whitepaper

Results 226 - 250 of 1964Sort Results By: Published Date | Title | Company Name
Published By: Panaya     Published Date: Aug 26, 2016
In the era of digital transformation, where the speed of change requires business processes to be agile, change with evolving business context and respond to existing and emerging competition - organizational culture and large-scale business processes are still resistant to change. This Panaya whitepaper provides a practical "to-do" list that can help facilitate change and keep your ERP current.
Tags : 
panaya, erp, enterprise resource planning, digital, digital ready, erp systems, digitalization, digital transformation
    
Panaya
Published By: Schneider Electric     Published Date: Aug 21, 2017
This TRA whitepaper will outline why this is the case and why that is important for your customers experience in future.
Tags : 
digital transformation, data centers, cloud, applications, customer experience
    
Schneider Electric
Published By: Tenable     Published Date: Aug 07, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : 
devops, dev sec ops, infosec, container security, idg, digital transformation
    
Tenable
Published By: Tenable     Published Date: Feb 27, 2019
"Overwhelmed by the number of vulnerabilities your team faces? Uncertain which cyber threats pose the greatest risk to your business? You’re not alone. Cybersecurity leaders have been grappling with these challenges for years – and the problem keeps getting worse. On average, enterprises find 870 vulnerabilities per day across 960 IT assets. There just isn’t enough time or resources to fix them all. More than ever, it’s essential to know where to prioritize based on risk. Download the new whitepaper “Predictive Prioritization: How to Focus on the Vulnerabilities That Matter Most” to: -Learn how to focus on the 3% of vulnerabilities that have been – or will likely be – exploited -Uncover why CVSS is an insufficient metric for prioritization – and the key criteria you need to consider -Understand the Predictive Prioritization process, which uses machine learning to help you differentiate between real and theoretical risks Ensure you’re prioritizing the right vulnerabilities for your t
Tags : 
    
Tenable
Published By: Tenable     Published Date: Feb 27, 2019
"Overwhelmed by the number of vulnerabilities your team faces? Uncertain which cyber threats pose the greatest risk to your business? You’re not alone. Cybersecurity leaders have been grappling with these challenges for years – and the problem keeps getting worse. On average, enterprises find 870 vulnerabilities per day across 960 IT assets. There just isn’t enough time or resources to fix them all. More than ever, it’s essential to know where to prioritize based on risk. Download the new whitepaper “Predictive Prioritization: How to Focus on the Vulnerabilities That Matter Most” to: -Learn how to focus on the 3% of vulnerabilities that have been – or will likely be – exploited -Uncover why CVSS is an insufficient metric for prioritization – and the key criteria you need to consider -Understand the Predictive Prioritization process, which uses machine learning to help you differentiate between real and theoretical risks Ensure you’re prioritizing the right vulnerabilities for your t
Tags : 
    
Tenable
Published By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
Published By: Red Hat     Published Date: Feb 25, 2019
Red Hat is a trusted partner to enterprise customers; cloud, software, and hardware suppliers; and the global open source community. A Red Hat® Enterprise Linux® subscription provides customers with direct access to innovation and advocacy—within the open source community and within a certified and trusted network of partners. Red Hat Enterprise Linux provides you with an innovative platform that serves as the foundation for your business. It is hardened, certified, and supported by the Red Hat Product Security team, support teams, and certified engineers. Red Hat supports your timelines and advocates for your requirements so you can focus on the work of your business rather than being your own operating system vendor. We use our leadership in the open source community to do the work that brings you the best of open source. Get direct access to: Technology-driven solutions Emerging technology Experience and support Continuous security Timeline support Download the whitepaper to lea
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 25, 2019
How to strike the balance between your existing systems and emerging technologies. Many organizations are struggling with the pressure to adopt cloud-native architectures while maintaining existing conventional systems. A virtualized infrastructure can connect your new and old systems. This IDC paper helps you achieve the ideal balance by: Embracing the new without disrupting the current infrastructure. Preparing for next-generation computing requirements. Enabling agile application delivery to compete and win. Read the IDC whitepaper to learn more about balancing your investment in new and existing systems.
Tags : 
    
Red Hat
Published By: IBM APAC     Published Date: Nov 13, 2018
This Frost & Sullivan whitepaper explores some of the common fears and challenges related to security and compliance, and how a skilled managed service provider can help you overcome them as you deploy sensitive, business-critical workloads in the cloud.
Tags : 
    
IBM APAC
Published By: Juniper Networks     Published Date: Oct 19, 2015
Da Anwendungs-Workloads neu definiert werden, müssen sich auch Rechenzentren ändern. In diesem IDC-Whitepaper wird beleuchtet, wie Netzwerk-Automatisierung und -Orchestrierung bei diesem Wandel helfen können und somit einfachere, agilere Netzwerke entstehen.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Oct 19, 2015
Business and IT leaders are looking to virtualization and cloud computing to deliver unprecedented agility for supporting a wide range of objectives, including cost management, increased mobility, higher application availability, and greater responsiveness to customer-related opportunities.
Tags : 
network, management, mobility, application
    
Juniper Networks
Published By: Schneider Electric     Published Date: Mar 14, 2017
This whitepaper discusses the key factors that influence both battery and UPS life; and provides some simple recommendations and guidelines to help you manage your single phase UPS to maximize the life and overall availability.
Tags : 
ups, ups management, ups lifecycle, battery, battery life, lifecycle management
    
Schneider Electric
Published By: Equinix EMEA     Published Date: May 22, 2019
Much has been written about the impact of technology on insurance, this most traditional of industries. Artificial intelligence (AI), connected cars, drones and the Internet of Things (IoT) are all becoming integral to the insurance and automotive industries. This becomes obvious when using your car’s navigation system – an everyday action that might well lead to a chain of events few would even think of today. To find out more download this whitepaper today.
Tags : 
    
Equinix EMEA
Published By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai
Published By: Workday Nordics     Published Date: Sep 19, 2018
Read this whitepaper from CIO.com to understand why cloud architecture holds the most promise for today’s organisations and to gain valuable tips for evaluating cloud solutions.
Tags : 
workday, workday technology, digital strategy, cloud solutions
    
Workday Nordics
Published By: Skillsoft     Published Date: Apr 29, 2015
A Skillsoft whitepaper on Overcoming the skills deficit: the response of UK organisations to the workforce development challenge
Tags : 
skills deficit, overcoming the skills deficit, uk skills shortage, skill builders, l & d software, skillsoft
    
Skillsoft
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This ESG whitepaper reviews challenges introduced by data growth and focuses on IBM data protection and retention products/technologies that address storage efficiency.
Tags : 
ibm uk, esg, data growth, data protection, information systems, information management, business continuity, business resiliency, business availability, dp&r, dp+r, dp and r
    
Ogilvy - IBM UK
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This whitepaper explores the latest challenges and innovations in data protection and retention.
Tags : 
ibm uk, data protection, information systems, information management, business continuity, business resiliency, business availability, dp&r, dp+r, dp and r
    
Ogilvy - IBM UK
Published By: Workday Nordics     Published Date: Feb 27, 2018
This whitepaper looks into Governance, compliance, control, and audit, and how its been traditionally treated as afterthoughts, or even irritants, in the financial modules of classic “big ERP” software. It has been easy and, unfortunately, typical to ignore this topic when planning, building, and evaluating enterprise business software. Control concepts are not as urgent as transaction processing, as visible as financial reporting, or as exciting as analytics so they are almost always an afterthought. Today we can’t afford for governance to be an afterthought, and from day one Workday was built with that in mind.
Tags : 
    
Workday Nordics
Published By: Workday Nordics     Published Date: Feb 01, 2019
"Read the whitepaper from Human Resource Executive® to learn how data-driven technology can help you: ? Save time by cutting down on paper-pushing tasks ? Renew focus on important HR strategies ? Use the same HR systems as Fortune 500 companies without breaking the bank"
Tags : 
workday, workforce technology, digital strategy
    
Workday Nordics
Published By: Workday DACH     Published Date: Feb 01, 2019
Weniger manuelle Prozesse, mehr Zeit für strategische Aufgaben. Mit moderner cloudbasierter Technologie steht mittelständischen Unternehmen trotz Budgetbeschränkungen erstklassige HR-Software zur Verfügung. Dank innovativer Cloud-Technologie gibt es nun eine Alternative, mit der kleinere Unternehmen kontinuierlich wachsen und wettbewerbsfähig bleiben können. Laden Sie das Whitepaper von Human Resource Executive® herunter und erfahren Sie mehr.
Tags : 
belegschafts technologie, digitale strategie
    
Workday DACH
Published By: Workday DACH     Published Date: Feb 07, 2019
Neueste Untersuchungen von IDC und Workday belegen den digitalen Stillstand vieler Unternehmen - die zunehmende Kluft zwischen den Anforderungen digitaler Marktführer und der Fähigkeit von Core-Business-Systemen, breitere digitale Transformationsprogramme zu unterstützen. Dies lässt sich auf mehrere zentrale Herausforderungen zurückführen: 80% sagen, dass sie keine neuen digitalen Lösungen in bestehende Finanz- und HR-Prozesse integrieren können oder dass dies aufwändig ist. 80% berichten, dass sie keine Echtzeit-Prognosen und Dashboards erhalten können oder dass dies hohen Aufwand erfordert. 80% gaben an, dass es für sie schwierig oder sogar unmöglich ist, die Finanz- und Personalprozesse an neue Anforderungen anzupassen. Lesen Sie unser Whitepaper und erfahren Sie, wie Sie die digitale Transformation erfolgreich vorantreiben und den gefürchteten Digital Deadlock vermeiden.
Tags : 
belegschafts technologie, digitale strategie
    
Workday DACH
Published By: NetApp     Published Date: Aug 26, 2016
Flash storage is taking the enterprise market by storm. With all-flash arrays (AFAs) now available from every major enterprise storage vendor, they are quickly becoming a mainstream general purpose deployment platform for mixed workloads. According to IDC, flash technology will come to dominate primary storage platforms by 2020. Read this independent whitepaper to learn what sets the NetApp AFF apart from other AFAs on the market, and discover why IDC describes the AFF as “the crown jewel” in the NetApp portfolio of all-flash storage solutions.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Senn Delaney     Published Date: Dec 15, 2009
A positive customer experience is a critical competitive differentiator it today's stuttering economic climate. Yet consumers are giving companies a failing grade at a time when the need to be customer centric is being put to the test as never before. This whitepaper by Senn Delaney partner and executive vice president Bill Parsons helps leaders consider whether their company's culture is really as customer-centric as it should be.
Tags : 
senn delaney, customer focused, brand management, customer-centric, employee management, employee engagement, other
    
Senn Delaney
Published By: NetIQ     Published Date: Jun 11, 2012
Take the effort out of log management and gain the actionable information you need to improve your organization's security posture. Receive your complimentary whitepaper NOW!
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
    
NetIQ
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.