dati

Results 1 - 25 of 1859Sort Results By: Published Date | Title | Company Name
Published By: BeyondTrust     Published Date: Apr 04, 2019
Unix and Linux build the foundation for most business-critical systems. Thus, these present target-rich environments for cyber-attackers. Privileged Access Management (PAM) helps to mitigate such risks. To succeed, organizations must follow an integrated approach, covering both privilege elevation and centralized management of shared account credentials.
Tags : 
    
BeyondTrust
Published By: Oracle     Published Date: Sep 25, 2019
Research shows that legacy ERP 1.0 systems were not designed for usability and insight. More than three quarters of business leaders say their current ERP system doesn’t meet their requirements, let alone future plans 1. These systems lack modern best-practice capabilities needed to compete and grow. To enable today’s data-driven organization, the very foundation from which you are operating needs to be re-established; it needs to be “modernized”. Oracle’s goal is to help you navigate your own journey to modernization by sharing the knowledge we’ve gained working with many thousands of customers using both legacy and modern ERP systems. To that end, we’ve crafted this handbook outlining the fundamental characteristics that define modern ERP.
Tags : 
    
Oracle
Published By: BehavioSec     Published Date: Oct 04, 2019
Authentication is evolving from static one-time user action, to transparent and continuous ways of validating digital identities without imposing frustration on end users. Behavioral biometrics technologies invisibly and unobtrusively authenticate users by validating the manner in which they physically interact online. Behavioral biometrics technologies learn how individual users hold mobile devices in their hands and press their fingers on the touchscreen. On computers, the system learns how users type on keyboards and move their mouse and cursor. The BehavioSec solution gathers this behavioral data and analyzes it using advanced techniques, to ensure that the user is who you expect them to be.
Tags : 
    
BehavioSec
Published By: KPMG     Published Date: Oct 09, 2019
Changing attitudes to data privacy leave many firms in a precarious position. When there is so much regulatory variation in different markets, how do firms balance their responsibility for customers’ data with maximising value from that data? Listen now to discover: • The current state of play for data privacy – understanding what your customers want and what the regulators want • How to lay solid foundations to help you adapt to the changing landscape • How to ensure your privacy strategy supports growth.
Tags : 
    
KPMG
Published By: Nextgen     Published Date: Sep 25, 2019
It's a big undertaking to switch EHR vendors. That's why it's important to choose a vendor who can not only meet all your needs now, but who will be a partner alongside you as those needs evolve. Whether looking to buy your first EHR, seeking to replace your existing EHR, or consolidating EHRs to a single, integrated solution, this guide will help you in the process. Use these steps to find the best EHR for your billing, reporting, and patient care needs.
Tags : 
    
Nextgen
Published By: Workday APAC     Published Date: Oct 07, 2019
"Workday provides financial services organizations with the technology foundation they need to spend less time gathering data and more time creating real value. But don’t just take our word for it. Hear from our customers in the banking industry that have used Workday to: Make better business decisions Uncover new sources for growth Become a magnet for top talent "
Tags : 
    
Workday APAC
Published By: Group M_IBM Q4'19     Published Date: Sep 25, 2019
According to the latest research from Gartner, SOAR solutions are gaining visibility and real-world use driven by early adoption to improve security operations centers (SOCs). The first market guide from Gartner to cover the SOAR solution market provides analysis and direction on the current state of the SOAR market, as well as recommendations and key findings to help security and risk management leaders evaluate how a SOAR solution can improve their ability to prioritize security operations activities, formalize triage and incident response, and automate response.
Tags : 
    
Group M_IBM Q4'19
Published By: Infinidat EMEA     Published Date: May 14, 2019
Virtualization is the standard in enterprise IT environments for consolidating servers, enhancing businstrators that reduces their Total Cost of Ownership (TCO) and helps speed the application development process. However, as improvements have been made with server technology, storage technoless continuity, and improving business agility. VMware provides an architecture for server adminiogy has become the bottleneck. Legacy storage solutions can’t keep pace with thousands of virtual machines demanding maximum IOPS along with high bandwidth at the lowest latency. Infinidat’s InfiniBox removes the storage bottleneck for VMware environments. The InfiniBox enterprise storage array delivers faster-than-all-flash performance, high availability, and capacity density at petabyte scale. This Infinidat white paper is written for VMware and storage administrators to introduce them to the integration capabilities of the InfiniBox for VMware.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 15, 2019
Il 2017 non è stato un anno facile per essere un CIO / CISO e il 2018 non sembra mostrare alcun segno di miglioramento in tal senso. Con così tante violazioni di dati in grado di rovinare un’intera carriera nel solo 2017 (Equifax, Uber, Yahoo per citare solo alcuni casi) e con requisiti normativi più rigorosi in tutto il mondo, i CIO / CISO hanno la responsabilità societaria di rivedere il loro approccio alla sicurezza dei dati.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 15, 2019
La rivoluzione digitale, l'instabilità economica, i cambiamenti politici e la carenza di competenze professionali sono tutti stati fattori, negli ultimi 24 mesi, del fallimento di aziende o, quantomeno, di perdite di redditività e profitti.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 15, 2019
Fondato nel 1998, IFOM, Istituto FIRC di Oncologia Molecolare è un centro di ricerca dedicato allo studio della formazione e dello sviluppo di tumori a livello molecolare. Nello specifico, il laboratorio di Francesco Ferrari si concentra sull’identificazione e sullo studio di elementi regolatori non codificanti nel genoma e sul modo in cui vengono coinvolti nella regolazione dei processi biologici fisiologici e patologici. Il gruppo utilizza i dati della genomica funzionale (trascrizione, indicatori epigenetici, organizzazione tridimensionale) e altre informazioni genomiche (come il re-sequencing dei pazienti) con metodi di massive sequencing.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Oct 10, 2019
Dal momento che i dati non sono più soltanto un business enabler ma sono sempre più la base per un maggior vantaggio competitivo delle aziende, la disponibilità Always On dei dati è diventata un requisito cruciale di ogni organizzazione IT. Con molte diffi coltà, negli anni le aziende hanno lottato nel progettare infrastrutture dati che potessero soddisfare il requisito dell’Always On pagando un costo e una complessità elevate. Affi nché una soluzione sia realmente Always On deve garantire un Recovery Point Objective pari a zero (RPO=0) e un Recovery Time Objective pari a zero (RTO=0). Si tratta di due requisiti necessari per una soluzione Always On ma assolutamente non suffi cienti.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Oct 10, 2019
Il 2017 non è stato un anno facile per essere un CIO / CISO e il 2018 non sembra mostrare alcun segno di miglioramento in tal senso. Con così tante violazioni di dati in grado di rovinare un’intera carriera nel solo 2017 (Equifax, Uber, Yahoo per citare solo alcuni casi) e con requisiti normativi più rigorosi in tutto il mondo, i CIO / CISO hanno la responsabilità societaria di rivedere il loro approccio alla sicurezza dei dati.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Oct 10, 2019
I Big Data e gli analytics workloads sono la nuova frontiera per le aziende. I dati vengono raccolti da fonti che non esistevano 10 anni fa. Tutti i dati dei telefoni cellulari, i dati generati dalle macchine e i dati relativi all’interazione con i siti vengono raccolti e analizzati. Inoltre, con i budget IT sempre più sotto pressione, l’impatto ambientale dei Big Data non fa che aumentare e pone grandi sfi de per i sistemi storage. Questo documento fornisce informazioni sulle problematiche che le applicazioni dei Big Data pongono sullo storage e su come scegliere le più corrette infrastrutture per ottimizzare e consolidare le applicazioni dei Big Data e degli analytics, senza prosciugare le fi nanze.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Oct 10, 2019
Nonostante decenni di progresso industriale e tecnologico, ad oggi non esiste ancora una soluzione storage integrata e universale capace di ridurre i rischi, essere redditizia, eliminare le complessità e integrarsi perfettamente nel modus operandi del business e gestire i dati su larga scala. Per raggiungere questi obiettivi, è necessario contare su determinate capacità, così da raggiungere i risultati ideali al minor costo possibile. Queste capacità includono la disponibilità, l’affi dabilità, le prestazioni, la densità, la facilità di gestione e l’integrazione dell’ecosistema nelle applicazioni. Questo documento presenta una soluzione innovativa nel panorama dello storage. Si possono così risolvere non solo i problemi di oggi, ma anche quelli di domani.
Tags : 
    
Infinidat EMEA
Published By: Pine Cove Consulting     Published Date: Oct 03, 2019
Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organization’s productivity. But what does a typical attack look like? And what security solutions should be in place to give the best possible defense? This paper examines commonly used techniques to deliver ransomware, looks at why attacks are succeeding, and gives nine security recommendations to help you stay secure. It also highlights the critical security technologies that every IT setup should include.
Tags : 
    
Pine Cove Consulting
Published By: Intel     Published Date: Sep 20, 2019
More data means more opportunities to discover powerful, actionable insights around customers, internal processes, and the broad market. Unfortunately, legacy IT architectures and approaches can block progressive analytics efforts. That leaves a lot of room for improvement, and the learning and investment curve for starting in analytics can be steep. However, tending to three core steps will prove immensely helpful on this journey: • Establishing an organizational foundation • Mapping the data pipeline • Transitioning analytics proofs of concept into production
Tags : 
    
Intel
Published By: IBM APAC     Published Date: Sep 30, 2019
Digital technology is changing the financial services industry rapidly with automated process, AI insights, customized experiences, new operating models and next generation applications. In such a scenario how should banks innovate and stay ahead of the game? This e-book will provide you the best strategies and recommendations for modernizing your IT infrastructure and operations. You’ll learn how to lead disruption and manage rapid change for your bank, its operations and its customers. Here are the five key takeaways: • Personalize customer experiences by maximizing your data • Borrow strategies from open banking and new business models • Step up your security game • Drive innovation from the inside out • Design an agile infrastructure to support participation in new digital marketplaces Find out more in the e-book.
Tags : 
    
IBM APAC
Published By: Two Sigma     Published Date: Sep 19, 2019
In this paper, we provide an overview of the Two Sigma Factor Lens, designed for analyzing multi-asset portfolios and derived from returns of broad, liquid asset class proxy indexes. This lens is intended to be: • Holistic, by capturing the large majority of cross-sectional and time-series risk for typical institutional portfolios; • Parsimonious, by using as few factors as possible; • Orthogonal, with each risk factor capturing a statistically uncorrelated risk across assets; • Actionable, such that desired changes to factor exposure can be readily translated into asset allocation changes. Finally, we discuss methods for constructing and assessing the Two Sigma Factor Lens that can be extended to produce additional risk factors for new sub-assetclasses or cross-sectional risks that may not currently be captured by the lens.1 This factor lens, and our ongoing work to expand it, form the foundations of the VennTM platform.
Tags : 
    
Two Sigma
Published By: Workday     Published Date: Jul 30, 2019
In HR, you have access to an enormous amount of data. How do you filter out the noise from the insights? In this eGuide, and as part of the Getting the Basics Right series, you'll learn how to align on business and HR KPIs including a priority sequenced step-by-step approach to forming these processes.
Tags : 
    
Workday
Published By: Great Bay Software     Published Date: Jan 09, 2019
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there’s value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
    
Great Bay Software
Published By: Red Hat     Published Date: Jun 26, 2019
Everything changes. We are in a period of significant shifts in companies—even entire industries—demonstrated in rankings, like the Fortune Global 500. For the last century, these periods of volatility have been driven by a combination of technological change and capital expansion.1 There is obvious competition between direct, traditional market segments, but digital disruption also opens up the ability to compete and gain revenue in new areas. For example, a movie streaming service like Netflix also launches a community around the software it created to run its services, or an online retailer like Amazon also innovates with public cloud management. Innovation requires more than a slick customer user interface (UI). There has to be a foundation of technology, processes, and culture that allow an organization to be flexible, to build on its existing knowledge, and to incorporate new ideas. At a strategic level, today’s software is expected to deliver on a multitude of new and different
Tags : 
    
Red Hat
Published By: Veeam '18     Published Date: Oct 10, 2019
60% dei dati cloud sensibili è conservato all'interno di documenti Office e per il 75% di questi dati NON viene eseguito un backup! In questo breve e semplice report, gli analisti di 451 Research spiegano perché è importante eseguire il backup dei dati di Office 365. I risultati più importanti includono: I dati di Office 365 sono i nuovi dati aziendali d’importanza critica Il fatto che i dati SaaS siano intrinsecamente sicuri è un luogo comune Ripristini e governance stanno diventando tanto importanti quanto il backup dei dati La protezione dei dati sarà sempre più legata alle problematiche legali e di conformità.
Tags : 
    
Veeam '18
Published By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Frost & Sullivan review the limitations associated with a single-provider approach to MPLS networks and its impact on the enterprise. They examine Virtela's Global Service Fabric - a multi-carrier network approach that provides a best-of-breed global MPLS network solution.
Tags : 
virtela, frost & sullivan, mpls networks, virtela's global service fabric, mpls network solution, cos, multi-protocol label switching, wide area network, cos mapping, network consolidation
    
Virtela Communications, Inc.
Published By: Infosys     Published Date: Aug 20, 2019
Transformation Propelled By Digital Maturity: Incumbent organizations (as opposed to digital natives) fall into 3 clusters determined by their progress along the digital transformation journey. Watchers: Who regard technology as an efficiency enabler and are trying to build a foundation for digital transformation. Explorers: Those who regard technology as enabler for select functions that directly impact CX. Visionaries: Rather, place technology at the heart of their business models and culture.
Tags : 
    
Infosys
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library