2012

Results 176 - 200 of 251Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Feb 06, 2013
This survey shows how organizations leverage strategic risk management and mitigation solutions such as risk analysis, security information event management (SIEM), and vulnerability scanning as part of their overall risk and compliance programs.
Tags : 
risk and compliance, patch management, siem, policy compliance and configuration, database security, mcafee vulnerability manager, mcafee risk advisor, mcafee policy auditor
    
McAfee
Published By: Riverbed     Published Date: Jul 15, 2014
In January 2012, Riverbed® Technology announced version 9.5 of its Cascade® network performance management solution, which included a number of major enhancements. Collectively, the new capabilities are designed to improve visibility into the health and activity of applications and services traversing networks from the branch to the data center.
Tags : 
advnace, visibility, virtual data centers, technology, solution, management
    
Riverbed
Published By: Box     Published Date: Nov 14, 2014
According to the American Community Survey, tele-commuting jumped 79 percent between 2005 and 2012. More than 9 million American workers did their jobs exclusively from home in 2010, according to the U.S. Census, and 30 million work from home at least once a week. And TechCast at George Washington University estimates as many as 30 percent of U.S. private sector workers could be working from home by 2019. For sales professionals, that proportion is certainly higher. The Telework Research Network found in 2011 that 70 percent of those working from home are in management, professional, sales and office jobs. If you’re in sales, you probably spend a considerable amount of time on the go. And why shouldn’t you? Smartphones offer constant, pocket-sized connectivity. Ubiquitous Wifi threatens to render the cubicle obsolete, and the right social networking strategy can sup-plant a hundred individual pitch meetings.
Tags : 
sales, connectivity, smartphones, social networking strategy
    
Box
Published By: Royal Caribbean International®     Published Date: Oct 26, 2012
With rewarding incentives, memorable meetings and successful conferences, you can increase ROI and employee satisfaction at the same time! Download the 2012-2013 corporate meetings, incentives and charters planning guide to learn how Royal Caribbean can take your event to the next level.
Tags : 
royal carribean, travel, incentive, event, cruise, employee incentives, corporate travel
    
Royal Caribbean International®
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Employees are increasingly bringing their own devices to work and accessing corporate IT resources from home. Windows Server 2012 helps mitigate potential security, use and control issues and makes implementing a BYOD strategy easier.
Tags : 
secure mobility, windows server, security
    
Dell & Microsoft
Published By: Dell     Published Date: Sep 12, 2013
Employees are increasingly bringing their own devices to work and accessing corporate IT resources from home. Windows Server 2012 helps mitigate potential security, use and control issues and makes implementing a BYOD strategy easier.
Tags : 
secure mobility, windows server, security
    
Dell
Published By: Dell     Published Date: Oct 24, 2014
Employees are increasingly using bring-your-own devices (BYOD) to work and accessing corporate IT resources from home. Until now, management of BYOD within IT was piecemeal, with most organizations cob¬bling together solutions that included mobile device management software, unified access suites, security, and hardware. Read this technology brief to learn how Windows Server 2012 R2 takes the guesswork and integration out of BYOD security and administration, providing one point of control and management for IT organizations.
Tags : 
byod, mobile device mangement, secure mobility
    
Dell
Published By: ESET     Published Date: Sep 21, 2012
Get the most up-to-date view of the IT security threat landscape from the experts at ESET. This monthly threat report is required reading for anyone involved with IT Security.
Tags : 
security threat, eset, it security
    
ESET
Published By: Nasuni     Published Date: Nov 19, 2014
In September 2012, Nasuni conducted a survey of more than 1,300 corporate IT users to better understand employee habits regarding Shadow IT and their impact on corporate IT systems and security. This paper presents the survey results, including what users revealed about their use of consumer file sharing solutions and personal devices.
Tags : 
employee habits, corporate it systems, dropbox, it infrastructure
    
Nasuni
Published By: Oracle     Published Date: Nov 03, 2016
Over the next decade, almost $78 trillion will be invested in infrastructure projects, according to PWC1. That represents an annual growth from an already colossal $4 trillion per year in 2012 to more than $9 trillion per year by 2025
Tags : 
    
Oracle
Published By: IBM     Published Date: Apr 26, 2013
In the spring of 2012, IBM launched a comprehensive re-thinking and refresh of its IT Service Management (ITSM) offerings. The IT management products formerly known as Tivoli Service Request Manager, IT Asset Management and Change Configuration Management Database have now been combined into a single product, IBM SmartCloud Control Desk 7.5. The products span advanced support for IT and intelligent asset management, change and configuration management, service request management and service catalog, along with Cloud delivery options and built-in support for automation beyond traditional service desk workflow.
Tags : 
smartcloud, control, desk, consolidate, advances, services, management
    
IBM
Published By: Epsilon     Published Date: May 30, 2012
For the sixth iteration, Email Institute has jazzed up our well-loved Look Book. This year, we've included a People's Choice email that you - our loyal readers - selected as your favorite email. After receiving hundreds of votes, we're unveiling our voter's pick and 26 other innovative emails.
Tags : 
marketing, epsilon, email, email marketing, digital marketing, online
    
Epsilon
Published By: Symantec     Published Date: Oct 07, 2014
The rising intensity and sophisticated nature of cyber-attacks has created a precarious environment for businesses charged with protecting their customers’ personal data. In 2012, credit card and debit card fraud resulted in losses amounting to $11.27 billion. In January 2014 alone, a single cyber-attack exposed more than 105 million identities. To steal this data, one option is to target the point at which a retailer first acquires that card data – the Point-of-Sale (PoS) system. PoS systems are increasingly being targeted by these attackers, which is why it's more important than ever to protect these devices and the systems they are connected to. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
point of sale systems, cyber-attacks, precarious environment, fraud, personal data, pos, security response
    
Symantec
Published By: IBM     Published Date: Jan 09, 2014
How can your midsize business meet new demands for data storage with limited resources? In this eguide, you’ll find out that this innovative solution can radically improve storage performance—while minimizing expenses
Tags : 
ibm, storwize eguide, data storage, modern technology, virtual storage, gartner research, innovative data, storage maintenance
    
IBM
Published By: Webroot     Published Date: Sep 18, 2013
Webroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences, and how IT pros are responding. Among the results, the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012. The survey report also includes recommendations—such as deploying a secure web gateway—for responding to this new threat environment. Key findings include: • 8 in10 companies experienced web-borne attacks in 2012 • The majority of respondents reported significant impacts such as increased help desk time, reduced employee productivity and disruption of business activities • Secure web gateways are a critical component of an effective defense against web-borne threats
Tags : 
web threats, data loss, security, web gateway, web attacks, security breach
    
Webroot
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Information is the engine of business growth in the digital age. Market intelligence, customer information, intellectual property and other data can be harnessed to create a quantifiable competitive advantage for a company and lay the path for future expansion. Yet as critical as data can be, the sweeping year-over-year proliferation in data volumes can quickly overwhelm an IT organization. This is much more than a budget problem: Without an effective data storage strategy, an organization is putting a critical resource at risk.
Tags : 
data storage management, microsoft windows server, market intelligence, customer information, intellectual property, data, it organizations, storage strategy
    
Dell & Microsoft
Published By: Dell     Published Date: Sep 12, 2013
Information is the engine of business growth in the digital age. Market intelligence, customer information, intellectual property and other data can be harnessed to create a quantifiable competitive advantage for a company and lay the path for future expansion. Yet as critical as data can be, the sweeping year-over-year proliferation in data volumes can quickly overwhelm an IT organization. This is much more than a budget problem: Without an effective data storage strategy, an organization is putting a critical resource at risk.
Tags : 
data storage management, microsoft windows server, market intelligence, customer information, intellectual property, data, it organizations, storage strategy
    
Dell
Published By: IBM     Published Date: Apr 26, 2013
Virtualization continues to lead a sea change for enterprise-scale data centers and cloud environments, delivering well-established benefits such as cost savings, reduced physical space and power requirements, simpler and more flexible testing environments, faster server provisioning, and improved return on investment. Yet for many organizations, one of virtualization’s greatest benefits is only now being realized in the form of highly portable and flexible virtual images. Natural extensions of virtualization technology, virtual images help organizations achieve even greater efficiencies and cost savings.
Tags : 
control, virtual, lifecylce, enterprise, data centers, cloud environments, virtualization
    
IBM
Published By: SumTotal     Published Date: May 24, 2013
The Value Matrix is based on functionality and usability, the two core measures that Nucleus has found indicate an application’s ability to deliver initial ROI and, ultimately, maximum value over time. Leaders, Experts, Facilitators, and Core Providers are identified in this matrix. Discover how the current workforce management providers stack up in this streamlined and concise evaluation.
Tags : 
workforce management, streamline hr, workforce management solutions, sumtotal
    
SumTotal
Published By: Gleanster Research     Published Date: Dec 11, 2012
This comprehensive 30pg benchmark report from Gleanster Research outlines exactly how Top Performing companies are embracing Agile BI.
Tags : 
    
Gleanster Research
Published By: IBM     Published Date: Sep 27, 2013
RFG believes IT executives should be employing the new generation of storage solutions that offer advanced storage management capabilities – like the IBM Storwize V7000 storage systems – in their target system environments.
Tags : 
ibm, ibm storwize v7000, ibm storage systems, storage systems, storage, leasing, storage management, high-efficient storage
    
IBM
Published By: Aerohive     Published Date: Oct 01, 2012
2012-2013 Branch Router Buyer's Guide The definitive guide for evaluating branch networks
Tags : 
aerohive, branch networks, lan, byo
    
Aerohive
Published By: hybris software     Published Date: Mar 04, 2013
This report details findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help eBusiness and strategy professionals select the right partner for B2C online and multichannel commerce solution.
Tags : 
b2c, ecommerce, multichannel, ebusiness, commerce suite
    
hybris software
Published By: IBM     Published Date: Nov 08, 2012
In this white paper, Forrester discusses the 70 criteria evaluation of customer analytics vendors and discuss 6 of the most significant software providers, one including IBM, and scored them. Read on to learn how each vendor fulfills each key point.
Tags : 
forrester, ibm, customer analytics solution, data management, analytics production, analytics consumption
    
IBM
Published By: IBM     Published Date: Jan 09, 2013
This report details our findings about how well each vendor of cloud strategies - Like Box and Cisco Systems, fulfills our criteria for constructing an online collaboration service and where they stand in relation to each other.
Tags : 
ibm, cloud, analysis, report, comparison, specifications, cloud strategy
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search Resource Library