uc

Results 51 - 75 of 18963Sort Results By: Published Date | Title | Company Name
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
    
Juniper Networks
Published By: Ruckus Wireless     Published Date: Jul 16, 2018
Students and teachers at Belleville Township High School District now rely on Ruckus Networks to stay connected to laptops, tablets, and smartphones. With Ruckus Cloud Wi-Fi, the IT team at Belleville Township High School District is able to access and manage WLANs with a click of a button. Read this case study to learn why they chose Ruckus Cloud Wi-Fi, allowing Belleville to take classroom learning to the next level.
Tags : 
    
Ruckus Wireless
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
HPE SimpliVity hyperconverged technology for data protection. IDC believes that IT organizations should take a fresh look at data protection and availability and unbind themselves from the limitations of client/server era technologies.
Tags : 
    
Hewlett Packard Enterprise
Published By: Polycom     Published Date: Apr 30, 2013
Wearable operational video (such as helmet cams), mobile cameras and sensors, and other visual technologies can provide crucial intelligence, which then can be gathered, communicated to personnel in disparate locations, and integrated to enable unified collaboration for public security responses. The possibility is emerging for a new generation of video applications that will enhance public security and disaster management.
Tags : 
videoconferencing, telepresence, video application, real time video, intelligence, security, crisis management
    
Polycom
Published By: Intel Corp.     Published Date: Aug 08, 2012
This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery. However, the changing demands on IT storage infrastructures have begun to strain the capabilities of initial deduplication products. To meet these demands, a new generation of deduplication solutions is emerging which scale easily, offer improved performance and availability and simplify management and integration within the IT storage infrastructure. HP refers to this new generation as "Deduplication 2.0.
Tags : 
assessing, deduplication, 2.0, second, generation, storeonce, deduplication, appliance
    
Intel Corp.
Published By: Workday Netherlands     Published Date: Mar 28, 2019
Uit nieuw onderzoek van IDC en Workday blijkt dat er in veel organisaties een digitale disconnectie bestaat. De kloof tussen de agenda van de CDO en het vermogen van de belangrijkste bedrijfssystemen om het bredere digitale transformatieprogramma te ondersteunen, wordt steeds groter. Dit heeft verschillende oorzaken: 80% zegt dat ze nieuwe digitale oplossingen niet, of slechts met moeite, kunnen integreren met bestaande processen voor finance en HR 80% geeft aan dat ze niet, of slechts met moeite, kunnen beschikken over realtime forecasts en dashboards 80% vindt het moeilijk of onmogelijk om finance- en HR-processen aan te passen aan nieuwe wet- en regelgeving Download ons whitepaper en lees alles over succesvolle, schaalbare digitale transformatie – en hoe u een digitale impasse voorkomt.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday Netherlands
Published By: iboss     Published Date: Jan 22, 2018
While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world combat is the best course to success.
Tags : 
iboss, device security, intrusion, network security
    
iboss
Published By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
10-page white paper on disrupting technologies: Read this paper to learn about technologies that are disrupting how business is conducted— and how they impact and are impacted by your data center infrastructure. We define the ideal IT environment, and present ways to achieve it with flexible, composable infrastructure.
Tags : 
    
Hewlett Packard Enterprise
Published By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
    
Tenable
Published By: VMS     Published Date: Jul 16, 2009
As a marketer you know that there is no singular silver bullet that will suddenly elevate your communications to a point where everyone runs out to buy your product. That's why it is important to understand the importance of an integrated approach for your communications strategies and learn how to monitor them. Read this study to learn how major brands address the issue and coordinate their Advertising and PR efforts.
Tags : 
advertising, marketing, vms, social media, roi, vantage, business intelligence
    
VMS
Published By: IBM     Published Date: May 16, 2017
Technology has always enabled companies to reinvent how they engage with customers. But now we are seeing a profound shift – the convergence of physical and digital customer interactions – which is fundamentally changing how customers will interact and transact with brands and businesses everywhere. To better understand these dynamics, the IBV is conducting a Customer Experience (CX) study, published as a series, with multiple reports organized by topic.
Tags : 
customer experience, digital perforamnce, it performance, digital experience, digital experience monitoring
    
IBM
Published By: IBM     Published Date: Jul 14, 2017
Technology has always enabled companies to reinvent how they engage with customers. But now we are seeing a profound shift – the convergence of physical and digital customer interactions – which is fundamentally changing how customers will interact and transact with brands and businesses everywhere. To better understand these dynamics, the IBV is conducting a Customer Experience (CX) study, published as a series, with multiple reports organized by topic.
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 14, 2017
Technology has always enabled companies to reinvent how they engage with customers. But now we are seeing a profound shift – the convergence of physical and digital customer interactions – which is fundamentally changing how customers will interact and transact with brands and businesses everywhere. To better understand these dynamics, the IBV is conducting a Customer Experience (CX) study, published as a series, with multiple reports organized by topic.
Tags : 
digital interaction, experience design, interactive experience, cross functional collaboration, customer experience, integrated data
    
IBM
Published By: IBM     Published Date: Oct 10, 2012
It is clear that we live in a land of the survival of the fittest. This same scenario is certainly not news to the CIO of any enterprise data center, especially in the data center with a mission-critical infrastructure.
Tags : 
it infrastructure, data, servers, unix, ibm
    
IBM
Published By: IBM     Published Date: Jan 09, 2014
As vendors abandon the UNIX market, IBM continues its commitment to AIX and POWER7 components on Power Systems. And with its recent architectural upgrades, it’s even redefining performance. Read the Clipper Group white paper and see how POWER7’s faster processors accelerate the delivery of applications and services, and improve the utilization of resources.
Tags : 
power7 system, ibm, power7 servers, mission-critical, data center, it infrastructure, architecture, bladecenter
    
IBM
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use
    
ForeScout
Published By: Dell EMC     Published Date: Aug 22, 2017
Dell EMC Isilon® scale-out NAS is the ideal platform to store, manage, protect and analyze your unstructured data. Isilon is the only platform that scales capacity and performance in minutes – allowing you to infinitely consolidate unstructured data, cut costs, and gain new levels of agility and insight to accelerate your business.
Tags : 
    
Dell EMC
Published By: Aria Systems     Published Date: Jun 15, 2016
Expanding and enriching the educational experience through a streamlined, broadened networkBYOD in the classroom and one-student-one-device trends meant Kentucky’s Bullitt County Public Schools needed an easily configurable, reliable and scalable network. Read this case study to discover the benefits of WLAN technology in the educational world >
Tags : 
    
Aria Systems
Published By: Avaya     Published Date: Jun 15, 2016
Expanding and enriching the educational experience through a streamlined, broadened networkBYOD in the classroom and one-student-one-device trends meant Kentucky’s Bullitt County Public Schools needed an easily configurable, reliable and scalable network. Read this case study to discover the benefits of WLAN technology in the educational world.
Tags : 
mobile device, best practices, networks, technology
    
Avaya
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
    
IBM
Published By: Gigamon     Published Date: Sep 03, 2019
We’ve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened. On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption. During this webinar, we’ll talk about: -How TLS/SSL encryption has become a threat vector -Why decryption is essential to security and how to effectively pe
Tags : 
    
Gigamon
Published By: Jamf     Published Date: Nov 05, 2018
This year higher education IT teams have focused on improving student outcomes by supporting success initiatives through technology. In this white paper, learn how 1-to-1 iPad programs can drive improved student outcomes through student wellness, engagement and career readiness. Also, gain helpful insight on how to start, manage and thrive with your own 1-to-1 iPad program.
Tags : 
    
Jamf
Published By: Lumesse     Published Date: May 15, 2015
This paper explores how critical it is to have an agile talent management strategy in place. Being mobile and social are key to attracting, developing and retaining the cream of Gen Z.
Tags : 
gen z, employees, retain talent, talent management, strategy, generation z, workplace, hr trends
    
Lumesse
Published By: Clicktale     Published Date: Dec 04, 2012
In this guide, we'll be introducing the full gamut of web solutions, starting with tools that evaluate your entire site traffic, and ending with techniques and best practices for understanding the individual user.
Tags : 
customer experience analytics, web optimization, web analytics, customer experience/engagement
    
Clicktale
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.