cio

Results 1251 - 1275 of 1306Sort Results By: Published Date | Title | Company Name
By: VMware AirWatch     Published Date: Nov 13, 2015
Durante la conferencia para desarrolladores WWDC 2014, Craig Federighi, el vicepresidente de Ingeniería de Software de Apple, dijo que iOS ha sido un gran éxito empresarial y resaltó la amplia gama de aplicaciones y funciones administrativas empresariales que Apple ha añadido a los sistemas operativos a través de los años. Federighi también dijo que las funciones de productividad de Mac OS X Yosemite son muy atractivas para los usuarios empresariales. Federighi observó que el 98 por ciento de las empresas de Fortune 500 ya utilizan iOS y Apple continúa implementando nuevas funciones en ambos sistemas operativos para el mercado empresarial. Las actualizaciones más recientes de Apple, iOS 7 y Mac OS X Yosemite, introdujeron funciones nuevas que simplifican el uso y la administración empresarial. Las nuevas funcionalidades de continuidad les permiten a los usuarios navegar libremente a través de los dispositivos Apple, usando un dispositivo tras el otro.
Tags : vmware, emm, mac management, managing macs, airwatch, security, it management, knowledge management
     VMware AirWatch
By: VMware AirWatch     Published Date: May 24, 2016
Negli ultimi anni, con il diffondersi dei dispositivi mobili nelle imprese il termine “BYOD” è diventato di uso comune negli ambienti di lavoro. Tuttavia, oltre a rappresentare un trend, il suo significato va ben oltre quello letterale dell’acronimo. Il BYOD costituisce un aspetto di un trend molto più ampio e radicato: la consumerizzazione dell’IT, le cui origini risalgono ai primi anni 2000. In quel periodo, la maggior parte delle persone disponeva di un PC con cui lavorare da casa oltre l’orario di ufficio, sfruttando tutti i vantaggi derivanti dall’uso di dispositivi di propria scelta, più agevoli da impiegare rispetto a quelli aziendali forniti dai reparti IT. I fenomeni del BYOD e della consumerizzazione dell’IT hanno continuato a crescere parallelamente alla riduzione dei prezzi dei dispositivi e al miglioramento delle caratteristiche di connettività.
Tags : best practices, business optimization, business management, program management, network management, business intelligence
     VMware AirWatch
By: VMware AirWatch     Published Date: May 24, 2016
Hace menos de un año, las predicciones de los analistas inducían a los entusiastas de la movilidad a creer que se acercaba el día del juicio final para el sector de la gestión de dispositivos móviles (MDM). En un acto con analistas celebrado en 2013, un comité de analistas dijo a los asistentes que el fenómeno de uso de dispositivos personales (BYOD) desembocaría en una reducción de los precios, una caída en picado de las ventas y la desaparición de un sector. «En estos momentos, la gestión de dispositivos móviles es un caos y creo que ese mercado va a desaparecer», declaró John Girard ante los asistentes (según CRN.com). Girard predijo una transición hacia la gestión a nivel de aplicación forzada por la tendencia BYOD y la reticencia de los empleados a la gestión de dispositivos personales.
Tags : best practices, business optimization, enterprise management, business intelligence, application integration, business management, business process management
     VMware AirWatch
By: VMware AirWatch     Published Date: May 24, 2016
La movilidad sigue siendo una de las principales oportunidades estratégicas para cualquier tipo de empresa gracias al potencial para que sea más competitiva, ya sea incrementando la productividad de los empleados o captando clientes con métodos innovadores. Para aprovechar dicho potencial, la movilidad empresarial debe brindar a los usuarios una experiencia fluida entre dispositivos de distinto tipo y habilitar un área de trabajo segura para las aplicaciones empresariales clave. Para satisfacer las necesidades móviles de los empleados y la cartera de clientes, las empresas deben disponer de soluciones de autogestión y BYOD (Bring Your Own Device) fiables con una plataforma establecida cuya capacidad de ampliación permita la incorporación de nuevos procesos.
Tags : 
     VMware AirWatch
By: VMware AirWatch     Published Date: May 24, 2016
La movilidad sigue siendo una de las principales oportunidades estratégicas para cualquier tipo de empresa gracias al potencial para que sea más competitiva, ya sea incrementando la productividad de los empleados o captando clientes con métodos innovadores. Para aprovechar dicho potencial, la movilidad empresarial debe brindar a los usuarios una experiencia fluida entre dispositivos de distinto tipo y habilitar un área de trabajo segura para las aplicaciones empresariales clave. Para satisfacer las necesidades móviles de los empleados y la cartera de clientes, las empresas deben disponer de soluciones de autogestión y BYOD (Bring Your Own Device) fiables con una plataforma establecida cuya capacidad de ampliación permita la incorporación de nuevos procesos.
Tags : data management, business practices, data center. data application, enterprise applications, security, best practices, business analytics, business integration
     VMware AirWatch
By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : arbor networks, enterprise, cyber attack, network, data, security
     ArborNetworks
By: Druva     Published Date: Aug 04, 2016
Whether your enterprise is on a journey of cloud transformation or you simply need to do more with less, moving backup to the cloud offers unprecedented cost savings. These 7 points will show you—and your CIO and CFO — how to dramatically reduce the overall storage footprint of your organization and slash costs while gaining the efficiencies of the cloud.
Tags : 
     Druva
By: Microsoft Office 365     Published Date: Oct 14, 2016
“Hi, this is Kevin from IT. We've been notified of a virus on your department’s machines.” Add some authentic hold music, and a social-engineering attacker can trick employees into sharing company info, like passwords. Learn how to use technology and prevention strategies to guard against dumpster diving, spear phishing, and other tactics with: Real-world prevention strategies Tools to spot suspicious actions Real-time behavioral malware analysis
Tags : protection, prevention, malware, security, cyber attacks, information, hacker detection, security management
     Microsoft Office 365
By: IBM     Published Date: Jul 12, 2016
As most companies now realize, analytics is increasingly more of an integral part of their day-to-day business operations. In a recent survey by a global research firm, 80% of CIOs stated that transition from backward-looking, passive analysis must shift to forward-looking predictive analytics. The challenge is that many analytic solutions are aligned to a specific platform, tied to inflexible programming models and requiring vast data movement. In this webcast, Forrester and experts from IBM will highlight how technology like Apache Spark on z/OS allows businesses to extract deep customer insight without the cost, latency and security risks of data movement throughout the enterprise.
Tags : ibm, forrester, apache spark, spark technology, z systems, security, knowledge management, enterprise applications
     IBM
By: Oracle     Published Date: Apr 16, 2018
Hoy en día enfrentamos muchos desafíos en las áreas de finanzas y en el proceso de gestión empresarial. Entre ellos están sistemas internos obsoletos, infraestructura y recursos de alto costo, dificultad para acompañar la legislación, entre otros. Conozca cómo Oracle Cloud permite y habilita a las empresas, de cualquier tamaño, a tener acceso a soluciones de gestión financiera ágiles, que actualmente, que hoy utilizan las mejores empresas globales.
Tags : como, revolucionar, tus, finanzas
     Oracle
By: Oracle     Published Date: Apr 16, 2018
Los líderes empresariales quieren que los gestores financieros asuman el papel de conductores proactivos del negocio. Pero tu equipo ¿está preparado para esto? Ve cómo las soluciones de Finanzas de Oracle pueden apoyar la Jornada de la Modernización Financiera con tecnologías innovadoras que impactan directamente los procesos de negocio, ofreciendo alto desempeño, agilidad y evolución con diversas funcionalidades cada vez más alineadas a las necesidades de los usuarios de negocio.
Tags : como, aumentar, agilidad, equipo, financiero, reducir
     Oracle
By: Oracle     Published Date: Apr 16, 2018
Os líderes empresarias querem que os gestores financeiros assumam o papel de direcionadores proativos do negócio. Mas a sua equipe está preparada para isso? Veja como as soluções de Finanças da Oracle podem habilitar a Jornada da Modernização Financeira com inovações relevantes que impactam diretamente os atuais processos de controle e análise, oferecendo alto desempenho, agilidade e evolução digital com riqueza de funcionalidades cada vez mais próximas das necessidades dos usuários de negócios.
Tags : aumentar, agilidade, equipe, financeira, reduzir, custos
     Oracle
By: Oracle     Published Date: Apr 16, 2018
Hoje em dia enfrentamos muitos desafios nas áreas de finanças e no processo de gestão empresarial. Entre eles estão sistemas internos obsoletos, infraestrutra e pessoas caras para manutenção, dificuldade em acompanhar a legislação, entre outros. Saiba como o Oracle Cloud permite e habilita que empresas de qualquer tamanho tenham acesso às finanças ágeis, atualmente, praticadas nas melhores empresas globais.
Tags : como, revolucionar, suas, financas
     Oracle
By: Microsoft     Published Date: Oct 04, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution. What is needed is a holistic approach to identity-driven security—one that leverages a cloud-scale intelligent security graph to help you protect your business. In this vision whitepaper, we look into some of the challenges facing IT in the modern world and examine the possible solutions.
Tags : 
     Microsoft
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
"This 56 page guide explores the foundational components of Hybrid IT, strategies to help CIOs partner with the business, and “key plays” that, if executed successfully, enable successful and sustainable digital transformation. Learn how transitioning to a Hybrid IT model can help you make the most of limited resources and free your team to spend less time keeping the lights on, and more time contributing to revenue growth as active participants in business innovation. "
Tags : 
     Hewlett Packard Enterprise
By: Zendesk     Published Date: Aug 26, 2016
This white paper provides insight into how to perform a customer service audit to determine what needs to change in an organization.
Tags : 
     Zendesk
By: Evariant     Published Date: Jul 02, 2018
When call center agents don’t have access to an EMR, consumer demographic, sociological and other data, nor an understanding of marketing campaigns, agents are inefficient, reactive and unable to personalize interactions with patients and consumers. The disjointed call center experience harms the health system’s ability to find, guide, and keep patients for life. The call center is often the first touch for many prospective healthcare customers, and Scripps Health recognized these challenges. They made the pivot from call center as cost center to strategic lynch pin in their patient experience strategy. Call center agents are now delivering a world-class patient experience as they provide physician referrals, take class registrations, and serve as a clearing house for general information . An added bonus of the shift is they can now integrate outbound calling into campaign efforts, and measure the full impact of marketing efforts and strengthen marketing’s ROI. Get your free copy of
Tags : call center, conversions, health, proactive
     Evariant
By: Veritas     Published Date: Jan 03, 2019
The digital business continues to evolve. Investments in data analytics projects lead the way while traditional, proprietary infrastructures are being disrupted by cloud, open source and hyperconverged paradigms. These changes are forcing IT leaders to contend with greater workload diversity in the midst of tightening budgets. And while the workload [or] IT landscape is changing, the need for reliable data protection remains as crucial as ever to protect against, data corruption, human error, and malicious threats such as ransomware. Learn how Veritas can help you navigate through these obstacles. Join us to hear experts from ESG and Veritas discuss how the right data protection solution today can prepare you for tomorrow's business demands. You will learn: The key trends that are driving change in the digital business The most common causes of data loss in tomorrow’s multi-cloud data centers How to protect an increasingly diverse environment with minimal operational overhead
Tags : 
     Veritas
By: Citrix ShareFile     Published Date: Apr 12, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : cloud security, client data protection, data encryption, cloud, user behavior
     Citrix ShareFile
By: Cox Business     Published Date: Dec 19, 2016
In this white paper, we’ll look at Distributed Denial of Service (DDoS) attacks, why they pose a threat to healthcare and other networks, and how to protect against them. As we are expected to host more and more key information on our network, we increase our risk at risk for an attack that can shut down vital services or serve to support a malicious actor out to steal private data.
Tags : 
     Cox Business
By: Cox Business     Published Date: Dec 19, 2016
In this white paper, we’ll look at Distributed Denial of Service (DDoS) attacks, why they pose a threat to hospitality networks, and how to protect against them. As we are expected to host more information on our network, we increase our risk for an attack that can shut down vital services or serve to support a malicious actor out to steal private data. Customers expect to be able do everything online, and won’t tolerate any interruption in service. This expectation inhibit a situation where an attacker is holds your web services hostage, and you have to choose between paying them off or apologizing to a lot of angry customers.
Tags : 
     Cox Business
By: Lookout     Published Date: Dec 13, 2016
Get all of your questions about enterprise mobile security, threats, and solutions answered in this essential guide.
Tags : mobile security, mobile device management, identity management, network attacks, malicious apps, security management
     Lookout
By: Lookout     Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : mobile security, mobile risks, device attacks, network attacks, malware attack
     Lookout
By: Lookout     Published Date: Mar 30, 2018
Mobile security presents one of the federal government’s biggest information technology challenges. Read the Lookout report to learn about the greatest risks, current security solutions, and the future for BYOD.
Tags : 
     Lookout
By: Progress     Published Date: Jan 06, 2017
Digitalization brings both new opportunities and confusion to even the most carefully planned selection processes for WCM. CIOs and IT leaders aiming to boost the effectiveness of their digital business strategy should use this document to help them select the most appropriate vendor and solution. Gartner Magic Quadrant reports are the standard of excellence for vendor evaluation, research and reporting. While many vendors are evaluated, only a select few meet the stringent criteria for inclusion. Continuing its long-standing tradition, Gartner has released the 2016 Magic Quadrant for Web Content Management (WCM). Progress is recognized as a “Challenger” in this year's report, based on a combination of completeness of vision and ability to execute. This is the third consecutive inclusion for the company's award-winning web content management and digital experience solutions. Web content management is an integral piece to any successful digital transformation strategy. In our minds t
Tags : 
     Progress
Start   Previous    39 40 41 42 43 44 45 46 47 48 49 50 51 52 53    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.