ram

Results 1 - 25 of 2963Sort Results By: Published Date | Title | Company Name
By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
     Cisco EMEA
By: Aventri     Published Date: Apr 11, 2019
"Successful meetings management requires a wide array of skills and tools to help you meet stakeholder's expectations and reach your goals. From tools to assist with budget creation to meeting approval workflows and cost-effective venue sourcing, a great meetings management program takes a lot of effort. That's why at Aventri, we created an eBook that combines all the essential meeting management strategies into one package. Learn how to: • Efficiently source the right meeting venue • Use the right meeting management technology to increase success • Implement money saving strategies with big budget results • Measure your total meeting spend and return. In the end, you will feel confident in your abilities to implement a successful meeting management strategy at your organization."
Tags : 
     Aventri
By: Rubrik EMEA     Published Date: Apr 15, 2019
Backup and recovery needs a radical rethink. When today’s incumbent solutions were designed over a decade ago, IT environments were exploding, heterogeneity was increasing, and backup was the protection of last resort. The goal was to provide a low cost insurance policy for data, and to support this increasingly complex multi-tier, heterogeneous environment. The answer was to patch together backup and recovery solutions under a common vendor management framework and to minimize costs by moving data across the infrastructure or media.
Tags : data, backup, recovery, virtualization, solutions, cloud, architectures
     Rubrik EMEA
By: Red Hat     Published Date: Feb 25, 2019
In questo rapporto di analisi, IDC prende in esame le sfide che i clienti sono chiamati ad affrontaree in termini di bilanciamento degli investimenti nelle infrastrutture esistenti, nel miglioramento dell'efficienza e nella modernizzazione dei data center, adottando tecnologie innovative e le più recenti tecniche di deployment per ottimizzare la produttività degli sviluppatori e l'agilità operativa e contenere i costi della gestione del ciclo di vita. IDC approfondisce le alternative a disposizione dei clienti per centrare questi obiettivi, puntando su infrastrutture in grado di supportare i carichi di lavoro esistenti e quelli di prossima generazione e sul ruolo della standardizzazione e modernizzazione per l'ottimizzazione operativa.
Tags : 
     Red Hat
By: Intel     Published Date: Apr 11, 2019
To remain competitive, manufacturers must focus on achieving new growth while driving down costs. Key to achieving this is greater flexibility and a dramatic upturn in operational efficiency across the manufacturing process. One area ripe for improvement is intralogistics transportation. Many manufacturers still rely on autonomous guide vehicles (AGVs) to undertake repetitive transport tasks; but, rigid in nature, they do not support today’s demand-driven, dynamic manufacturing environments. Intelligent autonomous mobile robots (AMRs), like SEIT* from Milvus Robotics, offer a viable and cost-effective alternative. This solution brief describes how to solve business challenges through investment in innovative technologies.
Tags : 
     Intel
By: Location3     Published Date: Feb 07, 2019
Roughly five years ago, an industry shift occurred in franchising that saw many franchisers and their respective marketing teams hire multiple agencies, partners and vendors to conduct various marketing programs on their behalf.
Tags : marketing, local marketing, franchise, franchisor, digital marketing, multi-location businesses, franchise marketing, in-store revenue
     Location3
By: Illusive Networks     Published Date: Apr 10, 2019
Though insider threats are not new, the challenge to get ahead of them has not lessened over the past decade. In this paper you’ll find insights on why detecting and deterring malicious lateral movement is an essential part of an insider threat program, how you can monitor for unauthorized access without eroding employee trust, and how you can expedite the investigation of potential malicious insider activity.
Tags : emerging threats, insider threats, malicious insiders, cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, enterprise security
     Illusive Networks
By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, pam/pim solutions, illusive networks
     Illusive Networks
By: Illusive Networks     Published Date: Apr 10, 2019
Illusive Networks is proud to once again sponsor the Cyberthreat Defense Report by CyberEdge Group, now in its sixth year, to help security leaders assess and shape their cybersecurity programs. Download this comprehensive report to learn more about the most wanted security management and operations technology for 2019, which security processes organizations struggle with the most, and how organizations are trying to detect advanced cyberthreats more quickly.
Tags : cybersecurity, cyber threats, apt, targeted attacks, cyberedge, advanced persistent threats, threat management, illusive networks
     Illusive Networks
By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : black duck software, open source, platform, sap, multi-source, code, source, intellectual property, business intelligence, business management, database development
     Black Duck Software
By: HotSchedules     Published Date: Feb 06, 2018
What could you be saving by implementing a learning management system? This guide will show you the provable return on investment in an eLearning strategy; how an LMS can help your business lower print costs, reduce employee turnover, positively impact sales, and much more. Whether you’re exploring the marketplace or building out your business case for online learning, this guide has the information you want. As you prepare to move to a new LMS consider Clarifi Talent Development, the learning and performance management system designed for today’s workforce. It is the choice for leading brands like Brinker, Newk’s and Subway. Unfortunately, many business owners either fail to see the value in ongoing training or don’t have the budget for it. Competition is fierce, margins are tight and learning programs can fall by the wayside. Sometimes the tried and true methods still get the job done. But all too often, on-the-job training is unengaging, expensive and inefficient.
Tags : market, training, onboarding, restaurants, employee
     HotSchedules
By: HotSchedules     Published Date: Apr 17, 2019
It’s harder than ever for restaurants to retain employees. Hourly workers have more job opportunities, especially with the rise of on-demand work in the gig economy. Now, restaurateurs don’t just have to worry about employees leaving to work at other restaurants — they need to worry about them leaving the industry altogether. In order to fight this turnover, restaurants need to provide employees with clear development opportunities in the workplace. In this ebook, we’ll explore: • How restaurants can invest in their people through innovative training programs • The core aspects of developing an engaging development program in your business • Success stories from three industry leaders in the field of talent development
Tags : 
     HotSchedules
By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
Empowering the Automotive Industry through Intelligent Orchestration With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
     Group M_IBM Q2'19
By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
IBM provides a security incident response (IR) solution called Resilient that helps its customers address security incidents quickly in an automated and orchestrated manner. IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Resilient. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the Resilient platform on their organizations.
Tags : 
     Group M_IBM Q2'19
By: Domino Data Lab     Published Date: Feb 08, 2019
As organizations increasingly strive to become model-driven, they recognize the necessity of a data science platform. According to a recent survey report “Key Factors on the Journey to Become Model-Driven”, 86% of model-driven companies differentiate themselves by using a data science platform. And yet the question of whether to build or buy still remains. This paper presents a framework to facilitate the decision process, and considers the four-year projection of total costs for both approaches in a sample scenario. Read this whitepaper to understand three major factors in your decision process: Total cost of ownership - Internal build costs often run into the tens of millions Opportunity costs - Distraction from your core competency Risk factors - Missed deadlines and delayed time to market
Tags : 
     Domino Data Lab
By: Bluecore     Published Date: Apr 03, 2019
If the very purpose of technology is to make our lives easier and allow us to work smarter, why do most email marketers use technologies that do the exact opposite? It’s time to break out of the Email Death Spiral and advance your marketing program with the next generation of email marketing technology. This guide explores exactly what your team needs to know to prepare for a successful change and how to best evaluate this next generation of email marketing technology, including: Understanding the next generation of email marketing technology Determining when it’s time for a change Prioritizing value with a proof of concept Approaching the ESP selection process Securing buy-in for the change Building a successful retail marketing program around your new ESP Creating a foundation for long term success
Tags : 
     Bluecore
By: Recorded Future     Published Date: Apr 18, 2019
This white paper outlines current approaches to implementing SIEM and enriching security products with threat intelligence.
Tags : 
     Recorded Future
By: CareerBuilder     Published Date: Sep 07, 2010
Whether you've had an employee referral program for years, are only in the initial stages of building one, or have never had one at all, this e-book is full of tips and advice on making your program the best it can be.
Tags : careerbuilder, employee referral, recruiting, qualified, ebook, social networking, roi, training, hiring
     CareerBuilder
By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, security management, security policies, application integration, business intelligence, configuration management, data integration, data protection, vulnerability management
     Ounce Labs, an IBM Company
By: ASG Software Solutions     Published Date: Aug 09, 2008
ITIL provides a framework of customizable best practice initiatives that help organizations consistently deliver high-quality IT services. Effective ITIL implementation adds value to the IT infrastructure and improves business and service delivery.
Tags : asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm, application integration, application performance management, business activity monitoring
     ASG Software Solutions
By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
     ASG Software Solutions
By: StrongMail     Published Date: Jun 08, 2008
The growing trend towards insourcing marketing and transactional email is being driven by businesses that are looking for ways to improve their email programs, increase data security and lower costs. When evaluating whether it makes more sense to leverage an on-premise or outsourced solution, it's important to understand how the traditional arguments have changed.
Tags : strongmail, social media, email marketing, on-premise advantage, transactional email, insourcing, bounce management, spam trappers, emarketing, roi, networks, social networking
     StrongMail
By: 123Together     Published Date: Dec 04, 2008
Microsoft Exchange Server has been a crucial technological breakthrough in advanced corporate communication systems. Companies who utilize an enterprise-class email server like Exchange believe that email is mission critical, and value the productivity it enables. But an in-house migration to Exchange 2007 from an earlier version of Exchange or another email program will not be an easy task. Complexity, time and cost issues loom large over the IT department and are causing IT directors to search for an alternative solution.
Tags : 123together, it strategies, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, migration, osterman, collaboration, mobile services, business management, collaborative commerce, messaging, colocation and web hosting
     123Together
By: Tempworks Software     Published Date: Mar 17, 2012
Freemium is a feature-light version of our award-winning business software program, TempWorks Enterprise, that helps you manage hiring and sales processes.
Tags : 
     Tempworks Software
By: Modicon PLC     Published Date: Dec 04, 2012
Our repair technicians are capable of repairing most Modicon - Schneider Electric parts same day. Our exchange program allows us to send you a remanufactured unit while allowing you 30 days to return the failed unit for a credit.
Tags : 
     Modicon PLC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.