asp

Results 276 - 300 of 552Sort Results By: Published Date | Title | Company Name
Published By: Kaspersky     Published Date: Oct 26, 2016
Download our eBook Healthcare Ransomware: Hospitals on Hold to learn the measures your hospital or healthcare organization can put in place to ensure that this menace does not happen to you.
Tags : 
kaspersky, hospital records, healthcare security, secure data, cybercrime
    
Kaspersky
Published By: Fujitsu     Published Date: Oct 25, 2016
When you embark on an SAP HANA® transformation, your goals include improving efficiencies, serving external customers better and driving business continuity. All too often, the transformation doesn't go as smoothly as it should. Learn key aspects of deploying SAP HANA from your industry peers, as captured by Coleman Parkes Research.
Tags : 
sap hana, hana cloud platform, sap hana cloud platform, sap hana platform, sap hana analytics
    
Fujitsu
Published By: Marketo     Published Date: Oct 17, 2016
The impact of social media transcends almost every aspect of our daily lives—work, politics, breaking news, and more. Today, it’s almost universally used—by consumers and brands—and is one of the most effective channels to connect with your audience. Download this definitive guide to learn how to effectively use social media marketing.
Tags : 
    
Marketo
Published By: Oracle     Published Date: Oct 17, 2016
Change can impact any aspect of business, from daily operations to processes that develop and transport products and services to relationships with customers to sales and profitability, and any size of business, from large enterprises to midsize and smaller companies.
Tags : 
    
Oracle
Published By: Schneider Electric     Published Date: Oct 17, 2016
This paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers.
Tags : 
    
Schneider Electric
Published By: Adobe     Published Date: Oct 10, 2016
We make it our duty to understand all aspects of digital marketing. For seven years, we’ve surveyed hundreds of marketers worldwide to learn how companies are maturing digitally.
Tags : 
    
Adobe
Published By: IBM     Published Date: Sep 21, 2016
Stephanie Fetzer, Product Architect at IBM, discusses various aspects of the Request for Interpretation process for rule questions within the HIPAA Implementation Guides.
Tags : 
ibm, healthcare, implementation, hippa, rules
    
IBM
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
Budgeting is one of the main aspects within your control to influence profits and avoid maverick spend. Budgeting and planning help your organization invests resources to best benefit, based on cautious consideration rather than the urgency to make a short-term decision. Budgets are essential to sustain your company’s economic growth and implementing best practices will guarantee a bright future to your company.
Tags : 
    
Determine (Selectica)
Published By: G/O Digital     Published Date: Sep 08, 2016
In this comprehensive research study, we break down the different aspects of social media advertising during the holiday season, so your business can shine bright during the holidays and beyond!
Tags : 
holiday shopping, social media, holiday revenue, social media optimization, brand identity, marketing strategy, holiday marketing campaign
    
G/O Digital
Published By: Kaspersky     Published Date: Aug 17, 2016
Find the answers you need to know by downloading our new ebook. We’ll break down the statistics on the biggest threats that enterprises face and how you can defend your business.
Tags : 
kaspersky, threat management, vulnerability, external threat
    
Kaspersky
Published By: Kaspersky     Published Date: Aug 17, 2016
Download our eBook to learn what you can expect from the oncoming wave of connected “things.”
Tags : 
kaspersky, iot, internet security, hackers, cybercrime, wireless security
    
Kaspersky
Published By: IBM     Published Date: Aug 08, 2016
IBM API Connect is a comprehensive management solution that addresses all four aspects of the API lifecycle: create, run, manage and secure. This makes API Connect far more cost-effective than limited point solutions that focus on just a few lifecycle phases and can end up collectively costing more as organizations piece components together. Download this datasheet and find out how IBM API Connect can help your organization.
Tags : 
ibm, api, api economy, integration, application program interface, cloud, middleware, digital transformation
    
IBM
Published By: LogRhythm     Published Date: Aug 08, 2016
Over the past three years, ransomware has jumped into the spotlight of the cyber threat landscape. Kaspersky Lab reports that in 2015, its solutions detected ransomware on more than 50,000 computers in corporate networks—double the figure for 2014. Even at this rate of detection, Kaspersky admits that the real number of incidents is several times higher than what has been detected and reported.1 In just the first quarter of 2016, $209 million was paid out to cyber criminals using ransomware. The FBI estimates that losses to be incurred in 2016 due to ransomware will top $1 billion.2 Once again, this is just the tip of the iceberg.
Tags : 
security, technology, best practices, information technology
    
LogRhythm
Published By: Kaspersky     Published Date: Jul 22, 2016
Learn how you can maximize the performance and security of your virtualized machines.
Tags : 
kaspersky, virtual security, virtual environment, data breach, data protection
    
Kaspersky
Published By: Kaspersky     Published Date: Jul 22, 2016
Do you have policies and plans in place to meet your user’s needs while keeping those devices—and your company’s sensitive information—secure?
Tags : 
kaspersky, byod, mobile device management, mobile workers, mobile security, remote security
    
Kaspersky
Published By: IBM     Published Date: Jul 20, 2016
A successful business case is one that enables your organisation’s business leaders to make the right decisionabout a Talent Analytics investment. In this report we highlight the key aspects you need to think about as you create your own business case for Talent Analytics, starting with getting a clear handle on why it is a worthwhile investment for your organisation, but also addressing considerations such as budget and resourcing concerns, how you can measure the success of your initiative and demonstrate ROI, and the major risks you need to bear in mind over the lifetime of the initiative.
Tags : 
ibm, mwd advisors, talent analytics
    
IBM
Published By: Cisco     Published Date: Jul 08, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
    
Cisco
Published By: Equinix     Published Date: Jul 06, 2016
Internet delivery and cloud hosting has transformed all aspects of content and media value chain, impacting how content is created, managed and delivered. Consumers now demand content on any device at any time, regardless of the network they are using.
Tags : 
media, media companies, broadcasters, content, create content, audience, deliver content, content management
    
Equinix
Published By: IBM     Published Date: Jul 06, 2016
Web content management remains a vibrant and growing market, fueled by the aspirations of digital strategists on the demand side and continuous innovation on the supply side. IT application leaders, marketers, digital experience specialists and merchandisers all now view WCM as mission-critical.
Tags : 
ibm, mobile, applications, apps, mobile apps, customer engagement, it application, wcm
    
IBM
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015.1 However, only half of enterprises today are using some type of endpoint backup.2 That means that the volume of endpoint data that is in jeopardy is nothing short of significant.
Tags : 
encryption, data loss prevention, mobile app
    
Commvault
Published By: Puppet     Published Date: Jul 05, 2016
Our recorded Windows webinar series covers all the basics and more to help you get started with Puppet. Each 45-minute recording focuses on a specific task you can automate with Puppet, as well as a demo of how it works. You’ll learn how to use automation to: • Manage local groups and Active Directory membership. • Manage Windows services, install packages and create scheduled tasks. • Deploy IIS and ASP.NET. • Set up Windows for system and application monitoring. • Get started on Azure with Puppet. Puppet can do a lot, so start small and build on each success. Enjoy the demos!
Tags : 
    
Puppet
Published By: Cisco     Published Date: Jun 21, 2016
Mobile devices have brought advancements to virtually all aspects of modern life and have had transformative effects on businesses spanning all industries. However, the positive business effects that can be brought about by mobility and "going digital" are not enjoyed as frequently within small and midsize businesses (SMBs) as they are within larger organizations. While potential benefits are there, small and midmarket organizations may have fewer resources available and can find difficulty in realizing the full value of the enterprise mobility infrastructure. Often, organizations find themselves having to make trade-offs between richness of functionality and available resources.
Tags : 
    
Cisco
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
Chemist warehouse is one of Australia's most remarkable business success stories, doubling sales and growing its national store network from 100 to more than 400 stores in just five years.
Tags : 
kaspersky, kaspersky endpoint security, security, security application, kaspersky solutions, security solutions
    
Kaspersky Lab Australia and New Zealand
Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The school has a reputation for innovation and makes extensive use of technology to educate its students and to prepare them for the technologies which help shape the world of both work and higher education.
Tags : 
technology innovation, technology, technology for education, byod, education
    
Kaspersky Lab Australia and New Zealand
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.