dp

Results 126 - 150 of 998Sort Results By: Published Date | Title | Company Name
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
Take a look at this flier for additional information regarding archiving and retention solutions from IBM.
Tags : 
ibm uk, data protection, information systems, information management, business continuity, business resiliency, business availability, dp&r, dp+r, dp and r
    
Ogilvy - IBM UK
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This ESG whitepaper reviews challenges introduced by data growth and focuses on IBM data protection and retention products/technologies that address storage efficiency.
Tags : 
ibm uk, esg, data growth, data protection, information systems, information management, business continuity, business resiliency, business availability, dp&r, dp+r, dp and r
    
Ogilvy - IBM UK
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This whitepaper explores the latest challenges and innovations in data protection and retention.
Tags : 
ibm uk, data protection, information systems, information management, business continuity, business resiliency, business availability, dp&r, dp+r, dp and r
    
Ogilvy - IBM UK
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
Browse the data-sheet for additional information regarding archiving and retention solutions from IBM.
Tags : 
ibm uk, data protection, information systems, information management, business continuity, business resiliency, business availability, dp&r, dp+r, dp and r
    
Ogilvy - IBM UK
Published By: IBM APAC     Published Date: Aug 22, 2017
Today’s enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: • Apple iOS and Apple macOS • Google Android • Microsoft Windows
Tags : 
user based context, id management, integration, azure ad, application catalogs, portal, end user store, saas, mdm, client management
    
IBM APAC
Published By: IBM APAC     Published Date: Aug 22, 2017
While it might be desirable to standardize end users on one or two types of devices that all run the same operating system, most organizations don’t have that luxury. Today’s users demand an extraordinary level of flexibility and convenience—which means most organizations support a vast assortment of endpoints, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, smartphones, and even wearables and IoT devices.
Tags : 
actionable insights, contextual analytics, applications, content, data, identity, threats, connectivity, smartphones, tablets
    
IBM APAC
Published By: Dell PC Lifecycle     Published Date: May 18, 2018
Companies Prioritize Detection Amidst A Wave Of Security Incidents Advanced endpoint threats and steady attacks change the way that decision-makers at organizations of all sizes and across industries prioritize, purchase, and execute on security initiatives. Now more than ever, IT security professionals recognize the importance of frontline detection and are shifting priorities to close gaps that place their organizations at risk.
Tags : 
    
Dell PC Lifecycle
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
With the viability and importance of cloud computing now widely accepted by IT and business leaders alike, the focus of planning, discussion and implementation has shifted to the best approaches for using cloud computing to achieve the all important business goals of agility, flexibility and efficiency. From an architectural standpoint, most organizations have embraced some combination of public and private clouds — sometimes in isolation, other times in concert. But increasingly, large and small organizations alike are taking steps toward the next wave of cloud architecture: hybrid clouds.
Tags : 
private cloud, public cloud, hybrid cloud, cloud computing
    
Dell & Microsoft
Published By: MobileIron     Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
Tags : 
data security, regulation, legal system, data protection
    
MobileIron
Published By: MobileIron     Published Date: Sep 26, 2017
The shift toward modern mobile-cloud technologies is forcing organizations to completely rethink their approach to endpoint security. For instance, while credential-based security is enough to secure access in an IT-controlled desktop environment, it doesn’t transfer to the mobile-cloud world
Tags : 
mobileiron, mobile, cloud, enterprise, security, endpoint security
    
MobileIron
Published By: PernixData     Published Date: Jun 01, 2015
David Klee and Bala Narasimhan discuss the tips for DBAs and Infrastructure Admins to maximize the performance of their systems without massive restructuring of their environments. - See more at: http://www.pernixdata.com/resource/database-experts-bringing-together-databases-virtualization-and-storage#sthash.KKii86jl.dRQXxxik.dpuf
Tags : 
pernixdata, virtualization, storage, dbas, databases
    
PernixData
Published By: OutSystems     Published Date: Oct 12, 2015
The Ovum Decision Matrix: Selecting a Mobile App Development Platform Solution highlights what companies should be looking for in a MADP solution. Given the amount of time, energy, money, anxiety, and attention that is being aimed at enterprise mobility right now, this report is quite timely.
Tags : 
outsystems, ovum, madp, mobile app, application development, ovum decision matrix, platform
    
OutSystems
Published By: OutSystems     Published Date: Oct 12, 2015
This guide gives you a concrete definition for each criteria and explains why it is crucial to consider each capability as you determine the right mobile app platform for your goals. The criteria you see throughout this guide has been identified by Gartner as the essential set of functions needed for optimal performance of your platform.
Tags : 
outsystems, mobile application, delivery platform, gartner, madp, mobile apps, mobile platforms
    
OutSystems
Published By: Dynatrace     Published Date: Apr 26, 2017
Digital business accounts for nearly a quarter of the world’s economy today, but many organizations still lack a complete view of the digital customer experience they’re delivering. That lack of clarity impedes business success. In this executive brief, MIT Technology Review describes how DPM can help bridge that gap.
Tags : 
customer experience, digital perforamnce, it performance, digital experience, digital experience monitoring
    
Dynatrace
Published By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies
Published By: Google     Published Date: Aug 23, 2018
"From APIs to employee-owned smartphones, there are more access points to corporate data than ever before. Have businesses updated their security strategies to reflect this explosion of new targets for potential breaches? In June 2017, Google commissioned Forrester Consulting to examine how security experts think about endpoint security and learn how the cloud is helping businesses address new vulnerabilities. Download the Forrester report and find out more."
Tags : 
    
Google
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
CA Privileged Access Manager protects an organization’s business and empowers its people. The solution protects critical accounts and endpoints while providing a seamless user experience. CA commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and objectively examine the potential return on investment (ROI) and enterprises may realize by deploying its Privileged Access Manager solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the CA Privileged Access Manager solution on their organizations.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If you’re like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
    
CA Technologies EMEA
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 27, 2019
What you can’t see will hurt you The situation is critical, because the percentage of encrypted user traffic has more than doubled since 2014, exceeding 80 percent, according to F5 Labs' 2017 TLS Telemetry report. So, of course, now there are SSL visibility solutions that provide decryption services allowing those security controls to see what they’re doing. But visibility, by itself, isn’t enough. Security teams and network operations have found that setting up decryption zones is not easy. Security teams often have to resort to manual daisy-chaining or tedious configuration to manage decryption/encryption across the entire security stack. And then they find that exceptions abound. And lastly, you need to scan your inbound and outbound traffic for tomorrow’s threats, and SSL Orchestrator is the tool that lets your security controls keep your organization’s name out of the papers and away from those pesky GDPR fines. Download the eBook to find out how you can gain visibility into e
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: 3D Systems     Published Date: May 24, 2019
In den letzten zwei Jahrhunderten hat sich die industrielle Fabrikproduktion in den folgenden vier Schlüsselaspekten immer wieder selbst übertroffen: Wiederholbarkeit des Prozesses, Langlebigkeit der produzierten Teile, Produktivität des Arbeitsablaufs und Wirtschaftlichkeit der Betriebskosten. Die Arbeitsabläufe in Fabriken wurden optimiert, sodass die bestmöglichen Teile so kostengünstig wie möglich in großen Mengen gefertigt werden können. Sämtliche neue Produktionsmethoden oder Arbeitsabläufe, die neben diesem Standardprozess akzeptiert werden sollen, müssen diesen bewährten Charakteristiken gerecht werden oder eine Verbesserung darstellen.
Tags : 
    
3D Systems
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: ipoque     Published Date: Oct 04, 2018
The SD-WAN market is growing fast, but so is competition. In such a competitive environment, SD-WAN vendors need to offer products with unique features and capabilities in order to stand out. Real-time application visibility powered by deep packet inspection (DPI) software can be the decisive element in achieving them. This whitepaper highlights the key value of DPI software, which is enabling advanced SD-WAN analytics and security features.
Tags : 
dpi, deep packet inspection, sd-wan, analytics, network analytics, traffic analytics
    
ipoque
Published By: Group M_IBM Q1'18     Published Date: Feb 01, 2018
Client-ready, globally applicable, a document setting out the IBM journey to GDPR Readiness
Tags : 
gdpr, compliance, data protection, personal data
    
Group M_IBM Q1'18
Published By: ipoque     Published Date: Feb 14, 2019
Virtualized Evolved Packet Core (vEPC) is a major breakthrough in network function virtualization (NFV). When asked where they have deployed NFV in production networks, communication service providers (CSPs) consistently name vEPC as one of the top answers. Why is that? In order to maximize their processing capacity, CSPs virtualize a subset of their network applications, including mobile edge computing (MEC), base stations (small/macro cells) and the mobile core, because these systems use a large bandwidth. The mobile packet core builds the foundation of the core network on which mobile CSPs offer IP-based services to their customers. Implementing vEPC solutions can help CSPs obtain the scale necessary to accommodate growing numbers of subscribers and large amounts of traffic or connections while controlling costs and improving on quality of experience (QoE). In the past, evolved packet core (EPC) solutions were deployed on purpose-built hardware. NFV enables operators to deploy EPC c
Tags : 
dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
    
ipoque
Published By: ipoque     Published Date: Feb 14, 2019
Application-aware vEPC is the key to SDN/NFV service deployments. Deep packet inspection software provides granular network data, which lays the foundation for application awareness in mobile networks. This case study explains how a leading provider of virtualized network solutions uses the best-berforming deep packet inspection (DPI) software R&S®PACE 2 by Rohde & Schwarz to provide their CSP customers with overall network intelligence at a highly granular level.
Tags : 
dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
    
ipoque
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.