risk

Results 1 - 25 of 2675Sort Results By: Published Date | Title | Company Name
Published By: FORTRUST     Published Date: Aug 14, 2015
Companies rely on their data center to provide the foundation for much of their business. Because of that, a thorough evaluation of the key geographical factors related to risk mitigation and data center site selection is critical. This white paper examines several of the major criteria to use in geographic data center site selection, and provides an overview of the FORTRUST facility as it relates to those criteria.
Tags : 
    
FORTRUST
Published By: FORTRUST     Published Date: Aug 14, 2015
When companies evaluate potential data centers and colocation service providers, they normally compare them using some kind of criteria or checklist. However, many such efforts fail to sufficiently evaluate the breadth and depth of detail necessary to make a well informed decision. This white paper examines several key criteria as they relate to service delivery from a data center or colocation provider. Specifically, this paper examines the importance of factors such as risk mitigation, operational processes and service assurance, combined with maintenance and lifecycle strategies that directly contribute to “high-availability service delivery.”
Tags : 
    
FORTRUST
Published By: FORTRUST     Published Date: Aug 14, 2015
THE TOP 10 CRITERIA TO DISCUSS WHEN TOURING A DATA CENTER Choosing a data center or colocation provider to house your company’s critical IT infrastructure is a huge decision. Unfortunately, colocation providers don’t make it easy to differentiate between them. Many data center tours will have the same components: a sales rep will show you their data center’s battery rooms, cooling equipment, security measures, and generators, all the while assuring you that they are highly secure, reliable, well maintained, invulnerable to natural disasters, and capable of high density computing. After a few tours, it may seem as though there isn’t much difference between one data center and the next. This couldn’t be further from the truth. It’s important to know what to look for so you can make an informed decision. Migrating your IT environment is risky, often expensive, and certainly time consuming — you want to make the right choice the 1st time
Tags : 
    
FORTRUST
Published By: CyrusOne     Published Date: Jul 06, 2016
CyrusOne’s quick-delivery data center product provides a solution for cloud technology, social media and enterprise companies that have trouble building or obtaining data center capacity fast enough to support their information technology (IT) infrastructure. In trying to keep pace with overwhelming business growth, these companies often find it hard to predict their future capacity needs. A delay in obtaining data center space can also delay or stop a company’s revenue-generating initiatives, and have significant negative impact on the bottom line.
Tags : 
    
CyrusOne
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren’t also introducing security risks, impacting customer experience (CX), or costing more than anticipated? That’s where Akamai comes in. This e-book explains how Akamai’s cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure. Download the e-book to learn how Akamai can help you: Protect your business from cyberattacks Deliver more engaging online experiences Offload traffic to maximize scale, reliability, and cost efficiency"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren’t also introducing security risks, impacting customer experience (CX), or costing more than anticipated? That’s where Akamai comes in. This e-book explains how Akamai’s cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure. Download the e-book to learn how Akamai can help you: Protect your business from cyberattacks Deliver more engaging online experiences Offload traffic to maximize scale, reliability, and cost efficiency"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren’t also introducing security risks, impacting customer experience (CX), or costing more than anticipated? That’s where Akamai comes in. This e-book explains how Akamai’s cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure. Download the e-book to learn how Akamai can help you: Protect your business from cyberattacks Deliver more engaging online experiences Offload traffic to maximize scale, reliability, and cost efficiency" "Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren’t also introducing security risks, impacting customer experience (CX), or costing more than anticipated? That’s where Akamai comes in. This e-book explains how Akamai’s cloud delivery plat
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren’t also introducing security risks, impacting customer experience (CX), or costing more than anticipated? That’s where Akamai comes in. This e-book explains how Akamai’s cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure. Download the e-book to learn how Akamai can help you: Protect your business from cyberattacks Deliver more engaging online experiences Offload traffic to maximize scale, reliability, and cost efficiency"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Your business relies on the cloud for agility, cost savings, and scalability, but how do you ensure that the cloud technologies enabling your business aren’t also introducing security risks, impacting customer experience (CX), or costing more than anticipated? That’s where Akamai comes in. This e-book explains how Akamai’s cloud delivery platform is designed to make the cloud work for you by extending and enabling your cloud infrastructure. Download the e-book to learn how Akamai can help you: Protect your business from cyberattacks Deliver more engaging online experiences Offload traffic to maximize scale, reliability, and cost efficiency"
Tags : 
    
Akamai Technologies
Published By: Dell EMC     Published Date: Aug 06, 2018
Technology is transforming how we do our jobs, and employees expect the business to accommodate their work habits. › Companies must identify roles and profiles and support their needs. Not every employee will require the same devices to get their jobs done efficiently and effectively. It is paramount for organizations to seek out specific devices to enable different worker personas. › IT must become a trusted partner to keep security top of mind. Employees showed a lack of trust toward IT when facing an issue with their device or ecosystem. It is imperative for IT to become part of the solution and not the problem; otherwise, workers will find ways to go around security policies and fix problems on their own, putting the firm at even more risk. › Employees require a more complete ecosystem. Employees need not only devices to get their jobs done effectively but an entire ecosystem as well. Without this, businesses will fall further behind in a fiercely competitive market and lose employ
Tags : 
    
Dell EMC
Published By: Vena Solutions     Published Date: Oct 29, 2018
Based on in-depth research and customer interviews, the annual Nucleus Research Value Matrix map out the corporate performance management (CPM) market landscape, evaluating vendors on a matrix contrasting usability and ease-of-use versus features and depth of functionality. Read or download the 2018 edition to uncover the most up-to-date CPM landscape, to find the best finance software solution for your needs, and to see why Vena led the pack in usability to land in the Leader quadrant for the third straight year.
Tags : 
nucleus research, cpm matrix, cpm technology value, cpm technology matrix 2018, excel replacement, financial planning, budgeting, forecasting, financial modeling, business modeling, finance what-if scenarios, financial close and consolidation, risk and audit management, erp data integration systems, adaptive insights, hyperion, anaplan, prophix, vena solutions
    
Vena Solutions
Published By: Sparton Corporation     Published Date: Oct 09, 2018
Manufacturing suppliers range from approved vendors and contract manufacturers (CMs) who only deliver materials and services to complex strategic partnerships. A transactional relationship based primarily on order fulfillment might work well for some companies. However, by taking a CM relationship to the next level of supplier-partner, organizations gain strategic benefits including cost savings, reduced risks, and optimized profits. The right cultural fit and the right-sized partner for your business can play a key role in building this long-term relationship.
Tags : 
    
Sparton Corporation
Published By: Mimecast     Published Date: Nov 14, 2018
Mike Rothman, President and Analyst at Securosis, and author of The Pragmatic CSO, conducted this study, which breaks down how companies can most effectively change employee security behavior and lower risk. If you want a blueprint for developing an effective program, this is a great place to start.
Tags : 
    
Mimecast
Published By: Lookout     Published Date: Mar 28, 2018
Lookout has developed the Mobile Risk Matrix to help organizations understand the components and vectors that make up the spectrum of mobile risk — and to provide data that will help enterprises gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 30, 2018
Learn best practices for enabling productivity and reducing risk with modern-enterprise mobile security strategies, including important implementation, deployment, and adoption tips for IT managers.
Tags : 
    
Lookout
Published By: Trimble     Published Date: Aug 20, 2018
Are you avoiding the speed bumps that threaten to derail your estimates? The construction business is competitive. Your ability to produce complete and accurate estimates can mean the difference between winning projects—or losing them. If you do win the project, your estimate becomes even more critical. Even a single error has the potential to kill your profit margin. While construction always carries some risk, your estimating process doesn’t need to. In this free eBook, you’ll learn specific strategies to: • Minimize costly errors before they destroy your profit margin • Retain the knowledge of your top estimators, even if they leave • Produce accurate estimates quickly and efficiently Uncover the top three mistakes estimators make—and get the strategies you need to avoid them. Grab your FREE eBook now.
Tags : 
    
Trimble
Published By: Juniper Networks     Published Date: Oct 02, 2018
Without specific and explicit design decisions about not only the network architecture but also network operations,enterprises risk drifting toward a future of many clouds, each with their own operational nuances. Those who are not mindful about managing new additions increase the complexity of their network with each variation. This white paper discusses how to approach the design of the network and operations in the move from cloud to multicloud. The focus is on meeting the business needs of today and tomorrow, battling complexity, preserving the possibilities for options, and supporting IT’s role as the steward of technology decisions for the business.
Tags : 
    
Juniper Networks
Published By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, agile development
    
Black Duck Software
Published By: Group M_IBM Q418     Published Date: Nov 13, 2018
The financial industry is experiencing a significant challenge when it comes to maintaining and establishing trust in its relationships with clients. Customers battered by the constant barrage of publicized data incursions and security breaches are highly sensitized to those signs in their own dealings. They find it difficult to accept any disruption in either their business or their personal financial activities and are easily frightened away from organizations that they perceive as risky.
Tags : 
    
Group M_IBM Q418
Published By: Epicor     Published Date: Sep 21, 2018
Does your current software give your business the visibility and flexibility you need to be responsive and competitive, or is outdated software negatively impacting business growth and excellent service? The retail world is becoming more complex. eCommerce has grown in the U.S.—from $42 billion to $236 billion in the last decade*—and lifestyle shopping is raising customer expectations. Having the right retail management software solution—one that can keep up with your business needs and the increasing pace of technology—is critical. Given the recent advancements in technology—and higher customer expectations—perhaps it’s time to ask if your retail management software is up to the task of nurturing and managing your growth over the coming decade. Epicor has been a part of successful retail businesses for years. Here are some risks you may face from using outdated software: 1. Excessive labor costs and hiring gaps 2. Operational inefficiencies 3. Insufficient data and insights 4. Dimi
Tags : 
retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas, advantages of retail store software
    
Epicor
Published By: Epicor     Published Date: Oct 17, 2018
Does your current software give your business the visibility and flexibility you need to be responsive and competitive, or are you using an outdated software to manage your farm and agriculture retail business? The retail world is becoming more complex. eCommerce has grown in the U.S.—from $42 billion to $236 billion in the last decade*—and lifestyle shopping is raising customer expectations. Having the right retail management software solution—one that can keep up with your business needs and the increasing pace of technology—is critical. Given the recent advancements in technology—and higher customer expectations—perhaps it’s time to ask if your retail management software is up to the task of nurturing and managing your growth over the coming decade. Epicor has been a part of successful retail businesses for years. Here are some risks you may face from using outdated software: 1. Excessive labor costs and hiring gaps 2. Operational inefficiencies 3. Insufficient data and insight
Tags : 
retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas, advantages of retail store software
    
Epicor
Published By: Jamf     Published Date: Nov 05, 2018
Hobson & Company (H&C), a leading research firm focused on total cost of ownership (TCO) and return on investment (ROI) studies, conducted independent research and found that a proven Apple device management solution delivers a quick and compelling ROI to both large and small enterprises. • Simplifying IT management o 90% reduction in time spent managing apps o 80% reduction in time spent provisioning • Improving end-user experience o 60% reduction in end-user productivity loss o 15% reduction in volume of help desk tickets • Mitigating risk o 90% reduction in time spent creating inventory reports o 65% reduction in time spent managing policy and setting changes
Tags : 
    
Jamf
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com