esi

Results 326 - 350 of 2967Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: Feb 14, 2019
Today's dynamic data demands pose new threats to security and IT professionals have to mitigate new risks without restricting the flow of information. Per findings discovered in a recent Forrester report, "Evolving Security to Accommodate the Modern Worker", Brett Hansen, Dell's Vice President of Client Software and General Manager of Data Security, shares his insights on solutions Dell provides to meet the needs of employees and IT. Download this article from Dell and Intel® to learn: • What IT departments can do to tailor security solutions to different users • How flexible security can be to address the needs of various workers • Which solutions are best at protecting your data
Tags : 
    
Dell EMC
Published By: Oracle     Published Date: Nov 08, 2017
All’inizio, probabilmente avrai scelto di adottare l’infrastruttura cloud con una certa prudenza, limitandoti a un approvvigionamento rapido o alla riduzione dei costi operativi o delle macchine. Ma come resistere ai vantaggi di questo nuovo modo di fruire della tecnologia? Il cloud continua a evolvere e a conquistare credibilità in tutti i settori. Oggi, ci aspettiamo che ogni sistema aziendale possa beneficiare dei vantaggi del cloud.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Cisco     Published Date: Sep 14, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 21, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption. Download this whitepaper to find out more.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
Cisco
Published By: NetApp     Published Date: Dec 05, 2016
Here are the five core principles for monetizing your storage like never before and winning more customer applications than ever for your cloud and hosted services. These are your keys to the next generation data center.
Tags : 
    
NetApp
Published By: Oracle     Published Date: Oct 17, 2016
This new digibook is specifically designed to help you make digital business a reality in your enterprise.
Tags : 
    
Oracle
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard
Published By: MicroStrategy     Published Date: Aug 12, 2012
Apple Premium Resellers use MicroStrategy Intelligence Dashboards on the iPad. See how these retail stores use our mobile platform to design beautiful, data-rich dashboards. See why MicroStrategy is the vendor of choice for Apple Premium Resellers.
Tags : 
microstategy, apple, dashboards, ipad
    
MicroStrategy
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
secure web gateway, web-based threats, web, solution, technology
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
gateway, web, security
    
Blue Coat Systems
Published By: VMWare - vFabric     Published Date: May 15, 2012
Is your business demanding more innovation? You must respond by rising above mediocrity to deliver great software - to achieve this, you must balance your design to provide 7 key qualities. Boost your commitment to design for all 7 qualities today!
Tags : 
vfabric, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware
    
VMWare - vFabric
Published By: Oracle     Published Date: Aug 09, 2013
Pacific Northwest National Laboratory discusses the impact and advantages of Oracle Fusion Human Capital Management with Zach Thomas, Oracle vice president of HCM strategy.
Tags : 
pacific northwest, national laborator, oracle, fusion, human capital management, hcm, human resources
    
Oracle
Published By: Oracle     Published Date: Aug 09, 2013
National Instruments designs and manufactures hardware and software. Melissa Fuller, IT Human Resources, at National Instruments discusses Oracle Fusion HCM and how they are using it to align to their changing business processes.
Tags : 
national instruments, oracle, fusion, hcm, human resources
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Pacific Northwest National Laboratory discusses the impact and advantages of Oracle Fusion Human Capital Management with Zach Thomas, Oracle vice president of HCM strategy.
Tags : 
pacific northwest, national laborator, oracle, fusion, human capital management, hcm
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
National Instruments designs and manufactures hardware and software. Melissa Fuller, IT Human Resources, at National Instruments discusses Oracle Fusion HCM and how they are using it to align to their changing business processes.
Tags : 
national instruments, oracle, fusion, hcm
    
Oracle
Published By: Lumeris     Published Date: Aug 04, 2014
For health plans, health systems and delegated payer operations, or health systems wanting to become their own payer, Lumeris’ turnkey outsourcing offers expert support to design, build, operate, measure, and optimize value-based health plan operations that can drive clinical and financial excellence. This can be evidenced by our ability to help clients achieve higher revenue, lower costs, higher market share, and meeting mandates for medical cost ratio contained in the Patient Protection and Affordable Care Act.
Tags : 
lumeris, health plan delivery, health plan operations, population health services, value based health plan operations, health plan outsourcing, operating a health plan
    
Lumeris
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: Flexera     Published Date: Sep 16, 2016
Download this white paper to learn more about these three steps to securing software patches: Play to strengths and know your weaknesses Prioritize for Bottom Line Value Design a Process to Support Desired Outcomes
Tags : 
software patch, patch management, third-party patching, software vulnerability management, vulnerability intelligence, enterprise risk, flexera, risk reduction
    
Flexera
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Pega     Published Date: May 24, 2016
As the marketing landscape continues to shift and evolve, marketers are being tasked with a multitude of responsibilities, not the least of which involves adopting new platforms and strategies to operate in a real-time world and provide relevant content across every conceivable delivery platform. This has opened a whole new world of challenges—and opportunities—for marketers as personalization has been brought to the forefront of the strategy for many organizations. These requirements are making it all the more imperative for organizations to be able to craft robust experiences that are targeted to the needs and desires of all of their customers. In a world where customers have a multitude of options for nearly everything they are looking to purchase—and where new contenders are willing to offer almost anything to gain their business and loyalty if given the opportunity—the demand to know and effectively engage customers has never been greater. Download this whitepaper and discover how
Tags : 
    
Pega
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Discover the best practices for securing and protecting your Hybrid IT environments from HPE’s Advisory Consulting services. Businesses and organizations are building new hybrid infrastructures to deliver new IT services that require agility, resiliency and security. Success will require more automation, integration and end-to-end visibility supported by threat intelligence and threat analytics. This blueprint provides proven strategies and approaches based on the IT digital transformation experience and many customer engagements. It will help customers determine where to start and how to approach this topic
Tags : 
    
Hewlett Packard Enterprise
Published By: Juniper Networks     Published Date: May 04, 2018
Business leaders are eager to leverage new technologies, and IT leaders can't afford to fall behind. Hybrid IT environments take advantage of private and public clouds but need enhanced security, automation, orchestration, and agility.
Tags : 
    
Juniper Networks
Published By: Oracle APAC     Published Date: May 24, 2018
By optimizing their on-premises IT environments and moving processes and workloads to the cloud, businesses can reduce time-to-market, increase agility, and minimize total cost of ownership. Oracle’s Linux and Virtualization offerings are designed to help you easily optimize your current on-premises environment, and offer a clear path to cloud—so you can migrate your workloads when the time is right.
Tags : 
    
Oracle APAC
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.