• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

usage

Results 76 - 100 of 311Sort Results By: Published Date | Title | Company Name
By: Cisco Umbrella EMEA     Published Date: May 24, 2019
"The way we work has changed. More users are working remotely, satellite offices are connecting directly to the internet, and SaaS app usage is on the rise. How can your security technology keep up with all of these changes? A new category of products is emerging - the secure internet gateway. Built to solve the security challenges of today's mobile, cloud-enabled enterprise, the secure internet gateway is a critical component to securing today’s workforce. View the infographic to understand the five primary reasons for the rise of this category. "
Tags : 
    
Cisco Umbrella EMEA
By: Group M_IBM Q119     Published Date: Mar 11, 2019
In this paper, we focus on the DWA and how it has evolved over the years since its introduction. The XDW architecture is then described, in which the need to maintain the data warehouse is documented while adding new components and capabilities to extend the analytical capabilities. This section also discusses the appropriate usage of appliances within the XDW. The rest of the paper covers the benefits from implementing the DWA, the selection considerations for them and what the future holds for them.
Tags : 
    
Group M_IBM Q119
By: Palo Alto Networks     Published Date: Jun 09, 2014
Without question, your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches
    
Palo Alto Networks
By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting a job.
Tags : 
firewall, optimization, security risks, business, devices, employees, technology
    
Palo Alto Networks
By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting their new job. Adding another layer of complexity is the concern about the effectiveness of your cybersecurity posture. Is your business a target for a cyberattack Is it a question of when, as opposed to if? And are you as prepared as you could be? The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges.
Tags : 
firewall, customer, optimization, employees, devices, cyber security, technology
    
Palo Alto Networks
By: Citrix     Published Date: Jun 15, 2018
The world of IT is undergoing a digital transformation. Applications are growing fast, and so are the users consuming them. These applications are everywhere—in the datacenter, on virtual and/or microservices platforms, in the cloud, and as SaaS. More and more apps are now being moved out of datacenters to a cloud-based infrastructure. In order for an optimized and secure delivery of these applications, IT needs specific network appliances called Application Delivery Controllers (ADCs). These ADCs come in hardware, virtual, and containerized form factors, and are sized by Network Administrators based on the current and future usage of applications. The challenge with this is that it’s hard to foresee sizing or scalability requirements for these ADCs since users are constantly increasing, and applications are consistently evolving, as well as moving out of datacenters. Complicating matters, most ADCs are fixed-capacity network appliances that provide zero or minimum expansion capability
Tags : 
    
Citrix
By: AdRoll     Published Date: Dec 01, 2017
There is a great misconception that the purpose of attribution modelling is to arrive at a singular, concrete truth; however, the reality is much more nuanced. Attribution modeling is actually an ongoing process of improving how we measure marketing’s impact in order to improve our decision making over time. There are a number of attribution principles that still confuse marketers: • Why is attribution a process and not an end state? • Why is making small steps forward really better than doing nothing? • Why does the perfect attribution model not exist? • What makes attribution an ROI investment and not a cost center? With the many attribution myths, challenges, and philosophies in mind, AdRoll and Econsultancy have partnered for a second year in a row to produce The State of Marketing Attribution 2017. This time around we’ve broaden our focus beyond Europe to include content that also covers North America and Asia-Pacific. This report goes in-depth on the current adoption levels of marketing attribution, the confidence in its usage, and the effectiveness of companies’ attribution methods worldwide. You will gain a better grasp on the required skills to succeed at attribution.
Tags : 
marketing, attribution, association, adroll, online, survey, report
    
AdRoll
By: MessageLabs     Published Date: Aug 29, 2008
Unmanaged employee use of email and the web can subject any organization to costly risks including litigation, regulatory investigations and public embarrassment.  Download this guide and learn how to deploy clearly written Acceptable Usage Policies (AUPs) for email and web usage, supported by employee training and enforced by proven technology solutions.
Tags : 
messagelabs, compliance, email policies, policy, enforce policy, email security, security policies, secure instant messaging
    
MessageLabs
By: Good Technology Corporation     Published Date: Oct 23, 2012
As companies embrace the use of individual liable mobile devices to access corporate applications and data, Good provides guidance on creating individual liable usage policies.
Tags : 
byod, bring your own device, security, policy considerations, device, enterprise applications
    
Good Technology Corporation
By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
This whitepaper illustrates how HP Integrity virtualization technologies on the HP Integrity i2 servers play a key role in high-end UNIX® servers.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure
    
HP - Intel® Xeon® processors
By: Brainshark     Published Date: Oct 16, 2013
94% of Fortune 500 companies have either adopted iPads or are rolling out pilot programs - what does this mean for your company? This report examines enterprise tablet adoptions and trends, iPad usage in the enterprise, and the benefits of leveraging the iPad for sales, training and corporate communications.
Tags : 
sales enablement, sales training, sales productivity, training, marketing, byod, mobile, mobile sales
    
Brainshark
By: ClickSoftware     Published Date: Sep 12, 2014
This e-book will explore the challenges in this large-scale roll-out and provide some insight on how to overcome them.
Tags : 
guide to a smart meter roll-out, smart meter usage, implementing smart meter usage, benefits of the smart meter, clicksoftware, software development, wireless, electronics
    
ClickSoftware
By: Blue Coat     Published Date: Feb 09, 2016
Based on the analysis of over 63M documents shared in the cloud, this report highlights key trends and insights into the usage and security of cloud apps and the data residing in them.
Tags : 
    
Blue Coat
By: Alteryx, Inc.     Published Date: Sep 07, 2017
Download this IDC InfoBrief to get the full details of the survey, and understand the impact that advanced spreadsheet usage is having on the data preparation and analytic processes throughout organizations.
Tags : 
    
Alteryx, Inc.
By: Spectrum Enterprise     Published Date: Jun 05, 2017
Download this case study to learn how Spectrum Enterprises has provided the scalability, reliability and security to support Hagadone Corporation’s ongoing drive for excellence including: - Productivity driven by the network’s ability to handle day-to-day work flow quickly and with little latency, especially during spikes in usage - Reliable connectivity for sharing large files for electronic publishing Flexibility to innovate and create an interactive hospitality guest experience - Ability to scale bandwidth to support diverse business needs and expand Hagadone’s influence as a media company
Tags : 
    
Spectrum Enterprise
By: Qualtrics     Published Date: Oct 02, 2018
Customer journey mapping is a major component of any customer experience program. Of course, a key part of mapping the customer experience includes identifying key moments of truth or moments of consumer brand interaction that shape brand perception and loyalty. In the digital age, many key moments of truth for your customers are happening online. This means that more and more of your consumers, brand perceptions and attitudes will be based on purely digital interactions (in-app, website, wearable tech, etc.). This has made understanding your customers’ digital interactions an essential part of any customer experience program. “It has been said that VOC programs without a web presence engage only 2% to 10% of those who interact with their website” (marketing sherpa). As we move into the future, this trend will continue. We know that mobile is an inherent part of today’s digital experience. Global mobile and tablet internet usage just exceeded desktop use for the first time (GS StatCoun
Tags : 
    
Qualtrics
By: Seismic     Published Date: May 14, 2019
Sales enablement is quickly becoming one of the largest priorities for global, enterprise organizations. 37% of organizations consider sales enablement to be their top marketing priority over the next 12 months.* The impact is clear. Organizations that have undertaken a sales enablement initiative have seen a 350% increase in content usage and 65% more revenue generated by new reps. In this guide you'll learn everything you need to know about this emerging field including how organizations are using sales enablement to help supercharge their bottom line. *Hubspot’s 2018 State of Inbound
Tags : 
    
Seismic
By: Seismic     Published Date: May 24, 2019
Implementing a sales enablement strategy is one of the most effective ways you can transform your sales and marketing teams. Organizations that have undertaken a sales enablement initiative have seen a 350% increase in content usage, 275% boost in conversions, and 65% more revenue generated by new reps. In this webinar, we’ll share the 3 biggest mistakes companies make when implementing a sales enablement strategy to ensure you don’t fall victim to these pitfalls. You'll walk away with the framework for implementing a sales enablement strategy that will enable you to: ? Increase Sales Productivity ? Improve Sales and Marketing Alignment ? Increase Efficiency of Content Management ? Unlock Deep Content Insights and Analytics
Tags : 
    
Seismic
By: Four Winds Interactive     Published Date: Jul 19, 2019
In a dynamic business world, you don’t need a static meeting room booking solution. You need something flexible. You need something as intuitive as it is powerful. You need something that provides in-depth room usage reporting, so you can optimize the space you have. You need FWI® BOOKED™, an all-inclusive smart meeting room signage solution.
Tags : 
    
Four Winds Interactive
By: Oracle     Published Date: Oct 20, 2017
This whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering. The key characteristics of the SPARC S7 to be highlighted are: Designed for scale-out and cloud infrastructures SPARC S7 processor with greater core performance than the latest Intel Xeon E5 processor Software in Silicon which offers hardware-based features such as data acceleration and security The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost. Performance matters as business markets are driving IT to provide an environment that: Continuously provides real-time results. Processes more complex workload stacks. Optimizes usage of per-core software licenses Risk matters today and into the foreseeable future, as challenges to secure systems and data are becoming more frequent and invasive from within and from outside. Oracle SPARC systems approach risk management from multiple perspectiv
Tags : 
    
Oracle
By: Palo Alto Networks     Published Date: Jul 05, 2012
The Application Usage and Risk Report from Palo Alto Networks provides a global view into enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide.
Tags : 
palo alto networks, risk report, application usage
    
Palo Alto Networks
By: Cisco     Published Date: Apr 03, 2014
This white paper by Cisco explores the IT innovation which is fueling change around the world and how IT musty adapt security practices and protections to meet these changes in work patterns, device usage and applications.
Tags : 
security, firewall, next generation, applications, byod, threats
    
Cisco
By: Cisco     Published Date: Apr 03, 2014
This white paper by Cisco explores the IT innovation which is fueling change around the world and how IT musty adapt security practices and protections to meet these changes in work patterns, device usage and applications.
Tags : 
security, firewall, next generation, applications, byod, threats
    
Cisco
By: F5 Networks Inc     Published Date: Aug 15, 2013
Between the proliferation of mobile devices and the ever increasing amount of content on the web, DNS usage has seen a huge increase in recent years. Meanwhile, DNS continues to be a tempting target for attackers, and when they succeed in disrupting DNS, all external data center services are affected. For organizations confronting these growth and security challenges, F5’s new full proxy architecture for DNS provides a complete solution for global, local, and cloud load balancing.
Tags : 
domain name system, dns, infrastructure, global, local, cloud load balancing, dns systems, dns infrastructure
    
F5 Networks Inc
By: Blue Coat Systems     Published Date: Oct 24, 2011
Read this technology brief to learn about a solution to regain performance, minimize bandwidth usage, and reduce the time of all SharePoint operations
Tags : 
blue coat, wan optimization, microsoft office sharepoint server, application delivery network, application performance monitoring, midsize firms, sap, oracle
    
Blue Coat Systems
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter