based

Results 226 - 250 of 3460Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: Oct 08, 2015
Download this white paper to learn how the company deployed a Dell and Hadoop cluster based on Dell and Intel® technologies to support a new big data insight solution that gives clients a unified view of customer data.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Feb 23, 2017
This study provides IT decision-makers with insight on various types of clouds and how they are used today along with a practical framework to evaluate converged infrastructure versus do-it-yourself approaches.  Based on interviews with organizations that implemented VCE solutions, Forrester Consulting quantified how VCE converged infrastructure drove significant increases in IT efficiency and productivity, as well as decreases in the cost associated with infrastructure, security, and compliance. The study describes a process for setting improvement goals and measuring success for infrastructure modernization. This process is supported by an intuitive template.
Tags : 
    
Dell EMC
Published By: Systinet     Published Date: Aug 21, 2009
As a strategy for creating a flexible and agile IT, service-oriented architecture (SOA) has gained considerable momentum in recent years, largely due to the advent of standards-based Web services.
Tags : 
web services security, web services, web service security, information management, business analytics, business metrics, system management software, programming application, service oriented architecture, service-oriented architecture, systinet
    
Systinet
Published By: BMC Software     Published Date: Jan 31, 2014
Consumerization of IT forces enterprises to rethink their approach to IT service delivery. What does consumerization really mean and why does it matter? Understand the basics to accurately identify the practical implications and benefits for your organization. This guide explores the realities of IT Consumerization to define challenges and opportunities. Learn best practices and get actionable recommendations. Please download the whitepaper to learn more.
Tags : 
bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications, internal customers, gartner, itssm, saas, itrpm, it service support management tools, cloud-based, customer experience, consumerization
    
BMC Software
Published By: Apptio     Published Date: Jul 16, 2019
Your business partners need IT to deliver innovation and agility, but traditional budgeting processes struggle to do either. Interested in adopting a zero-based budgeting approach to your organization? Download this eBook to learn: - The limitations of traditional budgeting vs. zero-based budgeting - How to benchmark your budgets against business outcomes - Five myths about zero-based budgeting and why they are wrong - How to confidently build zero-based budgets with the right tool
Tags : 
    
Apptio
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
This report looks at the challenges in the new world of EHR as well as security breaches and other risks that come with storing web-based information.
Tags : 
verisign, health, ehr, security, breaches, risks, web-based, information, patient, privacy, confidential, protect, security, healthcare industry
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Entrust Datacard     Published Date: May 15, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome, mobile browsers
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates.
Tags : 
foundation, extended validation, ssl, trust, ecommerce, cas, security, legitimate
    
Entrust Datacard
Published By: Marketo     Published Date: Mar 16, 2017
This ebook highlights the benefits of ABM and illustrates how you can create and implement a lean and effective ABM initiative right now.
Tags : 
marketo, account based marketing, abm, lead generation, target accounts, market research, list management, lead generation & automation
    
Marketo
Published By: Outreach.io     Published Date: Apr 09, 2018
Selling isn’t about blasting prospects with generic cold emails. That mile wide and inch deep approach might have worked in 1998, but it’s not going to cut it anymore. You need to connect with your prospects on a level that shows you understand their business and their needs. Sales intelligence is the ultimate must-have in your modern, account based sales toolkit because it allows you to learn more about your prospect and, in turn, sell more successfully.Just like you wouldn’t go on a blind date without a little online stalkingresearch, you shouldn’t call a prospect without understanding who they are, where they work, and what matters to them.At the end of the day, when you understand who you’re selling to, you can solve their problems better. This creates happier customers and prospects who trust you, which leads to more closed deals and more fist bumps all around.
Tags : 
    
Outreach.io
Published By: CrowdStrike     Published Date: Aug 01, 2017
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShellattacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn:?Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more?The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model ?How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent attacks
Tags : 
    
CrowdStrike
Published By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
    
CrowdStrike
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"Since a decade the market has seen an outburst of data. With Managing and Securing Data is Crucial. With 3.8 Billion mobile users and 24 Zetta bytes of data created, and 100% attacks that target username and password credentials, managing and securing data has become a crucial and the most critical aspect for almost every Business. Oracle’s SPARC M7 processor, with Oracle’s Software in Silicon technology, is the industry’s most advanced multi thread, multi-core processor with unique capabilities for information security. It sets the foundation for mission-critical cloud based server infrastructure with unprecedented levels of security, efficiency, and performance.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Staples     Published Date: Jan 22, 2018
When Maine-based tubing manufacturer Genplex wanted to cut costs without sacrificing quality, Staples Business Advantage accepted the challenge. Watch this video to see the solution and results.
Tags : 
    
Staples
Published By: CDW Symantec     Published Date: Sep 06, 2012
Hear from real-world IT professionals about their experiences using Backup ExecT 2012.
Tags : 
backup and recovery, cloud based backup systems, symantec, testimonials
    
CDW Symantec
Published By: Dell-Intel     Published Date: Oct 30, 2008
Dell servers have been optimized to help provide strong support for the latest ESX release, VMware ESX 3.5 Update 2, including enhanced performance for virtualized environments based on support for six-core Intel Xeon processors. Organizations that do not approach server virtualization with a clear plan risk developing a chaotic, inflexible infrastructure that wastes energy and resources.
Tags : 
hyper v, dell, intel, it infrastructure, virtualization, server virtualization, esx, tco, total cost of ownership, flexible computing solutions, performance and resource optimization, pro, internet scsi, iscsi, nfs, virtualized
    
Dell-Intel
Published By: IBM APAC     Published Date: Aug 22, 2017
Today’s enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: • Apple iOS and Apple macOS • Google Android • Microsoft Windows
Tags : 
user based context, id management, integration, azure ad, application catalogs, portal, end user store, saas, mdm, client management
    
IBM APAC
Published By: Ciena     Published Date: Nov 15, 2016
Drive smart grid transformation with Ethernet-based packet-optical networks. Download the white paper to learn how.
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh, sonet, sonet definition, what is sonet, sonet ring, sonnet def, sonet network, synchronous optical network, define sonet, g.707, sonet frame structure, sonet technology, sts 12
    
Ciena
Published By: Cisco     Published Date: Sep 27, 2019
Check out this infographic that illustrates how Cisco’s subscription-based software is designed to make networking simple.
Tags : 
    
Cisco
Published By: Persicope Data     Published Date: Mar 07, 2018
Some brands are great at connecting with new audiences. They might have a killer marketing campaign, demonstrably fulfill a gap in the marketplace, or just have that certain “it factor.” Being able to get new customers on board can lead to fantastic short-term financial gains.
Tags : 
    
Persicope Data
Published By: Ecora Software     Published Date: Aug 15, 2007
This whitepaper will teach you the necessary steps any organization must take to comply with the Gramm-Leach-Bliley Act (GLBA). Based on the experienced insight of Alex Bakman, Founder, Chairman & Chief Technology Officer at Ecora Software and Khalid Kark, Senior Research Analyst at Forrester Research, this paper discusses how any organization can reduce compliance costs by automating the process of attaining and maintaining proper financial privacy and consumer data safeguard procedures.
Tags : 
gbla, glba, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Sponsored by HP and Intel®     Published Date: Mar 05, 2013
This paper sponsored by HP and Intel® discusses the dynamics of harnessing information and explains how you can leverage technology to better capitalize on information in the context of your business.
Tags : 
vision for storage architecture, managing storage space, intel, converged storage, information storage
    
Sponsored by HP and Intel®
Published By: Infosys     Published Date: May 21, 2018
Our client offered electronic money transfer services. For years they had provided the digital links and the networks of agents that enabled people to send money quickly and easily around the world. But digital technology introduced a number of challenges to their business. Not only were pure digital payment companies threatening the agent-based model, but their business models had lower operating costs than a network of physical agents. Also, other technologies such as virtual money transfer via blockchain were being more widely adopted. In addition, industry mergers strengthened competitors, while increased protectionism began to reduce the number of migrant workers - the core customers of our client. The digital world was looking like a difficult place to operate in.
Tags : 
money, transfer, digital, technology, business
    
Infosys
Published By: Cisco EMEA     Published Date: Jun 01, 2018
Collaboration, leading to innovation, leading to success. Based upon gathering together to share ideas and information. Working together as a team to bring ideas to life. And putting together a consistently reliable, secure, scalable, easy-to-use, and easy-to-integrate system to empower all of it. Cisco collaboration solutions learn as they work together with your team. Frictionless collaboration experiences make customers happy to work together with you. Work with Cisco Webex. And your teams will work better together.
Tags : 
cisco, collaboration, innovation, webex
    
Cisco EMEA
Published By: SAP     Published Date: Mar 24, 2011
Between May and June 2010 Aberdeen examined the experiences and intentations of more than 170 service and manufacturing enterprises in the use and selection of non-field based service delivery channels enterprises.
Tags : 
multi-channel service delivery, service delivery, multi-channel framework
    
SAP
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.