profile

Results 76 - 100 of 287Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 14, 2017
Any organization wishing to process big data from newly identified data sources, needs to first determine the characteristics of the data and then define the requirements that need to be met to be able to ingest, profile, clean,transform and integrate this data to ready it for analysis. Having done that, it may well be the case that existing tools may not cater for the data variety, data volume and data velocity that these new data sources bring. If this occurs then clearly new technology will need to be considered to meet the needs of the business going forward.
Tags : 
data integration, big data, data sources, business needs, technological advancements, scaling data
    
IBM
Published By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: Oracle     Published Date: Mar 28, 2017
Loyalty programs provide a framework to nurture guest relationships, offering recognition, perks and options to redeem rewards. Most importantly, they create guest profiles and transaction histories that yield the insights needed to foster what is demanded today: individualized guest interactions.
Tags : 
hotel, loyalty program, perks, redeem, oracle
    
Oracle
Published By: VMware     Published Date: Feb 24, 2017
Apple began aligning management profiles in Mac and iOS software years ago so that Macs could be managed alongside iOS devices with mobile device management (MDM). Each macOS update has delivered additional MDM controls, enabling IT to manage more endpoints together. Unified endpoint management brings together traditional client management with a modern enterprise mobility management framework to simplify the management process for IT. This whitepaper summarizes the key challenges of Mac management and outlines considerations and product features to help ensure a successful deployment.
Tags : 
    
VMware
Published By: NetApp     Published Date: Feb 15, 2017
How can hybrid-flash array users benefit from a move to all-flash? This case study profiles a large European organization that moved their VMware server and desktop environments from hybrid-flash to NetApp AFF all-flash systems
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: DocuSign     Published Date: Feb 13, 2017
Join us as we begin with a profile of real world customers from a wide range of industries who are closing more deals faster using Salesforce and DocuSign.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Feb 13, 2017
Nancy from SmartSellingTools.com profiles DocuSign, a Digital Transaction Management & eSignature solution, a solution that speeds your sales contracts through the approval process.
Tags : 
    
DocuSign
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jan 10, 2017
Read this whitepaper by Forrester Research to gain perspective on the trends shaping development and operations strategies. Learn how progressive companies are handling application development and operations in a DevOps environment faster and at lower costs
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Viavi Solutions     Published Date: Jan 04, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
    
Viavi Solutions
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Published By: NetApp     Published Date: Dec 05, 2016
How can hybrid-flash array users benefit from a move to all-flash? This case study profiles a large European organization that moved their VMware server and desktop environments from hybrid-flash to NetApp AFF all-flash systems.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Riverbed     Published Date: Nov 02, 2016
IT leaders are adopting hybrid WAN topologies to increase capacity and reliability while balancing cost and performance requirements. However, these hybrid architectures are often too complex, rigid, and fragile. As a result, many organizations are challenging the status quo of traditional networking. Read this Technology Adoption Profile from Forrester to learn why 90% of network managers are looking to evolve their WAN, and see why new approaches such as SD-WAN are required to compete in today's digital age.
Tags : 
    
Riverbed
Published By: Veracode     Published Date: Oct 26, 2016
When a high-profile, or simply branded, vulnerability is disclosed, security teams are expected to abandon their planned activities and react. But, these responses can be time-consuming and costly. Even if the vulnerability is achieving mainstream awareness, enterprises need to balance responses against risk. Download this handy report for guidance on preparing for a high-profile vulnerability disclosure so risk-management or security teams can respond with the appropriate level of urgency.
Tags : 
veracode, security, vulnerability, high-profile vulnerability disclosure, vulnerability disclosure
    
Veracode
Published By: JBoss Developer     Published Date: Oct 21, 2016
Digital transformation (DX) is the continuous process by which enterprises adapt to or drive disruptive change by leveraging digital competencies, such as harnessing sensor data or using location, customer profile, and a mobile app to make shopping recommendations. DX reshapes the organization's culture where required; leverages existing processes, systems, and assets; and creates net-new digital capabilities as needed. With DX, there is the need to embrace new business models and new architectures and technologies that will help an enterprise with customer-facing innovation as well as transition existing systems, processes, organization structure, and relationships to support the transformation.
Tags : 
api, market intelligence, advisory services, digital transformation, data
    
JBoss Developer
Published By: IBM     Published Date: Oct 07, 2016
The new capabilities of WebSphere Application Server Liberty profile, based on Java EE 7 standards, are designed for enhanced developer productivity, dynamic scale, resilient production deployments and ease of integration into modern DevOps workflows. These new production ready capabilities of Liberty profile enable development and delivery of engaging and responsive applications by providing the application infrastructure that meets expectations for speed, agility and user friendliness.
Tags : 
ibm, middleware, cloud, platform services, websphere application server, java ee 7, websphere application server liberty
    
IBM
Published By: Adobe     Published Date: Sep 20, 2016
Download our new data-driven marketing guide, The Holistic Picture, to learn how multiple sources of data can be transformed into unified customer profiles. And see how you can use those profiles to create personalized experiences your customers will love.
Tags : 
adobe, data driven marketing, marketing, marketer, marketing guide, customer experience, internet marketing, crm & customer care, marketing research, traditional marketing
    
Adobe
Published By: LeadGenius     Published Date: Sep 13, 2016
Do your B2B web forms capture all the qualifying data you need from inbound prospects? Neither do ours. That’s why we’ve compiled a PDF guide highlighting the best ways to get all the prospect data you need, without lengthening your forms.
Tags : 
b2b, abm, account based marketing, account based sales, b2b marketing, lead generation, demand generation, marketing operations, account based strategy, ideal customer profile, icp, outbound, outbound email, inbound marketing, lead enrichment, customer data, lead form, emerging marketing, traditional marketing
    
LeadGenius
Published By: DocuSign     Published Date: Jul 25, 2016
This short video profiles the use of DocuSign in Insurance with a special focus on our customer’s customer. See first hand how DocuSign improves customer experience, maximizes ROI, and ensures compliance as the global standard for Digital Transaction Management in Insurance
Tags : 
    
DocuSign
Published By: IBM     Published Date: Jul 19, 2016
Learn how IBM Cognos Analytics incorporates many governed discovery features, with which business users can easily expose the underlying data modelling of existing reports and modify it to an individual or departmental requirements
Tags : 
ibm, ibm cognos analytics, analytics, business intelligence, business analytics
    
IBM
Published By: SnowFlake     Published Date: Jul 08, 2016
This EMA case study profiles the implementation of the Snowflake Elastic Data Warehouse, a new generation of cloud-based data warehouses, by Accordant Media. This document details significant tangible and intangible improvements and opportunities the Snowflake solution created for the Accordant Media infrastructure and analytical teams.
Tags : 
snowflake, media, data, technology, cloud-based data, best practices
    
SnowFlake
Published By: Qualys     Published Date: Jun 30, 2016
Few would argue with the statement that security is a top priority for IT departments at companies large and small today. Data is the currency of the digital age and the lifeblood of organizations, so strategies to protect corporate data are growing in importance and are now a topic of C-suite consideration. So with high-profile data breaches continuing to occur across industries, security leaders are revamping their strategies to keep pace.
Tags : 
security, cloud, cloud management, data security, it management
    
Qualys
Published By: Delta Risk     Published Date: Jun 07, 2016
Recent high profile, high impact cyber breaches at some of the largest financial institutions in the United States have highlighted the fact that boards of directors need to take an active role in the management of cyber risk. This Viewpoint offers the Delta Risk perspective on how boards should engage in the management of cyber security risks, stressing four priority activities.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: