assets

Results 26 - 50 of 482Sort Results By: Published Date | Title | Company Name
Published By: ServiceNow     Published Date: Oct 02, 2015
ServiceNow ExpressSM brings together all the great features you need to address these common IT Service Management challenges and more. • Revolutionize request management with a self-service portal and automated routing • Track assets centrally though an integrated CMDB across all IT processes • Make reporting timely and informative with one-click reporting, dashboards and gauges
Tags : 
    
ServiceNow
Published By: ServiceNow     Published Date: Nov 05, 2012
You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization.
Tags : 
itam, servicenow, it asset management, software asset management, sam, security, drive standardization, it management, business technology
    
ServiceNow
Published By: Canon Business Process Services     Published Date: Aug 28, 2013
Effective records management programs mitigate records compliance risk, leverage proven technology, gain more control over its information assets, improve operational efficiency and offer the ability to continuously improve.
Tags : 
records management, records management compliance, records retention, records retention schedule, electronic documents, electronic records management, document imaging, document and print management, document management services, managed print services, document processing center, document workflows, business management, business imaging, knowledge management, enterprise applications
    
Canon Business Process Services
Published By: Dell     Published Date: Feb 07, 2018
How can IT put PCs in the hands of their users without draining staff time and resources? IDC has put forth a deployment optimization model to help IT organizations understand how to deploy systems in less time, with fewer resources, and with better results. The model provides plenty for IT professionals to think about, including the wisdom of leaving some or all of the tasks to deployment experts who deploy PCs all day, every day. Join this on demand webcast today to learn about IDC’s view of the PC market, where it is headed, and best practices associated with their deployment optimization model. Speakers: • Rob Brothers, IDC, Program Vice President, Software and Hardware Support and Deployment Services • Jason Christensen, Dell EMC, Product Manager Intel Inside®. Powerful Productivity Outside. Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: Dell     Published Date: May 08, 2018
How can IT put PCs in the hands of their users without draining staff time and resources? IDC has put forth a deployment optimization model to help IT organizations understand how to deploy systems in less time, with fewer resources, and with better results. The model provides plenty for IT professionals to think about, including the wisdom of leaving some or all of the tasks to deployment experts who deploy PCs all day, every day. Join this on demand webcast today to learn about IDC’s view of the PC market, where it is headed, and best practices associated with their deployment optimization model. Speakers: • Rob Brothers, IDC, Program Vice President, Software and Hardware Support and Deployment Services • Jason Christensen, Dell EMC, Product Manager Intel Inside®. Powerful Productivity Outside. Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell
Published By: Dell     Published Date: Jan 29, 2019
Best Practices to Effectively and Efficiently Deploy PCs and Other Assets
Tags : 
    
Dell
Published By: Cisco     Published Date: Sep 21, 2017
Digital transformation isn’t a technology or a product. Rather, it’s a philosophy for using digital assets to change the way an organization runs. It involves realigning technology and modifying business processes to better engage employees, customers and other constituents of the extended enterprise. Digital transformation significantly improves the performance and reach of an enterprise and has become a top priority for IT and business leaders across the globe. Read on to find out how Cisco's Architecture can enable Digital Transformation.
Tags : 
digital transformation, architecture, business processes, best practices, customer engagement, employee engagement
    
Cisco
Published By: Panasonic     Published Date: Aug 04, 2016
Whether deploying, securing or managing mobility solutions in a professional environment, enterprise leaders must go to great lengths to ensure their investments are effective and easily assimilated into their existing workflows. In order to avoid encountering challenges with rugged mobile devices and other specialist mobile solutions, it is crucial for businesses with field workforces to leverage services and partners that can help them instill strategic best practices across the entire spectrum of mobilization, including security and data protection, installation and integration, training, maintenance and warranties, and proper disposal of old assets.
Tags : 
mobile devices, mobility, managing mobility, best practices, productivity
    
Panasonic
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
This workshop explains and demonstrates how to secure your infrastructure, protect your digital assets, and automate threat detection and incident correction—providing complete visibility into your data center security operations.
Tags : 
    
Hewlett Packard Enterprise
Published By: Secureworks     Published Date: Nov 11, 2016
In this white paper we will discover what the evolving path ahead for security leaders looks like, the importance of communication from top to bottom, focusing on how proactive measures can stop threat actors from derailing businesses, and how building a security architecture that protects the most critical assets will support the overall goals of an organisation.
Tags : 
managed security services, security, threat and vulnerability management, security, security architecture, cyber security
    
Secureworks
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged identity, accounts and credentials are core, critical assets for enterprises that must be highly protected through a combination of technology and processes which are enabled by privileged access management. Delivering that protection is instrumental in breaking the data breach kill chain, helping to prevent attacks and mitigating the impact of those that do occur.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
CA Technologies
Published By: Adobe     Published Date: Nov 11, 2015
This paper reveals the seven trends impacting how digital marketers create, manage, deliver, and optimise their digital assets.
Tags : 
7 trends in digital asset use, create content, manage content, delivery content, omptimise content, customer experience, marketing channel, customer interaction, personalised customer interaction
    
Adobe
Published By: Adobe     Published Date: Nov 11, 2015
This paper reveals how to use DAM to keep up with the constantly accelerating pace of digital business.
Tags : 
dam, digital asset management, digital assets, key considerations when choosing dam
    
Adobe
Published By: Adobe     Published Date: Nov 11, 2015
This paper reveals the seven trends impacting how digital marketers create, manage, deliver, and optimise their digital assets.
Tags : 
7 trends in digital asset use, create content, manage content, delivery content, omptimise content, customer experience, marketing channel, customer interaction, personalised customer interaction
    
Adobe
Published By: Adobe     Published Date: Nov 11, 2015
This paper reveals how to use DAM to keep up with the constantly accelerating pace of digital business.
Tags : 
dam, digital asset management, digital assets, key considerations when choosing dam
    
Adobe
Published By: Adobe     Published Date: Nov 11, 2015
This paper reveals the seven trends impacting how digital marketers create, manage, deliver, and optimise their digital assets.
Tags : 
7 trends in digital asset use, create content, manage content, delivery content, omptimise content, customer experience, marketing channel, customer interaction, personalised customer interaction
    
Adobe
Published By: Adobe     Published Date: Nov 11, 2015
This paper reveals how to use DAM to keep up with the constantly accelerating pace of digital business.
Tags : 
dam, digital asset management, digital assets, key considerations when choosing dam
    
Adobe
Published By: Adobe     Published Date: Jul 04, 2016
Your effectiveness at creating, sharing and deploying creative digital assets has a direct impact on your ability to create compelling customer experiences. And digital asset management (DAM) is the foundational piece in that effort. But be careful. There’s danger in the attitude, ‘We have a DAM.
Tags : 
creative digital assets, share digital assets, asset management, digital asset management, dam
    
Adobe
Published By: Adobe     Published Date: Jul 04, 2016
Your effectiveness at creating, sharing and deploying creative digital assets has a direct impact on your ability to create compelling customer experiences. And digital asset management (DAM) is the foundational piece in that effort. But be careful. There’s danger in the attitude, ‘We have a DAM.
Tags : 
creative digital assets, share digital assets, asset management, digital asset management, dam
    
Adobe
Published By: Adobe     Published Date: Jul 04, 2016
Your effectiveness at creating, sharing and deploying creative digital assets has a direct impact on your ability to create compelling customer experiences. And digital asset management (DAM) is the foundational piece in that effort. But be careful. There’s danger in the attitude, ‘We have a DAM.
Tags : 
creative digital assets, share digital assets, asset management, digital asset management, dam
    
Adobe
Published By: Tenable     Published Date: Aug 07, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
    
Tenable
Published By: Tenable     Published Date: Aug 07, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
    
Tenable
Published By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com