• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

cio

Results 1226 - 1250 of 1306Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Apr 11, 2016
A Adobe foi nomeada líder na Forrester Wave™: Plataformas de Experiências Digitais, segundo o relatório do último trimestre de 2015. Não importa o tamanho do seu negócio, a Adobe Marketing Cloud te dá o poder de entregar experiências individuais relevantes. Baixe o relatório para descobrir o que a Forrester tem a dizer sobre o que temos a oferecer.
Tags : 
adobe, experiências digitais, forrester
    
Adobe
By: Windstream     Published Date: Apr 23, 2013
Organizations should gain several advantages from server virtualization and cloud computing that will improve their overall ROI. This whitepaper discusses the best approach to saving precious IT budgets.
Tags : 
windstream, windstream communications, cloud computing, virtualization, server virtualization, roi, operational budget, servers
    
Windstream
By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
By: Cyveillance     Published Date: Jun 20, 2014
Learn about the recent trends and the 2014 outlook for the mobile security threat landscape. Find out how your organization can better prepare to prevent threats that could disrupt your business.
Tags : 
cyveillance, mobile security, cyberattacks, threats, malicious attacks, security
    
Cyveillance
By: Polycom     Published Date: Dec 18, 2014
How the workplace of the future helps organizations drive innovation.
Tags : 
business, video, conference, multicultural, meetings, communication, cio, digital
    
Polycom
By: Symantec     Published Date: Jul 29, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security, website protection, website threats, symantec, norton
    
Symantec
By: CA Technologies     Published Date: Aug 10, 2015
As organizações ágeis de hoje delegam às equipes de operações um tremendo desafio: implementar novas versões em produção imediatamente depois de completar o desenvolvimento e a prova. Para garantir a implementação exitosa dos aplicativos, se requer um processo automático e transparente. Este proceso é conhecido como Zero Touch Deployment™. Este white paper revisa os dois enfoques de Zero Touch Deployment: uma solução baseada em scripts e uma plataforma de automatização da implementação. O artigo explica como cada um pode resolver os principais desafios tecnológicos e organizacionais que enfrentam as organizações ágeis quando elas se dispõem a por em prática um sistema de implementação automática.
Tags : 
    
CA Technologies
By: Intel Security     Published Date: Oct 20, 2015
Microsoft Office 365 is being rapidly adopted by organizations of all sizes to give users greater flexibility and access to applications anytime, anywhere, and on virtually any device. Despite built-in data protection, additional capabilities are needed to protect precious data from advanced threats and malicious insiders. McAfee Data Loss Prevention offers comprehensive protection for your most sensitive data regardless of where it resides or where it travels—in the cloud or on premises.
Tags : 
data loss prevention, dlp, office 365, security, it management, knowledge management
    
Intel Security
By: NetApp     Published Date: Mar 05, 2018
The proliferation of business unit cloud use is primarily motivated by digital transformation's need for innovation and agility in big data and real-time analytics, rather than cost optimization, which causes overspending. CIOs should use three moves to gain business influence and optimize costs.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
By: ServiceNow     Published Date: Jul 09, 2015
Many CIOs are being pressured to demonstrate IT value. A service catalog can help you promote your services in a way the business can easily understand. It will become your service management foundation that can boost IT visibility and constantly demonstrate IT value to the business.
Tags : 
    
ServiceNow
By: ServiceNow     Published Date: Jul 09, 2015
Enterprises are transforming IT by adopting service automation tools and processes, making teams more innovative and efficient. By consolidating fragmented and redundant service systems, standardizing operational processes and by creating a single system of record for IT, CIOs can shift their attention from maintenance to service, effectively changing enterprise IT.
Tags : 
    
ServiceNow
By: MobileIron     Published Date: Apr 13, 2015
Enterprises around the world have been searching for a way to securely enable Android™ devices for work, but have shied away from the platform due to ongoing security and fragmentation concerns. Delayed or non-existent Android security patches, malicious app store activity, and other security gaps have led organizations to distrust the platform, particularly those in industries with tight security and compliance requirements. This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
    
MobileIron
By: SAP     Published Date: Nov 06, 2015
La gestión del riesgo nunca ha sido tan importante para las empresas, ni tampoco tan difícil. Una nueva investigación mundial encargada por SAP reveló que un entorno cada vez más complejo de riesgos y negocios está presentando importantes desafíos para las compañías. La encuesta realizada por Loudhouse Research a 1.010 ejecutivos con responsabilidad sobre la gobernanza, riesgo y cumplimiento (GRC) de sus organizaciones descubrió que la creciente complejidad normativa y del riesgo ahora es la mayor presión hecha a las funciones de GRC en las organizaciones.
Tags : 
    
SAP
By: SAP     Published Date: Nov 06, 2015
Este informe, basado en una encuesta realizada a más de 200 organizaciones, pone de manifiesto que los usuarios de la nube están buscando una nueva generación de soluciones en la nube que sean simples, altamente colaborativas y que permitan trabajar con procesos de planificación y análisis financieros (FP&A) de alto desempeño que ofrezcan más precisión y eficacia.
Tags : 
    
SAP
By: SAP     Published Date: Nov 06, 2015
En el otoño de 2014, el CFO Research llevó a cabo una encuesta entre los ejecutivos financieros senior de grandes empresas del mundo para examinar el rendimiento operacional de la función financiera. En particular, estábamos interesados en entender la disposición de grandes empresas para transformar las operaciones financieras —eso es integrar y optimizar los diferentes sistemas y procesos que una empresa típicamente emplea para ejecutar actividades financieras de transacción, generación de informes y las relacionadas con el cumplimiento—.
Tags : 
    
SAP
By: SAP SME     Published Date: Aug 13, 2015
¿Sus asociados comerciales tienen exigencias cambiantes? Los clientes controlan cómo y cuándo interactúan con las marcas. En este e-book aprenderá cómo crear interacciones poderosas en cada encuentro. Simplifique su gestión y manténgase un paso adelante con soluciones de interacción con el cliente y comercio de SAP.
Tags : 
productos de consumo, interacción con el cliente, customer engagement, experiencia del cliente, customer experience, comercio electrónico, comercio omnicanal, omnicanalidad
    
SAP SME
By: VMware AirWatch     Published Date: Oct 02, 2015
Hace menos de un año, las predicciones de los analistas inducían a los entusiastas de la movilidad a creer que se acercaba el día del juicio final para el sector de la gestión de dispositivos móviles (MDM).
Tags : 
mdm, containerization, security, enterprise mobility, mobile computing, mobile data systems, mobile workers, best practices
    
VMware AirWatch
By: VMware AirWatch     Published Date: Oct 02, 2015
Hoy, a pesar de la adopción masiva de plataformas móviles, teléfonos móviles y tabletas, los escritorios y aplicaciones de Windows son fundamentales para las empresas. Sin embargo, las arquitecturas de escritorio no han evolucionado con los años como lo hicieron las arquitecturas móviles. Ha llegado la hora de transformar los escritorios.
Tags : 
byod, emm, mobility, mobile computing, mobile data systems, mobile workers, best practices, enterprise software
    
VMware AirWatch
By: VMware AirWatch     Published Date: Oct 02, 2015
Negli ultimi anni, con il diffondersi dei dispositivi mobili nelle imprese il termine "BYOD" è diventato di uso comune negli ambienti di lavoro. Tuttavia, oltre a rappresentare un trend, il suo significato va ben oltre quello letterale dell'acronimo. Il BYOD costituisce un aspetto di un trend molto più ampio e radicato: la consumerizzazione dell'IT, le cui origini risalgono ai primi anni 2000. In quel periodo, la maggior parte delle persone disponeva di un PC con cui lavorare da casa oltre l'orario di ufficio, sfruttando tutti i vantaggi derivanti dall'uso di dispositivi di propria scelta, più agevoli da impiegare rispetto a quelli aziendali forniti dai reparti IT.
Tags : 
byod, mobility, analysis, enablement, mobile computing, mobile data systems, mobile workers, best practices
    
VMware AirWatch
By: VMware AirWatch     Published Date: Oct 02, 2015
En los últimos años, «BYOD», que hace referencia al uso de dispositivos personales en el trabajo, se ha convertido en uno de los términos más utilizados en la empresa, al generalizarse el uso de los dispositivos móviles en muchas organizaciones. Sin embargo, además de ser un término que está de moda, su significado no es el de unas simples siglas.
Tags : 
byod, mobility, analysis, enablement, mobile computing, mobile data systems, mobile workers, best practices
    
VMware AirWatch
By: VMware AirWatch     Published Date: Oct 12, 2015
Organizaciones necesitan encontrar la forma de restringir el acceso de O365.
Tags : 
airwatch, emm, office 365, cloud, enterprise applications, platforms, data management, application performance management
    
VMware AirWatch
By: VMware AirWatch     Published Date: Nov 12, 2015
¿Gestión de dispositivos móviles (MDM), contenedorización o ambas? Hace menos de un año, las predicciones de los analistas inducían a los entusiastas de la movilidad a creer que se acercaba el día del juicio final para el sector de la gestión de dispositivos móviles (MDM). En un acto con analistas celebrado en 2013, un comité de analistas dijo a los asistentes que el fenómeno de uso de dispositivos personales (BYOD) desembocaría en una reducción de los precios, una caída en picado de las ventas y la desaparición de un sector. «En estos momentos, la gestión de dispositivos móviles es un caos y creo que ese mercado va a desaparecer», declaró John Girard ante los asistentes (según CRN.com). Girard predijo una transición hacia la gestión a nivel de aplicación forzada por la tendencia BYOD y la reticencia de los empleados a la gestión de dispositivos personales.
Tags : 
mdm, containerization, security, enterprise mobility, enterprise applications
    
VMware AirWatch
By: VMware AirWatch     Published Date: Nov 13, 2015
Negli ultimi anni, con il diffondersi dei dispositivi mobili nelle imprese il termine "BYOD" è diventato di uso comune negli ambienti di lavoro. Tuttavia, oltre a rappresentare un trend, il suo significato va ben oltre quello letterale dell'acronimo. Il BYOD costituisce un aspetto di un trend molto più ampio e radicato: la consumerizzazione dell'IT, le cui origini risalgono ai primi anni 2000. In quel periodo, la maggior parte delle persone disponeva di un PC con cui lavorare da casa oltre l'orario di ufficio, sfruttando tutti i vantaggi derivanti dall'uso di dispositivi di propria scelta, più agevoli da impiegare rispetto a quelli aziendali forniti dai reparti IT.
Tags : 
byod, vmware, productivity, it management, mobile accessibility, wireless, knowledge management, enterprise applications
    
VMware AirWatch
By: VMware AirWatch     Published Date: Nov 13, 2015
Prácticas recomendadas para implementar un programa BYOD productivo En los últimos años, «BYOD», que hace referencia al uso de dispositivos personales en el trabajo, se ha convertido en uno de los términos más utilizados en la empresa, al generalizarse el uso de los dispositivos móviles en muchas organizaciones. Sin embargo, además de ser un término que está de moda, su significado no es el de unas simples siglas. BYOD forma parte de una tendencia más amplia y arraigada: la consumerización de las TI, que se remonta al principio de la década de 2000. Por aquel entonces, casi todos disponían de un ordenador personal, con lo que podían trabajar desde casa fuera del horario laboral, así como disfrutar de las ventajas de utilizar los dispositivos de su elección y con los que se sentían más cómodos en lugar de usar los dispositivos corporativos que les proporcionaban los departamentos de TI.
Tags : 
byod, vmware, productivity, it management, mobile accessibility, wireless, knowledge management, enterprise applications
    
VMware AirWatch
Start   Previous    39 40 41 42 43 44 45 46 47 48 49 50 51 52 53    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter