oracle, transformative projects, project portfolio management, analytics, optimization, erp, cloud computing
    
Oracle
Published By: Oracle     Published Date: Jul 31, 2017
Migrating finance and HR systems to the cloud improves collaboration and saves more than expected. A recent global survey conducted by MIT Technology Review Custom—in partnership with Oracle—explores the motivations, benefits, and rewards that result from deploying finance and HR systems in the cloud.
Tags : 
    
Oracle
Published By: Salesforce.com     Published Date: Jul 02, 2014
With today's financial advisors and wealth managers facing such tough competition, the ability to thrive comes through maximizing efficiency and finding innovative ways to maintain and grow business. This white paper highlights how technology is a great partner for meeting this need: • Create more relevant interactions with customers by tracking your business in the cloud • Connect to your customer information from any mobile device • Increase sales to your customers with a deeper understanding of their needs Download this white paper to learn more!
Tags : 
salesforce.com, customer tracking, business in the cloud, financial advisors, wealth managers, mobile devices
    
Salesforce.com
Published By: Equinix     Published Date: Oct 27, 2014
The businesses that thrive amid fluctuating technology demands are not only keeping a finger on the pulse of current trends, they have the infrastructure in place to handle whatever changes might come. And they’re doing so by treating their data centers as a strategic asset—a hub from which providers and performance can all stem. Are you ready for what’s next? According to analyst forecasts and IT executives, the five key trends affecting our state of technology are mobility, consumer technology, cloud services, hyperdigitization and globalization. In the following pages, you’ll learn how these bgtrends are affecting current networks, and why a strategic data center is key to not only surviving, but thriving, today and in the future.
Tags : 
data center, enterprise, cloud, experience, hybrid, performance, strategy, interconnectivity, network, drive, evolution, landscape, server, mobile, technology, globalization, stem, hyperdigitization, consumer
    
Equinix
Published By: Amazon Web Services and Intel     Published Date: Oct 07, 2015
In today’s highly digital ecosystem connecting with the right customers has become more challenging. With the explosion of web-connected devices, connecting with users through the method they prefer has become more demanding. Download this case study to see how the right cloud-based solution can successfully deliver highly targeted and relevant ads in order to help build ad revenue, enhance marketing and open up exciting new business opportunities.
Tags : 
cloud-based solution, relevant ads, ad revenue, new business opportunities, digital ecosystem
    
Amazon Web Services and Intel
Published By: MobileIron     Published Date: Apr 11, 2018
MobileIron unified endpoint management (UEM) enables your employees to enjoy seamless access to business apps and data through secure mobile devices, desktops, and cloud services while still maintaining complete control over their privacy. Harness the power of secure modern devices, apps and cloud services to enable business innovation. With one app, enterprises can protect company data by detecting and remediating known and zero-day threats on the mobile device, and no need for users to take any action.
Tags : 
byod, strategy, endpoint, management, uem, business, applications, data, mobile, device
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, best, practices, endpoint, security, data
    
MobileIron
Published By: MobileIron     Published Date: May 07, 2018
Office 365, Microsoft’s cloud-based productivity suite, includes online versions of Microsoft’s most popular solutions, like Exchange and SharePoint, storage through OneDrive, and several mobile apps, including Word, Excel, PowerPoint, OneNote, Outlook, Publisher, and Skype for Business. Office 365 is central to Microsoft’s strategy as the company evolves into a mobile-first, cloud-first software and solutions provider. Many MobileIron customers are increasingly using Office 365 on mobile devices instead of on traditional PCs. Therefore the ability to secure and deploy Office 365 on mobile devices using MobileIron is a common requirement.
Tags : 
security, office, 365, mobileiron, microsoft, cloud, onedrive, business
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.
Tags : 
cloud, practices, audit, checklist, endpoint, security
    
MobileIron
Published By: MuleSoft     Published Date: Jan 25, 2016
IT used to be so simple. Companies owned their own technology equipment and purchased enterprise licenses for many of the applications anybody in the organization might care to use. But then the cloud emerged, and mobile, and social media, and IoT; the world of IT has never been the same. Today's businesses are software-driven enterprises with technology capability distributed throughout the company, utilizing countless third-party cloud-based applications. This new organization requires an cultural shift in the IT organization. Read this whitepaper to learn: -How businesses can reorganize themselves into lightweight, agile, modular businesses able to respond to innovations in SaaS, mobile, and analytics -How to build a technological architecture that can accommodate new technology yet still extract value from on-premises systems -The advantages of an API-led connected architecture vs. old SOA approaches
Tags : 
technology, enterprise applications, best practices, business optimization, technology architecture
    
MuleSoft
Published By: Oracle     Published Date: Jun 01, 2016
Many companies that sell online direct to consumers are evaluating whether they can better achieve their revenue and growth goals by either shifting their e-commerce infrastructure to the cloud, or by migrating to a more flexible and scalable SaaS solution that doesn't limit their growth. But what are some of the key considerations as you evaluate your options? Download this whitepaper to learn the 3 keys to igniting your business growth as you consider SaaS commerce solutions.
Tags : 
    
Oracle
Published By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod, cloud, credit union, email protection, hosted exchange, email security, messaging, cloud computing, dlp, encryption, data loss prevention, content filtering, email services
    
BAE Systems
Published By: SAP     Published Date: Jul 18, 2016
The SAP® BusinessObjects™ Cloud solution offers all analytics capabilities for all users in one product. In the boardroom, at the office, or in front of a customer, you can discover, analyze, plan, predict, and collaborate in one integrated experience designed expressly for the cloud. Read the solution in detail to learn how to turn instant insight into quick action.
Tags : 
    
SAP
Published By: AWS     Published Date: Nov 07, 2018
Enterprises seeking the security and performance capabilities of establishing their own private network are often turned away by the high cost and technical expertise required. AT&T NetBond® for Cloud helps establish private, dynamic connectivity from on-premises data centers to Amazon Web Services (AWS) in as little as 2-3 days. Aira, a customer focused on augmented reality, has leveraged the global connectivity capabilities of AT&T NetBond® to connect low vision or blind smart glasses users with a network of agents to guide the visually impaired through everyday tasks such as interpreting prescriptions. Download this case study with AT&T, Aira, and AWS to learn how AT&T NetBond® can accelerate your journey to the cloud, improve ROI and secure your applications. Join our webinar to learn - Why Aira chose AT&T NetBond® to establish a global network connecting smart glasses to trained, professional agents - Best practices for quickly shifting network capacity to meet changing demands
Tags : 
    
AWS
Published By: AWS     Published Date: Nov 07, 2018
To best support global users and customers, enterprises require seamlessly connectivity between branch office locations, applications, and workloads hosted in the cloud. Many WAN solutions are ill-equipped for this task because they are generally rigid, complex to configure, and expensive to maintain. IoT adoption, a dramatic increase of the number of network devices, and the sophistication of security threats further compounds this challenge. Geographically-distributed devices need secure cloud connectivity, limiting the ability of existing WAN solutions to fulfill the need of distributed organizations. Cisco SD-WAN on Amazon Web Services (AWS) is an overlay WAN architecture that is designed to address modern enterprise cloud applications and workloads, heterogeneous WAN connectivity, distributed global workforces, and other business needs that traditional WAN solutions cannot meet. Learn more by downloading this solution brief. Join our webinar to learn -How to migrate a data ce
Tags : 
    
AWS
Published By: AWS     Published Date: Dec 19, 2018
Cisco and Amazon Web Services (AWS) believe not only in making it simple to connect to the cloud, but also to protect your cloud services. Security is not just an on-premises or a cloud thing. It’s every-“thing” and everywhere. Gaining pervasive security means you need visibility across your entire IT environment to help you effectively identify and mitigate security threats. Cisco Stealthwatch Cloud provides scalable visibility and delivers secure network behavioral analysis across on-premises and AWS environments to help identify anomalous activity that could indicate a security threat. This self-learning security solution continually refines its behavioral models as it monitors your environment, ultimately improving its functionality and reducing the costs required for manual security checks and updates. Watch our webinar to learn how JetBrains increased transparency and reduced threat exposure by deploying Stealthwatch Cloud on AWS. Along with increased infrastructure protection,
Tags : 
    
AWS
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.