growing

Results 201 - 225 of 1176Sort Results By: Published Date | Title | Company Name
Published By: Proofpoint     Published Date: Aug 10, 2017
BEC attacks are a growing threat to businesses because they prey on vulnerabilities that can’t be patched: people. That’s why employee training, financial controls, and especially technology are the keys to a strong defense and timely response. You need need a solution that does not solely depend on reputation and basic email filtering. With granular controls, advanced email solutions can identify and quarantine impostor emails before they reach an employee’s inbox.
Tags : 
security awareness, social engineering, impostor emails, email flags, financial institution, bec threats, suspicious messages
    
Proofpoint
Published By: Workday Netherlands     Published Date: Mar 20, 2019
Still relying on legacy ERP and spreadsheets? Chances are that you're losing out on your data's true potential and putting your organisation at risk as the digital economy expands. Learn why now is the perfect time for growing organisations to switch the cloud ERP. Read the report.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday Netherlands
Published By: Workday     Published Date: Feb 04, 2019
Still relying on legacy ERP and spreadsheets? Chances are that you're losing out on your data's true potential and putting your organisation at risk as the digital economy expands. Learn why now is the perfect time for growing organisations to switch the cloud ERP. Read the report.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: VMware     Published Date: Apr 09, 2019
To help their business clients unleash innovation and support growth, IT teams need to evolve to a modern data center that is virtualized, software defined and automated, with a consistent operational model for infrastructure and application delivery. In this collection of case studies, we reveal how companies are building more agile, innovative businesses based on VMware solutions.
Tags : 
    
VMware
Published By: Pure Storage     Published Date: Jan 12, 2018
Data is growing at amazing rates and will continue this rapid rate of growth. New techniques in data processing and analytics including AI, machine and deep learning allow specially designed applications to not only analyze data but learn from the analysis and make predictions. Computer systems consisting of multi-core CPUs or GPUs using parallel processing and extremely fast networks are required to process the data. However, legacy storage solutions are based on architectures that are decades old, un-scalable and not well suited for the massive concurrency required by machine learning. Legacy storage is becoming a bottleneck in processing big data and a new storage technology is needed to meet data analytics performance needs.
Tags : 
reporting, artificial intelligence, insights, organization, institution, recognition
    
Pure Storage
Published By: CA Mainframe     Published Date: Sep 12, 2008
This white paper describes the trends that are not only keeping the mainframe market alive but are supporting its growth. The growing complexity of IT makes consolidation and simplification of IT asset management essential. At the same time, increases in energy costs and concern about the environment are also impacting markets. Mainframes are uniquely positioned to provide the automation and virtualization today's complex infrastructures require while using less energy.
Tags : 
ca mainframe, mainframe
    
CA Mainframe
Published By: iCims     Published Date: Jan 24, 2017
A growing business is usually a good thing, but for talent acquisition teams, growth on a large scale can pose some unique recruiting challenges. That’s because rapid expansion can confront talent acquisition with the need to ensure that as the company grows, quality of hire doesn’t shrink.
Tags : 
    
iCims
Published By: TriNet     Published Date: Jul 28, 2015
Learn how a PEO can help remove business risks, contain HR costs, and enable you to focus on growing your business.
Tags : 
peo, hr costs, hr technology, minimize risk, hr employment recruitment, co-employment, three-point relationship, talent market
    
TriNet
Published By: Success Factors     Published Date: Aug 02, 2012
This free Ventana Research report shows SuccessFactors to be a top supplier of applications that support the management and operations of compensation. According to Ventana, SuccessFactors Compensation (part of SuccessFactors BizX Suite) achieved the top overall ranking due to its scores in Reliability and Capabilities. In addition, the growing number of SuccessFactors customers and the company's commitment to cloud computing contributed to its top ranking in the Validation and TCO/ROI categories. Easy for managers at all levels to use, the application has capabilities for compensation reviews and adjustments, as well as an embedded analytic view-which shows the handling of promotions and support across pay ranges. Find out what else Ventana has to say about SuccessFactors in this complimentary report. Download it today.
Tags : 
successfactors, sap, ventana research, value index, total compensation management, benchmark research, human capital, vendors, value index, total cost operations, return on investment, roi, tco, usability, manageability, reliability, capability, adaptability, validation, successfactors
    
Success Factors
Published By: Castlight Health     Published Date: Apr 13, 2016
With the growing adoption of high-deductible health plans (HDHPs) and increased employee cost sharing, unlocking the value of your benefits for your employees and your business critically depends, now more than ever, on engaging your employees to make smart healthcare decisions. The good news is that innovative benefits technologies are starting to deliver on a proven recipe for success.
Tags : 
castlight health, employee, health benefits, hdhp, healthcare
    
Castlight Health
Published By: MobileIron     Published Date: Sep 22, 2014
The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices.
Tags : 
mobile device management, enterprise mobility management, vendor landscape, it leaders, emm growth
    
MobileIron
Published By: CA Technologies     Published Date: Jun 04, 2015
There has been growing buzz about DevOps. DevOps is a methodology that unites the often separate functions of software development (Dev) and production and operations (Ops) into a single, integrated, and continuous process. DevOps is about breaking down the barriers between Dev and Ops. It leverages people, processes, and technology to stimulate collaboration and innovation across the entire software development and release process. Dev and Ops should always be part of an integrated process, but that’s not always as easy as it sounds. You may be stuck in what we call “Dysfunction Junction.” Read this eBooklet to learn about the pitfalls of DevOps, how you can avoid them, and how to get started on your DevOps journey.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
Enterprises that depend heavily on IT to deliver services to customers are constantly driven by market pressures to better develop and release new software features to meet growing demands. Facilitating the collaboration between development and IT operations and bringing application to market faster with high quality are crucial to today’s business success. This solution brief provides insights into the DevOps movement, why it matters and how you can cross the chasm to achieve better collaboration to deliver business value rapidly. You’ll learn how CA Technologies solutions for DevOps bring your portfolio of IT technology forward in a cadence of faster, more predictable releases, letting you confirm the results of each phase of the software life cycle toward positive business outcomes.
Tags : 
    
CA Technologies
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Feb 03, 2015
In his latest paper, Tom Kelly offers real-world anecdotes from cloud implementations at a selection of more than 25 companies, from Fortune 500 to private equity-backed companies, showing examples on how the cloud provides fast- growing companies a scalable infrastructure that supports their growth while improving efficiency and reducing costs.
Tags : 
cloud leverage, cloud implementations, fortune 500, private equity-backed companies, scalable infrastructure, efficiency
    
Netsuite DWASF Leads Display Q1 2015
Published By: LifeLock     Published Date: Mar 02, 2015
Every interaction, every communication, every touch point creates a digital breadcrumb — a piece of data that can put people at greater risk of identity theft. This paper from Forrester Research compares various segments and demographics to understand which groups are at the greatest risk of identity theft.
Tags : 
    
LifeLock
Published By: Dell EMC     Published Date: Aug 22, 2017
Dell EMC Isilon, the #1 Scale-Out NAS platform, continues to transform the way organizations are deploying, protecting and managing their fast growing unstructured data. This session by Eric Seidman, Senior Manager, Product Marketing, Dell EMC will introduce attendees to the new generation of Isilon Scale-Out NAS family. Also covered will be a deep dive into the new Isilon architecture and a closer look at the six new Isilon systems – powered by the new OneFS 8.1 – which were announced at Dell EMC World 2017. Attend this session to learn how Isilon’s latest enhancements can revolutionize your business.
Tags : 
    
Dell EMC
Published By: Mimecast     Published Date: Jun 02, 2016
Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the new Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them. *US Federal Bureau of Investigation, 4/2016
Tags : 
mimecast, whaling, phishing, email attacks, email security, internet security
    
Mimecast
Published By: JBoss Developer     Published Date: Nov 24, 2015
Building on the successes of Red Hat Enterprise Linux, the company in 2006 acquired JBoss, an open source middleware company. Mike Piech recently discussed how a growing JBoss portfolio is helping enterprises leverage hybrid architectures.
Tags : 
jboss, red hat, enterprise, business, open source solutions
    
JBoss Developer
Published By: Autodesk     Published Date: May 22, 2017
The future of making things is here, and it is complex. Engineering leaders are under constant and growing pressure to find more innovative solutions for increasingly demanding customers in the context of an extremely competitive global market.
Tags : 
additive manufacturing, generative design, simulation, high-speed manufacturing, smart manufacturing, enhanced customization, innovation, rapid prototyping, sustainable operation, cam, high-speed machining, tooling, job shop
    
Autodesk
Published By: Akamai Technologies     Published Date: Mar 15, 2016
Cybercriminals continue to evolve their tactics with ever-growing cyberattack sizes and new attack methods, which has spiked a demand for DDoS mitigation services. However, it is often difficult for companies to assess, evaluate, and differentiate DDoS mitigation service providers from one another. Read the four critical criteria you should use to evaluate providers before selecting one.
Tags : 
web security, best practices, mitigation services, network management, automotive
    
Akamai Technologies
Published By: illusive networks     Published Date: May 18, 2016
The growing need for cyber insurance is undeniable, yet the landscape is currently operating without standards, mostly due to the high number of unknowns regarding cyber risks. As a result, understanding how cyber insurance can help mitigate the costs for your company, if a cyber attack occurs, is quickly emerging as a best practice. Download this whitepaper and learn about what to consider when purchasing a cyber insurance plan, cyber Insurance Coverage: What Is (and Isn't) Covered, How Much Will the Coverage You Need Cost?, and how to step up cyber security efforts.
Tags : 
    
illusive networks
Published By: CA Technologies     Published Date: Jul 20, 2017
Mainframes continue to provide high business value by combining efficient transaction processing with high-volume access to critical enterprise data. Business organizations are linking mobile devices to mainframe processing and data to support digital applications and drive business transformation. In this rapidly growing scenario, the importance of providing excellent end-user experience becomes critical for business success.This analyst announcement note covers how CA Technologies is addressing the need for providing high availability and a fast response time by optimizing mainframe performance with new machine learning and analytics capabilities.
Tags : 
    
CA Technologies
Published By: Micron     Published Date: Oct 14, 2016
Today’s IT professionals are well aware that users expect fast, reliable access to ever-growing amounts of data – from web content, to videos, to business intelligence data and more. Meeting the challenges of this exponential growth is nearly impossible with existing, spinning media storage technology. Hard disk drives (HDDs) have been the standard in data storage for decades, but they can no longer satisfy. They create bottlenecks in data access, they fail to meet the growing demands of higher user expectations, and they consume too much power. Download to learn how to solve this issue.
Tags : 
    
Micron
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Resource Library