• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

dam

Results 1 - 25 of 823Sort Results By: Published Date | Title | Company Name
By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
    
Fidelis Cybersecurity
By: Fidelis Cybersecurity     Published Date: May 15, 2019
This report, conducted by SC Media and sponsored by Fidelis asked security leaders, decision makers and influencers what they were most concerned about, what their C-Suite was most concerned about, and what they’re doing (or planning to do) about it. As we start off 2018 it is clear that cybersecurity is ripe for transformation. The focus has shifted away from tactical technologies that provide more proverbial fingers in the dam and towards a strategic approach that focuses on delivering quantifiable improvement to the effectiveness and efficiency of security operations. Download this a research report to: See what executives and boards of directors care most about. See the top obstacles, gaps and concerns faced by security leaders. See where we are on the road to cyber maturity, as reported by your peers. See when security professionals prefer tactical approaches and when they prefer strategic plans.
Tags : 
    
Fidelis Cybersecurity
By: Schneider Electric     Published Date: May 20, 2019
Keeping aging switchgear performing at optimum performance levels can be challenging. When it comes to the reliability of an electrical distribution system, it’s not a question of if a system component will malfunction, but when. Electrical equipment ultimately degrades and reaches the end of its useful life, no matter how much maintenance is performed. And, with the advancements in the design of the new circuit breakers, those with older technology are no longer considered sustainable solutions. Plant managers and engineers must ensure continuity of operations and develop a plan to replace or upgrade aging switchgear. Facilities without a properly-implemented strategy put operations at risk that could lead to safety issues, equipment damage and/or downtime.
Tags : 
modernization, electrical distribution system, schneider electric
    
Schneider Electric
By: PwC     Published Date: May 14, 2019
Coding errors are common--and costly. There were $2.91B in OIG investigative recoveries for FY18 alone. Hospitals need to catch coding errors prior to billing, or risk heavy fines, legal issues and even a damaged reputation. What if you could catch coding errors prior to billing? PwC SMART increases the efficiency and effectiveness of inpatient and outpatient coding quality evaluation process, and enables a mechanism for quality and compliance review. See how SMART led to $1.8M in net reimbursement impact for a network of independent healthcare providers in New Jersey, and learn more about the inpatient and outpatient solutions.
Tags : 
    
PwC
By: CheckMarx     Published Date: Apr 03, 2019
Following a paper released by the US Department of Homeland Security, software security is fundamentally a software engineering issue that must be addressed systematically throughout the software development lifecycle.
Tags : 
    
CheckMarx
By: Forcepoint     Published Date: May 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Organizations need to fundamentally rethink how they address cybersecurity for today’s modern threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment. See how Dynamic Data Protection, an industry-first solution, uses human-centric behavior analytics to continuously determine the risk cyber identities pose, based on their actions.
Tags : 
    
Forcepoint
By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
By: Extensis     Published Date: Mar 07, 2008
The Photography Department at The National Gallery of London wanted to give other Gallery departments better visibility into its archived library of images and reduce the administrative workload for its photographers. Read how Portfolio Server and Portfolio SQL-Connect painted the perfect solution to this challenge.
Tags : 
extensis, portfolio server, sql, asa, dam, digital asset management, business intelligence
    
Extensis
By: Extensis     Published Date: May 04, 2008
With a library of thousands of on- and off-line slides growing by 1,200 new images monthly, chaos was spreading like a disease in The Pathology Department at Oregon Health & Science University. Until they found the perfect solution to help them organize, track and access their image library - Portfolio Server.
Tags : 
extensis, ohsu, library, dam, solutions, digital asset management', business intelligence
    
Extensis
By: Extensis     Published Date: Apr 18, 2008
In 2006, Direct Wines Ltd identified a need for a solution that would manage the thousands of wine related images they had collected. The main use of the images, which range from images of wineries and wine makers to those of grapes, is inclusion in the company's direct mail campaigns and on the Direct Wines website.
Tags : 
extensis, direct wine, portfolio server, images, dam, solutions, application integration
    
Extensis
By: Cantaloupe     Published Date: Mar 30, 2010
Social media is all around us and has fundamentally changed the way many of us communicate--both personally and professionally. Video can make your social media better, and ultimately get more leads to your website. But how best to post, measure, and use to drive traffic to your website?
Tags : 
cantaloupe, online video, social media, communication, facebook, twitter, seo, engagement
    
Cantaloupe
By: TargetMarketing     Published Date: Jun 04, 2010
You'll find in this complimentary report from Target Marketing, a breakdown of key segmentation areas, fundamental questions to ask to formulate effective segmentation plans, a six-step road map to a comprehensive segmentation process, three segmentation pitfalls to avoid, and more.
Tags : 
napco, target marketing, customer segmentation
    
TargetMarketing
By: HPE APAC     Published Date: Jun 20, 2017
Enterprise IT is in the throes of a fundamental transformation from a careful builder of infrastructure that supports core enterprise applications to a lean and lively developer of business-enabling applications powered by infrastructure. But why is this change happening now at all, and why now? Read this paper to find out more.
Tags : 
infrastructure, devops, agile, hpe, it transformation, enterprise
    
HPE APAC
By: Cisco     Published Date: Mar 26, 2019
Uncover the riskiest 1% of threats you’ve been missing. In hours. Not days or months. Nearly all endpoint security solutions claim to block 99% of malware. But what about the 1% of threats they miss? The most dangerous 1% of threats will wreak havoc on your network. If you rely solely on traditional point-in-time technologies, such as antivirus, those threats can go undetected for 200 days on average. For months on end, they can be creeping in and moving laterally across your network causing damage through stealthy malware campaigns without you even knowing it—until it’s too late.
Tags : 
    
Cisco
By: Entrust Datacard     Published Date: Oct 24, 2016
The mobile device is part and parcel of daily life. It’s fundamentally changed the way consumers behave, and this influence has spread to the enterprise sector as well. For instance, patron-owned mobile devices have largely helped pave the way for the widespread emergence of bring-your-own-device (BYOD) policies. Ten years ago, the idea of a company employee logging into the enterprise system while they’re on an airplane over the Atlantic would seem far-fetched, but today such behavior is relatively commonplace. Mobility is changing how we shop, work and live our daily lives.
Tags : 
    
Entrust Datacard
By: Akamai Technologies     Published Date: May 24, 2017
Zum Schutz eines Unternehmens und seiner Daten ist es unerlässlich, bei der Cybersicherheit vorauszudenken. In diesem E-Book erfahren Sie, wie Sie die bestehende Infrastruktur Ihrer Website oder Ihres Rechenzentrums mit verstärkten Sicherheitsmaßnahmen in der Cloud ergänzen können. Wir stellen die verschiedenen Ansätze zur Cloudsicherheit von Akamai sowie von anderen Anbietern vor. Daraufhin sehen wir uns einige häufig verwendete, aber leider oft missverstandene Kennzahlen an, damit Sie fundierte Entscheidungen treffen und die optimale Lösung für Ihr Unternehmen finden können.
Tags : 
    
Akamai Technologies
By: ExactTarget     Published Date: Aug 14, 2014
Marketing as you know it will never be the same. There’s a fundamental shift in relationships between brands and customers—fueled by smartphones, social media, and today’s always-on, always-connected mentality. Marketers have access to more customer data (big data) than ever before. But the quantity of data only matters if you’re smart about using it—to power 1:1 customer journeys.
Tags : 
marketing cloud, target, big data, brands, customers, social media, smartphones, always-on
    
ExactTarget
By: Box     Published Date: Jun 22, 2018
• Moving from legacy to cloud infrastructure is a huge win for business, but the process requires a fundamental shift in organizational culture and business processes both inside and outside IT. In fact, managing this change may be the biggest challenge your company faces when moving to the cloud, unless you're equipped with the resources that make for a simple, successful transition. • Here's our tried-and-true 3-step approach proving that change doesn't have to be hard. Download now to start your easy, secure and efficient move to the cloud.
Tags : 
    
Box
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Die digitale Transformation ist für mittelständische Unternehmen (100 bis 999 Mitarbeiter) ein absolutes Muss, um im digitalen Umfeld erfolgreich zu sein. Durch eine digitale Transformation können sich Unternehmen mehr Wettbewerbsvorteile verschaffen, indem sie Geschäftsprozesse automatisieren, operative Abläufe effizienter gestalten, Kundenbeziehungen vertiefen und neue Umsatzströme durch Produkte und Services generieren, die auf modernsten Technologien basieren. Die digitale Transformation kann durchaus als Reise gesehen werden, die damit beginnt, dass Unternehmen eine IT-basierte Vision entwickeln. Diese führt dann zu einer datenorientierten Strategie, bei der Analysen im Mittelpunkt stehen. Das Ergebnis solcher Initiativen hängt von der Fähigkeit des Unternehmens ab, Menschen, Prozesse, Plattformen und den Aspekt Governance effizient zu nutzen, um die Geschäftsziele des Unternehmens zu erreichen.
Tags : 
    
Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Im heutigen Zeitalter bahnbrechender digitaler Neuerungen müssen Unternehmen agiler handeln, um Geschäftschancen nutzen zu können. Viele haben dabei auf die Cloud Computing-Technologie gesetzt, da sie darauf ausgerichtet ist, die Agilität zu verbessern, die Skalierbarkeit zu steigern und die Kosten zu senken. Bei der Umstellung auf die Cloud mussten viele Unternehmen aber feststellen, dass das damit verbundene Maß an Sicherheit, Compliance und Leistung ihren Anforderungen nicht in vollem Umfang gerecht wird. Bisher war man zudem allgemein der Meinung, dass eine Public Cloud kostengünstiger als eine Private Cloud ist. Heute wissen wir, dass dies nicht in allen Fällen zutrifft. Kluge Unternehmen haben erkannt, dass Hybrid IT, die sowohl externe als auch lokale Services umfasst, mehr Agilität ermöglicht.
Tags : 
    
Hewlett Packard Enterprise
By: SAP     Published Date: May 18, 2014
Leading companies and technology providers are rethinking the fundamental model of analytics, and the contours of a new paradigm are emerging. The new generation of analytics goes beyond Big Data (information that is too large and complex to manipulate without robust software), and the traditional narrow approach of analytics which was restricted to analysing customer and financial data collected from their interactions on social media. Today companies are embracing the social revolution, using real-time technologies to unlock deep insights about customers and others and enable better-informed decisions and richer collaboration in real-time.
Tags : 
sap, big data, real time data, in memory technology, data warehousing, analytics, big data analytics, data management, business insights, architecture, business intelligence, big data tools, analytical applications
    
SAP
By: Dell     Published Date: Sep 24, 2018
The top data protection mandates from IT leaders are focused on improving the fundamental reliability and agility of the solution(s) in use. The mandate that follows closely behind is cost reduction, which is also seen as a top priority among data protection implementers. These challenges should not be seen as contradictory or mutually exclusive; in fact, they can all be addressed by improved data protection solutions that are engineered as much for efficiency as they are for reliability and capability.
Tags : 
economic, value, data, domain, idpa
    
Dell
By: Hewlett Packard Enterprise     Published Date: Mar 26, 2018
Business users expect immediate access to data, all the time and without interruption. But reality does not always meet expectations. IT leaders must constantly perform intricate forensic work to unravel the maze of issues that impact data delivery to applications. This performance gap between the data and the application creates a bottleneck that impacts productivity and ultimately damages a business’ ability to operate effectively. We term this the “app-data gap.”
Tags : 
    
Hewlett Packard Enterprise
By: Oracle     Published Date: Jan 16, 2018
Download this webinar to learn about Machine Learning and how it can be applied to finance, and acquire basic fundamentals about how to begin the journey.
Tags : 
    
Oracle
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter