service providers

Results 226 - 250 of 378Sort Results By: Published Date | Title | Company Name
Published By: Mindtree     Published Date: Nov 01, 2016
Learn how to cut costs so you can self-fund growth initiatives. An expert Managed Services guide can help you map a smart path to streamlining processes, outsourcing services and rearchitecting systems. With a customized plan in place, your Managed Services provider can begin to optimize IT and increase efficiencies through continuous improvements. Discover how Managed Services providers: Guarantee savings every year so you can invest in growth opportunities such as digital and analytics Optimize the run-the-business side of IT to accelerate innovation Deliver continuous improvements to productivity, quality and time to market
Tags : 
mindtree, growth initiatives, managed services guide, managed services, analytics
    
Mindtree
Published By: Tail-f Systems     Published Date: Sep 16, 2008
The NETCONF protocol is a modern building block for device management automation, offering a unified approach to network configuration, rather than a device-specific methodology. To equipment vendors, NETCONF is a way to standardize the management interface of network elements. To service providers, NETCONF is a way to optimize the administrative workflow, by moving management intelligence out of the device under management, and consolidating this management into higher-level applications.
Tags : 
netconf, netconf standard, device management automation, network standard, ietf standard, tail-f, tailf
    
Tail-f Systems
Published By: Intel     Published Date: May 19, 2017
Intel is accelerating Network Functions Virtualization (NFV) with unique capabilities that enable optimal use of data center resources to deliver communications services.
Tags : 
nfv, security, virtualisation, data
    
Intel
Published By: Red Hat     Published Date: May 01, 2013
A recent IDG Quick Poll reveals that enterprise decision makers understand OpenStack can help them build open-source systems. However, the challenges of deploying OpenStack make the Red Hat portfolio of open and hybrid technologies critical to getting up and running.
Tags : 
red hat, openstack, open-source architect, infrastructure-as-a-service, cloud computing, standard hardware, deployment, cloud providers, public clouds, virtual architecture, hybrid cloud portfolio, infrastructure
    
Red Hat
Published By: HP     Published Date: Jul 29, 2008
This white paper explores the advantages of Operational ITSM- through incremental and continual improvement of service management practices on an ongoing basis. IT organizations must evolve into trusted service providers that adapt quickly, offer cost-effective, reliable, and flexible services to meet today's business initiatives. This evolution is not easy. It requires that the IT organization adopt an IT Service Management (ITSM) framework. Operational ITSM provides an incremental approach for companies that may not have the resources to finance and staff a large ITSM project.
Tags : 
itsm, service management, service level, service-level, itil, mission critical
    
HP
Published By: Evident.io     Published Date: Nov 19, 2015
Collaboration services, email, managed services, and backups and disaster recovery are the most common current use cases for cloud services, according to the results of a new SANS survey on cloud security. The 485 IT professionals who participated in the survey reported using a variety of cloud providers and service models, including software-as-aservice (SaaS) cloud offerings, along with a fairly even mix of infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) implementations. Most respondents said they are investing in both public and private clouds as needs dictate.
Tags : 
evident, cloud security, collaboration services, 485 it, disaster recovery, cloud services, saas
    
Evident.io
Published By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
    
CA Technologies
Published By: OpenText     Published Date: Mar 02, 2017
Market-leading research group Ovum recently conducted a comparison of B2B integration managed services providers. Get your copy for a full vendor comparison and see why OpenText™ is positioned as the leader in B2B integration managed services.
Tags : 
ovum report, b2b integration, managed services, edi solutions
    
OpenText
Published By: NetApp and VMware     Published Date: Jan 06, 2012
Experts discuss how customers can virtualize business-critical apps leveraging common resource pools as key elements to delivering IT as service and cloud computing.
Tags : 
netapp solutions for service providers, service-oriented infrastructure (soi), secure multi-tenancy, service automation and management, data mobility, storage efficiency, integrated data protection
    
NetApp and VMware
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Merchants and service providers that process credit card payments must comply with the Payment Card Industry Data Security Standard (PCI DSS), now at Version 3.0. Whether the transaction occurs in a store or online, and regardless of the environment, from physical Point of Sale devices, to virtualized servers, or web servers in a public cloud, PCI DSS 3.0 mandates that these organizations are responsible for the security of their customers’ cardholder data. Read this white paper to learn more about the Payment Card Industry Data Security Standard 3.0.
Tags : 
    
CDW-Trend Micro
Published By: IBM Watson Health     Published Date: Nov 30, 2015
The transition from fee-for-service to value-based reimbursement has been a challenge for many providers. Financial incentives that favored high service volumes must now be re-focused to accommodate alternative models such as bundled payments and accountable care organizations (ACOs).
Tags : 
ibm, watson health, phytel, population, health management, accountable care organizations, finances, value-based
    
IBM Watson Health
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in today’s business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of today’s demanding IT environment.
Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment
    
Centrify Corporation
Published By: FICO     Published Date: Sep 12, 2017
PSD2 puts accountability for unauthorised or fraudulent payments squarely on payment service providers. PSPs are now obliged to confirm their customer’s identity robustly when making payments and when managing their accounts. But these measures threaten to put barriers in the way of the frictionless journey that customers want.
Tags : 
psd2, accountability, security, customer authentication, risk analysis, payment fraud, fico
    
FICO
Published By: Cisco     Published Date: Dec 21, 2016
Pulsant is a United Kingdom-based IT infrastructure services provider focused on the small and medium-sized enterprise market. It offers public, private, and hybrid cloud services and a variety of managed, collocation, and professional services. Pulsant was one of the first cloud service providers to embrace software-defined networking (SDN) as a way to simplify its IT infrastructure, unify control of physical and virtual environments, and reduce capital expenses (capex) and operating expenses (opex). After evaluating a number of vendors, Pulsant chose Cisco's Application Centric Infrastructure (ACI) as the best SDN solution for delivering its hybrid cloud services.
Tags : 
    
Cisco
Published By: MASERGY     Published Date: Jul 20, 2007
Organizations of all sizes are evolving to an enlightened, business-focused method of choosing network services and service providers called Total Customer Experience (TCE). This white paper describes the evolution toward a TCE approach and the benefits and clarity that TCE brings to the marketplace.
Tags : 
mice, multimedia, internet, communications, entertainment, service level, service level agreement, ip networks, collaboration, tce, quality of service, service provider, network provider, isp, masergy
    
MASERGY
Published By: McAfee     Published Date: Apr 04, 2017
Engaging a cloud service provider (CSP) for Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) or Software-as-a-Service (SaaS) is now common practice for enterprise IT. It is essential to make the right choice of providers and services, particularly as it relates to security practices, data privacy, and operational capabilities. Be sure to put potential Cloud Service Provider (CSP) partners under the microscope by asking them the right questions about how they will secure your most essential information.
Tags : 
saas, iaas, cloud service provider, cloud
    
McAfee
Published By: Rackspace     Published Date: Mar 28, 2018
With Rackspace Managed Security and Compliance Assistance for GCP, Rackspace is now a leading managed security services provider that offers services on all of the major public cloud platforms. In IDC’s 2017 CloudView Survey of over 6,000 enterprise respondents, nearly 50 percent indicated concerns about security in the cloud, and about 40 percent cited superior security capabilities available from service providers as a major incentive to move to the cloud.¹ With RMS, Rackspace security experts help customers with strategic planning for best practice multi-cloud security, tactical day-to-day security monitoring and threat analysis to deter, detect and respond to potential threats around the clock.
Tags : 
    
Rackspace
Published By: IBM     Published Date: Nov 13, 2008
To grow your subscriber base, reduce churn and control costs, it is imperative that you achieve and maintain a deep understanding of the customer experience throughout your organization. This white paper highlights IBM Tivoli® Netcool® Service Quality Manager Service Solutions — how it can change the way telecommunications providers are taking new services to market and helping to crystallize.
Tags : 
ibm, tivoli, voip, iptv, blackberry, service level agreement
    
IBM
Published By: RCN Business     Published Date: Nov 11, 2014
In a changing business climate, you're only productive as the technology that supports you. In fact, having the right services can mean the difference between one more happy sale or one less customer. Don’t settle for "one less" - get the right solution for your business with RCN Business Services. RCN Business Services offers a full suite of communications products and services to businesses of all sizes, including Internet, voice, video and network solutions. We are a facilities-based provider that offers extensive fiber density with redundancy and superior performance. Spanning over 6,000 miles, the advanced fiber-rich network is completely diverse from other communications providers, enabling businesses to experience exceptional customer service, quicker installation and issue resolution. RCN Business operates on three fundamental tenets: Partnership, Choice and Technology. These fundamental tenets guide how RCN Business approaches the sales process, addresses its customers, and supports its products and services. Partnership: The process starts with a dedicated RCN Business account representative actively listening and learning the needs, goals and challenges of a business. The trained and experienced RCN Business staff then delivers a customized solution. Choice: RCN Business understands that one size does not fit all. The goal is to create a reliable, customized technology solution that contributes to a business’s success and growth. Technology: Technology and customer support are critical to any business. With RCN Business owning and having full control of its network, businesses get local U.S. based operations, faster response times and a continuous monitoring for superior uptime.
Tags : 
lan, voip, business communication, wan, pbx
    
RCN Business
Published By: Intel     Published Date: May 15, 2017
Many system integrators, software vendors, and platform providers rely on Intel® technologies to deliver the performance and scalability required for vE-CPE solutions. Using vE-CPE solutions based on Intel technologies, service providers can offer a full range of services without having to use multiple purpose-built systems. Read on to find out more.
Tags : 
virtualization, intel, agility, reduce costs, flexibility, cpe, customer premises equipment
    
Intel
Published By: VMTurbo     Published Date: Jun 18, 2013
VMware vCloud Director has created tremendous potential for service providers and enterprises to deliver agile and cost effective Infrastructure-as-a-Service (IaaS) through its ability to automate the self-provisioning of virtual data center service offerings by customers. Since a multitude of commodity cloud providers have appeared seemingly overnight, service providers and enterprises must harness technologies like vCloud Director to reduce the overall cost of delivering compute services. With automated self-service provisioning in place, the next wave of opportunities for cost and performance optimization lies in operations management. This document details how VMTurbo Operations Manager delivers unique business value, addressing significant gaps in VMware vCloud offerings.
Tags : 
compute service, vmware vcloud, director environments, reduce costs
    
VMTurbo
Published By: Quocirca     Published Date: Sep 18, 2008
Businesses of all sizes have to manage an increasing diversity of remote users and devices. The task ranges from simply keeping systems running to ensuring security, compliance and the achievement of environmental goals. Under this sort of pressure, IT managers and managed service providers, to which the task is often outsourced, must have flexible access to powerful tools and an ability to share the data those tools rely on.
Tags : 
quocirca, remote, it management
    
Quocirca
Published By: Texas Instruments     Published Date: Nov 06, 2006
Download this free whitepapers to learn how Remote Management can transform this challenge into an opportunity to stand apart from other service providers in a very competitive market.
Tags : 
access control, remote access, remote management, remote support, service provider, service providers, ip networks, ip tv, customer service, customer satisfaction, texas instruments
    
Texas Instruments
Published By: IBM     Published Date: May 29, 2015
Learn how telecommunications providers can reboot the customer experience!
Tags : 
restoration, telecommunications, service providers, connection, communication, customer experience
    
IBM
Published By: IBM     Published Date: Jul 31, 2015
Commoditization is a serious threat to the telecommunications industry. Most CSPs offer similar services at rates designed to win what has become a price war. As a result, many face decreasing margins and difficulty sustaining differentiation based on prices or products alone. On top of commoditization, CSPs also face competition from OTT providers and an increasingly knowledgeable and demanding customer base. With access to growing amounts of data from an ever-increasing number of sources and devices, today’s empowered, savvy consumers know what they want and expect to get it.
Tags : 
ibm, telco, csps, big data, commoditization, customer retention
    
IBM
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: