platforms

Results 826 - 850 of 1062Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 01, 2017
Today's mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it. The tactical challenge of keeping infrastructure and business data secure while keeping workers productive each day takes precedence. And even then, IT managers can find themselves choosing between security and productivity as they decide how best to spend limited time and resources. This whitepaper will guide you how to get deep visibility into relevant endpoint data within the platform, granting actionable intelligence that can have a measurable impact on your organization.
Tags : 
it staff, applications, business data, data security, it managers, endpoint data, device, platforms
    
IBM
Published By: IBM     Published Date: May 01, 2017
Today's enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: Apple iOS and Apple macOS Google Android Microsoft Windows To complicate the situation further, they run different versions of those platforms for example, Microsoft Windows XP SP3, Microsoft Windows 10 or anything in between. In addition, IT is being tasked more and more with managing and securing wearables, ruggedized devices and the Internet of Things (IoT). Read this whitepaper to learn more.
Tags : 
enterprise management, mobile management, organization optimization, security management, microsoft, data protection, bug prevention, information management
    
IBM
Published By: IBM     Published Date: May 01, 2017
MaaS360 delivers robust UEM capabilities across all major computing platforms, including iOS, macOS, Android and Windows devices. And where competing solutions offer incomplete support for legacy Microsoft platforms, MaaS360 supports Windows XP SP3, Microsoft Windows Vista, Microsoft Windows 7, Microsoft Windows 8, Windows 10 and Microsoft Windows 10 Mobile. These capabilities include: Identity and access management (IAM) that allows a shift from a device-based context to a more comprehensive, userbased context Application management, including an intuitive, universal application catalog for iOS, macOS, Android and Windows, advanced bundling and promotion features, bulk application purchase and distribution capabilities, and fine-grained data controls Download now to learn more!
Tags : 
microsoft, ibm, competing solutions, it support, device based, identity access management, universal application, promotion features
    
IBM
Published By: IBM     Published Date: May 01, 2017
Endpoints continue to advance… Employees come and go... And the security landscape is in constant flux. IT leadership must rise to the challenge of managing a disparate and growing number of endpoints, operating systems, and platforms. The only efficient method of managing and securing all endpoints, their users, apps, content, and data is to implement and deploy a unified endpoint management (UEM) solution that changes and adapts with new technology, more skilled users, and increasingly sophisticated attacks by hackers. Read onward to learn why UEM is necessary, how it addresses complex problems encountered in the modern enterprise, and best practices for a successful deployment.
Tags : 
endpoints, employees, security landscape, security leaders, it security, unified endpoint management
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
In our 36-criteria evaluation of security analytics (SA) providers, we identified the 11 most significant ones — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman Security, IBM, Intel Security, LogRhythm, RSA, Securonix, and Splunk — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.
Tags : 
security analytics platforms, ibm security, security analytics, security and risk
    
Group M_IBM Q1'18
Published By: SWsoft     Published Date: Feb 28, 2007
Virtual appliances have recently been gaining notoriety with IT organizations. These pre-packaged ready to deploy instances of an applicationcreated in a virtual machine or environment can provide significant management savings. While they can be a powerful IT tool, not all virtual appliances are created equally.
Tags : 
server virtualization, virtualization, swsoft, servers, virtual appliances, networking, platforms, server hardware
    
SWsoft
Published By: thawte     Published Date: Aug 27, 2008
This guide will show you how Code Signing Certificates are used to secure code that can be downloaded from the Internet. You will also learn how these certificates operate with different software platforms.
Tags : 
ssl, thawte, certified, certification, secure socket
    
thawte
Published By: CrownPeak     Published Date: Jun 30, 2009
The content management market has exploded in size in recent years with the availability of platforms like Open Source and SaaS giving way to scores of solutions in a variety of sizes and complexities. While companies are spoiled for choice, the unprecedented volume of solutions makes selecting the right content management system (CMS) for an organization an increasingly difficult task. Learn more today!
Tags : 
cms, saas, software-as-a-service, crownpeak, content management system, open source, end-to-end process, collaboration
    
CrownPeak
Published By: F5 Networks Inc     Published Date: Oct 31, 2013
This white paper examines the DDoS threat spectrum including conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
Tags : 
distributed denial of service, ddos, ddos threat spectrum, network attacks, conventional network attacks, http floods, ssl floods, low bandwith threats
    
F5 Networks Inc
Published By: Acquirgy     Published Date: Dec 09, 2009
For 6 months we evaluated leading PPC technology platforms including Marin, Kenshoo, Aquisio, SearchForce, Omniture, Clicable and others. Using a SWOT analysis, we compared their capabilities for small clients, as well as clients spending more than $1 million a month. We also explored their value for both lead generation and ecommerce clients.
Tags : 
ppc, acquirigy, ecommerce, lead generation, swot analysis, kenshoo, marin, aquisio
    
Acquirgy
Published By: Cornerstone OnDemand     Published Date: Jul 28, 2017
The modern recruiter has it far from easy. While the soft skills of recruiting are still relevant — good communication skills, outgoing personality, and keen intuition — the tech-driven world of work requires talent acquisition specialists to navigate a variety of tools, data analytics, and social media platforms. Recruiters can no longer just be great “people people”—they need to be great tech people, too.
Tags : 
recruitment, human resources, communication, data analytics, social media
    
Cornerstone OnDemand
Published By: Unitrends     Published Date: Nov 03, 2010
When Yogi Berra said "The future ain't what it used to be" he could have been talking about backup rather than baseball. Despite enormous progress in backup technologies over the last decade, the"secondary" technology of backup as a whole has barely kept up when compared to the incredible gains in the "primary" technologies associated with computer and storage platforms
Tags : 
unitrends, backup, recovery, disaster recovery, capacity, storage
    
Unitrends
Published By: SAS     Published Date: Aug 28, 2018
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. To help users prepare, this TDWI Best Practices Report defines data lake types, then discusses their emerging best practices, enabling technologies and real-world applications. The report’s survey quantifies user trends and readiness f
Tags : 
    
SAS
Published By: SAS     Published Date: Mar 20, 2019
Welcome to the results of our study about analytics and analytics platforms. Our latest research indicates that the use of analytics continues to evolve in most organizations, and that many organizations are on the path to using analytics strategically.
Tags : 
    
SAS
Published By: HP and Intel     Published Date: Aug 13, 2012
Forrester Consulting provides an analysis of four HP 3PAR Storage customer implementations to quantify the efficiency and cost savings achieved over legacy storage platforms. On average, HP 3PAR Storage customers achieved a 10.4 month payback period with a 55% ROI over a 3-year evaluation period and a significant reduction in CapEx and OpEx over that same period as a result of thin provisioning, maintenance costs avoided and labor productivity gains
Tags : 
hp 3par storage, storage management, maximizing roi, total economic impact, technology
    
HP and Intel
Published By: Conductor     Published Date: Nov 16, 2010
Huge opportunities and technology advances in natural search are compelling search marketers to turn to SEO platforms to gain the upper hand. SEO has long been running to keep up with its digital family but the SEO platform is changing the way SEO is being practiced.
Tags : 
seo, seo platform, conductor, search engine optimization, website, analysis, analyze, serps
    
Conductor
Published By: Cisco     Published Date: Nov 17, 2014
The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.
Tags : 
cloud-computing, malware, cisco, malware infection, amp
    
Cisco
Published By: CarbonBlack     Published Date: Nov 01, 2016
A SANS Guide to Evaluating Next-Generation Antivirus Rather than dying, antivirus is actually growing up. Today, organizations look to spend their antivirus budget on replacing current solutions with next-generation antivirus (NGAV) platforms that can stop modern attacks, not just known malware.
Tags : 
carbonblack, sans, antivirus
    
CarbonBlack
Published By: BlackBerry     Published Date: Mar 11, 2013
This whitepaper reveals research findings on the total cost of ownership (TCO) and security for the major mobile platforms: Apple iOS, Google Android™, BlackBerry®, Windows Phone and Nokia Symbian.
Tags : 
tco, security of enterprise grade mobility, blackberry, total cost of ownership, major mobile platforms
    
BlackBerry
Published By: BlackBerry     Published Date: Mar 12, 2013
Find out about the challenges companies are encountering in the face of the four Cs: Compliance, Control, Cost and Consumerization. And, learn what businesses can glean from the public sector about best-practice Enterprise Mobility Management (EMM).
Tags : 
tco, security, enterprise grade mobility, emm, blackberry 10, best practices
    
BlackBerry
Published By: Blackberry     Published Date: Mar 12, 2013
This whitepaper reveals research findings on the total cost of ownership (TCO) and security for the major mobile platforms: Apple iOS, Google Android™, BlackBerry®, Windows Phone and Nokia Symbian.
Tags : 
tco, security, enterprise grade mobility, blackberry, blackberry 10, enterprise
    
Blackberry
Published By: Box     Published Date: Jul 15, 2013
In this Forrester's Wave File Sync and Share Platforms Q3 2013 report, the global research and advisory firm evaluates 16 file sync and share vendors: Accellion, Acronis, AirWatch, Alfresco, Box, Citrix, Dropbox, Egnyte, EMC, Google, Hightail (formerly YouSendIt,) IBM, Microsoft, Novell, Salesforce.com and WatchDox.
Tags : 
best practices, file sync, file share, content management
    
Box
Published By: IBM     Published Date: Sep 27, 2013
Discusses why converged systems, such as IBM PureSystems platforms, can radically simplify the IT life cycle and how these changes can deliver business value by accelerating time to market, improving application performance, and reducing required staff time.
Tags : 
ibm, idc, ibm puresystems, it life cycle, application development, application performance, converged systems, it solutions
    
IBM
Published By: IBM     Published Date: Oct 01, 2013
Continual and timely upgrades of UNIX systems can enable growth and lower costs. But for some Sun/Oracle and HP customers, expected upgrade plans have hit major hurdles. Read this Clipper Group white paper to see how only IBM continues to provide a plan, and a predictable drumbeat, for the future. Read it now.
Tags : 
ibm, ibm power7, ibm power7 systems, data center, it infastructure, data center, enterprise applications, consolidation
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
As your employees bring their own smartphones and tablets to the workplace, you need to create a flexible mobile environment that allows personally owned and corporate-issued devices to co-exist. IBM Mobile Enterprise Services for managed mobility is designed to help reduce the complexity that comes with multiple mobile platforms. IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program. In this report, you’ll learn how these companies: Increased employee productivity and satisfaction; expanded revenues from improved sales mobility, and decreased replacement, mobility infrastructure and support costs.
Tags : 
managed mobility, byod, michelle evangelista, bring your own device, mobile, flexible, mobile environment, ibm mobile enterprise services
    
IBM
Start   Previous    27 28 29 30 31 32 33 34 35 36 37 38 39 40 41    Next    End
Search Resource Library