iot

Results 1 - 25 of 571Sort Results By: Published Date | Title | Company Name
By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
    
Entrust Datacard
By: Schneider Electric     Published Date: Jul 01, 2019
The first-ever Global Digital Transformation Benefits Report is here. The report analyzes 230 customer stories and 330 data points to provide concrete evidence on digitization's disruptive potential. It examines how digital transformation has driven CapEx and OpEx savings, sustainability initiatives, equipment uptime, and other key business goals. It also includes stories from 34 of our customers, including how: • Tata Power, an Indian power company, cut power restoration times from hours to seconds. • New Belgium Brewing, a US beer company, cut downtime by 50%. • Vitens, a Dutch water utility, shrank deployment times by 65%.
Tags : 
digital, iiot, water, food and beverage
    
Schneider Electric
By: Schneider Electric     Published Date: Jul 01, 2019
This eGuide examines how the IIoT, big data, and augmented reality are enabling a new era of cost reduction, asset management, and worker safety in water and wastewater processing.
Tags : 
augmented reality, big data, water
    
Schneider Electric
By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
Today's energy, environment, and utility companies face an unfamiliar landscape in which they must integrate alternative energies, expand situational awareness across the system, and deepen their relationships with customers-all while continuing to deliver reliable, safe, and affordable electricity, gas and water to everyone.By combining predictive analytics with IoT, cloud and mobile technologies, utilities companies can Lower costs, improve operational efficiency and increase equipment reliability.
Tags : 
    
Group M_IBM Q3'19
By: Flexential     Published Date: Jul 17, 2019
The hybrid cloud has arrived for the enterprise, but it comes with a complication: the speed of light. Between the cloud and the end user (including IoT devices that count as ‘users’), there is an emerging need for an intermediate environment that can satisfy real-time compute requirements without incurring the latency of reaching all the way to the cloud. ‘Edge compute’ is the phrase used to describe what covers this middle ground, but the optimal location for edge compute resources remains open to question.
Tags : 
    
Flexential
By: Right Networks     Published Date: Aug 13, 2019
For Denise Bailey, Principal at Elliot Davis, staying on top of the latest accounting technologies is a critical component of her job – and one that she’s extremely passionate. When evaluating new technologies, Denise puts a premium on security, customer service, and a flexible integrations environment. Read the full story to learn how the firm and its QuickBooks Desktop Enterprise clients have benefited from anytime/anywhere access and enhanced security with a cloud hosting.
Tags : 
    
Right Networks
By: Great Bay Software     Published Date: Jan 09, 2019
IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better informed decisions and deliver powerful customer experiences. But how are organizations really putting IoT to work for their business? And how can IoT risks be mitigated so these rewards can truly be achieved? This e-book explores the potential of IoT in the enterprise, which industries are leading the way and how to secure your connected things. It also provides: • 7 best practices for data privacy and security policies • 7 items to consider for device security • 6 key considerations for network connection security
Tags : 
    
Great Bay Software
By: Great Bay Software     Published Date: Jan 09, 2019
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
    
Great Bay Software
By: Juniper Networks     Published Date: Jul 29, 2019
Get the Secrets to Designing a Resilient, Secure Campus Network. Download our 2019 buyer's guide to learn more. It’s challenging to design, deploy, and manage a campus network. Adding to this, aging equipment can slow your network down and hinder your ability to advance IT innovations that help keep your business competitive. What's more, the proliferation of devices and IoT sensors can expose your network to cyberattacks and other security threats. Our 2019 Buyer’s Guide can help you modernize your campus network, reducing OpEx while delivering a richer, more reliable user experience. Learn about the key trends and challenges that shape your campus network design and the essential considerations that should influence your selection process.
Tags : 
multiprotocol label switching (mpls), switching, ethernet network services, data center design, data center management
    
Juniper Networks
By: ASG Software Solutions     Published Date: Jun 05, 2009
ASG's Business Service PortfolioT (BSPT) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce
    
ASG Software Solutions
By: Comcast Business     Published Date: Feb 06, 2019
Just like your business, technology never stops advancing. Each year, there are new ways that technology can automate processes, lower costs, and enhance customer and employee satisfaction - all with the goal of increasing revenue! And while it can be difficult to change how your business works, leaving old methods behind and embracing new technology can help lead your business to more success and growth.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet
    
Comcast Business
By: Comcast Business     Published Date: Feb 06, 2019
The technology landscape in the financial services sector is vast, ranging from cutting-edge to mission-critical, each having an impact on the industry as a whole. Customer-facing services and back-end operations alike are seeing real benefits from innovation, including greater efficiencies and higher levels of customer satisfaction.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet
    
Comcast Business
By: Comcast Business     Published Date: Feb 06, 2019
The rate at which technology is evolving is increasing almost exponentially. In the business sector, hardware has given way to software-defined everything, while many on-premises technologies are now offered as a service. Much of the advances in technology over the last few years have been the direct result of the growing ubiquity of the cloud and faster connectivity speeds, both of which have enabled companies to adopt digital transformation technologies to help them work smarter and more efficiently.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet
    
Comcast Business
By: Patriot Capital     Published Date: Oct 06, 2011
There are significant tax benefits in the Stimulus Act that are about to expire at midnight on December 31st, 2011. Take advantage of them now!
Tags : 
    
Patriot Capital
By: SAP     Published Date: Mar 09, 2017
Small and midsize retailers around the world are seeing their businesses transform in a variety of ways. These firms, typically with fewer than 1,000 employees, have been transforming themselves as customers seek new types of engagement and as suppliers expect higher levels of efficiency and effectiveness. New business models and new competitors are changing the way retailers do business. Rather than simply react to new threats, successful retailers are leveraging technology in new ways to sharpen business practices, improve agility, and better serve customers while strengthening the role of retailers in the supply chain. Through digital transformation including the effective engagement of the internet of things (IoT) to track inventory, the opportunity to maintain and gain competitive advantage can be significant.
Tags : 
    
SAP
By: SAP     Published Date: Mar 09, 2017
In April 2016, SAP commissioned Forrester Consulting to evaluate how enterprises are taking advantage of IoT, how IoT fits into broader digital transformation initiatives, and the role of immediate insights in realizing the benefits that IoT can deliver.
Tags : 
    
SAP
By: SAP     Published Date: Mar 09, 2017
There’s strong evidence organizations are challenged by the opportunities presented by external information sources such as social media, government trend data, and sensor data from the Internet of Things (IoT). No longer content to use internal databases alone, they see big data resources augmented with external information resources as what they need in order to bring about meaningful change. According to a September 2015 global survey of 251 respondents conducted by Harvard Business Review Analytic Services, 78 percent of organizations agree or strongly agree that within two years the use of externally generated big data will be “transformational.” But there’s work to be done, since only 21 percent of respondents strongly agree that external data has already had a transformational effect on their firms.
Tags : 
    
SAP
By: Cisco     Published Date: May 24, 2019
Today’s organizations are becoming more innovative and dynamic by adopting mobility, IoT, analytics and cloud technologies. With this, come growing demands for network scale, agility and threat protection which call for an intent-based network. The Cisco® Digital Network Architecture (Cisco DNA) gives you comprehensive intent-based networking across your campus, branch and WAN with robust wired, wireless, and routing solutions.
Tags : 
    
Cisco
By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
By: Lenovo UK     Published Date: Mar 14, 2019
An increasingly tech-savvy workforce is changing the future of work and the workplace. The workplace is now where your people are, not where they go – whether that’s the public space of a coffee shop or private space at home. Working hours are no longer standard, dictated by the tasks to be done, not by the clock. Work tools are no longer based only on workplace technology. The same cool features used in consumer devices, such as touch, are now required for workplace devices. It’s this familiar, smart technology that keeps people, across the generations, happy, productive and engaged. This dynamic IT is the foundation for a smart workplace that will enable you to attract and keep top talent – and shape the future-ready enterprise, now.
Tags : 
dynamic it, smarttechnology, dynamicworkplace, security-first, smartit, workplacesecurity, cybersecurity, iot
    
Lenovo UK
By: Lenovo UK     Published Date: Mar 14, 2019
In today’s workplace, work happens where we are, not where we go. To support this you need the four pillars of dynamic IT Download this infographic to find out how Lenovo can help you deliver the dynamic IT your workforce requires.
Tags : 
smarterworking, future-ready, dynamicit, remoteworking, workplaceit, smarterworkforce, dynamicworkplace, mobility
    
Lenovo UK
By: Cisco EMEA     Published Date: Mar 05, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The evolution of IT requires a network that evolves along with IT’s changing requirements – a network that continuously adapts to ever-changing security threats, and evolving digitization, mobility, IoT and cloud requirements.
Tags : 
networking, enterprise, architecture, applications
    
Cisco EMEA
By: BigCommerce     Published Date: Oct 16, 2018
Businesses who have lived through the evolution of the digital age are well aware that we’ve experienced a generational shift in technology. The rise of software as a service (SaaS), cloud, mobile, big data, the Internet of Things (IoT), social media, and other technologies have disrupted industries and changed customers’ expectations. In our always-on, buy anything anywhere world, customers want their shopping experiences to be personalized, dynamic, and convenient. As a result, many businesses are trying to reinvent themselves. Success in a fast-paced economy depends on continually adapting and innovating. Companies have to move quickly to keep up; there’s no time for disjointed technologies and old systems that don’t serve the customer-obsessed mentality needed to thrive in the digital age.
Tags : 
    
BigCommerce
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
    
Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
La sécurité est une préoccupation permanente pour les entreprises Le paysage des menaces ne cesse de se développer et les attaques sont de plus en plus complexes. Si les technologies émergentes telles que l'Internet des objets (IoT), la mobilité et les environnements informatiques hybrides font apparaître de nouvelles opportunités commerciales, elles introduisent également de nouveaux types de risques. Protéger les serveurs au niveau logiciel n'est plus suffisant ; pour garder un temps d'avance sur les menaces, les entreprises doivent se protéger au niveau des systèmes physiques. Avec la multiplication des contraintes réglementaires, la conformité joue un rôle de plus en plus critique à la fois sur l'augmentation de la sécurité et sur la réduction du coût des non-conformités. Ces différents aspects étant extrêmement critiques, il est très important de définir des niveaux de protection matérielle et d'appliquer les mesures de sécurité jusqu'à la chaîne d’approvisionnement. À cet effet,
Tags : 
    
Hewlett Packard Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.