enterprise manager

Results 1 - 25 of 110Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Sep 23, 2019
Customer experience is the new management battleground. You know it better than anyone. Most customer experience best practices center on the value businesses need to bring to customers. But what role do customer needs play in creating an enterprise plan of attack? Get the full scoop. Plus, learn how experience managers at companies like Guitar Center, Nestle, and PETCO keep their brands thriving and competitive. Read CMO Club Solution Guide: Customer Experience Essentials.
Tags : 
    
Adobe
Published By: Akamai     Published Date: Apr 10, 2015
Enterprise network architectures are evolving as a result of the growth of public cloud, proliferation of mobile devices, and organizational requirement to collaborate with global users. In this on-demand webinar, Gartner Research VP and Distinguished Analyst Mark Fabbi and Akamai Technologies' Enterprise Web Experience Product Manager, Greg Lord, will provide insight into this new trend.
Tags : 
akamai, web performance, cloud services, network management, cloud networking, digital enterprise
    
Akamai
Published By: AppDynamics     Published Date: Aug 25, 2015
In collaboration with Enterprise Management Associates (EMA), AppDynamics has conducted a survey of application management professionals and managers to determine exactly what IT organizations want and need from APM providers. Here are some key findings from the research: • Only 30% of companies currently have application-specific solutions to monitor apps • 50% or fewer of the tools companies have purchased are actively being used to monitor apps • 27% of application-related problems are detected by monitoring tools • A “unified monitoring platform” is the top choice in a feature of an APM solution Download the full report to review the findings and understand the key challenges and “must haves” associated with APM solutions voiced by IT professionals themselves.
Tags : 
business technology, digital, customer service, efficiency, operations, infrastructure, business intelligence, business management
    
AppDynamics
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor
Published By: Attunity     Published Date: Nov 15, 2018
Change data capture (CDC) technology can modernize your data and analytics environment with scalable, efficient and real-time data replication that does not impact production systems. To realize these benefits, enterprises need to understand how this critical technology works, why it’s needed, and what their Fortune 500 peers have learned from their CDC implementations. This book serves as a practical guide for enterprise architects, data managers and CIOs as they enable modern data lake, streaming and cloud architectures with CDC. Read this book to understand: ? The rise of data lake, streaming and cloud platforms ? How CDC works and enables these architectures ? Case studies of leading-edge enterprises ? Planning and implementation approaches
Tags : 
optimize customer service
    
Attunity
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development
    
Black Duck Software
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Tags : 
blackberry, enterprise server, desktop manager, communications software, rim, microsoft exchange, mobile device management, mobile device management software
    
BlackBerry
Published By: BlackBerry     Published Date: Jan 06, 2011
With consumer use of smartphones growing by the day, it's no surprise that users are taking them into the workplace as well. Thousands of people already use their personal smartphones for work-related tasks like checking email and calendars when they're away from their desks. And many wish they could do more with their smartphones, given their myriad functions and applications.
Tags : 
blackberry, enterprise server, desktop manager, communications software, rim, microsoft exchange, mobile device management, mobile device management software
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 12, 2013
Installing BlackBerry® Mobile Fusion, upgrading licenses, preparing apps and more – learn how to make your organization’s transition to BlackBerry® Enterprise Service 10 smooth and seamless.
Tags : 
it manager, blackberry, tips, blackberry enterprise service 10, organization transition
    
BlackBerry
Published By: BMC Software     Published Date: Jun 30, 2009
Read a compelling case study by EMA, Inc. to learn how Dell uses BMC CONTROL-M to cut cost and increase productivity with workload automation.
Tags : 
dell, ema, bmc, control-m, itil, it services, application integration, saas
    
BMC Software
Published By: Box     Published Date: Jun 22, 2018
• Enterprise Content Management is a market in transition. And as demand for modernization becomes widespread, long-time leaders are investing in new capabilities to keep up — and bringing more of the market to the cloud to meet the needs of users and IT managers alike. • • This report shows how a range of providers measure up to help companies make the right choice when • requirements are skewed to the needs of information workers who need to create, collaborate on, share, and find enterprise content. • • Use the 2017 Forrester Wave™ report to: o Get educated. Gain an understanding of how the ECM market is changing and why complex, on-premises ECM suites are giving way to Cloud Content Management platforms like Box. o Define your needs. Forrester ranks the top 15 ECM business content vendors based on current offerings, strategy and market presence to help you evaluate vendors that suit your needs. o Select a vendor. Learn how cloud content management platforms like Box are designed
Tags : 
    
Box
Published By: CA SM     Published Date: Jun 02, 2008
Telecom assets are a special class of IT assets that require an accurate inventory for effective financial management. Enterprises should consider the benefits of establishing a "single version of the truth" that comes from linking management of IT and telecom assets with their other systems and processes. An accurate inventory is critical for effective financial management. Managers need accurate information that supports their business decisions.
Tags : 
ca sm, ca service management, service management, telecom, business management, asset management, business integration, convergence
    
CA SM
Published By: CA Technologies     Published Date: Nov 02, 2016
Keeping up with the new pace of change requires building agility into your business to adapt to change faster, while carefully overseeing your investments. The integrated solution of CA Project & Portfolio Management (CA PPM) and CA Agile Central (formerly Rally) helps you effectively balance agility and governance by connecting the work of agile teams to your enterprise portfolio. Supporting an evolutionary approach to adopting agile, the solution lets you continue using traditional methods, while growing agile adoption to deliver on portfolio investments faster—with higher quality and predictable business results. A holistic view across all projects helps portfolio managers optimize budgets and resources for maximum return on investment.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
The rise of the application programming interface (API) represents a business opportunity and a technical challenge. For business leaders, APIs present the opportunity to open new revenue streams and maximize customer value. But enterprise architects are the ones charged with creating the APIs that make backend systems available for reuse in new Web and mobile apps. It is vital that all stakeholders understand that the business goals and technical challenges of an API program are intimately related. Program managers must take responsibility for clearly communicating the key business goals of a proposed API to the architects who will actually build the interface. This eBook outlines best practices for designing results-focused APIs that will form the cornerstone of your API program’s success.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Reconstructing resource management tools to simplify tasks, drive collaboration and facilitate action. People who use technologies at home expect the same ease of use and intuitiveness for the tools they use in the workplace. But enterprise tools aren’t keeping up with the pace of change. Many product and portfolio management (PPM) solutions force resource managers to create entire workflows or navigate through multiple screens just to see the fundamental component of resource management—what their people are working on. Resource managers also cite shortcomings such as no simple way to perform everyday tasks, communicate in context with others, drill down into key information, narrow the field of resources and forecast financials and model outcomes.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
CA Privileged Access Manager protects an organization’s business and empowers its people. The solution protects critical accounts and endpoints while providing a seamless user experience. CA commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and objectively examine the potential return on investment (ROI) and enterprises may realize by deploying its Privileged Access Manager solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the CA Privileged Access Manager solution on their organizations.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
The misuse or takeover of privileged accounts constitutes the most common source of breaches today. CA Threat Analytics for PAM provides a continuous, intelligent monitoring capability that helps enterprises detect and stop hackers and malicious insiders before they cause damage. The software integrates a powerful set of user behavior analytics and machine learning algorithms with the trusted controls provided by CA Privileged Access Manager (CA PAM). The result is a solution that continuously analyzes the activity of individual users, accurately detects malicious and high-risk activities and automatically triggers mitigating controls to limit damage to the enterprise.
Tags : 
    
CA Technologies EMEA
Published By: Cisco     Published Date: Jan 05, 2015
The four pillars of computing — cloud, mobility, social, and analytics — are driving new levels of network innovation in datacenter networks. These forces are now buffeting the datacenter along with virtualization and the Internet of Things (IoT), resulting in sweeping changes in traffic patterns that expose the limitations of traditional networks and their operational models. To become a resource rather than a bottleneck to overall datacenter performance, the network must deliver not just exceptional performance and scalability but also unprecedented automation and orchestration that can yield agility, flexibility, and service velocity. This Technology Spotlight examines these key trends and discusses the role that Cisco's Application Centric Infrastructure (ACI) plays in addressing these ongoing challenges for enterprise IT and network managers.
Tags : 
cloud computing, infrastructure, marketplace, application, hybrid, enterprise
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
This Technology Spotlight examines key trends and discusses the role that Cisco's Application Centric Infrastructure (ACI) plays in addressing ongoing challenges for enterprise IT and network managers.
Tags : 
data center, software, networking, scale, automation, cisco
    
Cisco
Published By: Cisco     Published Date: Sep 15, 2015
This Technology Spotlight examines key trends and discusses the role that Cisco's Application Centric Infrastructure (ACI) plays in addressing these ongoing challenges for enterprise IT and network managers.
Tags : 
iot, datacenter, aci, enterprise, networking
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2015
Industrial enterprises around the world are retooling their factories with advanced technologies to boost manufacturing flexibility and speed, achieving new levels of overall equipment effectiveness (OEE), supply chain responsiveness, and customer satisfaction in the process. This renaissance reflects very real pressures industry players face today. For years, traditional factories have been operating at a disadvantage, impeded by production environments that are “disconnected”—at the very least strictly gated—to corporate business systems, to supply chains, and to customers and partners. Managers of these traditional factories say the feeling is akin to flying blind. These are operations where plant floors, front offices, and suppliers operate in independent silos, where managers have only hazy visibility into downtime and quality problems, and where the root causes of inefficiencies are rarely understood or addressed.
Tags : 
industrial enterprise, manufacturing, connected factory, convergence, automation, business networks, factory-based operational technologies, it networks
    
Cisco
Published By: CradlePoint     Published Date: Sep 04, 2014
In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint solutions. Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI DSS 3.0. Enabling features include network segmentation (ethernet ports, SSIDs, and VLANs), stateful firewall, MAC/IP/URL filtering, authentication/encryption, event logging, event alerts, time synchronization, and configuration/upgrade management from CradlePoint Enterprise Cloud Manager.
Tags : 
cradlepoint enterprise cloud manager, pci dss 3.0, pci compliance, stateful firewall, mac/ip/url filtering, authentication/encryption, event logging, event alerts
    
CradlePoint
Published By: CradlePoint     Published Date: May 17, 2016
Cradlepoint Helps Quick Serve Restaurant Achieve Network Success The combined solution of Cradlepoint AER2100 devices and Cradlepoint Enterprise Cloud Manager (ECM) enables Raising Cane’s to intelligently manage their converged wired and wireless connectivity, utilize advanced security applications like IPS/IDS - all while enabling PCI compliance. This allows Severns and his team to centrally configure, monitor, and manage the Raising Cane’s network with ease.
Tags : 
    
CradlePoint
Published By: Datavail     Published Date: Jan 12, 2018
Your enterprise performance management systems like Hyperion are mission critical. If you’re a Hyperion administrator, manager, or even a finance director, you know a crash, bug, or performance issue can delay reporting and take hours or even days to fix. Fortunately, keeping Hyperion running smoothly – and catching these issues before they happen – is not as impossible or time-consuming as you might believe. Join us for this webinar as we explore and debunk 9 misconceptions of Hyperion Performance Management that are keeping you from effectively managing your platform so financial processes run smoothly.
Tags : 
    
Datavail
Published By: Dell Storage     Published Date: Apr 21, 2011
Enterprise Manager provides a single storage resource management (SRM) interface for one or more Compellent SANs. The software also integrates with VMware vCenter to enhance server and storage visibility and manageability. This demo video shows how to use Enterprise Manager to collect VM host and guest storage statistics from vCenter, create, map and rescan storage volumes, and then format the volumes with VMFS to create datastores or assign the volumes as RDMs to a virtual machine. (3 min)
Tags : 
dell compellent, vcenter integration, compellent enterprise manager, storage resource management, srm, vmware vcenter, server, storage
    
Dell Storage
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.