organisation

Results 251 - 275 of 684Sort Results By: Published Date | Title | Company Name
Published By: Pure Storage     Published Date: Oct 09, 2017
Digital technology has arguably been the biggest disruptor for individuals and organisations in the last twenty years. It has changed how we communicate, how we shop, how we spend our time and how we develop and grow our businesses. For businesses, digital has not just created new products and services, but fundamentally shifted business models and the dynamic between business and customer, business and supplier, business and employee. It has become a significant force for value and revenue creation, but one that brings with it many challenges.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Pure Storage
Published By: McAfee     Published Date: Feb 17, 2014
Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.
Tags : 
cyber security, advanced evasion, aets, security, network security, firewall, cyber attack
    
McAfee
Published By: Aerohive     Published Date: Jun 01, 2015
Learn how organisations can easily and securely on-board a range of users and devices by issuing individual pre-shared keys on the same SSID.
Tags : 
wi-fi security, wlan, secure network, network, firewall, security, wireless security
    
Aerohive
Published By: Aerohive     Published Date: Jun 15, 2015
Découvrez comment les organisations peuvent intégrer facilement et de manière sûre une gamme d’utilisateurs et de terminaux en fournissant des clés pré-partagées individuelles sur le même SSID.
Tags : 
wi-fi security, wlan, secure network, network, firewall, security, wireless security
    
Aerohive
Published By: Qlik     Published Date: Aug 12, 2015
This white paper reveals how IT organisations need to innovate due to the new technology demands.
Tags : 
it trends, it innovation, technology in the workplace
    
Qlik
Published By: Qlik     Published Date: Aug 12, 2015
This Research Report examines the analytical strategies of organisations currently using data discovery tools and highlights their superior performance in user engagement.
Tags : 
data discovery, data, data discovery tools, analytics, benefits of using data discovery, data collaboration, data proliferation, data engagement
    
Qlik
Published By: SAP     Published Date: Oct 14, 2015
This Economist Intelligence Unit report discusses how highgrowth small and mid-sized enterprises (SMEs) are scaling their organisations to provide resources for growth whilst ensuring flexibility to respond quickly to changes in market conditions; the role of technology in scaling SMEs; and success factors in scaling headcount.
Tags : 
operational strategy of scaling, sme, scale, business intelligence, technology
    
SAP
Published By: KPMG     Published Date: Jun 06, 2019
AI will transform the workplace in ways we’re still trying to imagine. What skills and capabilities will your organisation need to survive? Read this report to find out – with contributions from government, academics and the Big Innovation Centre. Download the report to discover: • how AI will change the way economies, societies and businesses operate • how AI will change the skills your workforce needs in the 21st century • what AI means for the way we learn • how AI will change the role of the HR function.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
What impact will the cloud-enabled workplace have on your cybersecurity strategy? This year’s research shows that organisations are navigating a myriad of both old and new cybersecurity challenges to bring the cloud into scope. Read this to discover: • how growing cloud dependency has created distinctive challenges around cyber security • what the biggest cyber challenges are for organisations in this context • how intelligent automation and machine learning is being used to overcome operational obstacles hampering cloud security • a set of cybersecurity considerations for modern IT environments.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
Many organisations will be using AI sooner than anyone expects. Prepare now to address the risks from these advanced technologies with this comprehensive framework from our risk experts. Download this practical resource to see AI risk description, control topic and control description, COBIT process and COBIT area for 17 different AI risks.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 06, 2019
Find out why cyber security must be embedded into commercial strategy. With focused insight on the economics of trust for financial services, automotive, mobile and retail organisations. Read the report to understand: • how consumer expectations are shifting on the topic of digital trust • how well the priorities of consumers and security executives align • what it takes for consumers to stay with a brand when things go wrong.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jun 10, 2019
GDPR has prompted banks to re-evaluate their data protection policies. Going beyond pure compliance can help establish consumer trust as a point of differentiation. Read this report to find out: • the ethical challenges and risks arising from the use of customer data • how to start embedding principles for ethical data handling in your organisation • the competitive advantages that come from getting data ethics right.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Oct 09, 2019
Changing attitudes to data privacy leave many firms in a precarious position. When there is so much regulatory variation in different markets, how do firms balance their responsibility for customers’ data with maximising value from that data? Listen now to discover: • The current state of play for data privacy – understanding what your customers want and what the regulators want • How to lay solid foundations to help you adapt to the changing landscape • How to ensure your privacy strategy supports growth.
Tags : 
    
KPMG
Published By: Workday Netherlands     Published Date: Jul 05, 2019
"How can your growing organisation scale effectively and remain competitive? A strong HR core can help. This playbook from HR guru Jason Averbook and Workday offers step-by-step instructions for building an HR foundation that helps teams achieve success across your organisation. Read now to learn how the right technology enables you to: ? Streamline HR processes ? Better engage your workforce ? Deliver timely data-driven insights to stakeholders "
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday Netherlands
Published By: Rackspace     Published Date: Jan 09, 2012
Distributed computing has been pervasive in IT organisations for nearly two decades, but the tables are beginning to turn. This whitepaper discusses Rackspace's experience in quick deployment and hosting of VDI environments.
Tags : 
rackspace, technology, virtual desktop, vdi, infrastructure, data center
    
Rackspace
Published By: Fluke Networks     Published Date: Nov 05, 2014
This White Paper examines the need for AANPM and how it helps organisations to optimise the performance of business critical applications while speeding up network and application trouble-shooting and minimising downtime.
Tags : 
application trouble shooting, the need for aanpm, benefits of aanpm
    
Fluke Networks
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
Au cours de ces dernières années, la gestion des accès à forts privilèges, un processus englobant différentes fonctionnalités de contrôle, de supervision et d’audit visant à réduire les risques associés aux utilisateurs, aux comptes et aux identifiants à forts privilèges, est devenue une priorité majeure pour les entreprises et organisations de tous secteurs. Cet intérêt accru est motivé par différents facteurs.
Tags : 
identification à forts privilèges, activités à forts privilèges, sécurité, entreprise, violations de données, menaces internes, infrastructure de l’entreprise, privileged user access
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Les organisations engagées dans un processus de transformation numérique sont davantage préoccupées par des questions liées au risque et à la sécurité, ce qui n’a rien de surprenant. Les initiatives de transformation numérique entraînent inévitablement une augmentation du nombre de points d’accès à l’infrastructure de l’entreprise qui se situent en dehors des contrôles existants et sont accessibles par des identités plus nombreuses et plus variées qui prolifèrent à l’intérieur d’une infrastructure distribuée et dynamique.
Tags : 
identification à forts privilèges, activités à forts privilèges, sécurité, entreprise, violations de données, menaces internes, infrastructure de l’entreprise, privileged user access
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Pour dynamiser le marché ou rester compétitives, les entreprises doivent livrer leurs produits logiciels plus rapidement que jamais. Les méthodes traditionnelles d’assurance qualité ne sont cependant pas en mesure de supporter cette cadence soutenue. Bien qu’ils aient aidé les organisations à améliorer la qualité du code, les mécanismes d’intégration continue ne prennent pas en charge les tests de bout en bout à l’échelle du cycle de vie du code.
Tags : 
continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, test
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Dans les organisations agiles d’aujourd’hui, les équipes de production se trouvent face à un défi de taille : déployer en production les nouvelles versions immédiatement après les phases de développement et de test. Pour assurer la réussite d’un tel déploiement, il est nécessaire de mettre en œuvre un processus automatique et transparent. ce processus, nous l’avons baptisé Zero Touch Deployment™. cet article examine deux approches du Zero Touch Deployment : une solution basée sur les scripts et une plate-forme d’automatisation de la mise en production. Il indique comment chacune de ces approches peut résoudre les principaux défis technologiques et organisationnels face auxquels se trouvent les organisations agiles lorsqu’elles décident d’implémenter un système de déploiement automatique. cet article commence par retracer le contexte commercial et technologique qui pousse les organisations agiles à se tourner vers des solutions d’automatisation du déploiement.
Tags : 
zero touch deployment, continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Pour pouvoir réellement mettre en œuvre une approche de livraison continue, les organisations doivent entièrement repenser la façon de mener leur processus d’assurance qualité (QA). Cela passe notamment par redéfinir le rôle que les professionnels d’assurance qualité jouent au sein de l’organisation, automatiser le plus possible à chaque niveau et revoir entièrement les structures de test, pour prendre en charge des versions logicielles plus légères et plus rapides.
Tags : 
continuous testing, déploiement automatique, livraison continue, test, assurance qualité, développement, qualité du code, test
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
Depuis plus de vingt ans, les entreprises doivent se conformer à différentes directives et réglementations en matière de protection des données. Le Règlement général sur la protection des données (RGPD ou GDPR en anglais), qui reprend l’ensemble des législations existantes de la Commission européenne en matière de protection des données, a toutefois pour but de renforcer et d’harmoniser ces différentes réglementations pour les citoyens européens. Les principaux objectifs du RGPD sont de redonner aux citoyens un contrôle sur leurs données personnelles et de simplifier le cadre réglementaire pour les entreprises internationales. Pour les organisations déjà conformes à la Directive 95/46/CE, quels sont les critères technologiques à remplir pour garantir la conformité au RGPD ?
Tags : 
rgpd, gdpr, conformité, compliance, data testing, test data management, ca test data manager
    
CA Technologies EMEA
Published By: Oracle     Published Date: Oct 20, 2016
Flexibility and the ability to adapt easily to change can create a compelling competitive advantage for E&C organisations. Whether it’s behind the desk, on the go, or at the job site, E&C project teams need to be empowered to get a project done no matter where the job takes them and with a limited amount of resources.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2016
Download this paper to find out how Primavera Unifier’s granularity supports the entire team’s participation while giving your organisation the peace of mind that critical data is protected and accessed by authorised users.
Tags : 
    
Oracle
Published By: Aerohive     Published Date: Oct 26, 2015
Join this webinar to learn: - What the latest solution offerings look like and how to avoid investing in dead technology - Why more vendors are using the cloud to drive technical and commercial flexibility for organisations - How to easily grow your network with demand
Tags : 
wlan, wi-fi, wireless networks, wireless architectures
    
Aerohive
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Resource Library