it landscape

Results 76 - 100 of 661Sort Results By: Published Date | Title | Company Name
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Complexity, globalization and digitalization are just some of the elements at play in the risk landscape—and data is becoming a core part of understanding and navigating risk. How do modern finance leaders view, navigate and manage enterprise risk with data? Dun & Bradstreet surveyed global finance leaders across industries and business types. Here are the top trends that emerged from the study: 1. The Enterprise Risk & Strategy Disconnect—Finance leaders are using data and managing risk programs, but over 65% of finance leaders say there’s missing link between risk and strategy. 2. The Risks of the Use and Misuse of Data—Up to 50% of the data used to manage modern risk is disconnected. Only 15% of leaders are confident about the quality of their data. 3. Risky Relationships—Only 20% of finance leaders say the data they use to manage risk is fully integrated and shared. Download the study to learn how finance leaders are approaching data and enterprise risk management
Tags : 
    
Dun & Bradstreet
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
    
Rubrik EMEA
Published By: VMware     Published Date: Sep 12, 2019
As the nature of work continues to evolve, modern organizations face an ever-changing set of challenges. The consumerization of IT and an increasingly mobile workforce have created a generation of workers who interact with data and information in entirely new ways. If businesses want to keep their footing in this new landscape, they must respond in ways that allow them to stay both flexible and secure.
Tags : 
    
VMware
Published By: Workday APAC     Published Date: Apr 10, 2019
As your organization’s finance leader, the opportunity to better understand the landscape and your business has never been greater. Advances in analytics—powered by digital technologies, such as automation and machine learning—give finance teams deeper business insights. Read the story.
Tags : 
    
Workday APAC
Published By: Canon Business Process Services     Published Date: Aug 28, 2013
Organizations across a variety of industries are leveraging some of the essential components of records management, such as document imaging, to succeed in today’s competitive business landscape.
Tags : 
records management, records management compliance, records retention, records retention schedule, electronic documents, electronic records management, document imaging, document and print management, document management services, managed print services, document processing center, document workflows, business management, business imaging
    
Canon Business Process Services
Published By: Dell EMC     Published Date: May 09, 2019
.As midmarket companies pursue business growth, they must deliver differentiated products and experiences without compromising business or customer data. Crucial to this is having the most up-to date IT infrastructure to support the scale and complexity of a changing application landscape. Midmarket businesses (MBs) must modernize their data centers refreshing server infrastructure and automating their IT management processes. Those that do will propel business innovation and deliver superior customer experiences with secure, fast, and reliable business technology. Download this paper, commissioned by Dell, to learn more.
Tags : 
    
Dell EMC
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas, security, technology
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, appliance, virtual, physical, saas, hybrid
    
Blue Coat Systems
Published By: Oracle     Published Date: Aug 08, 2013
With Oracle CRM predictive analytics, identify your best cross-sell and up-sell opportunities so you can focus on higher probability deals.
Tags : 
oracle, crm, opportunity landscape, predictive analytics, sales
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
With Oracle CRM predictive analytics, identify your best cross-sell and up-sell opportunities so you can focus on higher probability deals.
Tags : 
oracle, crm, opportunity landscape, predictive analytics, sales
    
Oracle
Published By: Silver Peak     Published Date: Apr 12, 2016
This white paper reveals how with the proliferation of cloud-based and Software-as-a-Service (SaaS) applications, traditional means of connecting branches and users to applications must evolve.
Tags : 
cloud, cloud computing, cloud architectures, wan, saas, software as a service, cloud services, hybrid cloud
    
Silver Peak
Published By: Lengow     Published Date: Jun 06, 2016
This white paper illustrates Google Shopping’s role in the changing eCommerce landscape; from price comparison engines to CPC.
Tags : 
increase your sales, google shopping, google shopping campaigns, ecommerce, online shopping
    
Lengow
Published By: Absolute Software     Published Date: May 31, 2016
This is arguably the most unsettling time in history to be a CIO. The IT landscape is shifting at a rapid pace with advances in social media, mobility and big data. The proliferation of advanced robotics is just around the corner and the Internet of Things is connecting even the most mundane objects to the internet—and probably the corporate network. Back in the 1990s, most computer hackers were interested in gaining access to networks purely for kudos among their peers. Today hackers have monetized their skills and make their living from finding vulnerabilities in IT networks.
Tags : 
data, big data, security, corporate network, mobility
    
Absolute Software
Published By: Entrust Datacard     Published Date: Jul 23, 2019
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
    
Entrust Datacard
Published By: Adobe     Published Date: Aug 04, 2015
InfoTrends has developed this analysis piece to highlight who we believe to be the top vendors in this market.
Tags : 
digital publishing, digital publishing landscape, digital publishing solution
    
Adobe
Published By: Adobe     Published Date: Nov 11, 2015
Econsultancy's Quarterly Digital Intelligence Briefings look at some of the most important trends affecting the marketing landscape.
Tags : 
trends of marketing landscape, digital intelligence, cx challenge, customer experience, mobile excellence, internet of things, modern customer experience, complexity of customer experience, mobility, wearable tech
    
Adobe
Published By: CA Technologies     Published Date: Sep 25, 2017
Microservices can have a positive impact on your enterprise- just ask Amazon and Netflix-but you can fall into many traps if you don't approach them in the right way. This practical guide covers the entire microservices landscape, including the principles, technologies, and methodologies of this unique, modular style of system building. You'll learn about the experiences of organizations around the globe that have successfully adopted microservices.
Tags : 
microservices, organization, business, ca technologies, architecture
    
CA Technologies
Published By: Cisco and NVIDIA Corporation     Published Date: Jun 13, 2019
IT organizations are no longer just a business support function and cost center—they are expected to drive business as part of the core corporate strategy. Adding to this, IT landscapes continue to increase in complexity, complicating management and innovation. Digital transformation helps IT adapt to these changes. Building a hybrid or multi-cloud IT environment can help you transform successfully. An effective cloud environment can provide: • Improved infrastructure management and flexibility • More time for IT to focus on strategic projects rather than manage data centers. • Better IT cost management In fact, 49% of companies cite “modernized IT infrastructure and technologies with increased agility, flexibility, manageability, and security” as a digital initiative on their long-term roadmap. To learn more, download this eBook!
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Kindred Hospital Rehabilitation Services     Published Date: Apr 10, 2019
Many healthcare providers are seeking support from dedicated rehabilitation partners. Receiving support from a third-party team of rehab experts enables healthcare providers to reach the highest levels of performance in this niche and highly-regulated space. While the landscape has never been as challenging, there is also great opportunity. When identifying a rehabilitation partner, there are five key qualities that indicate long-term success. This article outlines how rehab partners can support healthcare providers, the key qualities to look for in a partner and the top questions to ask a potential partner.
Tags : 
    
Kindred Hospital Rehabilitation Services
Published By: Workday Nordics     Published Date: Sep 19, 2018
Providing all employees with easy, timely access to information is critical in today’s business landscape. Discover how a cloud-based system gives you a single source of truth, across the entire business, so you get data that’s trustworthy, actionable, and available in real time.
Tags : 
workday, workday technology, digital strategy, workday finance, hr cloud solutions
    
Workday Nordics
Published By: Pure Storage     Published Date: Oct 09, 2018
Digital technology is so intrinsic to our personal lives that we barely think about the fitness trackers and smartphones that are as much a part of us as the clothing we wear. For organizations, the shift to digital is more disruptive and the stakes far higher. Digital transformation has been high on the executive agenda for a few years and, for many, harnessing data has become a significant force for value and revenue creation. Agility has emerged as an organizational superpower as businesses grapple with change and uncertainty in their own customer bases and in the global political and economic landscape. IT has been thrust into the spotlight as the unwitting hero of the story – tasked with delivering on the digital vision, implementing all manner of applications and building firm infrastructure foundations to support the latest digital initiatives. In an increasingly on-demand world, it is this final point that often gets overlooked in the rush for the next shiny new technologies. E
Tags : 
    
Pure Storage
Published By: MobileIron     Published Date: Apr 28, 2016
Welcome to the first edition of MobileIron Security Labs (MISL) quarterly Mobile Security and Risk Review. This report provides insights into the state of the mobile security and threat landscape, highlights emerging risks, and recommends ways to fortify mobile enterprise deployments.
Tags : 
mobile apps, best practices, mobileiron, phones
    
MobileIron
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library