> Home

strategy

Results 351 - 375 of 2881Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Aug 22, 2017
Privileged user accounts—whether usurped, abused or simply misused—are at the heart of most data breaches. Security teams are increasingly evaluating comprehensive privileged access management (PAM) solutions to avoid the damage that could be caused by a rogue user with elevated privileges, or a privileged user who is tired, stressed or simply makes a mistake. Pressure from executives and audit teams to reduce business exposure reinforces their effort, but comprehensive PAM solutions can incur hidden costs, depending on the implementation strategy adopted. With multiple capabilities including password vaults, session management and monitoring, and often user behavior analytics and threat intelligence, the way a PAM solution is implemented can have a major impact on the cost and the benefits. This report provides a blueprint for determining the direct, indirect and hidden costs of a PAM deployment over time.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
APIs are an emerging technology for integrating applications using web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. While it is true that APIs share many of the same threats that plague the web, they are fundamentally differently and have an entirely unique risk profile that you need to manage. This eBooklet provides an overview of these new risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The mobile app has become “the” strategic initiative for all digital organizations attempting to drive business forward. “By 2017, mobile apps will be downloaded more than 268 billion times, generating revenue of more than $77 billion — making apps one of the most popular computing tools for users across the globe.”1 The app has become more than a simple method of communication. It is the new critical point of engagement, the face of the organization, and quite possibly the difference maker in customers staying or leaving. Getting the “user experience” (or UX) right in the eyes of the consumer is no longer a nice to have but fundamental to achieving success.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The rise of the application programming interface (API) represents a business opportunity and a technical challenge. For business leaders, APIs present the opportunity to open new revenue streams and maximize customer value. But enterprise architects are the ones charged with creating the APIs that make backend systems available for reuse in new Web and mobile apps.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Growing your enterprise is an ongoing priority. And, as the application economy continues to expand, it’s likely that you’re looking at digital business initiatives to fuel a significant portion of that growth.
Tags : 
    
CA Technologies
Published By: Microsoft     Published Date: Oct 06, 2016
Download the Keystone Research whitepaper to see how top performing enterprises use their IT investments to store, process, and use data to make more effective, real-time decisions. Keystone Research, a global economics and data-driven strategy consulting firm, interviewed senior IT and business decision makers at over three hundred businesses to uncover the relationship between Data & Analytics technologies and business performance. This research shows that companies who have developed the most sophisticated Data & Analytics platforms and apply these capabilities as a regular part of their business enjoy operating margins that are eight percentage points higher than lagging organizations. This translates to $100 million in operating profits on average for the more advanced companies in the sample controlling for factors such as company size and industry vertical.
Tags : 
microsoft, analytics, data, business impact
    
Microsoft
Published By: Microsoft     Published Date: Feb 02, 2017
Download the Keystone Research whitepaper to see how top performing enterprises use their IT investments to store, process, and use data to make more effective, real-time decisions. Keystone Research, a global economics and data-driven strategy consulting firm, interviewed senior IT and business decision makers at over three hundred businesses to uncover the relationship between Data & Analytics technologies and business performance. This research shows that companies who have developed the most sophisticated Data & Analytics platforms and apply these capabilities as a regular part of their business enjoy operating margins that are eight percentage points higher than lagging organizations. This translates to $100 million in operating profits on average for the more advanced companies in the sample controlling for factors such as company size and industry vertical.
Tags : 
    
Microsoft
Published By: Western Union Business Solutions     Published Date: Oct 26, 2016
Download the eBook, “Using Technology to Help Protect Profits,” now to discover the nuts and bolts for building a successful risk management strategy, and see how new online tools, like the WU EDGE platform, can empower you at every step to help protect profits
Tags : 
cash flow hedge, cash flow tool, cash flow management, cash flow management tools, cash management strategy, currency risk management, foreign risk management, foreign currency risk management, foreign currency risk exposure, currency risk exposure, hedging fx risk, hedge fx risk, fx exposure, fx management, exchange risk management, foreign exchange risk, foreign exchange rate risk, forex risk management, exchange rate exposure, foreign exchange exposure
    
Western Union Business Solutions
Published By: Carbonite     Published Date: Apr 09, 2018
IT admins tasked with restoring servers or lost data during a disruption are consumed with a single-minded purpose: successful recovery. But it shouldn’t take an adverse event to underscore the importance of recovery as part of an overall backup strategy. This is especially true with large datasets. Before you consider how you’re going to back up large datasets, first consider how you may need to recover the data. Variables abound. Is it critical or non-critical data? A simple file deletion or a system-wide outage? A physical server running onsite or a virtual one hosted offsite? These and a handful of other criteria will determine your backup and disaster recovery (BDR) deployment. What do we mean by large? A simple question with a not-so-simple answer. If your total data footprint is 5 TB or more, that’s considered large. But what kind of data is it? How many actual files are there? How frequently do they change? How much can they be compressed? It’s likely that two different 5 TB en
Tags : 
    
Carbonite
Published By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
To maximize the benefits of its next-generation systems and successfully execute its information strategy, CU had to overcome its aging network. Most of CU’s network infrastructure, which was built from solutions by another vendor, was introduced in 2007, when its computing center was first built. Over time, the equipment began to fail, affecting the stability of applications which relied on network connectivity. Technical support also became a major issue as the equipment faced obsolescence and maintenance contracts with vendors expired.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper APAC DWA Cloud Leads July 2017
Published By: Google     Published Date: Jan 08, 2018
Cloud platforms are rewriting the way that companies work, serving as a vital foundation for digital transformation. Companies should brace for challenges that will need to be met as they transition from in-house systems to hybrid-cloud, multi-cloud, and public-cloud environments. Learn how an open-source strategy and consistent governance will help your company use multi-clouds to compete in the digital world. Download the Harvard Business Review Analytic Services report and find out more.
Tags : 
multi-cloud, cloud services, cloud tools, digital transformation
    
Google
Published By: Google     Published Date: Apr 30, 2018
"Cloud platforms are rewriting the way that companies work, serving as a vital foundation for digital transformation. Companies should brace for challenges that will need to be met as they transition from in-house systems to hybrid-cloud, multi-cloud, and public-cloud environments. Learn how an open-source strategy and consistent governance will help your company use multi-clouds to compete in the digital world. Download the Harvard Business Review Analytic Services report and find out more."
Tags : 
    
Google
Published By: Limelight Networks     Published Date: Feb 21, 2018
Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). In some cases, using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But how do you know if a multi-CDN strategy is right for your business? This free Guide will help!
Tags : 
    
Limelight Networks
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
There’s no turning back from the fact that disruptive business automation is here. As artificially intelligent functionality delivers more capabilities that we increasingly take for granted, it’s difficult to grasp all the implications of this transformation. In this eBook, the aim is to illustrate what it means for business, for the people who work in those businesses, and for people served by those businesses every day. To better understand how automation is changing business, and with the generous support of CA Technologies, we reached out to 39 experts to get their opinion. By providing practical insights into what is happening today and what may be just over the horizon, I believe this eBook will be a valuable resource for anyone planning an automation strategy.
Tags : 
    
CA Technologies_Business_Automation
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
In the 26-criteria evaluation of continuous delivery and release automation (CDRA) providers, we identified the 15 most significant — Atlassian, CA technologies, Chef Software, Clarive, CloudBees, electric Cloud, Flexagon, Hewlett packard enterprise (Hpe), IBM, Micro Focus, Microsoft, puppet, Red Hat, VMware, and Xebialabs — and researched, analyzed, and scored them. We focused on core features, including modeling, deploying, managing, governing, and visualizing pipelines, and on each vendor’s ability to match a strategy to these features. this report helps infrastructure and operations (I&o) professionals make the right choice when looking for CDRA solutions for their development and operations (Devops) automation.
Tags : 
    
CA Technologies_Business_Automation
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: CA Technologies     Published Date: Jun 04, 2015
In the Application Economy, speed, innovation, and quality, have become table stakes. If you can’t meet your customers’ expectations, they will surely find a competitor who can. Whether your organization is in one of the sectors facing the most intense digital competition (like insurance, banking, telecommunications or retail), or a more traditional industry, how rapidly and successfully you embrace a software-driven digital transformation strategy will likely have a profound effect on your organization’s long term viability. In this Whitepaper, learn how the Application Economy is driving Digital Transformation in companies, and how you can position your organization for success.
Tags : 
    
CA Technologies
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Employees are increasingly bringing their own devices to work and accessing corporate IT resources from home. Windows Server 2012 helps mitigate potential security, use and control issues and makes implementing a BYOD strategy easier.
Tags : 
secure mobility, windows server, security
    
Dell & Microsoft
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Information is the engine of business growth in the digital age. Market intelligence, customer information, intellectual property and other data can be harnessed to create a quantifiable competitive advantage for a company and lay the path for future expansion. Yet as critical as data can be, the sweeping year-over-year proliferation in data volumes can quickly overwhelm an IT organization. This is much more than a budget problem: Without an effective data storage strategy, an organization is putting a critical resource at risk.
Tags : 
data storage management, microsoft windows server, market intelligence, customer information, intellectual property, data, it organizations, storage strategy
    
Dell & Microsoft
Published By: Dyn     Published Date: Nov 03, 2016
We all know that hybrid cloud adoption is exploding, with 80% of enterprises having at least some infrastructure in the cloud. This growth includes increased use of the internet to deliver applications, sites and services to employees, partners and customers. These companies need an internet performance management (IPM) strategy to ensure those services reach users effectively, starting with DNS. Join Trip Kucera and Dyn VP, Gary Sloper, as they discuss the impact of cloud and internet infrastructure across the cloud adoption lifecycle. Key focus points include: • Optimizing round trip times and latency, from time to first byte, to internet routing • Understanding and comparing cloud service providers • Protecting your service from route hijacks, DDoS attacks and mitigating vulnerabilities. Watch this short Video Webinar and learn how focusing on the DNS layer can help you plan, migrate and optimize your way to cloud success!
Tags : 
dyn, dns, hybrid, hybrid cloud, ipm, networking, enterprise applications
    
Dyn
Published By: Kaminario     Published Date: Aug 23, 2016
Your three essential tips for building a smarter, more resilient storage strategy.
Tags : 
kaminario, flash, performance, storage, application performance, resilient, networking, enterprise applications
    
Kaminario
Published By: Workday UK     Published Date: Sep 18, 2018
Auditing shouldn’t take your attention away from driving strategy and profitability. With a single cloud-based system for finance, you get compliance, controls, and audit capabilities all in one place. This streamlines the auditing processes and ensures security. Focus on business and let Workday do the rest.
Tags : 
    
Workday UK
Published By: Workday UK     Published Date: Sep 18, 2018
Digital transformation is your organisation’s chance to disrupt competition, break into new markets, and stay relevant for the long-term. Read this report to learn how CIOs can successfully drive digital strategy.
Tags : 
    
Workday UK
Published By: Workday UK     Published Date: Sep 18, 2018
Ready to reshape the future of work? Watch this video series to learn how you can use workforce technology to transform your organisation. After viewing the series, you’ll know how to develop a digital HR strategy, get executive buy-in, and maintain success.
Tags : 
    
Workday UK
Published By: Workday UK     Published Date: Sep 18, 2018
In this five-episode video series, Jason Averbook shows you the ins and outs of workforce technology and how to use it to achieve HR success. Watch the series to learn ways to develop a digital HR strategy, get executive buy-in, and maintain success.
Tags : 
    
Workday UK
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Home