framework

Results 26 - 50 of 521Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
IBM
Published By: Akamai Technologies Australia     Published Date: Feb 07, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
    
Akamai Technologies Australia
Published By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
    
Dome9
Published By: Dell DnCP     Published Date: Nov 20, 2018
Forrester Consulting conducted a Total Economic Impact™ (TEI) study to provide readers with a framework to evaluate the potential financial impact of Dell UltraSharp monitors above 27” on their organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed one customer from the global financial services industry with experience deploying Dell monitors. This summary is based on a full TEI study, which can be downloaded here.
Tags : 
    
Dell DnCP
Published By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
    
Akamai Technologies
Published By: Dell     Published Date: Aug 10, 2015
This study provides a framework to evaluate the potential financial impact of an on-premises private cloud deployment. Download this study (commissioned by Dell and delivered by Forrester Consulting) to better understand the benefits on your organization and to understand how leveraging private cloud can help your organization win, serve and retain customers. Costs, flexibility, risks and ROI associated with a private cloud deployment.
Tags : 
    
Dell
Published By: Dell     Published Date: Nov 19, 2015
Here is a simple guide to help you truly leverage the power of cloud now, without creating stumbling blocks in your overall journey.
Tags : 
    
Dell
Published By: Websense     Published Date: Jan 25, 2013
In this whitepaper, we provide guidance and clarity to help you implement a DLP control that is practical, efficient, and effective. Learn about 4 key topics of data breaches, potential vendors, 9 step framework and other best practices.
Tags : 
websense, data loss prevention, executive guide, data loss, practical guide, 4 topics, potential vendors, it management, data management, business technology, data center
    
Websense
Published By: Akamai Technologies     Published Date: Oct 23, 2018
VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution
Tags : 
    
Akamai Technologies
Published By: Sage EMEA     Published Date: Dec 19, 2018
The General Data Protection Regulation (GDPR) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union. EU regulations have direct effect in all EU member states, meaning the GDPR replaces the current Data Protection Directive and applies to all EU member states. The GDPR’s focus is the protection of personal data. In fact, GDPR is one of the biggest shakeups ever seen affecting how data relating to an individual should be handled—and it affects not just companies but any individual, corporation, public authority, agency or other body that processes the personal data of individuals based in the EU. As gatekeepers and processors of personal data, HR and People teams have a crucial role to play in preparing for this step change. The rules on how data is kept and used will become much more stringent, and it’s vital that HR and People teams become more transparent, communicating to employees exactly how their data is processed. In a world where 2,
Tags : 
    
Sage EMEA
Published By: Pega     Published Date: Jun 21, 2016
Organizations are constantly turning to IT solutions to streamline their operations and processes and gain efficiencies. Business Process Management solutions is one area gaining traction inside enterprises as they look to making their workflow more effective and more capable to an ever changing business environment. According to Gartner, BPM-platform-based case management frameworks are configurable "apps" meant to help solution architects accelerate the delivery of unique and flexible case management solutions. Gartner evaluated 11 providers in this growing market segment including Pegasystems.
Tags : 
    
Pega
Published By: Pega     Published Date: Jun 21, 2016
Case management frameworks built on business process management platforms help IT solutions architects deploy case-handling applications and offer an alternative to specialized case management applications and custom coding. According to Gartner, the complex architecture required to support case management has relegated it to the status of a niche application, typically addressed by specialist, commercial off-the-shelf application providers and system integrators. Case management as a process style is being applied in many sectors beyond government, legal and insurance, including healthcare, banking, higher education and retail. Industry and cross-industry case management frameworks are now available. "Adaptive case management" hype exceeds the reality of what buyers need. Gartner evaluated 12 vendors including Pegasystems against nine critical capabilities in four use cases.
Tags : 
    
Pega
Published By: Emmi Solutions     Published Date: Nov 01, 2013
This paper provides a framework to help healthcare organizations achieve effective, affordable and measurable patient empowerment, encouraging populations of patients to take greater responsibility for their own care.
Tags : 
experience, engagement, compliance, patient activation, activation, patient satisfaction, population health, outcomes, clinical outcomes, financial outcomes, accountable care, empower, aco, medical home, triple aim
    
Emmi Solutions
Published By: Pega     Published Date: May 03, 2016
Download this Gartner Magic Quadrant analysis for BPM platform-based case management frameworks and gain a better understanding of the solutions offered by each BPM vendor.
Tags : 
    
Pega
Published By: Cisco     Published Date: Mar 17, 2017
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations.
Tags : 
finance, cost reduction, operations, security engineering, roi, return on investment
    
Cisco
Published By: Cisco     Published Date: Sep 21, 2017
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations.
Tags : 
finance, cost reduction, operations, security engineering, roi, return on investment
    
Cisco
Published By: VMWare - vFabric     Published Date: May 10, 2012
IDC presents a closer look at the structural changes and functionality--including lightweight frameworks, in-memory data management, and application management--required in order to successfully evolve to a cloud-ready application platform.
Tags : 
vfabric, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, networking, data management
    
VMWare - vFabric
Published By: Secureworks     Published Date: Dec 09, 2016
The included Framework for Inquiry is a non-prescriptive exercise that can help boards and management craft a replicable reporting template for reviewing risk levels, measuring operational effectiveness, and prioritizing initiatives over time.
Tags : 
cybersecurity, managed security services, security, threat and vulnerability management, risk management
    
Secureworks
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity
Published By: Adobe     Published Date: Aug 20, 2014
This report reveals what is driving the convergence between eCommerce and WCM solutions and provides a framework for eBusiness professionals to use when considering the pros and cons of using these historically independent platforms together.
Tags : 
commerce and content, digital customer experience, mobile marketing, digital presence, ecommerce and wcm
    
Adobe
Published By: Mimecast     Published Date: Oct 17, 2013
Mimecast commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) global enterprises may realize by using Mimecast’s Unified Email Management (UEM) solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the full Mimecast UEM service on their organizations. Mimecast UEM is a suite of email security, archiving, and continuity services, which can also be purchased separately if required.
Tags : 
mimecast, forrester research, unified email management, uem, economic impact, return on investment, roi, evaluate financial impact, reduce complexity, costs of managing email, email management, email infrastructure, email backup, replication cost avoidance, business continuity, legacy security solutions, productivity gains
    
Mimecast
Published By: Schneider Electric     Published Date: Oct 17, 2016
This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, defines and compares their key attributes, and provides a framework for choosing the best approach(es) based on business requirements.
Tags : 
    
Schneider Electric
Published By: Oracle     Published Date: Mar 28, 2017
Loyalty programs provide a framework to nurture guest relationships, offering recognition, perks and options to redeem rewards. Most importantly, they create guest profiles and transaction histories that yield the insights needed to foster what is demanded today: individualized guest interactions.
Tags : 
hotel, loyalty program, perks, redeem, oracle
    
Oracle
Published By: Q2 eBanking     Published Date: Jul 30, 2017
This report is intended to serve as a guide to an effective digital banking conversion/change management plan. From your initial kickoff meeting to post-launch, you’ll learn about the key components required for success. The framework is the result of interviews with Q2 personnel who have been personally involved in thousands of hours of digital banking conversions, across hundreds of FIs, with every major core banking system on the market over the course of the past twenty years.
Tags : 
    
Q2 eBanking
Published By: CA Technologies     Published Date: Sep 25, 2017
Regardless of the industry, there are several common trends that are reshaping the business landscape. Each one has had a profound effect on the ways companies develop products, bring them to market and compete against their rivals.
Tags : 
portfolio initiatives, vendor, implementation, frameworks, dashboards, metrics
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com