lock down

Results 1 - 25 of 66Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Nov 08, 2017
Digital developments are forever shaping the way we work, bringing new innovations through our office doors almost every day. These high-demand technologies have increased expectations, with organizations now having to drive business agility at unprecedented levels. Although we’re presented with enormous opportunity, we also face new obstacles that can block the path to success; obstacles such as the need to innovate quickly, keep costs down, and actively respond to competitive pressures.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
By: Carbonite     Published Date: Jan 04, 2018
It’s the moment every IT department dreads: A data loss event takes your business offline and the countdown clock begins. Despite spending countless hours safeguarding against and preparing for this moment, the impact of downtime is immediate and all-consuming. While IT pros can’t always avoid data loss events, they can prepare for them to ensure minimal downtime. To better understand the IT experience during a data disaster, EVault commissioned Spiceworks Voice of IT to survey IT pros regarding disaster recovery practices and perceptions. All survey respondents were based in the U.S. and have influence over backup/disaster recovery purchase decisions. This e-book will explore the impact of downtime and data loss on IT departments for small and midsize businesses.
Tags : 
    
Carbonite
By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
By: Dell EMC     Published Date: May 10, 2017
In this short presentation from PUND-IT, discover why a Global 500 retailer—struggling with managing increasingly complex IT and supply chain environments—chose Dell EMC Vblock Systems over HPE to manage a variety of workloads and realize significant savings. Download this report from Dell EMC and Intel® to learn more.
Tags : 
    
Dell EMC
By: EMC Converged Platforms     Published Date: Aug 25, 2015
In the past decade, information technology has evolved from an enabler of back-office business process to the very foundation of a modern business. IDC interviewed 16 EMC customers who had recently deployed VCE Vblock® systems. Results included: • 4.6X more applications deployed • 96% reduction in downtime • 4.4X faster app delivery • 41% less time keeping the lights on Download this white paper to learn how to leverage convergence to drive business agility to accelerate your pace of innovation, provide flexibility to meet new demands and continually reduce the costs of operations.
Tags : 
    
EMC Converged Platforms
By: Adobe     Published Date: Nov 25, 2013
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer? Please download to learn more.
Tags : 
it management environment, document integration, document security, mobile, mobile apps, personal devices, define data, mobile workforce
    
Adobe
By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
By: Salesforce     Published Date: Jan 06, 2016
Salesforce Research surveyed more than 2,300 global sales leaders to discover: The unifying goals, stumbling blocks, and success metrics for today’s sales teams How high-performing sales teams are evolving to stay ahead of the curve Areas where sales is doubling down to supercharge business in the next 12–18 months. This report highlights sales trends in 2015, including the central role of sales teams in an integrated customer success platform. Throughout the report, data is examined relative to sales performance to identify patterns for overall customer success.
Tags : 
    
Salesforce
By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies
By: MarkLogic     Published Date: Sep 29, 2017
The clock is ticking: It’s time to future proof your data for MiFID II (and future regulations). Learn how to accelerate your MiFID II Compliance--within 30 days. Download our Quick Start Guide, designed to get you up and running with the major components and related processes for MiFID II, including an approach for building a fully integrated regulatory reporting solution. In the Quick Start Guide, we’ll cover: - What our consulting service can help you accomplish in 30 days - Key factors for your success - How we work - Why financial institutions trust MarkLogic for successful MiFID II implementations • CTA Button: o Get the Quick Start Guide
Tags : 
    
MarkLogic
By: FinancialForce     Published Date: Dec 01, 2017
The Professional Services industry is in its fourth consecutive year of steady growth and not slowing down. If you are looking to grow your business it's crucial to evaluate your current systems and processes to ensure they are drivers and not road blocks. Download this whitepaper and read the top 9 reasons why Professional Services works better on the Salesforce platform to help drive growth and bridge the services and sales divide for smarter services delivery.
Tags : 
    
FinancialForce
By: Vectra Networks     Published Date: Aug 03, 2015
Organizations invest heavily to block advanced attacks, on both endpoints and networks. Despite all this investment, devices continue to be compromised in increasing numbers and high-profile breaches continue unabated. Something doesn’t add up. It comes down to psychology: security practitioners want to believe the latest shiny widget for preventing compromise will finally work and stop the pain.
Tags : 
data, security, threats, protection, advanced threat, ips, ids, firewall
    
Vectra Networks
By: Puppet     Published Date: May 20, 2016
At Puppet, we've been looking at the state of DevOps practices for several years and helping organizations achieve higher levels of efficiency. We’ve learned a lot about the impact of DevOps at varying stages of IT automation maturity. As DevOps has moved from theory to implementation for more organizations, a host of DevOps myths have blocked adoption in many organizations. This publication debunks these myths so your organization can automate, innovate, and get ahead. Download this publication, featuring research from Gartner, to discover: - Why DevOps is applicable to legacy environments, traditional enterprises and hierarchical organizations. - Practices that underpin DevOps, from version control to automated testing to infrastructure as code. - How companies like Walmart, Staples, Ambit Energy and Infusionsoft have embraced DevOps and IT automation.
Tags : 
    
Puppet
By: GE Power     Published Date: Oct 05, 2016
Cyber attacks against utilities and power producers are on the rise. Prudent leaders are taking action now to lock down their control systems and operations assets before a potentially catastrophic event occurs. Download the eBook “5 Security Imperatives for Power Executives” to learn how to prepare and react to threats to your business and the public you serve.
Tags : 
energy cyber security, power plant cyber security, digital security for power plants, dcs security, ics security, power plant cyber risk
    
GE Power
By: Teradata     Published Date: Jan 16, 2015
NedTrain, a maintenance and cleaning service provider for locomotives, turns to Teradata Analytics for SAP® to unlock the valuable insight hidden in their newly implemented SAP® R/3 system. Impact and encourage positive end results...Download now!
Tags : 
teradata, sap, maintenance, cleaning service provider, locomotives
    
Teradata
By: Teradata     Published Date: Jan 27, 2015
There is little question about the role that SAP® BW has historically played in the SAP® infrastructure. It has been a key element in unlocking SAP’s vast and complex store of operational data housed in their ERP applications. One can easily think of BW as the original Rosetta Stone for this data. For without it, end users and IT shops would have faced daunting coding tasks attempting to cull the proper elements out of the SAP® ERP code for reporting. However, BW and the associated tools around it were rudimentary to begin with, and have not advanced to where it meets the pressing demands of todays’ end users. The New Rosetta Stone 2.0 for SAP® ERP Data —And More. Download now!
Tags : 
rosetta stone, data, erp, sap®, teradata
    
Teradata
By: Success Factors     Published Date: Jul 02, 2013
Every small and medium-size business needs to map out a comprehensive talent strategy. You can help your company avoid roadblocks by reading the SuccessFactors white paper “Steer your business to handle change by creating the right road map for your talent journey.” Understand how you can navigate major changes such as growth, expansion, efficiency and innovation. Download the white paper and navigate the path to success.
Tags : 
talent management, successfactors
    
Success Factors
By: Riverbed     Published Date: Apr 26, 2012
In this report, Taneja Group explores how Riverbed Technology has identified a way to lower IT costs in branch offices. The new Steelhead EX + Granite appliance combines a "branch-office box" virtualized hardware platform with a first-of-its-kind block storage technology to allow consolidation of edge storage, servers, and applications to the data center. Download the report to learn how your organization can benefit.
Tags : 
riverbed, wan optimization, infrastructure, virtual server, technology
    
Riverbed
By: Riverbed     Published Date: Apr 26, 2012
This informative ESG Lab report examines the Riverbed Steelhead EX + GraniteT appliance, which delivers a powerful combination of wide area network (WAN) optimization, a virtual services platform, and innovative block-storage optimization to help organizations consolidate servers and storage and deliver IT services globally, while ensuring the performance required in remote and branch offices. Download this informative report now to find out how edge-VSI can improve your IT infrastructure.
Tags : 
riverbed, wan optimization, infrastructure, virtual server, technology
    
Riverbed
By: Enterprise Mobile     Published Date: Jul 09, 2013
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management
    
Enterprise Mobile
By: Microsoft Windows     Published Date: Mar 31, 2017
Worried about cybercriminals taking down your business? Outsmart them with Windows 10. The threat landscape has evolved dramatically in recent years. It seems every day we hear another headline about an organization getting breached. We've responded by changing the architecture of Windows 10 so that we’re not just building bigger walls against these attacks; we’re locking the criminals out. Windows 10 provides a comprehensive set of protections against modern security threats. Download this Infographic to learn more!
Tags : 
    
Microsoft Windows
By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software
    
Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Start   Previous   1 2 3    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.