cio

Results 76 - 100 of 1160Sort Results By: Published Date | Title | Company Name
Published By: Websense     Published Date: Apr 09, 2013
Most security effectiveness tests take a sample of known malicious content, and see how many threats each solution can catch. Unfortunately, stopping known threats — those with a known signature, reputation or destination — isn't enough to protect real-world networks. So we designed a new test, along with leading independent test laboratory Miercom*, that simulates a typical day on a network like yours. We put a large sample of web traffic of unknown nature through our TRITON-powered Websense® Web Security Gateway solution, along with competing web gateways and firewalls. Each solution had a fair and equal chance to analyze, classify and block threats as it would on your network.
Tags : 
miercom, security, effectiveness, report, protect, network, threats, solutions
    
Websense
Published By: Dell     Published Date: Feb 04, 2015
More than 23 million servers in the world are still running on the Microsoft Windows Server 2003 operating system, making it the most popular engine for serving information and applications globally for over a decade. But, starting in July 2015, Microsoft will no longer provide basic support for it.
Tags : 
dell, windows, microsoft, modernization, management, modernization, server, 2003, 2012, support, services, efficiency, cost, platforms, future, mobility, standardization, transformation, challenges, applications
    
Dell
Published By: Dell     Published Date: Feb 04, 2015
Migrating your enterprise to a modern Microsoft® Windows® operating system is a complex process that can strain IT resources. That’s why Dell is focused on helping customers meet the deadline of the decade: On 14 July 2015 support for Windows 2003 will cease. The strategic value to efficient Windows migration is application, hardware and deployment readiness.
Tags : 
dell, windows, microsoft, modernization, management, modernization, server, 2003, 2012, support, services, efficiency, cost, platforms, future, mobility, standardization, transformation, challenges, applications
    
Dell
Published By: Dell     Published Date: Feb 04, 2015
Technology is moving fast and your data center needs to keep up so your business can thrive. Migrating to the latest platforms and solutions, such as Windows® Server® 2012 R2, lets you take advantage of its virtualization advancements and tap into the Microsoft cloud OS. Combined with unique innovations featured in Dell server, storage and networking solutions, you can do more than modernize your IT — you can transform it.
Tags : 
dell, windows, microsoft, modernization, management, modernization, server, 2003, 2012, support, services, efficiency, cost, platforms, future, mobility, standardization, transformation, challenges, applications
    
Dell
Published By: Dell     Published Date: Feb 04, 2015
In the last few years there have been radical changes in the ways organizations operate and people work. Explosion of data, increased mobile demands, and the globalization of business in general are making 24/7 access to people and information the norm. Sophisticated cyber attacks are requiring robust systems security designed to counter new threats. And velocity is now essential when delivering new IT services.
Tags : 
dell, windows, microsoft, modernization, management, modernization, server, 2003, 2012, support, services, efficiency, cost, platforms, future, mobility, standardization, transformation, challenges, applications
    
Dell
Published By: Akamai Technologies     Published Date: Aug 11, 2017
Targeted threats are increasing at an alarming rate. Malicious actors are evolving their methodologies and are increasingly exploiting the domain name system (DNS) to launch cyberattacks. Learn more about how to proactively protect your company with an additional layer of cloud-based security.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 11, 2017
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Caristix     Published Date: May 03, 2013
Learn why scoping is critical when it comes to interoperability and HL7.
Tags : 
hl7, integration, interface, midical, heathcare, costs, risks, interfacing project, cio, hospital, integration
    
Caristix
Published By: Dell     Published Date: Jun 13, 2018
We expend so much energy trying to make each minute count in many areas of our life – why wouldn’t we take the same approach to our computing experience? Time stuck waiting on a system could be better spent solving problems, working, or even playing. Download this research study to learn more about how you could be saving time that is lost on slow end user computing systems. Find out how Intel® Optane™ memory with Dell OptiPlex 7050 Micro provides a simple way to improve system responsiveness in several key areas to give users a way to reclaim precious time and become more efficient.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: Feb 23, 2017
During the course of research efforts in the all-flash array (AFA) space, IDC is still encountering IT executives, particularly CIOs and CFOs, who have an outdated perspective on relevant cost metrics for comparing all-flash solutions with legacy hard disk drive (HDD)–based systems. In IDC's view, flash is an absolute requirement for performance reasons in any 3rd Platform computing environment. While most understand the need for flash performance, there is still a subset that does not view the broader use of flash in the enterprise as cost effective
Tags : 
    
Dell EMC
Published By: Polycom     Published Date: Sep 04, 2012
Polycom's introduction of H.264 High Profile allows CIOs to meet budget challenges and power more visual communication with fewer resources, thus limiting or avoiding costly network upgrades.
Tags : 
h.264 high profile, polycom, real-time video, visual communication, video deployment, video conferencing
    
Polycom
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Web application and DDoS attacks hit enterprises without warning or reason. The attacks can expose confidential data and website resources to malicious uses, reduce performance, and render sites unavailable. Responsible organizations proactively block web attacks to protect their reputations, site availability, site performance, and confidential data.
Tags : 
application, security, performance, web attacks, data security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Searching for a Cloud Security Provider can be confusing. Many providers appear the same at first glance: similar metrics, similar promises. The fact is, the information you need to make a real comparison requires asking questions and probing for details that cloud services vendors don’t always volunteer. Use this list to be sure you’ve covered the essential elements for choosing the right cloud security provider to protect your organization from malicious cyberattacks.
Tags : 
cloud security, cloud solutions, data analysis, cyberattacks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 11, 2017
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
web analytics, frost & sullivan, bot management, botnet
    
Akamai Technologies
Published By: Iron Mountain     Published Date: Aug 28, 2014
The terms disaster recovery and business continuity planning are often used interchangeably but, when you think about it, one is much preferable to the other. While disaster recovery makes clear that the organization will rise again, it does not let the world (and your patient population) know that the business of care will go on during the recovery process. In this important on-demand webinar, you’ll hear from one CIO who has given a lot of thought to keeping operations up and running no matter what gets thrown the organization’s way. With so many varieties of disaster lurking in wait, this is one webinar you can’t afford to miss.
Tags : 
iron mountain, healthcare it, disaster recover, business continuity plan, healthcare operation, business operations
    
Iron Mountain
Published By: Red Hat     Published Date: Jan 08, 2014
This executive brief provides results of a CIO Magazine Quick Pulse poll sponsored by Red Hat, which highlights the industry move to OpenStack and benefits of moving to OpenStack cloud technology, wherein companies see promise and a need for implementation expertise.
Tags : 
quickpulse, red hat, open stack, infrastructure, infrastructure as a service, isas, workload, cloud, virtulization, data center
    
Red Hat
Published By: Red Hat     Published Date: Jan 08, 2014
This executive brief provides results of a CIO Magazine Quick Pulse poll sponsored by Red Hat which highlights the industry move to private cloud technology and hybrid cloud environments through dual-source virtualization wherein companies value security, performance and support in a quest to build the new IT paradigm.
Tags : 
red hat, virtualization, storage, cloud, cloud data, hybrid cloud, cloud management, platform as a service, paas, cloud data access storage, cloud applications, scalability, deployment, cloud technologies
    
Red Hat
Published By: MobileIron     Published Date: May 12, 2015
This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
android for work, mobileiron, fragmentation, malicious app store activity, security gaps, compliance, lollipop
    
MobileIron
Published By: Pega     Published Date: Aug 12, 2016
Today’s banks are facing enormous pressures that include regulatory requirements, hefty penalties, increasing customer service demands, and ferocious competition from other financial institutions rapidly embracing customer-centric technology. Despite these challenges, banks can’t afford to scale down any efforts to ensure the highest standards of customer service
Tags : 
pega, customer service, finextra, service requests, inquiry handling
    
Pega
Published By: Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017     Published Date: Nov 22, 2018
Modern Marketing is Powered by Marketing Automation Join thousands of marketing professionals who have already secured executive buy-in and are benefiting from the power of marketing automation. This guide offers a look into the mind of an exec: what keeps them up at night, how do they view the marketing department, and how can marketing automation address their concerns. Use this guide to get a better understanding of what is Revenue Performance Management and the Two questions keeping your CEO awake at night. Also included are conversation starters you can have with your CEO and separate ones for CFOs and CIOs.
Tags : 
    
Oracle APAC ZO OD Prime Volume ERP ABM Leads June 2017
Published By: Oracle     Published Date: Feb 15, 2018
To succeed in today’s competitive reality, businesses need to free themselves from the limitations of legacy IT infrastructure. The days of purchasing hardware and maintaining massive data centers to run IT must come to an end. Managing and maintaining your infrastructure is simply too expensive. A recent Gartner survey found that more than 80 percent of CIOs consider Infrastructure as a Service (IaaS) to be a viable option and 10 percent of CIOs already consider it to be their default choice for infrastructure. Utilizing an infrastructure with an elastic, pay-as-you-go service model not only reduces costs and worries, but also frees IT organizations to innovate in ways that will enhance business growth.
Tags : 
iaas, business, legacy, infrastructure, oracle, organisations
    
Oracle
Published By: Oracle     Published Date: Feb 15, 2018
I progressi nel campo digitale rivoluzionano in profondità il nostro modo di lavorare, introducendo innovazioni nei nostri uffici praticamente ogni giorno. Queste tecnologie hanno alzato il livello delle aspettative, costringendo le aziende a operare con un'agilità senza precedenti. Questi cambiamenti sono grandi opportunità, ma purtroppo ci imbattiamo anche in nuovi ostacoli che possono intralciare la nostra marcia verso il successo, come la necessità di innovare rapidamente, di minimizzare i costi e di reagire prontamente alle pressioni della concorrenza.
Tags : 
guida, approccio, integrato, odierne, informatica, oracle
    
Oracle
Published By: Oracle     Published Date: Feb 28, 2018
Per avere successo nella realtà competitiva di oggi, le aziende devono svincolarsi dai limiti imposti dall’infrastruttura IT legacy. L’acquisto di hardware e la manutenzione di enormi data center per l’esecuzione dei sistemi informatici appartengono al passato: la gestione e la manutenzione dell’infrastruttura sono semplicemente troppo costose. Un recente sondaggio di Gartner ha rivelato che oltre l’80% dei CIO ritiene che l’Infrastructure-as-a-Service (IaaS) sia un’opzione perseguibile e il 10% degli stessi già la considera la scelta predefinita per l’infrastruttura. L’utilizzo di un’infrastruttura con un modello di servizio elastico e con pagamento in base al consumo non solo riduce i costi e le preoccupazioni, ma consente inoltre alle organizzazioni IT di dedicarsi all’innovazione per favorire la crescita aziendale.
Tags : 
ampio, accesso, risorse, misurabile, pubblico, privato, ibrido
    
Oracle
Published By: Oracle     Published Date: Feb 16, 2018
To succeed in today’s competitive reality, businesses need to free themselves from the limitations of legacy IT infrastructure. The days of purchasing hardware and maintaining massive data centers to run IT must come to an end. Managing and maintaining your infrastructure is simply too expensive. A recent Gartner survey found that more than 80 percent of CIOs consider Infrastructure as a Service (IaaS) to be a viable option and 10 percent of CIOs already consider it to be their default choice for infrastructure. Utilizing an infrastructure with an elastic, pay-as-you-go service model not only reduces costs and worries, but also frees IT organizations to innovate in ways that will enhance business growth.
Tags : 
iaas, business, legacy, infrastructure, oracle, organisations
    
Oracle
Published By: Oracle     Published Date: Feb 28, 2018
So, while the advertising industry is in the midst of profound change, it’s hard to be certain about the form that it will take in future. There’s good reason to be optimistic, rather than pessimistic. Firstly, as we saw earlier, the proliferation of digital platforms means that there are now more canvases for creativity than ever before. And secondly, recent discoveries in psychology and behavioural science have highlighted how human decision making – in any context – is often unconscious or non-rational. As a result, the range of problems where creative communication can offer a solution is wider than ever previously realised.
Tags : 
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.