assets

Results 251 - 275 of 467Sort Results By: Published Date | Title | Company Name
By: Nuance     Published Date: Jul 11, 2011
Knowledge that exists on paper tends to stay on paper, but in today's Internet-driven, knowledge-based economy, quick access to important information is critical.
Tags : nuance, integrating paper, paper documents, content management, information assets, paper, analytical applications, data integration, content delivery, content management system
     Nuance
By: VMware     Published Date: Sep 13, 2011
Federal datacenters, which house an enormous wealth of legacy assets, are the primary targets for agencies evaluating different cloud computing approaches. When agencies begin their journey to the cloud with virtualization-an IT transformation starting point that preserves existing investments-they realize significant agility, cost and security benefits. Federal IT leaders are deploying VMware cloud infrastructure solutions to meet these new directives.
Tags : vsphere, vmware, storage, vsa, cluster service, technology, storage, clustering, storage area networks, storage management, storage virtualization, information management, intranets
     VMware
By: BHC Rhodes     Published Date: Oct 06, 2011
Engineers at BHC RHODES in Overland Park, Kan., helped the city of Kansas City create and implement an effective system for tracking assets with RFID.
Tags : traffic, inventory, engineering, rfid, asset management
     BHC Rhodes
By: Zebra     Published Date: Jul 10, 2014
In this paper, Zebra shows how a solid device management solution can provide consistency and visibility into device status to maximize uptime and business efficiencies. Ensuring visibility of all assets whether they are directly on premise or at remote locations is another key benefit-for both IT and finance. Doing so helps maximize productivity where the devices are used, streamlines inventory management and compliance operations, and helps to create a more agile enterprise.
Tags : zebra, device management, centralized device management, finance, compliance operations, agile enterprises, device status, it management, enterprise applications
     Zebra
By: IBM     Published Date: Aug 08, 2012
Manage physical and virtual assets, maintain your infrastructure and capital equipment and maximize the efficiency of your people, processes and assets with predictive analytics.
Tags : ibm, technology, asset management, business management, predictive analytics, physical assets, virtual assets, infrastructure, capital equipment, workforce management
     IBM
By: IBM     Published Date: Aug 08, 2012
While economic recovery is clearly in process, your capital and operational budgets are still extremely tight. At the same time, your maintenance organization is being pressured to take a stance of zero tolerance toward safety incidents while reducing maintenance costs and minimizing asset downtime. Read this in-depth Aberdeen Group report, based on responses from 117 executives of successful companies, to find out how best-in-class businesses are proactively managing these challenges. You'll learn these techniques for optimizing maintenance and operations-and more: creating a culture of collaboration among teams across your enterprise; empowering decision makers with appropriate, highly accurate metrics; and leveraging predictive management and analytics to manage assets throughout their life cycle.
Tags : ibm, technology, software, asset performance management, economic recovery, operational budgets, capital, asset management, maintenance cost, storage management, business management, analytical applications, information management, software compliance, service management
     IBM
By: IBM     Published Date: Aug 08, 2012
With tight budgets, it isn't easy to create the operational dexterity needed to thrive in a competitive marketplace. View this demo to find out how IBM® SPSS® solutions for predictive operational analytics help manage physical and virtual assets, maintain infrastructure and capital equipment, and improve the efficiency of people and processes. By using your existing business information, IBM SPSS software can help you: predict and prevent equipment failures that can lead to disruptive, costly downtime; quickly identify and resolve product quality issues to mitigate risks and reduce warranty costs; optimize product assortment planning to increase revenue, reduce working capital requirements and improve the return on inventory investments; and act to retain your best employees by developing predictive attrition models to identify the workers at greatest risk of leaving the organization.
Tags : ibm, technology, predictive operational analytics, spss, business analytics, business intelligence, business management, application integration, analytical applications
     IBM
By: IBM     Published Date: Nov 07, 2012
This white paper examples how IBM IT Asset Management enables organizations to take control of IT assets, from planning through onto disposal, to improve quality and manage asset costs. Read on to learn about controlling costs and service with IBM.
Tags : asset visibility, it asset, ibm, control, automation, ibm it asset management, data management
     IBM
By: IBM     Published Date: Jul 11, 2012
Software Asset Management associated costs have once again risen as a high priority for IT, and rightfully so. This paper offers information on technology that manages software assets cost efficiently, cost effectively in a low risk environment.
Tags : software asset management, sam, software asset cost, cost effective, cost efficient, risk avoidance, managing software assets, substantial expense reduction, ibm tivoli, business alignment, it infrastructure library, itil, it strategy, it planning, software licences, analytics, audit preparedness, virtualization, cloud, saas
     IBM
By: Limelight Networks     Published Date: Jul 31, 2012
How to Master the Art of Content Marketing will show you best practices, tips, and solutions for turning content assets into online customer engagement and higher web conversion rates.
Tags : storytelling, content marketing, marketing automation, aggregation, video, integration, sustainable workflow, target content, content pipeline, development workflow, content publishing, content distribution, global audience, mobile marketing
     Limelight Networks
By: CDW     Published Date: Feb 24, 2015
All organizations require software systems to conduct daily operations. These strategic enterprise assets are often acquired or created in isolation of each other as an organization grows, particularly for those that provide services rather than physical products. Over time, these systems become complex, overlapping and highly dependent on one another, so more effort must be expended to discover the full effects of any system change. The ability of an entity to update, replace or improve the overall capabilities of the enterprise can become severely impaired. Moreover, support and administrative costs for these critical assets inevitably grow to be a major burden. Add to all this the need to control licensing, follow the organization’s policies and ensure security for the internal network, and it becomes clear that some manner of oversight is required for the enterprise to be successful.
Tags : sam, software asset management, strategic enterprise assets, license utilization, cloud based computing, network security, software compliance, vulnerability management
     CDW
By: CDW     Published Date: Jun 26, 2015
Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.
Tags : software asset management, network security, licensing, cloud-based apps, licensing security, security management strategies, application security, security management, application integration, data protection, database security, software compliance
     CDW
By: CDW     Published Date: Jun 30, 2015
In this eSeminar, experts from Adobe and CDW discuss the new Adobe Creative Cloud for teams, a cloud-based solution that lets enterprises get the most out of their teams and their assets.
Tags : eseminar, adobe, cdw, cloud, content delivery, content integration, content management system, productivity
     CDW
By: SafeNet     Published Date: Jan 14, 2014
Today’s data resides in a virtualized world, but the risks are all too real, and, in many organizations, too frequently realized. This paper examines the fundamental security implications of cloud services and virtualization, and it details an approach organizations can take to safeguard sensitive assets in a way that is aligned with today’s dynamic environments.
Tags : virtualization, cloud services, security, encryption, safenet, network security, internet security
     SafeNet
By: Sage     Published Date: Mar 26, 2014
Spreadsheets have become one of the most prevalent software applications used by businesses. They are used for everything from simple calculations to impromptu databases. While inherently useful, spreadsheets are frequently used for tasks in which they are ill-suited. In fact, too many companies overlook the importance of accurate fixed asset tracking and rely on spreadsheets to track value, depreciation, and tax calculations. Unwittingly, this results in the direct loss of money and time.
Tags : sage, fixed assets, spreadsheets, tax payments, sarbanes-oxley, depreciation, tracking, planning, reporting, business intelligence, productivity, sarbanes oxley compliance
     Sage
By: Sage     Published Date: Mar 26, 2014
Here’s a riddle: What have you used for a very long time, occasionally pulled your hair out over, contains lots of cells with mathematical formulas, and is very stressful to update whenever a tax law or GAAP principle changes?
Tags : sage, fixed assets, spreadsheets, tax payments, sarbanes-oxley, depreciation, tracking, planning, reporting, best practices, business intelligence, business process management, enterprise software, records management, sarbanes oxley compliance
     Sage
By: Sage     Published Date: Mar 26, 2014
Do you often find yourself daydreaming about a perfect fixed assets management solution?
Tags : sage, fixed assets, spreadsheets, tax payments, sarbanes-oxley, depreciation, tracking, planning, reporting, best practices, business intelligence, quality assurance, data quality, sarbanes oxley compliance
     Sage
By: Adobe     Published Date: Dec 08, 2014
When it comes to digital asset management (DAM) projects and rich media, marketers and IT professionals struggle to find the best ways to store, share, and deliver assets across devices. The Gartner Three Best Practices for Digital Asset Management Projects report identifies the key DAM challenges facing organizations and provides recommended strategies and best practices.
Tags : asset management, dam, rich media, metadata issues
     Adobe
By: Cyveillance     Published Date: Apr 10, 2015
In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.
Tags : myths, cyber, threat, intelligence, fact, fiction, big data, cloud, networking, security
     Cyveillance
By: Evident.io     Published Date: Nov 19, 2015
Evident.io has a significant head start in this nascent corner of the cloud security space. Besides addressing a critical portion of the cloud's attack surface that isn't well covered by other vendors yet, Evident.io has built a platform that transcends the niche it currently addresses. The API/SDK consumption capabilities, data analytic and user workflow portions of the company's Evident Security Platform are valuable assets that it can leverage to grow into other areas in the future.
Tags : evident, cloud security, security platforms, datacenter, firewalls, public cloud, api consumption, networking, security, it management, data management
     Evident.io
By: Amazon Web Services     Published Date: Jul 16, 2018
The Internet of Things (IoT) is composed of sensor-embedded devices and machines that exchange data with each other and the cloud through a secure network. Often referred to as “things” or “edge devices”, these intelligent machines connect to the internet either directly or through an IoT gateway, enabling them to send data to the cloud. Analyzing this data can reveal valuable insights about these objects and the business processes they’re part of, helping enterprises optimize their operations. Devices in IoT deployments can span nearly any industry or use case. Each one is equipped with sensors, processing power, connectivity, and software, enabling asset control and other remote interactions over the internet. Unlike traditional IT assets, these edge devices are resource-constrained (either by bandwidth, storage, or processing power) and are typically found outside of a data center, creating unique security and management considerations.
Tags : 
     Amazon Web Services
By: CrowdStrike     Published Date: May 10, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: • How to collect and preserve data after a breach so that critical forensic information can be retrieved • What sort of in
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: How to collect and preserve data after a breach so that critical forensic information can be retrieved What sort of int
Tags : 
     CrowdStrike
By: McAfee     Published Date: Mar 31, 2017
Organizations looking for more intelligence and automation within their security defenses should include endpoint detection and response solutions to thwart new threats and protect endpoint-accessible assets.
Tags : endpoint detection, intel security, threat defense, endpoint protection
     McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.