• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

bi solutions

Results 326 - 350 of 1260Sort Results By: Published Date | Title | Company Name
By: Jamf     Published Date: Jan 18, 2018
Ace your migration with a manageable timeline. Once the decision is made to switch MDM solutions, the first step is to construct a logical, achievable timeline. The timeline should include critical milestones, financial considerations, school breaks, or any other factors that may impact implementation success. Choose a time when devices can be out of use in order to give IT time to make the transition without impacting users. Download this whitepaper to learn more!
Tags : 
    
Jamf
By: Determine (Selectica)     Published Date: Sep 13, 2016
We came to the above conclusion because even though suites solved many of the problems of independent, standalone modules to support integrated procurement processes in terms of data management nightmares, process inefficiency and visibility gaps that were common with first generation "best-of-breed" solutions, many mature organizations are increasingly finding that suites are not enough if they do not connect into larger enterprise processes and support the stakeholder organizations that procurement needs to work with. Are you with us? If you are, then you know that something else is needed: a source-to-pay (S2P) procurement
Tags : 
    
Determine (Selectica)
By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
mobile device, flexibility, risk reduction, data security, agility
    
Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, security, risk reduction, containerization, data security
    
Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
risk reduction, flexibility, mobility, data security, agility
    
Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : 
ransomware, risk reduction, data security, collaboration, containerization
    
Citrix ShareFile
By: Lookout     Published Date: Dec 09, 2016
Get all of your questions about enterprise mobile security, threats, and solutions answered in this essential guide.
Tags : 
    
Lookout
By: Lookout     Published Date: Mar 29, 2017
Read the eBook to learn the difference between securing mobility and mobile security, why Enterprise Mobility Management/ Mobile Device Management (EMM/ MDM) solutions alone are not security, and the kinds of attacks your mobile fleet might be facing.
Tags : 
enterprise, mobile security, basics, ebook, lookout, emm, mdm
    
Lookout
By: Lookout     Published Date: Mar 29, 2017
Over the past year, Gartner has provided important observations and guidance on Enterprise Mobility Management (EMM) and mobile security solutions. Read the report for key insights into the differences between the two as well as to better understand current state of mobile threat defense.
Tags : 
gartner, market, insights, mobile threat, emm, lookout
    
Lookout
By: Lookout     Published Date: Mar 29, 2017
Mobile security is making the role of today’s CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
webinar, mobile security, ciso, lookout
    
Lookout
By: Lookout     Published Date: Aug 30, 2017
In this eBook, you’ll learn about the difference between securing mobility and mobile security, why EMM/MDM solutions alone aren’t security, and the kinds of attacks your mobile fleet might be facing.
Tags : 
mobile security, device security, device attacks, enterprise mobile security
    
Lookout
By: Lookout     Published Date: Aug 30, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
byod, malware threats mobile security, data protection, mobile security solutions
    
Lookout
By: Lookout     Published Date: Aug 30, 2017
The modern organization has recognized the need to embrace mobile devices in the workplace. Some have fully implemented a bring-your-own-device (BYOD) program, while some have adopted a hybrid model of corporateowned and personally-enabled (COPE) devices. Many companies then choose to deploy an Enterprise Mobility Management (EMM) or Mobile Device Management (MDM) solution to enable some control of the mobile devices that access corporate data. For companies at this stage of mobility, security is the next critical layer. As Gartner states, “It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used."
Tags : 
enterprise mobility management, mobile device management, mobile security, mobile security solutions, mobile threats
    
Lookout
By: Lookout     Published Date: Aug 30, 2017
In the past year, Gartner has provided guidance on the differences between Enterprise Mobility Management (EMM) and mobile security solutions.This whitepaper highlights some key takeaways from recent Gartner research, and Lookout encourages organizations to read the full reports to learn more.
Tags : 
mobile threats, mobile security, mobile protection, enterprise mobility management, mobile security solutions
    
Lookout
By: Lookout     Published Date: Dec 13, 2018
Mobile security is making the role of today’s CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
    
Lookout
By: HP Inc.     Published Date: Jul 17, 2017
As a consumer, it’s more than likely that you own at least one item made by Jabil. Headquartered in the U.S., Jabil is one of the world’s most technically advanced manufacturing solutions providers, working with most major consumer brands across more than 100 facilities in 28 countries. Keeping its customers competitive requires Jabil to stay on the cutting edge of engineering, prototyping, and manufacturing. Producing parts on a 3D printer that meet or exceed traditional manufacturing’s cost, quality, and speed gives Jabil’s customers a new edge in the ultra-competitive consumer products market—a benefit that’s especially important to Dulchinos.
Tags : 
3d printing, printer, print services, hp technology, prototyping, 3d printer, production software, printing solutions, digital manufacturing
    
HP Inc.
By: Wasabi     Published Date: Nov 13, 2018
It is critical for media and entertainment companies that they get the most out of the content they’ve invested in. But for many monetization of their assets is being inhibited by slow and expensive tape-based archival solutions (LTO) as well as first generation cloud storage like Amazon. Wasabi Hot Cloud Storage, in partnership with Marquis Medway, is bringing media and entertainment companies a transformative new solution. Wasabi’s next generation cloud storage brings companies the speed they need to leverage their content, but costs far less than the traditional cloud storage options. Plus unlike Amazon and others, Wasabi does not charge you to retrieve your content—potentially a huge savings depending on how much you access it. To help you quickly and efficiently get assets from tape to cloud Wasabi has combined with Marquis Medway’s advanced workflow automation platform. To learn more about how this integrated solution can help you rapidly transition away from resource draining LT
Tags : 
    
Wasabi
By: Zingbox     Published Date: Oct 31, 2017
The arrival of the Internet of Things (IoT) moves on with ever-intensifying pace as enterprises experiment with business projects that incorporate IoT endpoints and technologies. This engagement is necessitating a profound commitment by security and risk management leaders to more capable forms of protection. Several vendors are offering distinct approaches to enterprise mobility management, software composition analysis and asset discovery. This Gartner review of the notable vendors serving IoT engagements looks closely at how these companies developed representative cool technologies and solutions to support the expansion of IoT interconnectivity.
Tags : 
    
Zingbox
By: IBM APAC     Published Date: Jul 19, 2019
Disruption to data availability has the ability to cripple an organisation, and in the consumer goods market, restricted access to data could cause goods to take longer to get to market. To prepare for data outages, it is imperative that businesses have effective backup and recovery solutions in place to minimise downtime and maintain functionality. This case study examines how PT Wings Surya, a leader in the Indonesian consumer goods market, was able to increase business uptime, cut the time taken to run backup jobs from 8 to just 2 hours, and reduce backup costs by 60%.
Tags : 
    
IBM APAC
By: Cohesity     Published Date: Oct 02, 2018
The University of California, Santa Barbara (UCSB) is a public research university and one of the 10 campuses of the University of California system. Its secondary storage was a combination of multiple point solutions. The UI/setup and maintenance was complex. Maintaining multiple licensing and maintenance agreements negatively impacted the administrative cost. The skyrocketing cost for additional backup capacity limited the team’s ability to expand their backup protection to many critical systems. With Cohesity's unified hyperconverged secondary storage platform, the IT team provided a single solution for all 13 departments to consolidate their backups on one platform, and scale-out as required. Read the case study and get details on how UCSB consolidated everything from backup to recovery, analytics to monitoring and alerting.
Tags : 
case, study, ucsb, consolidates, data, protection, cohesity, hyperconverged
    
Cohesity
By: Applause Israel     Published Date: Jun 19, 2018
obile Payments have emerged as a catalyst for transactions across all markets. In underdeveloped markets, mobile payment technology is enabling businesses to sell products and services to consumers that had previously been out of reach. In developed markets, it has made the process of purchasing products and services even simpler. PayPal, one of the most popular digital payment solutions on the market, facilitated $66 billion in payment volume throughout 2015, and now has 188 million active registered user accounts across the US. Furthermore, Statista projects that mobile payments will account for more than $210 billion in transactions by 2019. Mobile payment technology is a step forward in the process of connecting businesses to the people they are serving. However, some merchants will find themselves miles behind their competitors by the time the transition to mobile payments is complete. The reason? A failure to implement the correct mobile payment strategy. An ever-increasing numbe
Tags : 
    
Applause Israel
By: Splunk     Published Date: Nov 29, 2018
IT organizations struggle with numerous challenges — hybrid environments, lack of visibility during cloud migration, multiple infrastructure monitoring tools, and reliance on manual processes. Yet according to a 2018 global survey, less than half of IT practitioners are confident they can ensure performance and system availability with their current toolset. As a Splunk customer, you understand the power of running your monitoring and logging environment in a machine data platform. Are you utilizing your machine data platform to effectively run APM, infrastructure monitoring and Network performance monitoring and diagnostics? This guide outlines the 8 biggest mistakes IT practitioners make and provides solutions, key takeaways and real-world examples to help you improve IT monitoring and troubleshooting in your organization. Download your copy to learn how to: Achieve end-to-end-visibility throughout cloud migration Find trends and root cause faster with automated investigations
Tags : 
application performance monitoring, network tools, network monitoring tools, network monitoring software, network monitoring, it monitoring
    
Splunk
By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, pam/pim solutions, illusive networks
    
Illusive Networks
By: GFT USA, Inc.     Published Date: Jun 26, 2019
Drawing on over 30 years of financial services industry expertise, GFT is GCP’s premiere, go-to, pure play financial services partner enabling GCP services and products greater visibility and utilization within FIs across Capital Markets, Retail, Insurance, and Asset Management business segments. Leveraging reputational credibility from long-standing relationships with top global FIs, GFT offers GCP a unique and invaluable view into pressing problems and potential solutions for the rapidly changing FS market.
Tags : 
    
GFT USA, Inc.
By: Amazon Web Services     Published Date: Oct 09, 2017
Enterprise customers can take advantage of the many benefits provided by Amazon Web Services (AWS) to achieve business agility, cost savings, and high availability by running their SAP environments on the AWS Cloud. Many Enterprise customers run SAP production workloads on AWS today; including those that run on NON-SAP DBs (Oracle, MS SQL, DB2) or on SAP DBs (SAP HANA, SAP ASE). To support the demand of high memory instances, AWS have disclosed their SAP HANA instance roadmap (8TB and 16TB in 2018) and just made 4TB x1e instances available. A few examples of how AWS helped SAP customers cut costs, improve performance and agility include BP reducing 1/3 of their SAP infrastructure cost, Zappos successfully migrating to SAP HANA on AWS in less than 48 hours and enabling a major Healthcare and Life Science company to run BW on HANA with 30% better performance vs. on premise. This guide is intended for SAP customers and partners who want to learn about the benefits and options for running SAP solutions on AWS, or who want to know how to implement and operate their SAP environment effectively on AWS.
Tags : 
storage, networking, management, aws, sap, infrastructure, lower tco, capex, opex
    
Amazon Web Services
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter