external data

Results 1 - 25 of 72Sort Results By: Published Date | Title | Company Name
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: SAP     Published Date: Mar 09, 2017
There’s strong evidence organizations are challenged by the opportunities presented by external information sources such as social media, government trend data, and sensor data from the Internet of Things (IoT). No longer content to use internal databases alone, they see big data resources augmented with external information resources as what they need in order to bring about meaningful change. According to a September 2015 global survey of 251 respondents conducted by Harvard Business Review Analytic Services, 78 percent of organizations agree or strongly agree that within two years the use of externally generated big data will be “transformational.” But there’s work to be done, since only 21 percent of respondents strongly agree that external data has already had a transformational effect on their firms.
Tags : 
    
SAP
Published By: Zaloni     Published Date: Apr 24, 2019
Why your data catalog won’t deliver significant ROI According to Gartner, organizations that provide access to a curated catalog of internal and external data assets will derive twice as much business value from their analytics investments by 2020 than those that do not. That’s a ringing endorsement of data catalogs, and a growing number of enterprises seem to agree. In fact, the global data catalog market is expected to grow from US$210.0 million in 2017 to US$620.0 million by 2022, at a Compound Annual Growth Rate (CAGR) of 24.2%. Why such large and intensifying demand for data catalogs? The primary driver is that many organizations are working to modernize their data platforms with data lakes, cloud-based data warehouses, advanced analytics and various SaaS applications in order to grow profitable digital initiatives. To support these digital initiatives and other business imperatives, organizations need more reliable, faster access to their data. However, modernizing data plat
Tags : 
    
Zaloni
Published By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
To overcome the challenges and risks of the digital era, while positioning their businesses for success, SMBs need to partner with professional services organizations with the expertise that can safely guide them through achieving the following six key IT business initiatives: Data mobility A strong information security framework (for external and internal threats) 24x7 application availability Scalable infrastructure Pervasive, end-to-end data protection End-to-end professional services
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Modern storage arrays can’t compete on price without a range of data reduction technologies that help reduce the overall total cost of ownership of external storage. Unfortunately, there is no one single data reduction technology that fits all data types and we see savings being made with both data deduplication and compression, depending on the workload. Typically, OLTP-type data (databases) work well with compression and can achieve between 2:1 and 3:1 reduction, depending on the data itself. Deduplication works well with large volumes of repeated data like virtual machines or virtual desktops, where many instances or images are based off a similar “gold” master.
Tags : 
    
Hewlett Packard Enterprise
Published By: Commvault     Published Date: Jul 06, 2016
Email is the backbone of today’s corporate business processes. It lives as the primary communication vehicle internally between employees and externally with customers, vendors, partners and investors. It is arguably today’s most pervasive and critical business application within which is stored the most valuable business content. To protect this vital information while working to eliminate risk, lower management costs and improve business insight, companies require a comprehensive email archiving solution. This solution should not only work to effectively retain email information in a searchable repository, the best email archiving solutions also provide a smarter approach to collecting, retaining and accessing data so that it can deliver true business value.
Tags : 
commvault, email archiving, data protection, email archiving solution, mailbox archiving, reduce bloat, o365, it management, storage, business technology
    
Commvault
Published By: SAS     Published Date: Jan 17, 2018
Consider the many ways that a customer encounters your brand – organic results on a search engine, display media campaigns, social media links, re-targeting on external sites, etc. One thing is certain – consumer journeys are far from linear. They can occur across multiple platforms, devices and browsers. The problem is that organizations are often constrained to channel-limiting decisions regarding their media investment allocations. Marketing attribution helps you analyze the impact and business value of company-generated marketing interactions to help make the best marketing investment decisions. The challenge is to interpret the massive volumes of customer data that continues to expand day by day.
Tags : 
    
SAS
Published By: AWS     Published Date: Sep 05, 2018
Amazon Redshift Spectrum—a single service that can be used in conjunction with other Amazon services and products, as well as external tools—is revolutionizing the way data is stored and queried, allowing for more complex analyses and better decision making. Spectrum allows users to query very large datasets on S3 without having to load them into Amazon Redshift. This helps address the Scalability Dilemma—with Spectrum, data storage can keep growing on S3 and still be processed. By utilizing its own compute power and memory, Spectrum handles the hard work that would normally be done by Amazon Redshift. With this service, users can now scale to accommodate larger amounts of data than the cluster would have been capable of processing with its own resources.
Tags : 
    
AWS
Published By: Infosys     Published Date: May 30, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : 
internal, applications, data, hacks, privacy, enterprises
    
Infosys
Published By: RMS     Published Date: Jul 18, 2019
When evaluating single risks, underwriters and coverholders typically have to request exposure analytics from their portfolio managers and brokers, or gather their own supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones, through to lookups on Google Maps. But all this takes valuable time, requires multiple user licenses and can generate information that is inconsistent with the underlying modeling data at the portfolio level.
Tags : 
    
RMS
Published By: IBM     Published Date: Apr 12, 2016
The digital transformation that organizations are striving for today requires a mindset of "no limits" in terms of securely exposing critical business assets for internal and external consumption. In order to be an agile, digital business, enterprises need to seamlessly connect across hybrid environments, applications, data and processes, keeping a keen eye on an open cloud strategy. They also need a secure integration framework to provide controlled access, a single dashboard providing performance insights, and easy access to digital assets for your developers. This webcast will explore all of these areas in depth, to support your enterprise's quest to become a next-generation digital business.
Tags : 
ibm, digital business, api economy, api management, apim, api, enterprise applications, business technology
    
IBM
Published By: Dell     Published Date: Feb 02, 2018
All companies, small and large, grapple with infrastructure growth and IT modernization. For many companies, datacenter infrastructure has become an essential part of a hybrid cloud environment that allows users to consume internal and external resources seamlessly. This, in turn, is helping modernize today's datacenters and drive new levels of agility, productivity, and scale. A common attribute of modern datacenter infrastructure is solutions that provide all compute and data services as a single system that can be managed holistically at a rack scale. IDC refers to such solutions as converged infrastructure.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: Feb 07, 2018
All companies, small and large, grapple with infrastructure growth and IT modernization. For many companies, datacenter infrastructure has become an essential part of a hybrid cloud environment that allows users to consume internal and external resources seamlessly. This, in turn, is helping modernize today's datacenters and drive new levels of agility, productivity, and scale. A common attribute of modern datacenter infrastructure is solutions that provide all compute and data services as a single system that can be managed holistically at a rack scale. IDC refers to such solutions as converged infrastructure. Intel®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Published By: Globalscape     Published Date: Nov 14, 2016
Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you’ll learn: - 3 layers most targeted: the network, data & users - Bad security practices - Why Managed File Transfer is a critical component to combat bad practices
Tags : 
globalscape, managed file tracker, data security, data breaches, security, enterprise applications, business technology
    
Globalscape
Published By: Pure Storage     Published Date: Jul 18, 2017
OTS' experiences with all-flash technology mirror what many customers have experienced over the past several years. Hesitatingly optimistic, OTS deployed its first AFA in a limited environment to prove the system out, and when it performed and/or exceeded the company's expectations, it quickly started moving more workloads to it over time. Like OTS, many customers do not immediately retire their legacy storage, but in moving the more demanding workloads off of their existing environments, they provide better application performance both for those applications on the AFA and for those that stay on the legacy storage. And like OTS, the majority of AFA customers have in the past year in particular come to the conclusion that all-flash technology is the future of primary storage for performance, reliability, ease of management and expansion, and economic (as measured by total cost of ownership) reasons.
Tags : 
external storage systems, flash arrays, scale-up, scale-out, managing it infrastructure, data center, idc, market intelligence
    
Pure Storage
Published By: Pure Storage     Published Date: Jul 26, 2017
OTS' experiences with all-flash technology mirror what many customers have experienced over the past several years. Hesitatingly optimistic, OTS deployed its first AFA in a limited environment to prove the system out, and when it performed and/or exceeded the company's expectations, it quickly started moving more workloads to it over time. Like OTS, many customers do not immediately retire their legacy storage, but in moving the more demanding workloads off of their existing environments, they provide better application performance both for those applications on the AFA and for those that stay on the legacy storage. And like OTS, the majority of AFA customers have in the past year in particular come to the conclusion that all-flash technology is the future of primary storage for performance, reliability, ease of management and expansion, and economic (as measured by total cost of ownership) reasons.
Tags : 
external storage systems, flash arrays, scale-up, scale-out, managing it infrastructure, data center, idc, market intelligence
    
Pure Storage
Published By: IBM     Published Date: Mar 29, 2017
Not just some data—all of it. Internal, external, structured, unstructured, historical, real-time. And what if you could do it without a huge infrastructure project? You can. Take a closer look at how three companies capitalized on more data—almost instantly—with IBM® BigInsights® on Cloud.
Tags : 
analyze, data, cloud, ibm, analytics
    
IBM
Published By: CA Technologies     Published Date: Jan 06, 2014
This report examines the issues around the adoption of cloud-based services and looks at the security technology that is being deployed by enthusiasts and why the avoiders are holding back.
Tags : 
mediacom, cloud-based services, adopt the cloud, security of data, effective security, security technology, sensitive data, cloud avoiders, in-house deployments, cost of ownership, external interaction, identifiable data, security services, access management, identity governance, drivers and blockers, data management, data center
    
CA Technologies
Published By: Qlik     Published Date: Oct 13, 2015
Read more to learn how modern companies are adjusting to the BYO (Bring Your Own) data trend by combining external data with internal content.
Tags : 
qlik, data discovery, business intelligence, analytics, user produced content, cloud, social, data visualization, external data, internal content, data management, business technology, data center
    
Qlik
Published By: MuleSoft     Published Date: Apr 13, 2016
APIs are the key to creating new digital channels. They facilitate internal and external data sharing, enable mobile applications, and create new monetization opportunities. APIs are the key to creating new digital channels. They facilitate internal and external data sharing, enable mobile applications, and create new monetization opportunities. Read this eBook to learn: -how to define the business objectives that APIs will help achieve -best practices to design, manage, and deploy APIs -monitor and measure the impact of your APIs
Tags : 
digital infrastructure, data, data sharing, best practices, data management, application management, enterprise applications
    
MuleSoft
Published By: Looker     Published Date: Dec 03, 2015
Everywhere you look, companies are using external-facing analytics to maximize the value derived from their data assets, by moving customers up the value chain, increasing stickiness, and offering a more competitive product on the marketplace. Listen to learn about embedding BI software, including; • Top uses cases for embedding business intelligence software • Case studies from different companies currently embedding BI • Build vs buy considerations • Evaluating ROI
Tags : 
    
Looker
Published By: IBM     Published Date: Apr 21, 2016
Industry analysts expect North American sports industry revenue to grow at a compounded annual rate of 4.8% to reach $67.7 billion by 2017, with customer-generated data the most collected type of external data.1 IBM Fan Insight, a software as a service-based solution available in the IBM Softlayer Cloud, and offers sports teams the breakthrough customer intelligence they need to lead in their industry.
Tags : 
ibm, sports marketing, sports industry, fan insight, kpi dashboard
    
IBM
Published By: OracleSMB     Published Date: Jan 04, 2018
Compliance and risk management issues affect small and medium-sized businesses. They are not just a concern for larger, public companies, but smaller companies have fewer resources to deal with the regulatory demands that affect them. Instead of hiring expensive external resources to ensure compliance, invest in financial compliance cloud technology to continuously monitor and provide feedback on your compliance efforts. It will lower long-term costs, improve collaboration, and increase confidence in data security and financial reports.
Tags : 
    
OracleSMB
Published By: TIBCO Software     Published Date: Feb 14, 2019
Digital business initiatives have expanded in scope and complexity as companies have increased the rate of digital innovation to capture new market opportunities. As applications built using fine-grained microservices and functions become pervasive, many companies are seeing the need to go beyond traditional API management to execute new architectural patterns and use cases. APIs are evolving both in the way they are structured and in how they are used, to not only securely expose data to partners, but to create ecosystems of internal and/or third-party developers. In this datasheet, learn how you can use TIBCO Cloud™ Mashery® to: Create an internal and external developer ecosystem Secure your data and scale distribution Optimize and manage microservices Expand your partner network Run analytics on your API performance
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: Feb 14, 2019
Digital business initiatives have expanded in scope and complexity as companies have increased the rate of digital innovation to capture new market opportunities. As applications built using fine-grained microservices and functions become pervasive, many companies are seeing the need to go beyond traditional API management to execute new architectural patterns and use cases. APIs are evolving both in the way they are structured and in how they are used, to not only securely expose data to partners, but to create ecosystems of internal and/or third-party developers. In this datasheet, learn how you can use TIBCO Cloud™ Mashery® to: Create an internal and external developer ecosystem Secure your data and scale distribution Optimize and manage microservices Expand your partner network Run analytics on your API performance
Tags : 
    
TIBCO Software
Start   Previous   1 2 3    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com