hr services

Results 226 - 250 of 416Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: May 15, 2014
This report aims to provide a fair and balanced analysis of Microsoft Office 365, its advantages, disadvantages and limitations that can be managed through third party services.
Tags : 
limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control
    
Mimecast
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Digital transformation (DX) is a must for midsize firms (those with 100 to 999 employees) to thrive in the digital economy. DX enables firms to increase competitive advantage through initiatives such as automating business processes, creating greater operational efficiencies, building deeper customer relationships, and creating new revenue streams based on technology-enabled products and services. DX is a journey, and it starts with firms embracing an IT-centric vision that guides a data-driven, analytics-first strategy. The outcome of DX initiatives depends on the ability of a firm to efficiently leverage people (talent), process, platforms, and governance to meet the firm’s business objectives.
Tags : 
    
Hewlett Packard Enterprise
Published By: Cisco     Published Date: Apr 10, 2015
Cisco engaged Miercom to conduct a competitive analysis of its Catalyst 2960-X switch versus two comparable Hewlett-Packard switches from the 2920 and 5120 product families. Miercom executed comprehensive hands-on testing and evaluated the performance of some widely deployed features that are critical for reliable functioning of enterprise networks. The test methodology focused on specific areas in which Cisco believed there were key competitive differentiators between the products. Test results validated include throughput, latency, energy efficiency, stacking, LACP load balancing and Quality of Services (QoS) performance. Miercom found that the Cisco Catalyst 2960-X demonstrated superior performances against the competitive switches in the tests featured in this report.
Tags : 
cisco, miercom, competitive analysis, catalyst switch, wifi, wireless
    
Cisco
Published By: Mimecast     Published Date: Apr 18, 2017
451 Research independent analysts review Mimecast’s Targeted Threat Protection suite of email security services. This report provides detailed descriptions of the various email threat vectors: attachments, links and phishing and how Mimecast email security services work to thwart these attacks. The report covers an overview of the market and specifics on Mimecast services: Impersonation Protect, Attachment Protect, and URL Protect.
Tags : 
email fraud, threat protection, mimecast, cyber security, email security
    
Mimecast
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Im heutigen Zeitalter bahnbrechender digitaler Neuerungen müssen Unternehmen agiler handeln, um Geschäftschancen nutzen zu können. Viele haben dabei auf die Cloud Computing-Technologie gesetzt, da sie darauf ausgerichtet ist, die Agilität zu verbessern, die Skalierbarkeit zu steigern und die Kosten zu senken. Bei der Umstellung auf die Cloud mussten viele Unternehmen aber feststellen, dass das damit verbundene Maß an Sicherheit, Compliance und Leistung ihren Anforderungen nicht in vollem Umfang gerecht wird. Bisher war man zudem allgemein der Meinung, dass eine Public Cloud kostengünstiger als eine Private Cloud ist. Heute wissen wir, dass dies nicht in allen Fällen zutrifft. Kluge Unternehmen haben erkannt, dass Hybrid IT, die sowohl externe als auch lokale Services umfasst, mehr Agilität ermöglicht.
Tags : 
    
Hewlett Packard Enterprise
Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Organizations face onboarding risks of BYOS (Bring Your Own Service) as they hire new employees that bring their own cloud services into the work environment. Risks facing IT and security teams include protecting corporate data and defending against modern threats. While IT and Security teams want to adopt modern cloud applications and increase business agility, they also want to implement visibility and monitoring to protect corporate data and comply to security policies. This session will highlight how new methodologies available today enable organizations to discover sanctioned and un-sanctioned cloud services that are being used within their organization, and how they can apply consistent security policies across the public and private cloud to protect corporate data and conform to compliance policies.
Tags : 
    
Oracle Security Solutions
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Die digitale Transformation ist für mittelständische Unternehmen (100 bis 999 Mitarbeiter) ein absolutes Muss, um im digitalen Umfeld erfolgreich zu sein. Durch eine digitale Transformation können sich Unternehmen mehr Wettbewerbsvorteile verschaffen, indem sie Geschäftsprozesse automatisieren, operative Abläufe effizienter gestalten, Kundenbeziehungen vertiefen und neue Umsatzströme durch Produkte und Services generieren, die auf modernsten Technologien basieren. Die digitale Transformation kann durchaus als Reise gesehen werden, die damit beginnt, dass Unternehmen eine IT-basierte Vision entwickeln. Diese führt dann zu einer datenorientierten Strategie, bei der Analysen im Mittelpunkt stehen. Das Ergebnis solcher Initiativen hängt von der Fähigkeit des Unternehmens ab, Menschen, Prozesse, Plattformen und den Aspekt Governance effizient zu nutzen, um die Geschäftsziele des Unternehmens zu erreichen.
Tags : 
    
Hewlett Packard Enterprise
Published By: MobileIron     Published Date: Feb 15, 2017
The third edition of the Mobile Security and Risk Review is a must read and provides IT security leaders with timely information about the mobile threat landscape and the emerging risks facing their organizations. The report also includes a list of the most popular business apps, Apple VPP and DEP adoption metrics, top blacklisted mobile apps and information about healthcare and financial services industries.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Oct 21, 2016
Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. However, when attacks against users are successful, they can result in the loss of both personal and business data. Download now to learn how to increase your mobile security.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Aug 03, 2016
In this edition we discuss emerging risks, report OS enterprise share, and list the top blacklisted consumer apps. We conclude with our recommendations for enterprises to protect their assets against mobile risks and threats. Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. When attacks against users are successful, they can result in the loss of both personal and business data.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Nov 14, 2017
Traditional identity-based security models cannot secure your business data from the latest mobile-cloud threats, including unsecured devices, unmanaged apps, and unsanctioned cloud services. To keep business data secure in the mobile-cloud world, you need a new security model that checks the state and health of devices, apps, and cloud services before letting them get to your data.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Feb 17, 2015
The personal cloud is the most persistent data loss threat to the enterprise today because many employees use their own cloud services to store work documents. Traditionally, content security solutions functionally link security and storage which requires the migration of work documents to a new content storage repository in order to enforce security policies. This increases complexity by creating more repositories for the enterprise to manage. Most importantly, this approach does not solve the personal cloud problem because individual users continue to store their work documents, for convenience, in cloud services that IT cannot secure.
Tags : 
cloud, mobileiron, mobile, security
    
MobileIron
Published By: Collaborative Consulting     Published Date: Dec 20, 2013
Enabling business value through the Mobile Web requires new thinking as well as a shift in technology. Putting “mobile first” and implementing services-based architectures are among the critical steps. The options are limited only to the imaginations of the designers but must be driven by the user’s context.
Tags : 
collaborative consulting, business value, user expectations, mobile web, service architecture, technology challenges, information technology, program management, software solutions, context and services
    
Collaborative Consulting
Published By: AWS     Published Date: Jul 24, 2019
Add more value to your business Independent Software Vendors (ISVs) are turning to the cloud to modernize their applications and get rid of their commercial database dependencies to improve application performance, lower total cost of ownership (TCO), and reach new customers. DB Best delivers the established processes and technology ISVs need to accelerate the modernization of applications still running on commercial databases to Amazon Aurora. This enables your customers to quickly get up-and-running on the cloud and drive greater business value through Amazon Web Services (AWS). View the webinar to learn how DB Best and AWS enable you to accelerate every stage of your application modernization journey – from evaluating the right migration path for your application, to following a proven and repeatable database migration process, to driving growth and reaching more customers.
Tags : 
    
AWS
Published By: ServiceSource     Published Date: Jun 18, 2019
Market shifts and evolutions over time have brought us to a very unique point in B2B commerce. We’ve rapidly accelerated through several transitions: from a product economy, to the service economy, to the subscription economy, and today, the experience economy. Download the whitepaper to learn how ServiceSource can provide the most comprehensive and streamlined customer journey experience that spans the entire B2B customer lifecycle.
Tags : 
    
ServiceSource
Published By: Mindtree     Published Date: Nov 01, 2016
Learn how to cut costs so you can self-fund growth initiatives. An expert Managed Services guide can help you map a smart path to streamlining processes, outsourcing services and rearchitecting systems. With a customized plan in place, your Managed Services provider can begin to optimize IT and increase efficiencies through continuous improvements. Discover how Managed Services providers: Guarantee savings every year so you can invest in growth opportunities such as digital and analytics Optimize the run-the-business side of IT to accelerate innovation Deliver continuous improvements to productivity, quality and time to market
Tags : 
mindtree, growth initiatives, managed services guide, managed services, analytics
    
Mindtree
Published By: NetApp     Published Date: Sep 11, 2014
"VMware Horizon View is an enterprise-class desktop virtualization solution that delivers virtualized or remote desktops and applications to end users through a single platform. Horizon View is a tightly integrated, end-to-end solution built on the industry-leading virtualization platform, VMware vSphere. Although Horizon View enables levels of availability and agility of desktop services unmatched by traditional PCs, the complexity of deploying and managing thousands of virtual desktops in a VMware environment can be daunting without the right tools. Storage is often the leading cause of end-user performance problems. The NetApp all-flash FAS solution with the FAS8000 platform solves the performance problems commonly found in VDI deployments. In this reference architecture, NetApp tested VMware Horizon View user and administrator workloads to demonstrate how the NetApp all-flash FAS solution eliminates the most common barriers to virtual desktop adoption. The testing covered common
Tags : 
virtualization platform, remote desktop and applications, fas solution, storage utilization
    
NetApp
Published By: NetApp     Published Date: Feb 19, 2015
VMware Horizon View is an enterprise-class desktop virtualization solution that delivers virtualized or remote desktops and applications to end users through a single platform. Horizon View is a tightly integrated, end-to-end solution built on the industry-leading virtualization platform, VMware vSphere. Although Horizon View enables levels of availability and agility of desktop services unmatched by traditional PCs, the complexity of deploying and managing thousands of virtual desktops in a VMware environment can be daunting without the right tools. Storage is often the leading cause of end-user performance problems. The NetApp all-flash FAS solution with the FAS8000 platform solves the performance problems commonly found in VDI deployments. In this reference architecture, NetApp tested VMware Horizon View user and administrator workloads to demonstrate how the NetApp all-flash FAS solution eliminates the most common barriers to virtual desktop adoption. The testing covered common
Tags : 
    
NetApp
Published By: IBM     Published Date: Jul 07, 2015
Through the IBM Network Innovation Centers, IBM brings together networking services and technology capabilities together to demonstrate infrastructure agility.
Tags : 
demonstrations, network innovation, networking solutions, interoperability, manageability, scalability, performance
    
IBM
Published By: SafeNet     Published Date: Jan 14, 2014
The demands for heightened security through the use of multi-factor authentication are pressing, but so is the need to control budgets and give users convenient access to the data and services they need. It is growing increasingly clear that organizations can’t meet these demands with legacy platforms—they need next-generation authentication. This paper examines why this need for next-generation authentication is so vital, and it offers a detailed look at the key characteristics that distinguish these platforms from other alternatives.
Tags : 
authentication, next-generation, cloud computing, internet security, safenet
    
SafeNet
Published By: IBM     Published Date: Sep 30, 2016
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
nucleus, research guidebook, ibm qradar, cloud
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
ibm, nucleus, research guidebook, ibm qradar, cloud
    
IBM
Published By: Mimecast     Published Date: Aug 22, 2017
The right third party solution can ensure that email is protected against advanced cyberattacks and guarantee service availability SLA – all while leveraging your investment in Office 365. But, what are the three key areas of concern around Office 365 email that you should be aware of? Read what Microsoft Office Servers and Services MVP, J. Peter Bruzzese has to say about the key features and functions you need to address security, data assurance and continuity for Office 365 email – and what to look for in a single solution that does it all.
Tags : 
office 365, risk mitigation, geek book, sla, cyberattacks
    
Mimecast
Published By: MuleSoft     Published Date: Jan 16, 2018
The future of financial services is under pressure from profound digital disruption. Across the globe, there are forces, both regulatory and customer-led, that open up the market to new entrants and disrupt what customers are buying — and how. The advent of Open Banking is one major influence, with Open APIs paving the way for third-party developers to build applications and services independently. This whitepaper outlines the challenges facing financial services firms and how a new approach to enterprise integration — API-led connectivity — can help banks and financial services firms not only survive, but thrive in an increasingly competitive future. Download this whitepaper to learn: What financial services firms should do about Open Banking, based on the experiences of the impact of PSD2 in Europe How an API strategy could define the future of financial services How a global bank successfully completed a digital transformation initiative
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Apr 15, 2019
The future of financial services is under pressure from profound digital disruption. Across the globe, there are forces, both regulatory and customer-led, that open up the market to new entrants and disrupt what customers are buying — and how. The advent of Open Banking is one major influence, with Open APIs paving the way for third-party developers to build applications and services independently. This whitepaper outlines the challenges facing financial services firms and how a new approach to enterprise integration — API-led connectivity — can help banks and financial services firms not only survive, but thrive in an increasingly competitive future. Download this whitepaper to learn: What financial services firms should do about Open Banking, based on the experiences of the impact of PSD2 in Europe How an API strategy could define the future of financial services How a global bank successfully completed a digital transformation initiative
Tags : 
    
MuleSoft
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Resource Library