it teams

Results 201 - 225 of 825Sort Results By: Published Date | Title | Company Name
Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Organizations face onboarding risks of BYOS (Bring Your Own Service) as they hire new employees that bring their own cloud services into the work environment. Risks facing IT and security teams include protecting corporate data and defending against modern threats. While IT and Security teams want to adopt modern cloud applications and increase business agility, they also want to implement visibility and monitoring to protect corporate data and comply to security policies. This session will highlight how new methodologies available today enable organizations to discover sanctioned and un-sanctioned cloud services that are being used within their organization, and how they can apply consistent security policies across the public and private cloud to protect corporate data and conform to compliance policies.
Tags : 
    
Oracle Security Solutions
Published By: VMWare EMEA     Published Date: Oct 23, 2017
To meet the challenges of managing such a complex environment, IT teams need an enterprise-ready cloud management platform that can support multivendor environments, automate application and service delivery, and facilitate operations and governance. VMware provides an enterprise-ready cloud management platform that delivers the industry’s most complete solution for managing a heterogeneous, hybrid cloud, and supports cloud management requirements across Day 1 and Day 2 operations for compute, storage, network and application level resources. The VMware solution is in use today across a wide range of industries and use cases, delivering benefits such as faster provisioning, optimized IT operations, and lower capital spending. To learn more about the VMware cloud management platform, visit http://www.vmware.com/virtualization/ cloud-management.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: Cisco     Published Date: Dec 27, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption.
Tags : 
    
Cisco
Published By: Workday APAC     Published Date: Dec 21, 2018
"When CIOs and IT leaders have to constantly work to keep disparate systems in line and stitch together data, their ability to support business value is limited. Workday solves that problem. Watch this video to hear how Workday technology improves the daily life of CIOs and their teams. Your IT peers share: What a day in the life looks like for CIOs What new feature adoptions look like on Workday How integrations differ between Workday and competitor platforms"
Tags : 
    
Workday APAC
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 21, 2019
Leading multinational corporation and technology company wanted to simplify, streamline and automate their highly complex & business-critical processes, and improve SLA compliance. LTI provided 24x7 support with distributed teams across the onsite/offshore locations. Our Design-Thinking-led approach for the next-generation platform, using Altassian Jira, helped connect the client’s multiple systems through microservice integration patterns. Download full case study
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Dun & Bradstreet     Published Date: Oct 21, 2016
When it comes to data-inspired growth, cutting costs isn’t the answer. As a CFO, you’re in a strong position to help teams explore what is possible within a business, under what constraints and in what time frame. Envision yourself as a strategist, enabler, and connector. In addition to appeasing your executive teams and shareholders, you’re also in a strong position to help your company reach new heights. Examine the nuances within your data, and align around a common set of growth goals. Download this white paper to learn more.
Tags : 
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Feb 02, 2016
Since when did budgeting become a process that companies dread? Just say the word “budget,” and you’ll elicit at least a few groans or eyerolls from teams outside of finance. It’s daunting: the weight of the next few years rests on a couple of forecasts, financial projections and line-item lists. As a result, cross-functional teams are under a lot of stress to ensure that their cases and arguments are heard. In some ways, the budgeting process almost feels combative.
Tags : 
hoovers, finance, budgeting, cfo, data, risk assessment
    
Dun & Bradstreet
Published By: Dun & Bradstreet     Published Date: Apr 21, 2016
When the right approach is applied, analytics can drive more effective marketing strategies. While marketers understand the role analytics plays within the organization, most are not leveraging analytics to really drive enterprise performance. We surveyed 100+ business leaders to understand the state of analytics maturity across today’s leading organizations, uncovering common challenges teams are facing in their quest to use data and analytics to deliver a competitive advantage. What We Uncovered: - 73% of analytic professionals claim to work for an analytically-driven company - Only 42% of companies have a strategy for using analytics across the enterprise - Just 38% of companies share results of their analytic insights outside their department - 81% of organizations rely on 3rd parties for at least some portion of their analysis Download the report to learn how marketers, like yourself, view themselves in light of using analytics to drive their business.
Tags : 
hoover's, marketing strategies, analytics, data, internet marketing, sales
    
Dun & Bradstreet
Published By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : 
ddos attacks, it security, application layer attacks
    
Arbor
Published By: Mimecast     Published Date: Apr 25, 2017
Five Necessary Changes to Comply The EU General Data Protection Regulation (GDPR) deadline is approaching. You may think you’re immune from its impact, but if you do business with customers in the EU, think again. It’s time to rethink your organizational processes around compliance. This Forrester Research Brief helps your security, regulatory and privacy teams grasp the five changes necessary for GDPR compliance.
Tags : 
gdpr, security, regulation, forrester
    
Mimecast
Published By: YLD     Published Date: Apr 27, 2016
IT departments are faced with new challenges, with increased competition, lower customer loyalty and globalisation. It all requires faster development while dealing with shadow IT, legacy systems and requirements for highly skilled teams, with expertise in new, disruptive technologies.
Tags : 
it department, customer loyalty, technology, it support, becoming a disruptive cio
    
YLD
Published By: IBM     Published Date: Feb 02, 2016
Read this white paper to get an in-depth look at the benefits of embracing a digital business model, and find out how sports teams of all types can use cloud service providers with digital marketing and analytics tools to gain a competitive edge on the marketing playing field.
Tags : 
ibm, sports, marketing, data, analytics, digital marketing, interactive marketing, marketing software, web analytics, website/graphic design, email marketing services/software, mobile marketing, online video marketing, social media marketing
    
IBM
Published By: Oracle     Published Date: Oct 20, 2016
Flexibility and the ability to adapt easily to change can create a compelling competitive advantage for E&C organisations. Whether it’s behind the desk, on the go, or at the job site, E&C project teams need to be empowered to get a project done no matter where the job takes them and with a limited amount of resources.
Tags : 
    
Oracle
Published By: VMware     Published Date: Jun 21, 2019
Hyperconverged infrastructure (HCI) has emerged as a breakthrough IT technology over the past several years. With the right HCI solution, IT teams can lower costs, increase agility, and reduce complexity— leveraging a modern software-defined IT platform that provides a seamless path to hybrid cloud. IT continues to embrace HCI in great numbers, with the market expected to grow at a compound annual rate of 42 percent through 2023.1
Tags : 
    
VMware
Published By: VMware     Published Date: Jun 21, 2019
Business demands are shifting. The pace of technology is speeding up. The ability to deliver applications faster while building a hybrid cloud strategy is no longer a nice-to-have, but a must-have for modern businesses looking to stay competitive while meeting customer needs. The fast pace of digital business spurred organizations around the world to embrace compute virtualization, which transformed the data center over the past decade. But that transformation isn’t complete. Many IT teams still rely on hardware-centric approaches to storage and networking, which are expensive and time-consuming to manage and maintain, and don’t provide the flexibility and agility that today’s users demand. In an era where speed and performance are critical, moving to a software-centric approach in every area of the data center is the only way to get ahead. That’s why so many organizations are turning to hyperconverged infrastructure.
Tags : 
    
VMware
Published By: IBM     Published Date: Jan 06, 2016
With IBM PureApplication Service, IT teams are no longer challenged to re-architect existing applications to make them cloud ready.
Tags : 
ibm, enterprise, hybrid cloud, pureapplication
    
IBM
Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: Absolute Software     Published Date: Nov 21, 2011
Like most IT teams, LIAI technicians are committed to optimizing staff productivity. With the organization steadily growing and IT demands increasing, maintaining this commitment proved challenging. They needed began to minimize the burden of administrative duties and maximize IT efficiency.
Tags : 
la jolla, absolute, immunology, productivity, it demands, efficiency, liai, resources, resource allocation, configuration, software, hardware, requirements
    
Absolute Software
Published By: HP - Enterprise     Published Date: Aug 31, 2011
New headlines provide ongoing evidence that IT Security teams are losing the battle against attackers, reinforcing the need to address the security of enterprise applications.This Analyst Insight reviews several practical steps you can take to get started now.
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp, software vulnerabilities, critical application vulnerability, hp fortify, aberdeen, sdlc, mobile security, on-demand solutions, software-as-a-service, saas, it security, alm, "application lifecycle management"
    
HP - Enterprise
Published By: Cisco     Published Date: Feb 05, 2013
Whether being considered to support an organization's initial private cloud deployment or help an organization recover from a false start, an entry-level private cloud automation solution can enable IT teams to quickly demonstrate the value of IaaS.
Tags : 
private cloud, automation, cloud, entry level, roi, server, network
    
Cisco
Published By: NetApp     Published Date: Sep 30, 2013
IT teams are working harder than ever in the face of massive data growth, complex operations, and time and budget constraints. Access this white paper to discover an operating system that addresses the limitations of traditional approaches to IT, removing IT constraints and allowing you to respond to business demands more readily.
Tags : 
cloud computing, communication, bluewolf, self-service, technology, cloud
    
NetApp
Published By: Paxata     Published Date: Nov 14, 2018
Gartner advises data and analytics leaders to move quickly to hire, train, and promote data engineers as separate and unique roles within their teams. Download this research to learn why.
Tags : 
    
Paxata
Published By: Keynote     Published Date: Apr 23, 2014
In the world of digital interactions, the margin between success and disengagement or abandonment is measured in milliseconds. With the exploding adoption of advanced smartphones and tablets, you need a mobile-first approach to engaging with customers and employees. And as your mobile initiatives are delivered at increasingly rapid rates, the quality and reliability of the mobile apps, mobile web and connected services that support them has become critically important. For the technology teams delivering customer and employee services in the mobile channel, it is important to understand that performance monitoring solutions which work for the desktop cannot be simply applied to mobile. Managing the mobile end user experience requires an understanding of the challenges posed by the complexities of the mobile environment. This paper will reveal the 4 pillars of mobile performance, plus offer strategies for accurately monitoring mobile end user experience so you can continuously improve.
Tags : 
mobile application monitoring, mobile application monitoring system, mobile app performance, mobile application performance, app monitoring, monitor mobile applications, web performance monitoring tools, performance monitoring, web application monitoring, mobile website performance, mobile website optimization, mobile web monitoring, keynote
    
Keynote
Published By: McAfee     Published Date: Sep 15, 2014
The need for robust network security is growing, but IT security teams, resources, and budgets are shrinking at many organizations. That doesn’t mean you have to scale down your growth or skimp on key IT security areas, but it does mean you need to optimize your resources, starting with your network firewall team. Resource optimization involves the automation and streamlining of operational processes and management workflows so that your IT team members can be freed up to focus their time, skills, and expertise on priority projects. Furthermore, optimizing your resources helps preserve your budget while eliminating budgetary conflicts and slashing administrative costs.
Tags : 
network security, it security, firewall, resource optimization, security management
    
McAfee
Published By: Workforce Software     Published Date: Feb 02, 2015
Leave administration is one of the most challenging aspects of workforce management and an area that continues to become more complicated as leave regulations—and lawsuits—increase. For employers, having to understand and comply with complex federal regulations, such as the Family and Medical Leave Act (FMLA), in addition to myriad local laws, union rules and company policies can be overwhelming. The task of complying with these many regulations often consumes a great deal of time for HR teams, especially those operating across multiple geographies.
Tags : 
workforce software, software, automate, outsource, fmla, act, cloud, management, employee leave, strategy
    
Workforce Software
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.