att

Results 26 - 50 of 4100Sort Results By: Published Date | Title | Company Name
By: Infinidat EMEA     Published Date: May 15, 2019
La rivoluzione digitale, l'instabilità economica, i cambiamenti politici e la carenza di competenze professionali sono tutti stati fattori, negli ultimi 24 mesi, del fallimento di aziende o, quantomeno, di perdite di redditività e profitti.
Tags : 
     Infinidat EMEA
By: Infinidat EMEA     Published Date: May 15, 2019
Le soluzioni enterprise di INFINIDAT® sono basate su un’architettura di storage unica e brevettata INFINIDAT – Un insieme completo di funzioni di software-de?ned storage (SDS) integrate con il migliore hardware commerciale presente sul mercato. Attraverso l’integrazione del software con una piattaforma hardware di riferimento ampiamente testata, INFINIDAT fornisce la prima vera soluzione SDS di classe enterprise.
Tags : 
     Infinidat EMEA
By: Beqom     Published Date: Jun 12, 2019
Get the overlooked lessons that will help you go digital successfully HR and sales leaders are challenged to streamline the compensation process while attracting and retaining top talent, supporting business strategy, and maintaining regulatory compliance. Fill out the form to instantly download our free eGuide and learn where the most successful digital compensation transformations get it right.
Tags : 
     Beqom
By: AppZen     Published Date: Jun 17, 2019
Occupational fraud is not a small issue. On average, a company loses 5% of its revenues to employee financial fraud each year, with the annual median loss at $140,000 and over 20% of companies reporting losses of $1 million or more. The key to keeping a lid on this fraud is identifying the fraud before it takes too much of a bite out of the company’s bottom line, or even further, to put processes and controls in place that automatically audits, monitors, and accepts or rejects transactions that don’t fit an recognized pattern.
Tags : 
     AppZen
By: Zscaler     Published Date: Jun 19, 2019
Le regole del gioco sono cambiate: le applicazioni stanno ormai migrando verso il cloud e gli utenti possono avere accesso da qualsiasi location senza mai il bisogno di collegarsi al corporate network. E’ quindi indispensabile ripensare l’architettura della sicurezza. Scoprite con questo documento come proteggere i vostri attivi strategici con le nostre funzionalita’ di Data Protection e Cloud DLP.
Tags : 
     Zscaler
By: Zscaler     Published Date: Jun 19, 2019
Scoprite attraverso questa guida come ridirigere in maniera ottimale il traffico delle vostre filiali, per permmettere un accesso diretto ad internet e alle vostre applicazioni nel cloud. Abbassate i vostri costi, ottenete una visibilita’ completa sul vostro traffico e migliorate l’esperienza dei vostri utenti mettendo in sicurezza le vostre filiali remote.
Tags : 
     Zscaler
By: Zscaler     Published Date: Jun 19, 2019
Le applicazioni, come ormai anche gli utenti, stanno abbandonando la rete corporate. Tuttavia i sistemi di sicurezza spesso si trovano ancora all’interno del DC. E’ ormai arrivato il momento di ripensare questa architettura e offrire un’esperienza sicura ed ottimale ai proprio utenti senza badare a dove si trovino. La sicurezza offerta dalla piattaforma cloud di Zscaler vi permette di trasformare la vostra rete per sfruttare i vantaggi di un mondo orientato verso il cloud e alla mobilita’ degli utenti. Scoprite di piu’ con questo rapporto.
Tags : 
     Zscaler
By: Zscaler     Published Date: Jun 19, 2019
Scoprite il nostro rapport semestrale Cloud Security Insights Threat Report 2019 – Uno studio delle minacce basate sui protocolli SSL/TLS, che analizza il traffico criptato nel cloud Zscaler tra luglio e dicembre 2018. Il rapporto, stilato dal nostro team di ricerca ThreatLabZ, si focalizza sulla varieta’ di attacchi via SSL e bloccati da Zscaler, tra cui gli attacchi di phishing, i botnet, malware, etc.
Tags : 
     Zscaler
By: Zscaler     Published Date: Jun 19, 2019
Office 365 non e’ un’applicazione SaaS come le altre. La sua ‘fame’ in termini di banda larga e la sua sensibilita’ alla latenza rappresentano un vero ostacolo per le appliance tradizionali. Perche’? Perche’ la modalita’ di rete a stella non permette di offrire un’esperienza utente efficiente, aumentando allo stesso momento i costi d’implementazione. Office 365 puo’ trasformare la vostra attivita’, ma solamente con una rete addata al suo utilizzo. Scoprite in questa guida come le soluzioni Zscaler, raccomandate da Microsoft, possono aiutarvi alla migrazione verso Office 365.
Tags : 
     Zscaler
By: Zscaler     Published Date: Jun 20, 2019
Découvrez notre rapport semestriel Cloud Security Insights Threat Report 2019 - une étude des menaces basées sur les protocoles SSL/TLS, qui examine le trafic chiffré sur le cloud Zscaler™ entre juillet et décembre 2018. Le rapport, compilé par notre équipe de recherche du ThreatLabZ, se penche sur une variété d’attaques exécutées via SSL et bloquées par Zscaler, parmi lesquelles les attaques de phishing, les botnets, l’exploitation du navigateur et le contenu malveillant.
Tags : 
     Zscaler
By: KPMG     Published Date: Jun 06, 2019
Cities need to rethink public transport systems to meet consumer demand for flexible, on-demand services. By doing this, they can also unclog congested roads, improve safety and reduce carbon emissions. Read this insight to discover: • how patterns of mobility are changing in major cities • what customers want – and the key challenges to meeting their expectations • whether microtransit solutions can be an effective complement to traditional public services • three key levers to pull to develop responsive, demand-driven services.
Tags : 
     KPMG
By: Mimecast     Published Date: Jun 03, 2019
Knowing where to look and what to watch out for is half the battle. Download this report to understand the most pervasive types of email threats, how security professionals perceive them and what they’re doing to combat them. Most importantly, you’ll walk away with actionable steps to improve your organization’s email security and cyber resilience. Gain valuable insight from 1,025 global IT decision makers on email-based attacks, cyber resilience, business continuity, awareness training and threat intelligence.
Tags : 
     Mimecast
By: Forcepoint     Published Date: Jun 06, 2019
Your people access and share data using a myriad of different cloud apps. The bad news is, you probably have no idea how your data is used, where it travels to and the level of associated risk. You’ve lost visibility and control. The good news is, we can help get it back. Register now for a FREE Cloud Threat Assessment and detailed report of your cloud-application risk posture. This in-depth assessment will show you: Cloud usage patterns. How potentially harmful activities happen in cloud applications across your organization. Geographical usage. Which countries your data is traveling to and from (you may be surprised). Privileged users. Do you have more administrators than you need? Dormant users. Are you overspending on unused licenses? Riskiest users. Who are your riskiest users and why? You'll receive customized assessments on Office365, Box, G Suite, and Salesforce.com.
Tags : 
     Forcepoint
By: List Sotheby's International Realty, Singapore     Published Date: Jun 11, 2019
The former Keppel Harbour was transformed into the vibrant marina-waterfront living precinct that it is today. To date, the Keppel Bay waterfront is lined by three iconic residential developments – Caribbean At Keppel Bay, Reflections At Keppel Bay and Corals At Keppel Bay – with a total of 2,464 apartments. As the Keppel Bay precinct matures over the years, the marina-waterfront housing lifestyle has taken roots and offers an attractive living concept to prospective buyers. Being situated on the mainland, Keppel Bay also have the advantage of being closer to amenities and have better accessibility and connectivity. Following the announced extension of the CCL to include three more stations (Keppel, Cantonment and Prince Edward) to close the circle, Keppel Bay will be directly connected to Marina Bay in the Downtown Core. When these stations are in operation by 2025, travel time between Keppel Bay and the CBD will be reduced by one-third of the current travel time.
Tags : 
     List Sotheby's International Realty, Singapore
By: Citrix Systems     Published Date: Jun 04, 2019
Security threats come in a variety of different forms — from network to web and app attacks. As these form factors continue to morph, they often evade traditional security measures, leaving organizations scrambling to protect their digital ecosystem. With a comprehensive end-to-end security solution, your organization can securely deliver the apps and data your teams need to be productive. Check out our e-book and discover: Why a holistic security approach is crucial What a new security approach looks like How Citrix solutions provide security across your entire stack
Tags : 
     Citrix Systems
By: Recorded Future     Published Date: Apr 18, 2019
Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. These business relationships can knowingly or unknowingly introduce different types of risks that need to be identified and managed as if these third parties were part of the enterprise itself. Recorded Future's latest risk intelligence offering enables threat intelligence teams to better understand, monitor, and measure their real-time exposure to these third-party risks. Armed with this information, organizations can better assess and prioritize risk mitigation actions.
Tags : 
     Recorded Future
By: Recorded Future     Published Date: Apr 18, 2019
When it comes to processing information, one full security event read by a machine is equal to just 10 words read by a human analyst, on average. Even the slightest delay can mean the difference between attack and action. Find out how you can connect the dots to rapidly reveal unknown threats before they impact your business, and respond to security alerts 10 times faster.
Tags : 
     Recorded Future
By: Attivio     Published Date: Aug 20, 2010
With the explosion of unstructured content, the data warehouse is under siege. In this paper, Dr. Barry Devlin discusses data and content as two ends of a continuum, and explores the depth of integration required for meaningful business value.
Tags : attivio, data warehouse, unified information, data, content, unstructured content, integration, clob, blob, business intelligence, database development, data protection, data quality, data warehousing
     Attivio
By: Attivio     Published Date: Aug 20, 2010
Current methods for accessing complex, distributed information delay decisions and, even worse, provide incomplete insight. This paper details the impact of Unified Information Access (UIA) in improving the agility of information-driven business processes by bridging information silos to unite content and data in one index to power solutions and applications that offer more complete insight.
Tags : attivio, data warehouse, unified information, data, content, unstructured content, integration, clob, blob, database development, data protection, data warehousing
     Attivio
By: ASG Software Solutions     Published Date: May 28, 2009
Organizations are drowning in content. They don't know what they have, and they can't find what they need when they need it. While they spend significant time and money to manage content stored among a host of disconnected systems, their efforts are less than fully effective.
Tags : asg, sla, cmdb, bsm, metadata, metacmdb, lob, automation, it value chain, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, best practices, business analytics, business intelligence, business management, business process management
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Apr 20, 2010
Application modernization is a powerful method for extending the life and improving the business value of a company's critical application assets. It provides an attractive and cost effective alternative to application development, enabling companies to defer investment in replacement initiatives without compromising business support.
Tags : application modernization, forrester consulting, apo, asg, application portfolio optimization, application integration, application performance management, business activity monitoring, business intelligence, business management, business process automation
     ASG Software Solutions
By: ASG Software Solutions     Published Date: May 05, 2010
Read this topical and informative white paper from EMA Research and see how you can attain peace of mind that your end user's application performance will exceed expectations.
Tags : asg, end user, service assurance, ema, it infrastructure, service management, application integration, business integration, business intelligence, web service management, project management
     ASG Software Solutions
By: OneUpWeb     Published Date: Nov 23, 2010
Does social media marketing really work? How do you separate fact from fiction as you navigate your way through the buzz about "going viral"? Amidst the chatter about Twitter, Facebook, FourSquare, Digg, Delicious, and Linked In-what will really get your business ahead? Tune in to find out as Oneupweb CEO Lisa Wehr and Social Media Director, Maureen Michaels team up to unveil the truth.
Tags : oneupweb, usability, driving sales, e-commerce, ecommerce, task, clickability, demographics, design, website design, social media, marketing plans, growth
     OneUpWeb
By: Tagman     Published Date: Mar 21, 2011
This white paper examines the true costs associated with the Tagging of websites to implement and track the performance of online marketing technologies such as web analytics, display ad serving and search marketing. This research was conducted by TagMan, a smart container tag with real-time attribution and web-page acceleration.
Tags : web analytics, tagging, real time attribution, web page acceleration, tagman
     Tagman
By: Precision Fiber Products     Published Date: Sep 19, 2012
Global Supplier of quality fiber optic products: PM connectors, optical attenuators, adapters, ferrules, MIC patch cords & cable assemblies, polishing film, fixtures, Miller tool kits & more.
Tags : 
     Precision Fiber Products
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.