solutions

Results 1 - 25 of 5244Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 08, 2019
Les solutions Cisco pour les réunions L'envir et pour la collaboration en équipe L'environnement de tra vail a changé. Aujourd'hui, l'agilité pr é vaut contre les schémas de fonctionnement classiques. Toutefois, dans notre monde moderne, la culture de l'inno vation doit venir des entreprises elles-mêmes. Vos collaborateurs ont besoin d'un espace de tra vail qui met l'accent sur l'inno vation et la rapidité. Cisco Webex Teams est une plateforme qui oWre à vos équipes tous les r outils dont elles ont besoin. Il s'agit d'un kit egroupant les technologies essentielles aux PME tournées vers l'a venir.
Tags : 
    
Cisco EMEA
Published By: Cisco     Published Date: Mar 22, 2019
Hyperconverged infrastructure solutions are making substantial inroads into a broader set of use cases and deployment options, but limitations exist. I&O leaders should view HCI solutions as tools in the toolbox, rather than panaceas for all IT infrastructure problems.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 26, 2019
Uncover the riskiest 1% of threats you’ve been missing. In hours. Not days or months. Nearly all endpoint security solutions claim to block 99% of malware. But what about the 1% of threats they miss? The most dangerous 1% of threats will wreak havoc on your network. If you rely solely on traditional point-in-time technologies, such as antivirus, those threats can go undetected for 200 days on average. For months on end, they can be creeping in and moving laterally across your network causing damage through stealthy malware campaigns without you even knowing it—until it’s too late.
Tags : 
    
Cisco
Published By: Here Technologies     Published Date: Apr 02, 2019
In today’s interconnected world you need to future-proof the integrity and reputation of your business. Your company’s network remains the Achilles heel of the whole enterprise because once compromised, your company’s reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : 
    
Here Technologies
Published By: TIBCO Software     Published Date: Mar 15, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Speakers:
Tags : 
    
TIBCO Software
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
    
Rubrik EMEA
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
Backup and recovery needs a radical rethink. When today’s incumbent solutions were designed over a decade ago, IT environments were exploding, heterogeneity was increasing, and backup was the protection of last resort. The goal was to provide a low cost insurance policy for data, and to support this increasingly complex multi-tier, heterogeneous environment. The answer was to patch together backup and recovery solutions under a common vendor management framework and to minimize costs by moving data across the infrastructure or media.
Tags : 
data, backup, recovery, virtualization, solutions, cloud, architectures
    
Rubrik EMEA
Published By: Dell EMC     Published Date: Feb 14, 2019
Today’s organizations must have IT solutions that can handle both current and emerging workloads. The modular design of PowerEdge MX—powered by Intel® Xeon® scabable processors—meet that demand. Access this Dell brief to learn the five ways PowerEdge MX can help you scale, secure and simplify your IT. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell EMC
Published By: Schneider Electric     Published Date: Mar 28, 2019
To win the colocation race you need to be faster, reliable, innovative and efficient –all while making smarter design choices that will ensure positive returns. Customers are demanding 100% uptime and always-on connectivity –be it small enterprises to large Internet Giants–and colocation providers need to meet these expectations. The growing adoption of prefabricated data centers allows just that. With the undisputed benefits of prefab modules and building components(like speed or quality),colocation providers can manage their business today, and deploy faster in the future. Chris Crosby, CEO for Compass Datacenters, is well-known for his expertise in the data center industry. From its founding in 2012, Compass’ data center solutions have used prefabricated components like exterior walls and power centers to deliver brandable, dedicated facilities for colocation providers. Prefabrication is the central element of the company’s “Kit of Parts” methodology that delivers customizable data center solutions from the core to the edge. By attending this webinar, colocation providers will: • understand the flexibility and value delivered via the use of prefabricated construction • Hear the common misperceptions regarding prefabricated modules and data center components • learn how prefabricated solutions can provide more revenue generation capability than competing alternatives • know what key things to consider when evaluating prefabricated data center design
Tags : 
data centers, colocation provider, schneider electric, - modular data centers, prefabricated data center
    
Schneider Electric
Published By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
    
Intel
Published By: Intel     Published Date: Apr 15, 2019
There’s never been a more urgent need for comprehensive security and surveillance solutions. GeoVision Inc. has built its business on helping meet this need, providing digital and networked video surveillance solutions to customers in 110 countries. To succeed in its highly competitive and fast-changing industry, GeoVision must always be on the lookout for ways to give its customers leading-edge performance. Find out how GeoVision is working closely with Intel to maximize the performance of the hardware using the tools in Intel® System Studio, a comprehensive development tool suite to optimize the computer vision and deep learning workloads.
Tags : 
    
Intel
Published By: VMware     Published Date: Apr 09, 2019
To help their business clients unleash innovation and support growth, IT teams need to evolve to a modern data center that is virtualized, software defined and automated, with a consistent operational model for infrastructure and application delivery. In this collection of case studies, we reveal how companies are building more agile, innovative businesses based on VMware solutions.
Tags : 
    
VMware
Published By: Gigamon     Published Date: Mar 26, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, pam/pim solutions, illusive networks
    
Illusive Networks
Published By: Here Technologies     Published Date: Mar 29, 2019
Today’s assets, including equipment, vehicles, and shipping containers, move via multiple transportation modes at varying speeds across a range of distances and geographies. The journeys of these assets are fraught with problems, including lost and stolen goods, delayed shipments, and damage from incorrect environmental conditions. HERE is looking to solve the problems of keeping track of things, both outdoors and indoors. IoT deployments rely on location tracking to function effectively. With the significant cost of delayed, lost and stolen goods – location tracking offers a huge market opportunity. ISG Research had an extensive briefing with to analyze the company’s ambitions to reach deeper into the IoT and Asset Tracking market. Download to learn more about active tracking of high value products and how to enhance your tracking solutions.
Tags : 
here technologies, transport and logistics
    
Here Technologies
Published By: Here Technologies     Published Date: Mar 29, 2019
Automobile and heavy equipment manufacturers are ready to break free of the outdated state of their outbound supply chains. A lack of visibility contributes to a process that is ripe for optimization. Manufacturers need reliable partners to help establish greater visibility of their supply chains and locate assets in real time. This ebook outlines how solutions from HERE Technologies can meet common supply chain challenges and help manufactures enable proactive decision-making and greater efficiency. This ebook will help you understand how location intelligence from HERE: • Enables manufacturers tackle key supply chain challenges and begin a new phase of smart optimization • Helps manufacturers establish more accurate supply chain ETAs • Utilizes a range of technologies to provide real-time locations – both indoor and outdoor
Tags : 
    
Here Technologies
Published By: Here Technologies     Published Date: Apr 02, 2019
Automobile and heavy equipment manufacturers are ready to break free of the outdated state of their outbound supply chains. A lack of visibility contributes to a process that is ripe for optimization. Manufacturers need reliable partners to help establish greater visibility of their supply chains and locate assets in real time. This ebook outlines how solutions from HERE Technologies can meet common supply chain challenges and help manufactures enable proactive decision-making and greater efficiency. This ebook will help you understand how location intelligence from HERE: • Enables manufacturers tackle key supply chain challenges and begin a new phase of smart optimization • Helps manufacturers establish more accurate supply chain ETAs • Utilizes a range of technologies to provide real-time locations – both indoor and outdoor
Tags : 
auto, mapping, location data
    
Here Technologies
Published By: Forcepoint     Published Date: Mar 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
The data maturity curve As companies invest more and more in data access and organization, business leaders seek ways to extract more business value from their organization’s data. 92 percent of business leaders say that to compete in the future, their organization must be able to exploit information much more quickly than it can today.1 Chief Information Officers (CIO) need solutions that will allow them to evolve their organization’s approach to data and drive real value with strategic decisions. This journey can be depicted in a data maturity curve.
Tags : 
    
Group M_IBM Q2'19
Published By: Epicor     Published Date: Apr 12, 2019
As a business leader of a manufacturing company, you may be experiencing the challenges of competing in a digitally transformed marketplace. In our increasingly digital world, your ability to grow depends on how your business leverages the latest best-practice technology. Is your enterprise resource planning (ERP) system keeping pace? In this Forrester Research report—presented by Epicor Software—you’ll discover the latest insights on software as a service (SaaS) business solutions. SaaS business applications will evolve in the cloud to new levels of value in: Intelligence Flexibility Connectivity User experience The report also provides predictions and recommendations that will help guide your manufacturing business with its strategic growth initiatives. Download the report to learn more, and discover why you should change the way you think about cloud.
Tags : 
epicor erp, saas, applications
    
Epicor
Published By: Anaplan     Published Date: Apr 02, 2019
Connected organizations collaborate across business functions to dynamically steer business performance. Previous generations of planning software have fallen short of this vision, making collaboration difficult to achieve, scattering data across multiple sources, and providing inflexible planning models that require heavy IT support. This landscape motivated Anaplan to develop an innovative platform that enables Connected Planning across the entire enterprise. The FSN Innovation Showcase highlights three major innovations that support these objectives: • Anaplan’s proprietary Hyperblock® technology • The App Hub, a suite of 250+ industry-leading solutions • Developments in machine learning and artificial intelligence
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Apr 09, 2019
Connected organizations collaborate across business functions to dynamically steer business performance. Previous generations of planning software have fallen short of this vision, making collaboration difficult to achieve, scattering data across multiple sources, and providing inflexible planning models that require heavy IT support. This landscape motivated Anaplan to develop an innovative platform that enables Connected Planning across the entire enterprise. The FSN Innovation Showcase highlights three major innovations that support these objectives: • Anaplan’s proprietary Hyperblock® technology • The App Hub, a suite of 250+ industry-leading solutions • Developments in machine learning and artificial intelligence
Tags : 
    
Anaplan
Published By: Intel     Published Date: Mar 19, 2019
Digital kiosks are fast becoming ubiquitous in quick-service restaurants, cinemas and retail stores as retailers grapple to embrace automated, digital solutions to keep up with rising labour costs, customer expectations and stiff competition. To maximise the value of self-ordering kiosks, retailers should not perceive digital kiosks as a means to an end but a critical touchpoint within the customer journey. Download the whitepaper to discover how the new generation of self-order kiosks— • Can resolve the challenges of acquiring, training and maintaining a workforce • Can enhance customer experiences throughout the entire shopping and purchasing process • Can facilitate better business decision making through access to valuable customer data
Tags : 
    
Intel
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: NEC     Published Date: Jan 28, 2010
Case Study: NEC provided intuitive and user friendly technology to enrich the whole guest experience with improved service times, personalized assistance and quality communications.
Tags : 
nec, peninsula shanghai, hotel, network solutions, real-time communication, productivity, ip telephony server, wireless technology, unified communications
    
NEC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library