inter enterprise

Results 276 - 300 of 381Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Nov 12, 2015
Hear from the University of Michigan Health System’s CMIO, Dr. Andrew Rosenberg, to learn how this institution is achieving their goal for internal/external operability in support of their enterprise analytics roadmap to support its clinical, research, education and administrative missions. Learn more about the specific challenge's that were solved, how they integrated systems of record with medical devices, and hear about their plans for future integration.
Tags : 
ibm, big data, enterprise analytics, emr, research interfaces
    
IBM
Published By: SAS     Published Date: Mar 06, 2018
This interview survey explores enterprise readiness for artificial intelligence (AI). Respondents came from across EMEA and from a number of industries and sectors. Their views on AI and their organisations’ levels of readiness were diverse. Download this whitepaper to learn more!
Tags : 
    
SAS
Published By: SAS     Published Date: Jun 06, 2018
The Internet of Things (IoT) is rapidly emerging as a core transformational technology of the digital era. The ability to gather data from sensors embedded throughout an enterprise can drive insights and operational efficiencies from the supply chain to the customer. But IoT and Industrial IoT (IIoT) implementations require high degrees of IT/OT convergence - collaboration and integration between information technology and operational technology groups - to succeed. These two groups, however, often have different goals, performance metrics, and perspectives on both the collaboration and the outcome. This SAS/HPE-sponsored paper helps readers get a better understanding of the relationship, either real or perceived, between these two groups. Futurum Research surveyed the state of the relationship between IT and OT teams as it pertains to the design, implementation, and creation of value through IoT technologies.
Tags : 
    
SAS
Published By: BlackBerry     Published Date: Mar 03, 2009
Companies that are interested in securing their mobile workers and preventing unauthorized access to important company resources need to implement an enterprise wireless security strategy. Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
Tags : 
blackberry, mobile applications, mobile security, cio, pim, voip, smartphones, it communication
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server Express is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server Express integrates with your organization's existing infrastructure, which can include messaging software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources. You can install the BlackBerry Enterprise Server Express on the same server as Microsoft Exchange or Windows Small Business Server, or you can install the BlackBerry Enterprise Server Express on a separate server.
Tags : 
blackberry, server express, microsoft exchange, v5.0.1, administration guide, mobile applications, cio, pim
    
BlackBerry
Published By: Intermedia     Published Date: Nov 10, 2008
There are two main BlackBerry smartphone mobile connectivity options, and they are quite different. The first is the BlackBerry Internet Service, in which your mobile carrier acts as a liaison between your email and your BlackBerry smartphone. The second option is to use a BlackBerry Enterprise Server, which directly links your wireless device to your email, contacts, calendars and business applications— virtually automatically and almost instantly. If you’re using a BlackBerry smartphone solely for personal email, then a BlackBerry Internet Service account is all you need, and you can stop reading here. But if you’re a business user and are only using BlackBerry Internet Service, you’re leaving lots of important functionality unused.
Tags : 
intermedia, blackberry enterprise server, blackberry business user, blackberry internet service, blackberry smartphone
    
Intermedia
Published By: SERENA Software, Inc     Published Date: Jun 23, 2009
Lean BPM is focused on radically simplifying how business processes and management are delivered. Processes are designed quickly and easily by the business user closest to the problem. Working solutions are delivered incrementally to your users in record time. Serena delivers the easiest business process development. No coding. No consultants. No kidding.
Tags : 
serena, serena software, lean bpm, serena, serena software, working solutions, workflow, application
    
SERENA Software, Inc
Published By: Coveo     Published Date: Nov 13, 2013
In the health-care industry, every second counts. Learn how the Children’s Hospital of Boston uses Coveo to ensure clinicians and hospital staff easily local precise, critical patient care information.
Tags : 
internal knowledgebase, enterprise search, enterprise search solutions, unified search
    
Coveo
Published By: QTS Data Centers     Published Date: May 02, 2017
The Internet boom of the late 90s and early 2000s launched a mass migration of enterprises seeking the benefits of IT outsourcing. The emergence of virtualized infrastructure and cloud computing created a new business landscape of opportunities along with escalating challenges in capacity and complexity.
Tags : 
    
QTS Data Centers
Published By: GENBAND     Published Date: Apr 01, 2014
See how GENBAND offers CIOs of large multi-site enterprises effective ways to reduce telecom spend by leveraging their IP data networks for inter-site, intra-enterprise multimedia communication and consolidation of connectivity to service providers.
Tags : 
    
GENBAND
Published By: ForgeRock     Published Date: Oct 08, 2014
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : 
identity access management, dynamic iam solution, public-facing, secure, business enabler, revenue-generating services
    
ForgeRock
Published By: ForgeRock     Published Date: Mar 10, 2015
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : 
iam, forgerock, irm, relationship management
    
ForgeRock
Published By: Tripwire     Published Date: Mar 31, 2009
Learn the basics about security benchmarks, and specifically how the security benchmarks developed by the Center for Internet Security (CIS) can help you with your compliance initiatives.
Tags : 
center for internet security, cis, tripwire, compliance, internet security, cis-certified, framework, regulation
    
Tripwire
Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance
    
Tripwire
Published By: IBM     Published Date: May 19, 2015
This report focuses on how the 524 CMOs we interviewed are helping their enterprises become more “customer-activated.”
Tags : 
social media, search marketing agencies, content management systems, interactive marketing, web analytics, website/graphic design, crm & customer care, business intelligence
    
IBM
Published By: IBM     Published Date: Jul 22, 2016
This research report examines the key issues, and provides recommendations for leveraging data and analytics to help procurement drive greater enterprise value. Based on in-depth interviews with two dozen leading Chief Procurement Officers (CPOs), the report outlines pragmatic steps that every procurement organization can take to leverage analytics and improve engagement with suppliers and key business stakeholders across the enterprise.
Tags : 
ibm, commerce, procurement, analytics, procurement analytics, data, big data, procurement organization
    
IBM
Published By: IBM     Published Date: Jan 05, 2017
This research report examines the key issues, and provides recommendations for leveraging data and analytics to help procurement drive greater enterprise value. Based on in-depth interviews with two dozen leading Chief Procurement Officers (CPOs), the report outlines pragmatic steps that every procurement organization can take to leverage analytics and improve engagement with suppliers and key business stakeholders across the enterprise.
Tags : 
ibm, procurement, commerce, procurement analytics
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
Given the evolving way Web and Cloud applications are used—and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms of securing Internet access. It’s imperative to have effective compliance and company policy enforcement, and the use of a secure web gateway with advanced functionality is a key piece of an enterprise’s security architecture.
Tags : 
secure web gateway, web application, cloud application, encryption, web threats
    
Symantec
Published By: IBM MaaS360     Published Date: Apr 04, 2016
Learn how to become an enterprise mobility Mowglie. In today’s completely connected mobile jungle, many users and employees are accessing information from multiple devices and from many locations. Enterprise mobile management tools are becoming a must have for most businesses to survive and deliver an optimal experience. The MaaS360 suite from IBM allows for a robust app development platform where users can become mobile Mowglies and increase portability and interoperability. Download this e-book to create a failsafe Enterprise Mobility Survival Guide and build the best mobile environment for your users and employees.
Tags : 
ibm, mobile, management, guide, app development
    
IBM MaaS360
Published By: IBM     Published Date: Oct 02, 2015
In this report, Ponemon Institute presents findings from in-depth interviews with enterprises who switched to IBM Security QRadar from another Security Information and Event Management (SIEM) solution. The reports summarizes their rationale for switching SIEM providers as well as metrics on the deployment and performance in managing and containing network traffic anomalies.
Tags : 
ibm, security, qradar, siem, network traffic anomalies
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
In this report, Ponemon Institute presents findings from in-depth interviews with enterprises who switched to IBM Security QRadar from another Security Information and Event Management (SIEM) solution.
Tags : 
ibm, qradar, security, intelligence, siem, information and event management
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
In this report, Ponemon Institute presents findings from in-depth interviews with enterprises who switched to IBM Security QRadar from another Security Information and Event Management (SIEM) solution. The reports summarizes their rationale for switching SIEM providers as well as metrics on the deployment and performance in managing and containing network traffic anomalies.
Tags : 
ibm, ponemon institute, ibm security qradar, siem
    
IBM
Published By: IBM     Published Date: May 09, 2016
Understanding the impact and value of enterprise asset management: Implementing IBM Maximo Asset Management to enable success across your smarter infrastructure
Tags : 
ibm, watson, iot, internet of things, enterprise asset management, ibm maximo asset management
    
IBM
Published By: IBM     Published Date: Jun 28, 2016
Availability, performance, user interface... Nobody cares. The age of the enterprise is here! Customers are now automatically purchasing any product you release, ensuring the longevity of your enterprise.
Tags : 
best practices, competitive advantage, enterprise, productivity
    
IBM
Published By: IBM     Published Date: Oct 21, 2016
By next year over half of all US companies will formally support BYOD, bringing on the challenge of securing data and applications on devices that may often be in the hands malicious users, or worse – teenagers looking to win a game of Pokémon Go with mom’s work iPhone. And, thanks to the consumerization of IT, mobile users increasingly expect the same smooth user experience with business applications that is provided by popular games and consumer applications. Fortunately, increased mobility and the bring your own device explosion don’t always add up to increased security challenges and UI/UX struggles. This Tech Byte series will look at the most important considerations when planning a mobile strategy – from application development platform to security and governance to user interface guidelines, and present best practices that businesses of all kinds can use to help ensure a successful shift towards a mobile-first enterprise.
Tags : 
ibm, mobile, mobile security, devices, platform to device
    
IBM
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.