• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

file management

Results 1 - 25 of 151Sort Results By: Published Date | Title | Company Name
By: BeyondTrust     Published Date: Sep 24, 2019
HOW TO USE THIS BUYER’S GUIDE Today, privileges are built into operating systems, file systems, applications, databases, hypervisors, cloud management platforms, DevOps tools, robotic automation processes, and more. Cybercriminals covet privileges/privileged access because it can expedite access to an organization’s most sensitive targets. With privileged credentials and access in their clutches, a cyberattacker or piece of malware essentially becomes an “insider”.
Tags : 
    
BeyondTrust
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
“We ruled out Zscaler due to its overly complex architecture and PAC file requirements. The ongoing management would have been a nightmare.” - Marc Tournier, Information Security and Compliance Manager (CISO), Avril Group
Tags : 
    
Cisco Umbrella EMEA
By: CheckMarx     Published Date: Jun 21, 2019
DevSecOps, modern web application design and high-profile breaches are expanding the scope of the AST market. Security and risk management leaders will need to meet tighter deadlines and test more complex applications by accelerating efforts to integrate and automate AST in the software life cycle.
Tags : 
    
CheckMarx
By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
By: Splunk     Published Date: Sep 10, 2018
The financial services industry has unique challenges that often prevent it from achieving its strategic goals. The keys to solving these issues are hidden in machine data—the largest category of big data—which is both untapped and full of potential. Download this white paper to learn: *How organizations can answer critical questions that have been impeding business success *How the financial services industry can make great strides in security, compliance and IT *Common machine data sources in financial services firms
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
By: Reputation.com     Published Date: Jun 29, 2018
Creating competitive advantage starts with a sound digital strategy. In a 2017 survey of healthcare consumers across the U.S. from a representative range of demographic groups, we found that 88% of consumers begin their search for healthcare providers online. Consumers rely on search engines and review sites to steer their decisions about where to go for care. What consumers read about you online heavily influences their decision-making. Your reputation is defined at every touchpoint a potential patient has with your doctors and organization on the web — from the doctor or location listing, to patient rating and reviews, to finding the right doctor and reading profiles on your website. Done well, online reputation management (ORM) enables your providers to generate a high volume of representative reviews from the “silent majority,” while providing valuable insights to improve patient experience, make operational improvements and drive new patient appointments.
Tags : 
    
Reputation.com
By: Box     Published Date: Jun 22, 2018
• When it comes to the cloud, most businesses have moved from wait-and-see to a "how do we make it happen now?" approach. • But the complexities of moving valuable content from legacy systems to the cloud is still a daunting challenge. That's why some businesses are putting off the move even though they're painfully aware of the limitations of legacy infrastructure like network shares, enterprise content management systems and general purpose file servers. • The good news is the upside of migrating away from legacy infrastructure to a Cloud Content Management platform is far greater than the effort to get there. All you need is a plan. • Our new eBook, From legacy infrastructure to the cloud: A migration journey in 5 steps, gives you a clear, methodical process for migrating your organization to a Cloud Content Management solution.
Tags : 
    
Box
By: CA Technologies     Published Date: Jun 01, 2018
Thanks to numerous, headline-making incidents in recent years, cybercrime has risen toward the top of the concern list for many organizations—and the customers with whom they do business. You’ve heard many of the stories. Major health insurers, such as Anthem, Premera BlueCross and CareFirst had personal information for millions of their customers stolen. Sony Pictures experienced a breach that not only embarrassed employees and adversely impacted the release of the high-profile film, “The Interview,” but also damaged systems and applications—making it extremely difficult for the company to conduct business. The list goes on. Some you maybe haven’t heard, like the one about CodeSpaces, a provider of version management services to developers. When attackers were able to gain access to its cloud-based management consoles, they deleted the company’s entire infrastructure and backups—ultimately forcing CodeSpaces out of business. The bad news for organizations like yours is, thanks to the
Tags : 
    
CA Technologies
By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
    
CA Technologies
By: Microsoft     Published Date: Apr 05, 2018
Im April kündigte Microsoft die Lösung Microsoft Relationship Sales an, die Microsoft Dynamics 365 for Sales mit LinkedIn Sales Navigator kombiniert. Vertriebsmitarbeiter haben Zugriff auf Informationen aus dem weltweit führenden professionellen Netzwerk, damit sie einfacher Interessenten finden und Beziehungen zu stärken. Die Lösung bietet: -Zugriff auf 500 Millionen LinkedIn-Profile mit Fotos sowie Informationen zu aktuellen und früheren Tätigkeiten der Mitglieder. Damit können Vertriebsmitarbeiter einen besseren Eindruck von ihren aktuellen Kunden erhalten und über das Netzwerk neue Leads finden. -Empfehlungen für die nächsten Schritte der Benutzer in Dynamics 365 auf Basis von Signalen aus E-Mail, Customer Relationship Management (CRM)-Software und LinkedIn. Diese basieren auf künstlicher Intelligenz (KI) und enthalten Vorstellungs- und Vernetzungsvorschläge sowie Vorschläge für InMail und Nachrichten.
Tags : 
crm strategy, crm-strategie, linkedin, dynamic sales
    
Microsoft
By: Dassault Systemes SolidWorks Corp.     Published Date: Mar 27, 2018
The product development ecosystem is complex, as it entails nearly every area of an enterprise — each with its own set of tools, files and needs. Enterprises need the right solutions to untangle the web of data management and enable a smarter approach to manufacturing. This article discusses how distributed data management, now an integrated part of SOLIDWORKS Manage, stores and regulates design data to streamline processes and improve the movement of information.
Tags : 
solidworks, data, management, development, ecosystem
    
Dassault Systemes SolidWorks Corp.
By: Cloudian     Published Date: Mar 22, 2018
Download this white paper to learn more about how enterprise file management can help your business maximize storage capacity.
Tags : 
    
Cloudian
By: Hitachi Vantara     Published Date: Mar 20, 2018
ESG Lab performed hands-on evaluation and testing of the Hitachi Content Platform portfolio, consisting of Hitachi Content Platform (HCP), Hitachi Content Platform Anywhere (HCP Anywhere) online file sharing, Hitachi Data Ingestor (HDI), and Hitachi Content Intelligence (HCI) data aggregation and analysis. Testing focused on integration of the platforms, global access to content, public and private cloud tiering, data quality and analysis, and the ease of deployment and management of the solution.
Tags : 
    
Hitachi Vantara
By: Cloudian     Published Date: Feb 26, 2018
A new class of storage promises to revolutionize file data management with scalability, simplicity and cost benefits that together represent a step function improvement from traditional NAS. Cloudian HyperFile offers a new approach that addresses both the scalability and cost concerns. It is the first to combine traditional NAS features with a limitlessly scalable, fully modular storage environment that reduces CAPEX costs by 2 /3 while simplifying management and eliminating storage silos. At CAPEX costs down to ½ cent per GB/month, and with scalability and storage density that minimize management and data center space costs, Cloudian HyperFile offers economics that radically transform the landscape for enterprise file storage
Tags : 
    
Cloudian
By: Cloudian     Published Date: Feb 15, 2018
A new class of storage promises to revolutionize file data management with scalability, simplicity and cost benefits that together represent a step function improvement from traditional NAS. Cloudian HyperFile offers a new approach that addresses both the scalability and cost concerns. It is the first to combine traditional NAS features with a limitlessly scalable, fully modular storage environment that reduces CAPEX costs by 2 /3 while simplifying management and eliminating storage silos. At CAPEX costs down to ½ cent per GB/month, and with scalability and storage density that minimize management and data center space costs, Cloudian HyperFile offers economics that radically transform the landscape for enterprise file storage.
Tags : 
    
Cloudian
By: SessionM     Published Date: Jan 24, 2018
Download Gartner’s latest Market Guide for Master Data Management of Customer Data Solutions to learn market definition, analysis and recommendations, the criteria necessary for evaluating marketing data management solutions and how master data sits in the middle of the 360° customer view.
Tags : 
customer engagement, unified customer profile, customer data platform, data orchestration, customer data activation, machine learning, data integration, personalization, cross-channel campaign management, single customer view, 360 profile, customer retention, customer loyalty, customer lifetime value, closed loop offers, next best offer, loyalty automation, loyalty platform, customer data management, customer data platform
    
SessionM
By: Cisco     Published Date: Dec 27, 2017
Among your primary responsibilities as a board member is providing advice on both business strategy and enterprise risk. A general understanding of risk management is essential when looking at cyber risk specifically. Ultimately, an enterprise should consider adding cybersecurity expertise to its board membership, but all members can benefit from increasing their understanding about how cyber risk affects corporate strategy and the overall enterprise risk profile. To provide effective strategic advice to company leadership on cyber risk, you must ask the right questions, including whether a company does ongoing cyber risk assessment and management, and how.
Tags : 
    
Cisco
By: Financial Force     Published Date: Dec 01, 2017
This IDC Vendor Profile describes FinancialForce.com, a cloud applications company with financial management, ordering and billing, human capital management (HCM), professional services automation (PSA), and supply chain management (SCM) solutions built on the Salesforce1 platform and a 36-year heritage of building financial management solutions at UNIT4 (the former Agresso and CODA products). FinancialForce.com's accounting solution, launched in 2008 as CODA 2go, was the first on - demand financial system built entirely on the Salesforce1 Platform. Backed by Technology Crossover Ventures, Advent International, Salesforce Ventures, and UNIT4, FinancialForce.com's applications continue to be the leading finance and professional services solutions available as native Salesforce1 applications on the AppExchange.
Tags : 
    
Financial Force
By: FinancialForce     Published Date: Dec 01, 2017
This IDC Vendor Profile describes FinancialForce.com, a cloud applications company with financial management, ordering and billing, human capital management (HCM), professional services automation (PSA), and supply chain management (SCM) solutions built on the Salesforce1 platform and a 36-year heritage of building financial management solutions at UNIT4 (the former Agresso and CODA products). FinancialForce.com's accounting solution, launched in 2008 as CODA 2go, was the first on - demand financial system built entirely on the Salesforce1 Platform. Backed by Technology Crossover Ventures, Advent International, Salesforce Ventures, and UNIT4, FinancialForce.com's applications continue to be the leading finance and professional services solutions available as native Salesforce1 applications on the AppExchange.
Tags : 
    
FinancialForce
By: Epson     Published Date: Nov 21, 2017
A customer may store heavy file boxes in one of its warehouses, but Fireproof Records Center spends a lot of time strategizing about the paperless office. Based in Grove City, Ohio, the company helps businesses in central Ohio manage information more efficiently, offering a suite of cloud document management and scanning tools, including the easy-to-use Epson WorkForce® color document scanner.
Tags : 
    
Epson
By: Epson     Published Date: Nov 20, 2017
A customer may store heavy file boxes in one of its warehouses, but Fireproof Records Center spends a lot of time strategizing about the paperless office. Based in Grove City, Ohio, the company helps businesses in central Ohio manage information more efficiently, offering a suite of cloud document management and scanning tools, including the easy-to-use Epson WorkForce® color document scanner.
Tags : 
    
Epson
By: VMware     Published Date: May 10, 2017
Countless organizations are deploying digital workspace solutions to meet the demands of today’s mobile end users and the IT administrators that support them. The goal is to empower users to work from anywhere, on any device—mobile or laptop—at any time. However, architecting a secure, seamless, scalable digital workspace solution is not necessarily easy, which is where this paper helps. When developing your digital workspace, it is important to keep five key considerations in mind, both on the front end and the back end of your environment: • Seamless, secure end-user access to applications and files • Easy-to-use enterprise app store • Management security • Fully integrated infrastructure stack • Agnostic platform with a broad ecosystem Download this white paper to see how to approach these major considerations, with detailed strategies, and provide recommendations for effectively addressing each one.
Tags : 
    
VMware
By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Start   Previous   1 2 3 4 5 6 7    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter