• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

apt

Results 1 - 25 of 1511Sort Results By: Published Date | Title | Company Name
By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
By: Global Payments     Published Date: May 02, 2019
The economic face of the APAC region is changing. While the East has long been considered a source of competitively priced raw materials and manufacturing services, the spending power of its inhabitants - and their increased fondness for international travel - has transformed it into a force to be reckoned with. It’s estimated that, over the next five years, 88% of the growth in the global middle class will be in the Asia Pacific region.1 If multinational companies hope to take advantage of this vast new target market, they will need to adapt their expansion strategies and offer APAC customers a tailored retail experience.
Tags : 
apac growth, global payments, luxury brands, trusted payments, localized purchasing, retail, wechat pay, alipay, chinese wallets, global commerce, mobile payments, alternative payment methods, chinese wallets, international payment solutions
    
Global Payments
By: 3D Systems     Published Date: May 15, 2019
La technologie de Frittage sélectif par laser (SLS) est au cœur d'une tendance croissante à la fabrication personnalisée de masse et au prototypage fonctionnel. La disponibilité de technologies de fabrication additive, de matériaux et de finitions adaptés transforme la fabrication. La fabrication thermoplastique numérique directe à partir de données numériques offre une qualité exceptionnelle tout en ouvrant la porte à de nouveaux paramètres de conception que n'autorise pas le moulage par injection.
Tags : 
    
3D Systems
By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Education BUSINESS CHALLENGE Protect student data from threats posed by malware on teachers’ MacBook laptops IT ENVIRONMENT Avast antivirus, enterprise network security layers SOLUTION Malwarebytes Incident Response RESULTS Removed PUPs and malware from hundreds of Mac systems in just minutes Delivered instant visibility into connected systems and quarantined malware Reduced risk with ability to proactively detect and remediate threats
Tags : 
    
MalwareBytes EMEA
By: Intapp     Published Date: May 10, 2019
The Cornerstone of Financial Control Time equals money. Time plus data equals control. All professionals, whether in management, consulting, engineering, or accounting, must be confident that their value is reflected in their bottom line. One of the primary factors driving that compensation is the amount of time spent on a particular subject or client. But too often front line earners at those firms don’t provide the clean, data-rich timesheets needed to accurately gauge the effort required by each project.
Tags : 
business, business intelligence, time, tax, time for tax, intapp, applications, time data, automation, reporting, timekeeping, audit, accounting, consulting, professional services, active time capture, passive time capture, time tracking
    
Intapp
By: Sage EMEA     Published Date: May 13, 2019
Enterprises must continuously change to keep ahead of the competition, reduce silos, improve connectivity and respond rapidly to a changing world. Organisations also need to drive continuous innovation with technology that helps them adapt faster. So if you’re thinking of replacing your legacy ERP system, start by asking yourself these three essential questions:
Tags : 
    
Sage EMEA
By: Zscaler     Published Date: May 15, 2019
Cloud sandboxing protection is as essential to security as keys are to encryption. Preventing CIOs and CISOs from having to make excuses when it comes to APTs, zero-days, and ransomware.
Tags : 
    
Zscaler
By: Black Duck Software     Published Date: Feb 17, 2009
"Agile" software development is an increasingly popular development process for producing software in a flexible and iterative manner that can deliver value to the enterprise faster, reduce project risk and allow adaptation to changes more quickly.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, agile development, business intelligence, project management, database development, web development
    
Black Duck Software
By: Group M_IBM Q2'19     Published Date: Apr 02, 2019
One of the biggest changes faces organizations making purchasing and deployment decisions about analytic databases -- including relational data warehouses -- is whether to opt for a cloud solution.
Tags : 
    
Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
Empowering the Automotive Industry through Intelligent Orchestration With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q2'19
By: Bluecore     Published Date: Mar 04, 2019
For a company that sells wool products, the dog days of summer can be tough. Despite this challenge, Pendleton has managed to stay relevant even during the hottest days of the year thanks to Bluecore. “In June and July, having Bluecore send people emails based on what they browsed is especially helpful because we don’t have as many messages or new products going out. So as often as people come to our site is as often as they’ll get emails, and those emails are guaranteed to be relevant to them. If the onus was on blast emails, then we’d be showing people products that are not necessarily relevant to them or that they might think are terribly out of season,”
Tags : 
email marketing, triggered emails, audience segmentation, email capture
    
Bluecore
By: Forcepoint     Published Date: May 14, 2019
Modernizing the Distributed Enterprise Network Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Enterprise-grade SD-WAN connectivity. Deploy and operate connections between more than 1,000 sites from a single console Security. Top-rated security that doesn’t impede performance and reliability Ease of Deployment and Operation. Built specifically for true, centralized manageability, even at enterprise scale Future-Proof Agility and Flexibility. Adapts to different environments seamlessly Read Modernizing the Distributed Enterprise Network and take the first step toward true network
Tags : 
    
Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for today’s modern threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, an industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
Tags : 
    
Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: • Automate policy enforcement to deter data loss events • Reduce the number of security alerts • Cut down on incident investigation time
Tags : 
    
Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Modernizing the Distributed Enterprise Network Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Enterprise-grade SD-WAN connectivity. Deploy and operate connections between more than 1,000 sites from a single console Security. Top-rated security that doesn’t impede performance and reliability Ease of Deployment and Operation. Built specifically for true, centralized manageability, even at enterprise scale Future-Proof Agility and Flexibility. Adapts to different environments seamlessly Read Modernizing the Distributed Enterprise Network and take the first step toward true network
Tags : 
    
Forcepoint
By: Simba by Magnitude     Published Date: Mar 25, 2019
Software providers say that connecting applications to data sources, having adequate resources to do so, applying an effective maintenance strategy and addressing scalability are top-of-mind challenges. This eBook from the connectivity experts with 100s of person-years of data adapter experience is your how-to guide on the journey toward addressing these challenges to accelerate adoption of your application.
Tags : 
    
Simba by Magnitude
By: Extensis     Published Date: Jun 08, 2010
Metadata Management is the process of ensuring that all metadata associated with a digital asset is captured, organized, stored and made available for use by and within other applications. Metadata Management begins at the moment the digital asset is created by an application or captured by digital imaging.
Tags : 
metadata, management, extensis, digital asset management', business intelligence, configuration management
    
Extensis
By: AdaptivCOOL     Published Date: Jan 11, 2012
The Effects of Real-time Airflow & Cooling Management
Tags : 
    
AdaptivCOOL
By: Precision Fiber Products     Published Date: Sep 19, 2012
Global Supplier of quality fiber optic products: PM connectors, optical attenuators, adapters, ferrules, MIC patch cords & cable assemblies, polishing film, fixtures, Miller tool kits & more.
Tags : 
    
Precision Fiber Products
By: UMEED SOFTWARE SOLUTIONS PVT LTD     Published Date: Feb 18, 2013
OUR ORGANIZATION IS A PRIVATE LIMITED COMPANY AND EXTREMELY SOUND IN SOLAR PV APPOINTMENT SETTING/SURVEY,EVERY INFORMATION GETS CAPTURED VERY CAREFULLY SO THAT THOSE ARE QUALIFY-PRO AND REAL TIME CONVERTIBLE.
Tags : 
    
UMEED SOFTWARE SOLUTIONS PVT LTD
By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Une enquête menée par le groupe mondial d'études sur les marchés des technologies de l'information IDC auprès de 3 500 grands noms de l'informatique à travers le monde montre l'unanimité des entreprises au sujet de PC Lifecycle as a Service qui s'avère économique, rapide et mieux adapté aux employés. Dell PC as a Service (PCaaS) intègre le matériel, les logiciels, les services pour le cycle de vie et le financement dans une solution globale qui propose un prix unique et prévisible par mois et par siège, fourni par le Service financier de Dell. En savoir plus sur les solutions Dell en collaboration avec Intel®
Tags : 
revele, adoption, exponentielle, service, dell, intel
    
Dell PC Lifecycle
By: Cox Business     Published Date: Apr 27, 2017
ealthcare workers understand the complexity of fighting infections better than most. As medications are developed, germs evolve and become resistant to those medications. Over time, germs become incredibly complex and difficult to treat as they continue to evolve and adapt. Unfortunately, computer viruses seem to be following a similar pattern—and the healthcare industry is struggling to catch up.
Tags : 
    
Cox Business
By: Red Hat     Published Date: Sep 09, 2018
As applications and services become more central to business strategy, and as distributed methodologies like agile and DevOps change the way teams operate, it is critical for IT leaders to find a way to integrate their backend systems, legacy systems, and teams in an agile, adaptable way. This e-book details an architecture called agile integration, consisting of three technology pillars—distributed integration, containers, and APIs—to deliver flexibility, scalability, and reusability.
Tags : 
    
Red Hat
By: Cisco     Published Date: Dec 20, 2018
Edison has followed the development and use of Cisco’s Application Centric Infrastructure (ACI) over the past five years. Cisco ACI delivers an intent-based networking framework to enable agility in the datacenter. It captures higher-level business and user intent in the form of a policy and translates this intent into the network constructs necessary to dynamically provision the network, security, and infrastructure services.
Tags : 
    
Cisco
By: QTS     Published Date: Nov 04, 2016
Watch this video to find out how the Chief Operating Officer at QTS has adapted to data center changes!
Tags : 
data center, colocation, decision making process, data management
    
QTS
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter