evolve

Results 176 - 200 of 610Sort Results By: Published Date | Title | Company Name
Published By: MobileIron     Published Date: Jul 31, 2015
To better understand what Windows 10 means for the modern enterprise, this white paper provides a technical overview of these and other new features in the latest OS release. It also includes a brief overview of how the enterprise architecture has evolved and how Windows 10 enables IT leaders to use this fundamental architecture shift as a catalyst for business transformation.
Tags : 
modern enterprise, enterprise architecture, business transformation, windows 10, security
    
MobileIron
Published By: Mitel     Published Date: Mar 30, 2017
You know the way we communicate with each other has evolved, but what about the way your business communicates with your customers? A third of the US population is made up of millennials that use multiple channels when reaching out or making a purchase, so how does this shift affect your bottom line? More importantly, how closely aligned is your customer experience strategy with how customers are buying? Looking for some clarity? Check out this infographic for a clear understanding of how customers are shopping, why they abandon your transactions, and what steps you can take to keep them happy.
Tags : 
customer experience, sms, email, web chat, social media, mobile
    
Mitel
Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2018
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective. Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile specifc security. To encourage this evolution, Lookout developed the Mobile Risk Matrix. Its purpose is to help security organizations understand the spectrum of risk on mobile devices and to provide data that demonstrates the prevalence of mobile risk.
Tags : 
    
Lookout
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
As the threat landscape continues to evolve, you need a practical and robust way to protect privileged access in your enterprise. Analytics that detect new threats and automatically mitigate them are a great way to achieve this. By following these four key steps as you build a PAM threat analytics solution, you’ll be able to establish a more comprehensive and effective approach for addressing internal and external security threats.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Software delivery processes and systems, and the people involved with them, are under increasing pressure. Sometimes it’s digital transformation, other times it’s simply the challenge of keeping up with the demands created by ever more dynamic markets and an escalating pace of change. None of this is news, but is does provide an important backdrop to the discussion of how software delivery needs to evolve, especially given that traditional methods and approaches were never designed to deal with the fastmoving and unpredictable environment you are probably working in today.
Tags : 
delivery, testing, software development, integration, business solutions, ca technologies, continuous testing, testing effort, service virtualisation, delivery ecosystem
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
A lot can be learned from getting a group of experienced CIOs in a room and encouraging them to talk freely about the topics at the front of their minds. Rarely do they want to discuss technology, and even the latest IT industry ‘hot topics’ usually don’t get that much airplay. Conversations, and sometimes quite heated debates, tend to revolve around broader business-related trends, how these are changing stakeholder and user behaviour and expectations, and how best to respond to such dynamics.
Tags : 
development tools, code management, software build, service virtualisation, automation management, platform building, sdlc, mttr, continuous testing, testing effort, service virtualisation, delivery ecosystem
    
CA Technologies EMEA
Published By: Carbon Black     Published Date: Apr 10, 2018
With breaches today often going undetected for months or years, many organizations must now accept the very real possibility that intruders have already compromised their systems, regardless of the organization’s security posture. Today, compromises are measured in minutes and the speed of response is measured in days. Enterprises the world over are realizing that to close the gap, they need to evolve their security operations from being a largely reactive unit (waiting for alerts that indicate a threat) to being proactively on the hunt for new attacks that have evaded detection. When an incident does occur, the speed of your response will dictate the extent to which you can minimize the impact. In the case of a malicious attack, it takes on average over 7 months to identify a breach, and nearly two and a half additional months to contain the incident. Every second counts, and while the clock is ticking, the cost of the breach is rapidly increasing as well. Breaches that take over 3
Tags : 
    
Carbon Black
Published By: Location3     Published Date: Aug 31, 2018
When we released our first white paper in February 2015 discussing the ways multi-location businesses were using online media to drive in-store visits, most of the strategic opportunities being leveraged by marketers revolved around using things like promotional coupons, beacons and other tactics. While those methods certainly provided incremental lift in in-store traffic and revenue, there existed a number of gaps in connecting online data associated with promotional efforts, to data that indicated a customer actually converted offline at a business location. At press time for our original “online-to-offline” white paper, digital industry giants were still very much in the early stages of evaluating data points that signified offline customer conversions. Many of these “conversions” were somewhat implied (i.e. Clicks on “Get Directions” link), while others were a bit more reliable in signifying in-store visits and purchases made by consumers (i.e. downloadable coupon redeemed in-store
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, online to offline, multi-location businesses, store visits, cross channel analytics
    
Location3
Published By: IBM APAC     Published Date: May 14, 2019
Digital transformation (DX) continues to headline business initiatives as companies look to remain competitive in the rapidly changing IT landscape. Organizations are increasingly investing in and implementing next-generation applications and architectures such as software-defined IT and hybrid IT to drive higher levels of efficiency and agility. These modern technologies and architectures, however, also require organizations to evolve their underlying infrastructure to support new capabilities and demands. Recent strength in the server market, which continues to operate in a marketwide refresh cycle, illustrates the growing demand for new infrastructure. 1Q18 marked the server market's fifth consecutive quarter of both shipment and revenue growth and represented a fourth consecutive quarter of year-on-year ASP growth, as customers continue to replace aging server infrastructure with more powerful and efficient systems that leverage the latest platform developments from processor supp
Tags : 
    
IBM APAC
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
threats, applications, cybercriminals
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Sep 14, 2018
As the threat landscape evolves, so must our security controls and countermeasures. Recent research from F5 Labs revealed that applications are the initial targets in the majority of breaches, suggesting that any app can be an attack vector. Cybercriminals are moving their tactics further up the stack using sophisticated application-layer exploits, as well as an emerging wave of automated, bot, and IoTbased threats that are quite capable of evading simple signature or reputation-based detection. Yet, the majority of WAFs on the market today have remained largely unchanged, leaving the applayer exposed, unable to proactively monitor and protect against evolving attack vectors.
Tags : 
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
As signaling and scrubbing technology evolve (and as your solutions become more and more adaptable), DDoS attacks will become less effective and less attractive to would-be adversaries. The time will soon come when a 1 Tb attack from an IoT botnet will seem like a mere annoyance, rather than a catastrophic event—if you even notice it at all. So how do you get there faster? Plan ahead by designing a defense in-depth DDoS strategy and partner with a trusted security provider to handle the large attacks. Upfront preparation will pay off when the threat of DDoS attacks no longer keeps you up at night.
Tags : 
strategy, ddos, spam, technology, solutions
    
F5 Networks Inc
Published By: Mimecast     Published Date: Oct 25, 2017
Even as cyberattacks have evolved, phishing remains the number one threat delivery tactic. Why? Because it’s effective. That’s the bad news. The good news is, your organization can effectively defend against phishing attempts with the right program in place. You can stand in the way of the abuse of your most mission-critical communications app. There are six key areas to consider. Read this Gartner research note, Fighting Phishing: Optimize Your Defense, to advance your anti-phishing program.
Tags : 
anti-phishing, cyber security, secure email gateway, url filtering, mimecast
    
Mimecast
Published By: Pure Storage     Published Date: Jul 19, 2017
As the information technology (IT) industry enters the cloud era, where hybrid IT is the dominant deployment model in organizations of all sizes, the capabilities of primary all-flash arrays (AFAs) will need to evolve to handle cloud scale and agility
Tags : 
it architecture, cloud, all-flash, storage
    
Pure Storage
Published By: NetApp     Published Date: Feb 19, 2015
Flash Storage for Dummies, NetApp 2nd Special Edition, describes the many uses and benefits of flash storage technology in the enterprise. From flash-accelerated storage to all-flash arrays, flash technology improves performance and increases reliability in storage infrastructures. The book examines various elements of flash storage: how it evolved, and why you should consider it for your storage infrastructure. The book explores key differences in NetApp’s flash storage solutions: NetApp Flash Cache, Flash Pool, all-flash FAS, and the EF-Series. You’ll also learn five strategies for using Flash in your next storage project. In that classic For Dummies style, you’ll get some useful tips on how to best incorporate flash in your IT environment.
Tags : 
    
NetApp
Published By: Pure Storage     Published Date: Mar 15, 2018
Managing technology refreshes is not a popular task among enterprise storage administrators, although it is a necessary task for successful businesses. As a business evolves, managing more data and adding new applications in the process, enterprise storage infrastructure inevitably needs to grow in performance and capacity. Enterprise storage solutions have traditionally imposed limitations in terms of their ability to easily accommodate technology refreshes that keep infrastructure current and operating reliably and most cost effectively. In 2015, Pure Storage introduced a new technology refresh model that has driven strong change in the enterprise storage industry by addressing the major pain points of legacy models and provided overall a much more cost-effective life-cycle management approach. In conjunction with other aspects of Pure Storage's enterprise storage product and services offerings, the company's "Evergreen Storage" technology refresh model has contributed to this all-f
Tags : 
    
Pure Storage
Published By: IBM     Published Date: Mar 29, 2017
No matter the vintage or sophistication of your organization’s data warehouse (DW) and the environment around it, it probably needs to be modernized in one or more ways. That’s because DWs and requirements for them continue to evolve. Many users need to get caught up by realigning the DW environment with new business requirements and technology challenges. Once caught up, they need a strategy for continuous modernization.
Tags : 
data, warehouse, modernization, ibm, cloud
    
IBM
Published By: Redhat     Published Date: Sep 15, 2015
This paper explains how RedHat JBoss Middleware helps organisations evolve their middleware infrastructure by providing the tools needed to rapidly build connected systems that bring people, processes, and information together.
Tags : 
redhat, redhat jboss middleware, middleware infastructure, enterprises
    
Redhat
Published By: Redhat     Published Date: Sep 15, 2015
This paper explains how RedHat JBoss Middleware helps organisations evolve their middleware infrastructure by providing the tools needed to rapidly build connected systems that bring people, processes, and information together.
Tags : 
redhat, redhat jboss middleware, middleware infastructure, enterprises
    
Redhat
Published By: Oracle     Published Date: Sep 26, 2019
To the marketer who’s always on We know. There’s a lot to keep up with. And get to the bottom of. As the universe of marketing evolves, shape-shifting from one minute to the next, the importance of building muscle memory around new topics is undeniable. At Oracle, we get it. Which is why we created a series of guides about what’s trending in modern marketing. They’ll get you up to speed on pivotal trends in less time – with less effort – so you can get back out there. Because sitting on the sidelines isn’t really your thing. Download this whitepaper to get started.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Sep 26, 2019
To the marketer who’s always on We know. There’s a lot to keep up with. And get to the bottom of. As the universe of marketing evolves, shape-shifting from one minute to the next, the importance of building muscle memory around new topics is undeniable. At Oracle, we get it. Which is why we created a series of guides about what’s trending in modern marketing. They’ll get you up to speed on pivotal trends in less time – with less effort – so you can get back out there. Because sitting on the sidelines isn’t really your thing.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Sep 30, 2019
We know. There’s a lot to keep up with. And get to the bottom of. As the universe of marketing evolves, shape-shifting from one minute to the next, the importance of building muscle memory around new topics is undeniable. At Oracle, we get it. Which is why we created a series of guides about what’s trending in modern marketing. They’ll get you up to speed on pivotal trends in less time – with less effort – so you can get back out there. Because sitting on the sidelines isn’t really your thing.
Tags : 
    
Oracle
Published By: IBM APAC     Published Date: Aug 25, 2017
The world of business analytics is evolving rapidly, and while there are multiple emerging trends of note, two stand out as particularly impactful. First, there is an expanding and increasingly diverse audience of users that are becoming more analytically active. From mid-level Line-of-Business staff to senior executives on mahogany row, more users in more job functions are taking an increased level of ownership in the insight that fuels their decisions and the underlying data that supports that insight.
Tags : 
data integration, data security, data optimization, data virtualization, database security
    
IBM APAC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library