• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

pts

Results 176 - 200 of 344Sort Results By: Published Date | Title | Company Name
By: M86 Security     Published Date: Feb 09, 2011
This paper will outline the evolution of APTs, explain the motivation behind them, and determine best practices for defending against these threats.
Tags : 
m86 security, threats, best practices, phishing, vulnerability, advanced persistent threats, apts
    
M86 Security
By: Citrix Systems     Published Date: Oct 07, 2014
Bring-your-own-device (BYOD) programs and policies empower people to choose the best device to get their work done, including personally-owned consumer smartphones, tablets and laptops. This white paper provides guidance for introducing BYOD to help people become more mobile and productive while IT adapts to consumerization in a simple, secure and controlled manner.
Tags : 
best practices, secure, simple, consumerization, byod, program, device, smartphones, tablets, laptops, mobile, productive, it management, wireless
    
Citrix Systems
By: Concur     Published Date: Apr 17, 2013
We’ve come a long way from DOS prompts and paper tickets. A new generation of business travelers is out on the road and embracing a new chapter in history. The Social Era has both transformed the way we do business, and the way we do business travel.
Tags : 
business travel, corporate travel, mobile travel, travel management, social enterprise, cloud travel
    
Concur
By: McAfee     Published Date: Feb 06, 2013
Today’s anti-malware solutions running as applications above the operating system are no match for the stealth techniques used by today’s malware developers. Hardware-assisted security products take advantage of a “deeper” security footprint.
Tags : 
advanced persistent threats, apts, apt attacks, rootkits, zero-day stealth attacks, stealthy malware, hardware assisted security, hardware enhanced security, kernel level security, anti spam, anti spyware, anti virus, application security, encryption, hacker detection, internet security, intrusion detection, intrusion prevention, security management, vulnerability management
    
McAfee
By: VMware, Inc     Published Date: Dec 05, 2013
PC life-cycle management (PCLM) solutions primarily focus on deploying or moving an application or an operating environment to a new user location. Functions include packaging, distributing, installing , and updating an application or an operating environment. These solutions provide a certain level of automation and are certainly more advanced than dealing strictly with scripts. However, they have complex workflows and do not provide the highest level of automation. In today's multidevice world, where the average user carries three or more devices, this paradigm alone is not agile enough for modern end users.
Tags : 
vmware, pc life-cycle management, pclm, operating environment, automation, layered desktop images, automatic synchronize, datacenter backup, pc life-cycle management tools, networking, it management, knowledge management, enterprise applications, storage, data management, access control, business continuity, disaster recovery
    
VMware, Inc
By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
Over the last couple of years SD-WAN technology has matured into a mainstream solution. Yet, the most appropriate migration path is not always clear. While there are many considerations to balance during a migration, the enduring benefit of an SD-WAN architecture is simplification: branch design, data center design, routing, edge platform choices, security choices, management. To ensure an understanding of the fundamental concepts, let’s quickly discuss the architecture and components of SD-WAN, and then move on to cover the best practices of various aspects of an SD-WAN migration
Tags : 
    
VMware SD-WAN by VeloCloud
By: SAP     Published Date: Mar 22, 2016
All participants will use digital innovation to run their enterprise in real time and operate in a global network. They will provide superior products and services for a unique customer experience with the highest safety and environmental standards. This also paves way for new mobility concepts and business models. Our vision is where urban mobility and transportation systems run in a sustainable ecosystem while protecting natural resources and environment. This requires the ability to connect companies, people, and vehicles in real time for accident-free driving with zero-emission operated vehicles.
Tags : 
digital network, digital enterprise, value creation, best business practices, sap
    
SAP
By: LogRhythm     Published Date: Aug 08, 2016
Security threats continue to be more sophisticated and advanced with each day, with the majority often going completely undetected. • Organizations are usually scrambling to keep up and implement new security controls to protect themselves, which adds a new layer of complexity. • With the rise of Advanced Persistent Threats (APTs) and insider attacks, it becomes extremely difficult for security staff to detect all the risks. • Many IT and IT Security staff are already stretched thin by keeping track of many different security technologies that already exist.
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm
By: LogRhythm     Published Date: Jun 19, 2018
In today’s fast-paced threat environment, speed to detect and respond is critical. Yet, according to multiple SANS surveys,1 analysts are finding it difficult to keep up with the speed in which hackers attack their systems.
Tags : 
logrhythm, scalability, hackers, systems, scripts
    
LogRhythm
By: Rizepoint     Published Date: Feb 13, 2017
Consumers and other stakeholders increasingly want to know where their products come from and how they are produced. A successful Responsible Sourcing program strengthens the corporate brand by making it more predictive and adaptive to changing market needs and helping the company develop resilience, mitigate risk, improve efficiency, and better manage supplier relationships. Download this complimentary guide to read about key concepts and principles that apply to virtually any organization when managing Corporate's Responsible Sourcing guidelines, and ensuring franchisee compliance for protection of your brand and commitment.
Tags : 
    
Rizepoint
By: Veeam '18     Published Date: Mar 13, 2018
Windows Server 2016 has been generally available since October 2016. This eBook has been updated to provide the latest and greatest additions within Window Server 2016 as it applies to virtualization; Hyper-V. This is the main topic we will be discussing in this eBook, Windows Server 2016 Virtualization — also known as Hyper-V 2016. Components within Hyper-V are updated or additional functionality is added with each release of Windows Server. Knowing this is important to understanding the increased functionality as well as the overall usability of Windows Server through documents such as this. Many of the new features and functionalities do require some basic usage of PowerShell. Throughout this eBook you will find sample PowerShell scripts documented as examples allowing IT professionals to leverage Hyper-V PowerShell within their own environments.
Tags : 
microsoft, windows, server, technology, organization, optimization
    
Veeam '18
By: RES Software     Published Date: Apr 08, 2013
Afin de répondre aux demandes de nouvelles fonctionnalités, d’économies et d’amélioration de la qualité (d’intégrité et de performance, par exemple), les infrastructures des postes de travail sont en constante évolution. Aujourd’hui, de tels changements ont une incidence quasi systématique sur les conditions d’utilisation des postes. Ce livre blanc décrit les concepts de transformation des postes et comment la technologie de transformation des postes de travail peut aider les entreprises à réussir leur transition vers des espaces de travail utilisateur administrés sans préjudice pour la productivité de l’utilisateur.
Tags : 
    
RES Software
By: Amazon Web Services     Published Date: Jun 02, 2017
451 Research ist ein herausragendes IT-Forschungs- und Beratungsunternehmen. Mit der Gewichtung auf technologischer Innovation und Marktstörung liefert es wichtige Erkenntnisse für führende Unternehmen der digitalen Wirtschaft. Mehr als 100 Analysten und Berater stellen diese Erkenntnisse durch syndizierte Forschung, Beratungsdienste und Live-Events für über 1.000  undenorganisationen in Nordamerika, Europa und auf der ganzen Welt bereit. 451 Research wurde im Jahr 2000 mit Hauptsitz in New York gegründet und ist ein Geschäftsbereich von The 451 Group.
Tags : 
cloud, cloud platform, amazon, aws, microsoft
    
Amazon Web Services
By: Egencia     Published Date: Aug 04, 2014
Over the past decade, procurement fundamentals have redefined travel management. As the industry refreshes its position on traveler satisfaction, however, travel management and procurement concepts find a new balance in best-in-class programs.
Tags : 
egencia, modern travel management, business travel, managing expenses, travel dollars, travel policy, enterprise applications
    
Egencia
By: Skillsoft     Published Date: Jun 23, 2016
In the latest developments in technology for HCM, Nucleus sees an inexorable march to upend conventional approaches to on-the-job learning. Training scheduled around static variables such as regulatory policy or company initiatives, for instance, is one-dimensional. This type of learning will persist. The emergence of prescriptive analytics made possible by real-time data models, however, makes trigger-based, in-the-moment learning possible (Nucleus Research p199 – The coming mass extinction in HCM, November 2015). Further supporting this are social media–style user interfaces (UIs), which promote continual collaboration. It’s learning that happens whenever an employee needs it, not when the organization or law decrees it. Data across HCM prompts these triggers.
Tags : 
best practices, business optimization, business management, organization, talent management, technology
    
Skillsoft
By: Palo Alto Networks     Published Date: Dec 11, 2013
Legacy firewalls aren't designed to address today's complex network traffic consisting of applications, users, and threats. They rely on outdated technology. Read how a new modern security platform safely enables any technology and application. - Learn why yesterday's methods can't handle today's cyberthreats - Find out if your firewall has the ability to see and control traffic, and prevent APTs - Discover how you can deliver modern security without compromising performance - Read why bolt-on security is a costly approach to security
Tags : 
cybersecurity, firewalls, palo alto, technology, application, network traffic security, prevent atps, application security
    
Palo Alto Networks
By: Movable Ink     Published Date: May 05, 2014
Each season, the Movable Ink team looks back at recent campaigns and honors five brands for creating engaging agile email marketing experiences that stood out in the inbox. Download the Spring 2014 edition of The Inkredible Five to see standout emails from brands like Lilly Pulitzer, The Wall Street Journal, and 7 For All Mankind.
Tags : 
agile, email, dynamic content, live content in email, crm, real time, marketing, innovative, top five, video, social media, geo targeting, personalization
    
Movable Ink
By: SumTotal, a Skillsoft Company     Published Date: Jun 24, 2016
In the latest developments in technology for HCM, Nucleus sees an inexorable march to upend conventional approaches to on-the-job learning. Training scheduled around static variables such as regulatory policy or company initiatives, for instance, is one-dimensional. This type of learning will persist. The emergence of prescriptive analytics made possible by real-time data models, however, makes trigger-based, in-the-moment learning possible (Nucleus Research p199 – The coming mass extinction in HCM, November 2015). Further supporting this are social media–style user interfaces (UIs), which promote continual collaboration. It’s learning that happens whenever an employee needs it, not when the organization or law decrees it. Data across HCM prompts these triggers.
Tags : 
best practices, business optimization, business management, organization, talent management, technology
    
SumTotal, a Skillsoft Company
By: Oracle Service Cloud     Published Date: Mar 23, 2016
This document defines Oracle’s Customer Experience (CX) Value Equation as the strategic method to identify and measure the value of organizational CX. This model was originally documented in “CX Metrics and KPIs – September 2012.” It has received wide support, and has been the #1 searched hit and downloaded CX KPI document for 3+ years – a significant achievement in this industry – in an era where concepts are replaced daily with the latest, greatest fad. Since the original publication, I have received significant feedback that has been overwhelmingly positive, but with a request to comment on additional topics – most notably: brand impact, shared services, and Oracle’s Road to Modern. This updated paper leverages the original work, adds information around these additional topics and incorporates our continued client experience.
Tags : 
oracle, service cloud, service management, customer interaction, application integration, best practices, business analytics, business intelligence, customer interaction service
    
Oracle Service Cloud
By: Oracle Service Cloud     Published Date: Mar 23, 2016
In the early 2000s, two vastly different businesses—baseball and field service management—began to use advanced statistical analysis to gain an advantage over their competitors. They both revolutionized their respective fields by using statistical knowledge to improve performance. The new approach replaced old models and methods and attained shockingly good results as both set new standards for their respective industries. In this white paper, you will learn the general concepts behind predictive analytics and how they can be applied to a field service organization. The paper will cover the basic metrics that should be tracked, the use of performance pattern profiles, and how these principles can predict future events.
Tags : 
oracle, service cloud, service management, customer interaction, best practices, business activity monitoring, business analytics, customer interaction service, customer relationship management
    
Oracle Service Cloud
By: LifeLock     Published Date: Jan 17, 2018
In the spring of 2015, 4 employees from the company’s primary manufacturing plant discovered that fraudulent tax returns had been filed using their names, addresses and social security numbers. These were random incidents and not the result of a company data breach. After repeated attempts involving many hours trying to personally remediate the problem, the employees turned to the head of HR for aid in resolving the situation.
Tags : 
    
LifeLock
By: Microsoft     Published Date: Jul 20, 2018
When it comes to performance, Azure SQL Database is built for you, the developer. Azure SQL Database is designed to make your work easier and let you focus on other priorities. It scales on the fly, without downtime, with capabilities that make it great for building multitenant software as a service (SaaS) apps. Plus, it learns and adapts to your database workload, whatever that may be, using built-in intelligence to continually adjust and improve over time. That said, there’s more to a successful app than impressive performance. That’s why we built Azure SQL Database to be just as intelligent in other areas, such as availability and security, so that you won’t need to worry about those essentials either. Finally, we built Azure SQL Database to let you work the way you want, using the tools and platforms you prefer. It’s why we call Azure SQL Database the intelligent database for developers. Read on to learn more, and we’re sure you’ll agree.
Tags : 
    
Microsoft
By: Microsoft     Published Date: Jul 20, 2018
Learning about containers is a bit like learning about Linux or learn? ing about Go: it’s potentially a huge topic! But everyone has to begin somewhere. This lesson will give you an introduction to some of the key concepts of containers and walk you through some examples of using Docker containers with Go code.
Tags : 
    
Microsoft
By: Beqom     Published Date: Dec 05, 2018
Download this free e-guide to gain an understanding of predictive analytics concepts, how to align your data sources to unlock the value of the data in your organization, analyze the correlations, and reap the benefits of analytics in optimizing sales performance.
Tags : 
salesforce compensation management, commission plans sales teams, compensation management, compensation management sales teams, compensation plans sales teams, compensation sales teams, deferred compensation, deferred compensation management, deferred compensation plan, incentive compensation management, incentive compensation software, incentive compensation system, incentive management, sales commission plans, sales compensation plans, sales performance management, sales performance software, salesforce compensation, business analytics, customer satisfaction
    
Beqom
By: Vertica     Published Date: Oct 30, 2009
Independent research firm Knowledge Integrity Inc. examine two high performance computing technologies that are transitioning into the mainstream: high performance massively parallel analytical database management systems (ADBMS) and distributed parallel programming paradigms, such as MapReduce, (Hadoop, Pig, and HDFS, etc.). By providing an overview of both concepts and looking at how the two approaches can be used together, they conclude that combining a high performance batch programming and execution model with an high performance analytical database provides significant business benefits for a number of different types of applications.
Tags : 
vertica, analytical computing, adbms, mapreduce, application management, data management, data mining, grid computing, business analytics, business metrics, linux, analytical applications, business intelligence, information management, data warehousing
    
Vertica
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter