asset value

Results 26 - 50 of 57Sort Results By: Published Date | Title | Company Name
Published By: Red Hat     Published Date: Jan 07, 2019
A business survives when it extends its core competencies in new ways. Increasingly, one of the paths to innovation lies with application programming interfaces (APIs). APIs allow a business to take traditional revenue (and traditional customer and partner interactions) and carry them into a different technological foundation. This enables new customer and ecosystem relationships that can monetize the organization’s core assets and lead to sustained growth and new value and revenue streams.
Tags : 
    
Red Hat
Published By: List Sotheby's International Realty, Singapore     Published Date: Jun 26, 2019
Citadel-founder Ken Griffin lit up the luxury residential sector in January 2019 when he bought a super penthouse in New York City for US$240 million. This purchase followed another acquisition he made in London in which he forked out US$122 million for a 200-year old house overlooking London’s St James Park. These ultra-high-net-worth (UHNW) buyers, local or foreign, are chief executive officers (CEOs) of tech companies or investment funds, and chairmen of major multi-national corporations (MNCs). They are also collectors of trophy assets who go for nothing less than the best-in-class attributes such as location, size, views, privacy, luxurious furnishings, and architectural merit. Trophy real estate is the ultimate collectible treasure. Like buying a prized sports car or a high-value masterpiece of art, trophy residences can ignite the desires of the UHNW individuals. As such, many developers of ultra-luxury properties have conceived collectible concepts right from the planning
Tags : 
    
List Sotheby's International Realty, Singapore
Published By: CDW     Published Date: Nov 05, 2013
As IT infrastructures evolve, the complexity of software assets is constantly increasing, creating headaches for IT pros whose responsibility it is to keep track of it all. In response, many are turning to software asset management (SAM) software. Chances are your organization may already have an asset management product in place that you think is adequate.
Tags : 
cdw solutions, sam provider, software asset management, sam software, it process, software tco improvement, cio pushback, telecommunications
    
CDW
Published By: Adobe     Published Date: Jun 26, 2019
IDC quantifies the value of Adobe Experience Manager Assets for organizations interviewed at an average of $3.17 million per year per organization over three years, which would result in an average three-year ROI of 366%. Adobe Experience Manager Assets generates this value by: — Increasing the return on content investments by improving asset findability and reuse and by reducing redundant content creation efforts — Accelerating time to value from marketing and brand campaigns by streamlining asset distribution — Improving team productivity through workflow automation — Reducing risk associated with the use of outdated or unapproved digital assets
Tags : 
    
Adobe
Published By: HP     Published Date: Jun 23, 2008
HP is increasingly demonstrating that its vision includes positioning itself as an innovator at the high end especially with respect to managing heterogeneous storage assets. HP appears to be a leading proponent of avoiding dreams of owning the entire data center storage infrastructure. Rather its aim appears to add customer value by recognizing and accommodating the diversity of installed storage assets at customer sites.
Tags : 
hp disaster proof, disaster proof, disaster-proof, storage, storageworks, continuous access, high availability
    
HP
Published By: iKnowtion     Published Date: Nov 17, 2011
This highly successful dot-com brand leveraged its customer information assets to understand the broad range of customers attracted to its product offering, as well as how to evaluate each customer's future value potential.
Tags : 
customer intelligence, crm solutions, customer analytics, value estimation, customer potential, data modeling, marketing analytics, iknowtion
    
iKnowtion
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Patch Plus makes managing IT assets fast, easy, and automatic, reducing time to value from months to minutes.
Tags : 
shavlik, patch plus, automation, it asset, virtualization, netchk console, unified management, patch management
    
Shavlik Technologies
Published By: IBM     Published Date: Mar 28, 2008
Business integration, along with the IT integration resources required to support it, has become an essential focus for companies across industries. These organizations want to update existing technology assets—and realize new value from what were previously disconnected and isolated applications.
Tags : 
    
IBM
Published By: IBM     Published Date: Dec 30, 2008
This executive level brochure provides the strategy behind Information on Demand (IOD), the 5 entry points to IOD and includes a summary of the 2008, information market analyst Ovum’s independent evaluation of IBM's Information On Demand initiative which declared IBM to be at the "vanguard of the unified information management revolution." In this brochure customers will also learn how to optimize their business and create a sustainable competitive advantage.
Tags : 
information on demand, ibm, iod, optimize business, strategic asset, business value of information, soa
    
IBM
Published By: Sage     Published Date: Mar 26, 2014
Spreadsheets have become one of the most prevalent software applications used by businesses. They are used for everything from simple calculations to impromptu databases. While inherently useful, spreadsheets are frequently used for tasks in which they are ill-suited. In fact, too many companies overlook the importance of accurate fixed asset tracking and rely on spreadsheets to track value, depreciation, and tax calculations. Unwittingly, this results in the direct loss of money and time.
Tags : 
sage, fixed assets, spreadsheets, tax payments, sarbanes-oxley, depreciation, tracking, planning
    
Sage
Published By: Exablox     Published Date: Jan 27, 2015
Your information is a core business asset and differentiator. But traditional data storage can add costs disproportionate to its potential value. How can you drive down your total cost of ownership and eliminate unnecessary costs, without compromising enterprise class features? Eliminate storage costs that undermine the business value of your organization’s information. In this fourth of a series of informative e-books from Exablox, we take a look at the costs of traditional storage approaches, and offer simple, practical ways that you can cut these costs while getting more for your money.
Tags : 
storage cost, cut storage cost, storage tco, data storage cost, exablox, oneblox
    
Exablox
Published By: IBM     Published Date: Apr 13, 2015
IDC Retail Insights defines omni-channel merchandise optimization as the set of technologies, data assets, skills, processes, and management intent required to develop and maintain sets of targeted and localized offers that best satisfy important business objectives. These goals include customer satisfaction, customer lifetime value, and category, channel, and corporate performance. By "offers," IDC Retail Insights means the broad set of attributes that characterize assortments, products, services, prices, utility, and convenience that match customers' buying criteria and shopping behaviors. Targeted and localized offers present a compelling "choice set" that satisfies and delights consumers. Download this white paper to read the questions posed by IBM to Greg Girard, program director of Omni-Channel Analytics Strategies at IDC Retail Insights, on behalf of IBM's customers.
Tags : 
omni-channel merchandise, ibm, targeted offers, localized offers, customer satisfaction, corporate performance
    
IBM
Published By: F5 Networks     Published Date: Dec 10, 2014
Virtualization caused a major cultural shift in IT. By enabling physical assets to be better utilized, IT teams realized that they could deliver systems to their customers in a more timely manner, thereby delivering better value. In this webinar you will learn what is NetOps and how is it different from DevOps.
Tags : 
f5 networks, devops, agile, netops, data center, virtualization, sdn
    
F5 Networks
Published By: IFS, Inc.     Published Date: Apr 01, 2010
Understanding how to take responsibility for proper implementation and truly taking ownership of an enterprise application as a crucial business asset will go a long way to getting the full value out of your information technology investment.
Tags : 
ifs, enterprise applications, erp implementation, enterprise resources planning, carsound, roi
    
IFS, Inc.
Published By: SAS     Published Date: Feb 09, 2016
Since the global financial crisis of 2008, stress tests have taken on growing importance and prominence in financial institution supervision and regulation. These tests, designed to measure an institution’s ability to maintain capital buffers and withstand extreme economic shocks, were imposed initially, and primarily, on the biggest multinational firms – those designated global significantly important banks (G-SIBs) or financial institutions (G-SIFIs). However, the circle for supervisory stress testing has widened to include a growing number of banks as defined by domestic jurisdictions – in the United States, for example, down to banks with $10 billion in assets under the Dodd-Frank Act Stress Test (DFAST) rule. What’s more, stress tests and their underlying scenarios can be of considerable value as a strategic management tool to a financial services company of virtually any type or size.
Tags : 
sas, white paper, stress testing, supervisory stress testing
    
SAS
Published By: HP     Published Date: May 14, 2014
This Enterprise Strategy Group Solution Impact Analysis examines how well-designed, executed and implemented storage -- such as converged storage solutions from HP -- can elevate storage from a necessity and a cost center to an asset that contributes to the business. The outcome of a series of in-depth interviews conducted by ESG analysts, performed with senior IT professionals in various industries, this report confirms that ROI is a real-world value that HP Converged Storage customers are realizing today.
Tags : 
3par storeserv, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud
    
HP
Published By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are an essential part of understanding your risk profile, it's simply not realistic to expect to eliminate all vulnerabilities from your environment. So, when your scan produces a long list of vulnerabilities, how do you prioritize which ones to remediate first? By data criticality? CVSS score? Asset value? Patch availability? Without understanding the context of the vulnerable systems on your network, you may waste time checking things off the list without really improving security. Join AlienVault for this session to learn: • The pros & cons of different types of vulnerability scans - passive, active, authenticated, unauthenticated • Vulnerability scores and how to interpret them • Best practices for prioritizing vulnerability remediation • How threat intelligence can help you pinpoint the vulnerabilities that matter most
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value
    
AlienVault
Published By: Quocirca     Published Date: Sep 07, 2007
Mid-sized organizations have similar issues to large organizations when it comes to the storage and management of information and data, yet they often have limited capability to attract, retain and maintain the skills that large organizations will use in managing their data assets.  There is a strong need for more effective tools that will enable mid-sized organizations to manage their data assets and gain the greatest value from them.
Tags : 
smb, smbs, storage, data management, information management, storage management, san, sans
    
Quocirca
Start   Previous    1 2 3    Next    End
Search Resource Library