it ecosystem

Results 126 - 150 of 303Sort Results By: Published Date | Title | Company Name
Published By: MobileIron     Published Date: Nov 14, 2017
This paper covers some of the critical security gaps today’s mobile-cloud enterprises must address: • Unsecured devices. Unsecured devices allow users to easily access business data from mobile apps or cloud services simply by entering their credentials into an app or browser on the device. Once on the device, data can be easily compromised or shared with unauthorized, external sources. • Unmanaged apps. These typically include business apps, such as Office 365 productivity apps, that the user has downloaded from a personal app store instead of the enterprise app store. As a result, these apps are not under IT control but can still be used to access business content once the user enters his or her credentials. • Unsanctioned cloud services. Most enterprise cloud services have associated ecosystems of apps and services that integrate using APIs. While the enterprise cloud service might be sanctioned, apps and services from its ecosystem might not be.
Tags : 
    
MobileIron
Published By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
Our recent primary research project solicited feedback from respondents to determine familiarity with, and plans for use of Hadoop ecosystem components. Download this white paper to learn more.
Tags : 
    
Waterline Data & Research Partners
Published By: athenahealth     Published Date: Jun 08, 2015
In this white paper we demonstrate why CFOs must focus their attention on advancing along three distinct strategic tiers: 1) Optimizing the health system’s fiscal health. Even if it’s already good it needs to be even better to weather inevitable industry changes. 2) Thinking outside the walls of the health system by optimizing the ecosystem of providers, the system of care, and physician loyalty. 3) Optimizing the patient experience: harness the health system to deliver what patients value most.
Tags : 
cfo, finances, fiscal health, industry changes, optimization
    
athenahealth
Published By: MuleSoft     Published Date: Sep 08, 2016
Enterprises are adopting more and more SaaS applications and customers are interacting with companies from an increasing number of channels. Many companies are not ready to provide the level of engagement, service and support their customers demand. New applications are added to the company’s ecosystem, but not connected with the existing applications. Customer data is inconsistent and not synced across a customer’s lifecycle.
Tags : 
mulesoft, microservices, digital transformation, business value, it support
    
MuleSoft
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Exploit kits, which first became popular in 2006, are used to automate the exploitation of vulnerabilities on victims’ machines, most commonly while users are browsing the web. Over the past decade they have become an extremely popular means for criminal groups to distribute mass malware or remote access tools (RAT), because they lower the barrier to entry for attackers and can enable opportunistic attacks at scale. To understand this phenomenon, we must understand the ecosystem that surrounds exploit kits, including the actors, campaigns and terminology involved.
Tags : 
palo alto, exploit kits, antivirus, security, security value, prevention
    
Palo Alto Networks
Published By: Druva     Published Date: Nov 09, 2018
The rise of virtualization as a business tool has dramatically enhanced server and primary storage utilization. By allowing multiple operating systems and applications to run on a single physical server, organizations can significantly lower their hardware costs and take advantage of efficiency and agility improvements as more and more tasks become automated. This also alleviates the pain of fragmented IT ecosystems and incompatible data silos. Currently, this virtualization juggernaut shows no sign of slowing. As businesses recognize the potential for increased reliability and scalability offered by virtual technology, they are ramping up their investments in data center modernization and upgrading. In fact, 33 percent of the respondents to a recent ESG survey on cloud usage said that making greater use of server virtualization was one of their top five spending priorities for the next 12 to 18 months.
Tags : 
    
Druva
Published By: Druva     Published Date: Nov 09, 2018
The rise of virtualization as a business tool has dramatically enhanced server and primary storage utilization. By allowing multiple operating systems and applications to run on a single physical server, organizations can significantly lower their hardware costs and take advantage of efficiency and agility improvements as more and more tasks become automated. This also alleviates the pain of fragmented IT ecosystems and incompatible data silos. Protecting these virtualized environments, however, and the ever-growing amount of structured and unstructured data being created, still requires a complex, on-prem secondary storage model that imposes heavy administrative overhead and infrastructure costs. The increasing pressure on IT teams to maintain business continuity and information governance are changing how businesses view infrastructure resiliency and long-term data retention—they are consequently looking to new solutions to ensure immediate availability and complete protection of the
Tags : 
    
Druva
Published By: IBM     Published Date: May 02, 2018
Read about security measures banks should consider to help mitigate risk and gain user trust in today’s Open Banking ecosystem.
Tags : 
open banking, security, risk
    
IBM
Published By: IBM     Published Date: Jul 02, 2018
Far from being a soft issue, trust underpins the management of your digital business and digital ecosystems. This report highlights how trust is fundamental to your digital transformation. It focuses on the role of trust in the B2B context and analyzes the key technologies, processes, and operational values that CIOs and their teams must use to build and maintain trusted ecosystem partnerships
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Far from being a soft issue, trust underpins the management of your digital business and digital ecosystems. This report highlights how trust is fundamental to your digital transformation. It focuses on the role of trust in the B2B context and analyzes the key technologies, processes, and operational values that CIOs and their teams must use to build and maintain trusted ecosystem partnerships.
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Sep 24, 2018
Take a look at the IT ecosystem of any company today and there’s a good chance you’ll find it includes offerings from several cloud services providers. That’s certainly the case at mid- to large-sized companies with at least 500 employees, according to a recent survey conducted by IDG Research. The survey of 100 senior IT professionals found that 59% are already multi-cloud adopters — that is, using computing and storage services from two or more cloud providers. Another 31% of respondents say they plan to become multi-cloud organizations in the coming 12-24 months, with only 10% still in the “consideration” phase.
Tags : 
    
Group M_IBM Q418
Published By: TIBCO Software     Published Date: Feb 14, 2019
Digital business initiatives have expanded in scope and complexity as companies have increased the rate of digital innovation to capture new market opportunities. As applications built using fine-grained microservices and functions become pervasive, many companies are seeing the need to go beyond traditional API management to execute new architectural patterns and use cases. APIs are evolving both in the way they are structured and in how they are used, to not only securely expose data to partners, but to create ecosystems of internal and/or third-party developers. In this datasheet, learn how you can use TIBCO Cloud™ Mashery® to: Create an internal and external developer ecosystem Secure your data and scale distribution Optimize and manage microservices Expand your partner network Run analytics on your API performance
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Feb 14, 2019
Digital business initiatives have expanded in scope and complexity as companies have increased the rate of digital innovation to capture new market opportunities. As applications built using fine-grained microservices and functions become pervasive, many companies are seeing the need to go beyond traditional API management to execute new architectural patterns and use cases. APIs are evolving both in the way they are structured and in how they are used, to not only securely expose data to partners, but to create ecosystems of internal and/or third-party developers. In this datasheet, learn how you can use TIBCO Cloud™ Mashery® to: Create an internal and external developer ecosystem Secure your data and scale distribution Optimize and manage microservices Expand your partner network Run analytics on your API performance
Tags : 
    
TIBCO Software
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
The advantages blockchain can bring to the automotive ecosystem, both in facilitating collaboration among participants and enabling capabilities for new mobility business models, have gotten the attention of automotive executives. In addition to enabling a single source of data, blockchain can facilitate device-to-device transactions, smart contracts, and real-time processing and settlement. For the automotive industry, this translates into improvements and operational efficiencies in areas such as supply chain transparency, financial transactions between ecosystem participants, authenticating access to cars, and customer experience and loyalty.
Tags : 
    
Group M_IBM Q3'19
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
HfS published the Top 10 Cognitive Assistant Service Provider report that explores the emerging conversational service provider ecosystem across key areas including execution ability, innovation capability, and the voice of the customer. The conversational services called as Cognitive Assistants, go beyond the traditional chatbots and augment human-customer interaction across both front- and back-office business operations. IBM was recognized for its market leadership in Cognitive Assistant that harness the power of IBM Watson capabilities – including NLP, conversation and analytics. HfS also merits IBM for demonstrating the greatest volume and depth of cognitive assistant use cases across industry verticals and enterprise processes.
Tags : 
    
Group M_IBM Q3'19
Published By: IBM     Published Date: Jun 25, 2018
Incorporating Watson Assistant into their “Easy System”, Staples Inc. enhanced their ordering interface and product support to be more seamless, whether via their iconic Easy Button, through the app, over Facebook Messenger, or with a Slackbot. See how Staples used Watson APIs to build a cognitive ordering ecosystem for customers, incorporating speech-to-text capabilities and leveraging on a massive amount of back-end and customer data. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market.
Tags : 
    
IBM
Published By: Proofpoint     Published Date: May 30, 2018
Email fraud is rife – business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email attacks are also preventable. Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains. Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block fraudulent emails before they reach your employees, customers and business partners. Protect your email ecosystem from today’s advanced email threats including business email compromise (BEC) and consumer phishing. Proofpoint Email Fraud Defence gives you the visibility, toolset and services needed to authorise legitimate email senders and block fraudulent messages before they reach the inbox.
Tags : 
    
Proofpoint
Published By: Dynatrace     Published Date: Apr 16, 2018
Based on a global survey of 800 CIOs, this report examines the challenges organizations face when working within complex, cloud-centric ecosystems. Technology is at the heart of every organization today. Now more than ever, society expects the services we use to be innovative and faultless, prompting the creation of hyper-complex IT ecosystems. Relying on physical databases and third-party cloud service providers, businesses are finding it increasingly difficult to monitor application performance, ensure positive experiences, and succeed in this new environment.
Tags : 
    
Dynatrace
Published By: Dynatrace     Published Date: Apr 16, 2018
Internet-of-things (IoT) is increasing in excitement across all industries as they look to provide innovation in their product and services, and monitor risks and costs in their business operations. But IoT is not a single technology. It is an ecosystem of human and non-human touchpoints that span across multiple technologies. This creates a dynamic and complex environment that is difficult to see and manage in scope. The traditional monitoring approach of watching dashboards, responding to alerts, and manually analyzing doesn’t work anymore. Today’s hyper-dynamic, highly distributed IoT application environments have become way too complex and move too quickly. The volume, velocity, and variety of information is simply more than humans can keep up with using traditional tools.
Tags : 
    
Dynatrace
Published By: WatchGuard     Published Date: Jan 28, 2013
This white paper describes the market drivers behind the BYOD phenomenon, the challenges presented to an organization, a strategic outline to manage BYOD, and how WatchGuard helps to create a secure BYOD ecosystem.
Tags : 
byod, bring your own device, it security
    
WatchGuard
Published By: Hortonworks     Published Date: Apr 05, 2016
This white paper will help you evaluate your ability to protect your data in a Apache Hadoop ecosystem. Read on to learn ten signs that you might need to improve security and data governance in order to manage risk while getting more value out of your Apache Hadoop environment.
Tags : 
    
Hortonworks
Published By: Oracle     Published Date: Feb 21, 2018
As Mobile is the new normal for users to connect and consume content, you need to consider apps, mobile integration,security, analytics, development tools, life-cycle management, various mobile stakeholders, and the overall enterprise mobile ecosystem.
Tags : 
    
Oracle
Published By: VMware     Published Date: May 10, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: • Seamless, secure end-user access to applications and files • Easy-to-use enterprise app store • Management security • Fully integrated infrastructure stack • Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
Published By: CloudHealth by VMware     Published Date: Apr 08, 2019
Organizations moving to AWS seek improved performance, increased innovation, and a faster time to market—but the road to cloud maturity, and ultimately cloud success, proves both challenging and expensive. Learn to accelerate your AWS cloud journey with: A checklist for determining if you have clear visibility into your AWS environment Expert tips for developing proper cloud security best practices Real examples of financial, performance, and security management policies for automating your cloud ecosystem Looking to optimize your AWS cloud infrastructure? Use this eBook to regain control over your visibility and cost management, security and compliance, and governance and automation.
Tags : 
    
CloudHealth by VMware
Published By: Anaplan     Published Date: Sep 07, 2018
A new way to collaborate As the digital revolution continues, a linear approach to supply chain planning is gradually giving way to ecosystem thinking. Consumers buy in an entirely new way. Goodbye Sears catalog, hello one-click checkout. To keep up, companies need the ability to plan accurately in real-time. Introducing digital demand management with the Anaplan platform: a collaborative approach that can keep up with omnichannel demand. What’s inside this paper from Supply Chain Brain: What digital demand management means in today’s market The benefits of a connected approach to demand management
Tags : 
    
Anaplan
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.