• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

adopting

Results 276 - 300 of 372Sort Results By: Published Date | Title | Company Name
By: ProfitBricks     Published Date: Apr 01, 2013
The value of conventional on-premises servers is eroding. As with all decay, it starts slowly and declines steadily. Bits and pieces of the physical server market are peeling off as businesses turn away from conventional data center and IT closet deployments in favor of cloud-based infrastructure-as-a-service (IaaS). And there’s no shortage of IaaS; hosting and service-provider companies are flooding the market with low-cost access to hosted servers. The challenge for adopting businesses is leveraging hosted assets that guarantee data security and integrity with fine-grained levels of adjustable capacity, high performance and price predictability.
Tags : 
iaas, solution, cloud-based
    
ProfitBricks
By: Proofpoint     Published Date: Apr 23, 2010
This whitepaper discusses the dramatic cost savings that companies can realize by adopting a SaaS (Software-as-a-Service) model for email archiving versus an on-premises approach.
Tags : 
proofpoint, email archiving, saas, software-as-a-service, tco, roi, email security, return on investment, total cost of ownership
    
Proofpoint
By: Proofpoint     Published Date: Apr 23, 2010
This whitepaper discusses the dramatic cost savings that companies can realize by adopting a SaaS (Software-as-a-Service) model for email security versus an on-premises approach.
Tags : 
proofpoint, saas, email security, software-as-a-service, total cost of ownership, data protection, messaging
    
Proofpoint
By: Proofpoint     Published Date: Jun 22, 2017
Human targeted attacks continued to lead the pack in 2016. Attackers’ used automation and personalisation to increase the volume and click-through rates of their campaigns. Taking a page from the B2B e-marketer’s playbook, cyber criminals are adopting marketing best practices and sending their campaigns on Tuesdays and Thursdays when click-through rates are higher. Meanwhile, BEC and credential phishing attacks targeted the human factor directly--no technical exploits needed. Instead, they used social engineering to persuade victims into sending money, sensitive information and account credentials. Timing is everything—attackers know that hitting your employees with a well-crafted email at the just the right time produces the best results. Of course, this varies by region. So if you are responsible for worldwide SecOps, you need visibility into not only attack patterns but also when and which employees tend to click.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Proofpoint
By: Prophix     Published Date: Apr 24, 2013
Spreadsheets are error-prone and unable to support the critical nature of important financial processes. Read this free guide to learn how leading companies have broken the spreadsheet habit, adopting packaged applications specifically-designed for budgeting and forecasting.
Tags : 
spreadsheets, business intelligence, analytics, budget, roi, efficiency, forecasting, analytics, data, application integration, application performance management, best practices, business activity monitoring, business analytics, business integration, business management, business metrics, business process automation, business process management, change management
    
Prophix
By: Puppet     Published Date: Mar 09, 2017
There’s a lot of misinformation about DevOps out there — causing some organizations to mistrust the benefits of DevOps practices. It’s time to debunk the common myths, and get on a path to collaborating more effectively and delivering better software, faster. Download the ebook to disprove these common DevOps myths: • Myth 1: There’s no direct customer/business value for adopting DevOps. • Myth 2: There’s no significant ROI in applying DevOps to legacy apps. • Myth 3: There’s not enough time to implement DevOps. • And more!
Tags : 
    
Puppet
By: Q1 Labs     Published Date: Feb 02, 2012
Read this whitepaper to learn how adopting a next generation SIEM solution provides security intelligence, to allow organizations to maintain comprehensive and cost-effective information security.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution, siem technology, security monitoring, threat detection, fraud prevention, risk management, security compliance, access control, authentication, identity management, internet security, intrusion prevention, data protection
    
Q1 Labs
By: Quinstreet - Netapp     Published Date: Jun 11, 2012
Download this ROI study from Wikibon for a business case analysis that oultines the savings that come from adopting unified storage.
Tags : 
netapp, network storage, cloud computing, virtualization, storage efficiency, data storage, information management, nas, storage
    
Quinstreet - Netapp
By: Quocirca     Published Date: Jul 03, 2008
As enterprises recognize the costs associated with an uncontrolled printing environment, many are turning to specialist managed print services (MPS) providers. MPS services encompass the assessment, optimization and management of the print environment. Increasingly, MPS providers are now adopting a partnered out-tasking approach by delivering flexible services that can be tailored to individual customer requirements.
Tags : 
managed print services, mps, quocirca, infrastructure, network management
    
Quocirca
By: Rackspace     Published Date: May 28, 2019
Don’t let the end of support for SQL Server and Windows Server 2008 sneak up on you. Check out this infographic for a snapshot of the preparation that needs to be done, and learn how to avoid business disruptions by adopting the most current security and innovation technologies.
Tags : 
end of support, disruption, sql server, windows server, azure
    
Rackspace
By: Rackspace     Published Date: Jun 14, 2019
Don’t let the end of support for SQL Server 2008 and Windows Server 2008 sneak up on you. Check out this infographic for a snapshot of the preparation that needs to be done, and learn how to avoid business disruptions by adopting the most current security and innovation technologies.
Tags : 
end of support, disruption, sql server, windows server, azure
    
Rackspace
By: Rackspace     Published Date: May 28, 2019
Don’t let the end of support for SQL Server and Windows Server 2008 sneak up on you. Check out this infographic for a snapshot of the preparation that needs to be done, and learn how to avoid business disruptions by adopting the most current security and innovation technologies.
Tags : 
    
Rackspace
By: Radius Solutions     Published Date: Apr 29, 2008
"Lean" is defined as a process to improve manufacturing and service operations, reduce waste, improve quality and drive down cost. While many packaging companies have embraced a number of Lean Manufacturing concepts, many have yet to fully realize the benefits of a fully-integrated Lean environment. Leveraging an ERP system that embraces "Lean" principles and incorporates industry specific best practices can facilitate and support the process. In this white paper, learn how lean manufacturing can apply to printing and packaging, and how an ERP system fits into the process.
Tags : 
erp, lean, lean methods, lean manufacturing, printing, packaging, radius, radius solutions, scm, supply chain, enterprise resource planning, supply chain management, productivity
    
Radius Solutions
By: Reactivity     Published Date: Aug 21, 2009
Businesses are rapidly adopting Web services to provide new levels of integration between applications. By comparison with earlier data communications techniques, Web services are faster and cheaper to develop, quicker to deploy, and easier to adapt to emerging business needs. This paper discusses the special security challenges posed by the use of Web services, and how to secure networks against them.
Tags : 
web services, web service management, web service deployment, web service, web service security, network security, secure networks, reactivity, xml, analytical applications, service oriented architecture
    
Reactivity
By: Red Hat     Published Date: Jan 01, 2013
Under pressure to improve service levels and contain costs, many enterprises are adopting a dual operating system (OS) approach. They are choosing Windows for office productivity and collaboration applications and Red Hat Enterprise Linux for infrastructure and datacenter modernization. Red Hat Enterprise Linux easily integrates with existing Windows infrastructure, making dual deployment possible.
Tags : 
dual platform, modern datacenter, productivity, collaboration, linux, deployment
    
Red Hat
By: Red Hat     Published Date: Sep 25, 2014
Enterprises are increasingly adopting Linux as a secure, reliable and high-performing platform that lowers acquisition and operating costs while providing the agility needed to anticipate and react to changing business conditions. In particular, the Red Hat Enterprise Linux (RHEL) operating environment, which is based on the Linux open-source kernel, has become widely deployed by medium-sized and large businesses, by enterprises in their data centers, and in private and public cloud infrastructures. RHEL is distributed and supported by Red Hat Inc., the world’s largest provider of open-source software solutions, accounting for 74.7% of worldwide Linux operating system (OS) revenue. As a development and deployment platform, RHEL offers an efficient, scalable and robust operating environment with certified security and flexible deployment options in physical and virtualized environments.
Tags : 
enterprise solutions, open-source software, it management, storage
    
Red Hat
By: Red Hat     Published Date: Nov 30, 2015
A step-by-step guide for adopting software-defined storage as part of a practical, proactive strategy for managing enterprise data. Flexibility is inherent in this technology, and now more than ever, a flexible IT architecture might be the key to facing the once unthinkable challenges of big data.
Tags : 
software-defined storage, enterprise data, it architecture, big data, enterprise applications
    
Red Hat
By: Red Hat     Published Date: Dec 15, 2015
Achieving a truly innovative IT architecture requires both renovating the core of your IT and adopting new deployment models that speed up the delivery of new business services. Red Hat has infrastructure solutions for both traditional and agile workloads.
Tags : 
    
Red Hat
By: Red Hat     Published Date: May 05, 2015
IT organizations are under intense pressure to improve service levels and contain expenses in today’s challenging economic climate. Forward-looking organizations are upgrading IT infrastructure and implementing virtualization and cloud computing solutions to improve business agility and drive down costs. Many enterprises are adopting a dual platform approach, retaining Microsoft Windows for office productivity and collaboration applications, and deploying Red Hat® Enterprise Linux® for infrastructure and datacenter modernization initiatives. By adopting standards-based Red Hat Enterprise Linux, businesses can enjoy high performance, reliability, and security, with a lower overall TCO.
Tags : 
red hat, platform strategies, modern datacenter, virtualization, cloud computing solutions, it management, knowledge management, data management
    
Red Hat
By: Red Hat     Published Date: Mar 28, 2019
Digital business requires a culture of organizational agility, as the rapid pace of demand can only be satisfied by faster and more flexible development and delivery models. Most organizations do not have the luxury of completely rebuilding their technology foundation or immediately adopting new practices and mindsets, so they are embracing gradual yet fundamental shifts in culture, processes, and technology to support greater velocity and agility. The cloud-native approach modernizes existing applications and builds new applications based on cloud principles, using services and adopting processes optimized for the agility and automation of cloud computing.
Tags : 
    
Red Hat
By: Red Hat     Published Date: Mar 28, 2019
Digital business brings to mind innovative technologies: mobile devices, intelligent sensors, wearable devices, virtual reality, chatbots, blockchain, machine learning, and other technology. For some, it also reflects the rapid rise of new digitally native businesses that have disrupted traditional business models and destabilized established companies and industry sectors. For the majority of organizations, digital business means pivoting to a culture of organizational agility, where the rapid pace of demand can only be satisfied by faster and more flexible development and delivery models. As most organizations do not have the luxury of completely rebuilding their technology foundation or immediately adopting new practices and mindsets, they are embracing gradual yet fundamental shifts in culture, processes, and technology to support greater velocity and agility.
Tags : 
    
Red Hat
By: Ring Central     Published Date: Aug 28, 2013
Nothing is more important to business success than communicating professionally and promptly with customers and colleagues. The way businesses communicate and handle incoming calls, and everything from faxes to conference calls, affects public perception of the company. Evolving businesses can better serve customers and enhance the way employees work by adopting the most readily available and affordable technology. In today’s world, leading edge communication begins and ends with a high-speed Internet-enabled, cloud-based, IP-connected phone service from RingCentral.
Tags : 
cloud based system, business phone system. cloud based, telecom, business process, business communications, corporate communications, enterprise applications
    
Ring Central
By: RingCentral     Published Date: May 14, 2013
Headquartered in San Francisco, with offices in Chicago, Los Angelos, and Miami, TRUSTe helps businesses build consumer trust and increase engagement across online properties. When a company moves to a new location, it has the opportunity to start fresh. Moving to the new offices, TRUSTe decided to explore the benefits of adopting a hosted phone system and doing away with their traditional PBX infrastructure. Learn why TRUSTe finds time savings and independence with RingCentral.
Tags : 
ringcentral, hosted phone systems, phone systems, time savings, independence
    
RingCentral
By: RingCentral     Published Date: Dec 05, 2013
Evolving businesses can better serve customers and enhance the way employees work by adopting the most readily available and affordable technology. Click here to read how leading edge communication begins and ends with a high-speed Internet-enabled, cloud-based, IP-connected phone service from RingCentral.
Tags : 
internet, ringcentral, ring central, business internet, business phone, cloud phone, cloud computing, cloud services, mobile employees, wireless, medical phones, ip telephony, optical networking, small business networks, tcp/ip protocol, mobile data systems, mobile workers, wireless application software, wireless infrastructure, wireless phones
    
RingCentral
By: Riverbed     Published Date: May 24, 2012
Hybrid cloud architectures are growing in popularity as a way to cope with today's business needs. This paper outlines a framework and specific solutions for adopting a hybrid cloud architecture to support increased profits and productivity.
Tags : 
cio, cloud computing, hybrid cloud adoption, wan optimization, application delivery controllers, network performance management, cloud storage gateways
    
Riverbed
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter