it management

Results 1 - 25 of 6957Sort Results By: Published Date | Title | Company Name
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Netapp     Published Date: Dec 12, 2014
This ESG Lab Validation report documents the results of hands-on testing of NetApp clustered Data ONTAP in Oracle database environments, with a focus on ease of management, non-disruptive operations, and efficient scaling.
Tags : 
    
Netapp
Published By: Tableau     Published Date: Apr 13, 2018
In this whitepaper, discover the benefits of expanding your analytics toolkit. Combine Excel’s data collection and management capabilities with Tableau’s intuitive, analytical power to transform your raw data into actionable insights. Focus on the questions that take your data beyond the spreadsheet. Read more at about this partnership.
Tags : 
    
Tableau
Published By: HotSchedules     Published Date: Jan 17, 2019
Restaurant inventory management is not a favorite activity among restaurant managers, but that doesn’t mean it has to be painful. The process — especially when conducted with outdated methods — is both tedious and time-consuming. But better inventory management could have a big impact on your restaurant’s bottom line. This infographic tells you how to handle objections from managers who don’t want to your inventory management system and lays out how to fix the problem with modern, mobile inventory tools.
Tags : 
    
HotSchedules
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
IASIS Healthcare LLC executives challenged the Arizona-based supply chain team to find innovative ways to manage inventory and reduce cost. Targeting areas with some of the most expensive supplies—catheterization laboratories and interventional radiology (IR)rooms—the team sought a new way to drive down costs while still providing a wide variety of products, offering patients innovation and high quality, and maintaining physician satisfaction. Read this case study to learn how Arizona Hospitals use STANLEY Healthcare's SpaceTRAX® Point of Use™ Inventory Management System to overcome the challenges of managing inventory in Cath Labs and IR Rooms.
Tags : 
inventory management, healthcare, cath labs, ir room, supply chain, cost reduction, physician satisfaction, medical technology
    
STANLEY Healthcare
Published By: CheckMarx     Published Date: Jun 21, 2019
DevSecOps, modern web application design and high-profile breaches are expanding the scope of the AST market. Security and risk management leaders will need to meet tighter deadlines and test more complex applications by accelerating efforts to integrate and automate AST in the software life cycle.
Tags : 
    
CheckMarx
Published By: Google Apigee     Published Date: Feb 01, 2019
We all use APIs every day. The demands of digital transformation, and the related need for platforms and ecosystems, make it essential to manage APIs throughout their life cycle. We identify the pros and cons of a wide range of API management vendors and offerings, to help you make the right choice.
Tags : 
    
Google Apigee
Published By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
    
OKTA
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
Businesses of all sizes struggle with aging gear and lack of storage. In fact, in a 2018 Enterprise Storage Forum survey, IT and business leaders cited these concerns as their two biggest storage infrastructure challenges. But in mid- to enterprise-sized businesses, where every dollar counts, fixing these problems can feel like a tall order. If you’re going to upgrade your storage, you need to make sure you’re getting an efficient array that will help you maximize the value of your storage and your data. We tested two storage arrays to see which could best help organizations meet these goals: the Dell EMC™ Unity™ XT 880F, and an all-flash offering in the entry-level market from a competitor (“Vendor A”). In our hands-on testing, the Dell EMC Unity XT array processed up to 93 percent more input/output operations per second (IOPS) in an 8KB 100% random read test and reduced 129 percent more data. It also carried out common management tasks faster, cutting the number of deployment steps i
Tags : 
    
Dell EMC Storage
Published By: Sage People     Published Date: Mar 07, 2018
Sage provides an enterprise-level business management solution for services operations; these solutions assist Sage customers with core financial and supply chain management functionality. Sage commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and objectively examine the potential return on investment (ROI) that services organizations may realize by deploying its Enterprise Management solution as part of Sage Business Cloud. The purpose of this study is to provide readers and prospects with a framework to evaluate the potential financial impact of the Enterprise Management solutions on their services organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester conducted in-depth interviews with six Enterprise Management for Services organizations customers, each with at least two to three years of experience using Enterprise Management. For this TEI study, Forrester has created a composite Organization to
Tags : 
    
Sage People
Published By: Apstra     Published Date: Aug 19, 2019
AOS delivers powerful, intent-driven automation of network services in vendor-agnostic environments by delivering it as an easily consumable service in response to consumer-specified intent. Network devices serve packets, AOS services serve application workloads. According to numerous studies, 70-80% of outages are due to configuration change applied to a living system, and not due to initial deployment. Initial, one-time deployment can be seen as sort of a “hello world” application; the real complexities arise as the system evolves. With AOS, configuration, telemetry, and expectations are derived from the single source of truth - the intent - in an idempotent fashion, and as such there is no implementation difference between initial deployment or change management.
Tags : 
    
Apstra
Published By: Sage     Published Date: Oct 17, 2013
See why an appropriate time and attendance system that meets your organization’s needs can help to eliminate and prevent most of the negative aspects of inaccurate and unreliable timekeeping for your business.
Tags : 
employee productivity, workforce management, company culture, employee performance
    
Sage
Published By: Juniper Networks     Published Date: Oct 02, 2018
As the number and variety of threats mushroom, an Ovum survey has found that security teams have become physically unable to respond in an appropriate way to the ones that actually matter, with 50% of respondents in India saying they deal with more than 50 alerts each day. Shockingly, for 6% of organizations, that figure rises to between 100 and 1,000 threats a day. The Solution? Ovum believes that security decision-makers should invest in centralized management capabilities, enabling them to control the disparate security tools in their infrastructure, and address the challenge of prioritizing the volumes of daily alerts they receive. Download the Report to find out what else Ovum has discovered about security practices in India.
Tags : 
    
Juniper Networks
Published By: Polycom     Published Date: Apr 30, 2013
Wearable operational video (such as helmet cams), mobile cameras and sensors, and other visual technologies can provide crucial intelligence, which then can be gathered, communicated to personnel in disparate locations, and integrated to enable unified collaboration for public security responses. The possibility is emerging for a new generation of video applications that will enhance public security and disaster management.
Tags : 
videoconferencing, telepresence, video application, real time video, intelligence, security, crisis management
    
Polycom
Published By: BAE Systems     Published Date: Dec 29, 2015
This framework will help you decide which MSSP best meets the needs of your financial institution
Tags : 
bae systems, applied intelligence, financial institution, managed security, managed security services, managed security service provider, mssp, data breach
    
BAE Systems
Published By: Intel Corp.     Published Date: Aug 08, 2012
This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery. However, the changing demands on IT storage infrastructures have begun to strain the capabilities of initial deduplication products. To meet these demands, a new generation of deduplication solutions is emerging which scale easily, offer improved performance and availability and simplify management and integration within the IT storage infrastructure. HP refers to this new generation as "Deduplication 2.0.
Tags : 
assessing, deduplication, 2.0, second, generation, storeonce, deduplication, appliance
    
Intel Corp.
Published By: Interactive Intelligence     Published Date: Feb 28, 2013
Are your collectors FDCPA-compliant when they're on the phone with consumers? There are many options available to call centers and collection agencies. In this white paper, we get through the thoughts and opinions and various voices in the industry.
Tags : 
better hiring, better work environment, better quality management, fdcpa compliancy, better hiring, better quality management, knowledge management, enterprise applications
    
Interactive Intelligence
Published By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
    
Tenable
Published By: Castlight Health     Published Date: Aug 02, 2016
In this report by Forrester Research, find out what 120 executives in the US with influence and decision-making responsibility regarding healthcare management do to manage costs and increase employee engagement.
Tags : 
    
Castlight Health
Published By: AMD     Published Date: Jul 20, 2012
Business agility be defined as a company's ability to respond to changes in business conditions quickly enough to benefit from them.
Tags : 
virtualization, it support, it management, data managemtn, cloud computing, cloud network, virtual server performance, data migration
    
AMD
Published By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security
    
Limelight
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
IT endpoint management used to be an easier game: Managers deployed user systems with custom images when employees were hired, and employees returned them on their last day at work. Even during deployment, users had minimal abilities to impact systems and devices that were centrally managed. Servers resided in physical data centers where they could be identified and accessed. Those were the days!
Tags : 
    
Group M_IBM Q418
Published By: IBM     Published Date: Jul 26, 2017
A rewarding customer experience is the central aim for luxury gift company 1-800-Flowers.com: a fast, intuitive shopping process helps keep consumers loyal to its brands. Working with IBM, the company has built a master data management (MDM) system that helps deliver a more seamless experience to shoppers across multiple brands and channels.
Tags : 
1 800 flowers, ibm, e-commerce, case study, master data management
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com