tools

Results 276 - 300 of 2507Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Today’s organizations turn to the cloud for all types of productivity-gaining tools – including security. Features such as security for mobile users and data loss protection are key, but it’s also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Rand Secure Archive     Published Date: Jun 06, 2013
Most organizations possess considerable intellectual property. Unfortunately, that information is useless unless employees know how to find it. The time that staff members spend searching for data, often fruitlessly, represents a real cost to organizations. In some instances, when employees can’t find the information they’re looking for, they end up duplicating work. Archiving tools with powerful index and search capabilities can help maximize the value of intellectual property.
Tags : 
data, archive, tools, index, search, value, intellectual property
    
Rand Secure Archive
Published By: AWS     Published Date: Sep 05, 2018
Amazon Redshift Spectrum—a single service that can be used in conjunction with other Amazon services and products, as well as external tools—is revolutionizing the way data is stored and queried, allowing for more complex analyses and better decision making. Spectrum allows users to query very large datasets on S3 without having to load them into Amazon Redshift. This helps address the Scalability Dilemma—with Spectrum, data storage can keep growing on S3 and still be processed. By utilizing its own compute power and memory, Spectrum handles the hard work that would normally be done by Amazon Redshift. With this service, users can now scale to accommodate larger amounts of data than the cluster would have been capable of processing with its own resources.
Tags : 
    
AWS
Published By: Amazon Web Services     Published Date: Sep 05, 2018
Amazon Redshift Spectrum—a single service that can be used in conjunction with other Amazon services and products, as well as external tools—is revolutionizing the way data is stored and queried, allowing for more complex analyses and better decision making. Spectrum allows users to query very large datasets on S3 without having to load them into Amazon Redshift. This helps address the Scalability Dilemma—with Spectrum, data storage can keep growing on S3 and still be processed. By utilizing its own compute power and memory, Spectrum handles the hard work that would normally be done by Amazon Redshift. With this service, users can now scale to accommodate larger amounts of data than the cluster would have been capable of processing with its own resources.
Tags : 
    
Amazon Web Services
Published By: HP     Published Date: Nov 05, 2014
HP Helion is a portfolio of cloud products and services that provides organizations the tools they need to develop, deploy and deliver applications in a Hybrid IT environment securely and future proofs their business to test, learn and succeed faster. Watch this free presentation to learn more.
Tags : 
hp helion, helion, cloud, cloud computing
    
HP
Published By: Dell PC Lifecycle     Published Date: Mar 07, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization.
Tags : 
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: May 15, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization.
Tags : 
    
Dell PC Lifecycle
Published By: Dell Server     Published Date: Aug 07, 2018
Today’s digital businesses are managed using critical business analyses that provide far greater insight into the business and how to maximize results. However, these high-value applications that use the latest software tools demand far more from IT infrastructure, as they utilize an order of magnitude more data and demand more compute resources than legacy applications. Legacy systems are no longer capable of meeting the present and future needs of the organization. Forward-thinking IT organizations are developing new infrastructure strategies to better support high-value analytics workloads with Dell EMC PowerEdge Servers powered by Intel® Xeon® Platinum processor.
Tags : 
    
Dell Server
Published By: LANDesk     Published Date: Feb 12, 2007
As IT departments work to transition from "firefighting mode" to becoming more proactive and responsive, a key step along the path is to implement labor-saving automation tools that allow more tasks to be done more rapidly, using fewer resources and with greater predictability and reliability.
Tags : 
it management, productivity, project management, service management, groupware workflow, business process automation, bpa, it automation
    
LANDesk
Published By: Concur     Published Date: Feb 04, 2013
With the introduction of cloud-based solutions, investing in tools to automate business processes like accounts payable is more affordable, and significantly less risky for SMB. Use this guide to help select the right AP solution to match your needs.
Tags : 
ap automation, expense management, accounts payable, smb expense solutions, expense management solutions
    
Concur
Published By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
    
Menlo Security
Published By: Splunk     Published Date: Dec 11, 2018
Predictive IT is a powerful new approach that uses machine learning and artificial intelligence (AI) to predict incidents before they impact customers and end users. By using AI and predictive analytics, IT organizations are able to deliver seamless customer experiences that meet changing customer behavior and business demands. Discover the critical steps required to build your IT strategy, and learn how to harness predictive analytics to reduce operational inefficiencies and improve digital experiences. Download this executive brief from CIO to learn: 5 steps to an effective predictive IT strategy Where AI can help, and where it can’t How to drive revenue and exceptional customer experiences with predictive analytics
Tags : 
predictive it, predictive it tools, predictive analytics for it, big data and predictive analytics
    
Splunk
Published By: VMware AirWatch     Published Date: Sep 16, 2015
In this report, read about how AirWatch by VMware provides EMM suites to help organizations integrate mobile devices into their security framework, and provides tools for easier auditing and reporting, provisioning, support, data defense.
Tags : 
airwatch, security, data defense, mobile, emm
    
VMware AirWatch
Published By: Splunk     Published Date: Nov 29, 2018
Gartner Market Share Analysis: ITOM, Performance Analysis Software, Worldwide, 2017 Splunk Jumps From #5 in 2016 to #2 in Top 10 Named ITOM Performance Analysis Software Vendors, Worldwide, 2017 Splunk is ranked #2 of overall ITOM Performance Analysis Software Vendors, according to Gartner’s report, Market Share Analysis: ITOM, Performance Analysis Software, Worldwide, 2017. This Gartner report also lists Splunk as one of several disruptors in the table “Market Share of Incumbents vs. Disruptors - ITOM Performance Analysis Software.” As a Splunk customer, are you utilizing your machine data platform to its fullest potential? Learn about newest trends in ITOM software tools across AIOps, APM, infrastructure monitoring and Network performance monitoring and diagnostics. Download this report to learn: 2017 rankings of performance analysis software vendors, overall and subsegments How digital business is driving demand for modern, agile monitoring tools via DevOps toolchains Shifts in
Tags : 
application performance monitoring, network tools, network monitoring tools, network monitoring software, network monitoring, it monitoring
    
Splunk
Published By: IBM     Published Date: Oct 19, 2010
Learn how to use Enterprise 2.0 technologies to take collaboration at your company to the next level!
Tags : 
collaboration, collaboration tools, collaborative management, enterprise 2.0, enterprise management, ibm, crm solutions/software
    
IBM
Published By: SAP     Published Date: May 18, 2014
This TDWI Checklist Report presents requirements for analytic DBMSs with a focus on their use with big data. Along the way, the report also defines the many techniques and tool types involved. The requirements checklist and definitions can assist users who are currently evaluating analytic databases and/or developing strategies for big data analytics.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management
    
SAP
Published By: IBM     Published Date: Oct 20, 2015
This analyst piece shows that to be able to take control and do effective planning, marketers need insights that can only be supplied by marketing analytics.
Tags : 
ibm, marketing, analytics, planning, marketing research
    
IBM
Published By: IBM     Published Date: Mar 04, 2016
This analyst piece shows that to be able to take control and do effective planning, marketers need insights that can only be supplied by marketing analytics
Tags : 
marketing analytics, data, ibm, best practices, effective planning
    
IBM
Published By: IBM     Published Date: Sep 29, 2015
Improve business performance and remain competitive.
Tags : 
analytics, strategy, talent, social chatter, tools, engage, develop, data
    
IBM
Published By: SAS     Published Date: Aug 27, 2010
Forget spreadsheets. Organizations that are winning in this down economy are using automated analytical tools to take a more scientific approach to decision making through observation, experimentation and measurement to improve their business processes.
Tags : 
sas, analytics software, business intelligence, data mining, automated analytical tools, computerworld
    
SAS
Published By: Mimecast     Published Date: Dec 20, 2018
Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Watch the Anatomy of an Email-Borne Attack webinar where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live hack. You will learn: Why and how the healthcare threat landscape is evolving How your email can be used as an entry point in multiple types of attack Attacker methodologies and the tactics and tools being used to exploit your users How to enhance email security and improve overall cyber resilience
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Burton Group     Published Date: Apr 08, 2008
In this Methodologies and Best Practices document, Burton Group Research Director Daniel Blum recounts customer perspectives on the anti-malware battlefield playing out at the enterprise level. The document explores lessons learned, and what keeps customers awake at night even after good defensive strategies are in place. The Reference RFI alone is valuable for those switching anti-malware products, or seeking new ones.
Tags : 
burton group, best practices, malware, security, email security, network security, content filtering
    
Burton Group
Published By: VMware AirWatch     Published Date: Sep 21, 2017
ANZ Bank chose VMware AirWatch® to securely manage the bank’s fleet of more than 18,000 mobile devices that are used in 34 countries. ANZ Bank uses AirWatch to manage bankers’ company-issued mobile devices, and to manage digital tools such as Apple® iPad® kiosks in bank branches. Learn more about VMware AirWatch solutions built specifically for the finance industry.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Jul 21, 2017
ANZ Bank chose VMware AirWatch® to securely manage the bank’s fleet of more than 18,000 mobile devices that are used in 34 countries. ANZ Bank uses AirWatch to manage bankers’ company-issued mobile devices, and to manage digital tools such as Apple® iPad® kiosks in bank branches. Learn more about VMware AirWatch solutions built specifically for the finance industry.
Tags : 
    
VMware AirWatch
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.