data direct

Results 126 - 150 of 205Sort Results By: Published Date | Title | Company Name
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity, business technology
    
Entrust Datacard
Published By: Dyn     Published Date: Jan 14, 2015
Read this whitepaper and learn the 5 ways to keeping your network up and your customers happy.
Tags : 
infrastructure, disaster planning, data center, ttl, monitoring, redirect traffic, server health, business intelligence, time to live
    
Dyn
Published By: CA Technologies     Published Date: Jan 14, 2015
In the past, Enterprise IT managed the back of?ce…the data center…the systems that kept the business running. Today, there is a mandate for IT to adopt a new role—one that speaks a common language with the business. This new IT mans the storefront, interacts directly with customers and thinks beyond uptime metrics to give equal consideration to cost, spend, quality and consumption.
Tags : 
enterprise it, metrics, cost, quality and consumption, front office, it management, enterprise applications
    
CA Technologies
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation
Published By: ClearStory     Published Date: Oct 07, 2014
Why be bogged down by different analysis solutions for different data types and sources, when a single solution can give you direct access and blending, of all your data, wherever it is? Get the paper and find out more.
Tags : 
data harmonization, analysis solutions, data types, collaboration, data management, data center
    
ClearStory
Published By: SuccessFactors     Published Date: Sep 19, 2014
This white paper focuses on communicating metrics to the board of directors.
Tags : 
workforce data, views on workforce management data, effective workforce management metrics
    
SuccessFactors
Published By: SuccessFactors     Published Date: Sep 19, 2014
This white paper focuses on communicating metrics to the board of directors.
Tags : 
workforce data, views on workforce management data, effective workforce management metrics
    
SuccessFactors
Published By: NEC     Published Date: Aug 12, 2014
Server virtualization is revolutionizing the datacenter by making applications mobile, increasing application uptime, and allowing IT admins to allocate computing resources more efficiently. The technology has been deployed widely enough that the role of the computer server has evolved from directly hosting operating systems and applications to hosting fully virtualized environments. Server that can support more virtualized machines (VMs - complete application stacks) allow their users to gain higher return on their IT investments. Private Cloud can extend the virtualization benefits in ways that broaden the benefits of virtualization to all parts of the organization. In this white paper, you will learn how Corporate IT uses these tools to meet the increasing demand for IT services.
Tags : 
tier 1, cloud, machines, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor, enterprise applications, data quality
    
NEC
Published By: DATAVERSITY     Published Date: Jul 24, 2014
Will the “programmable era” of computers be replaced by Cognitive Computing systems which can learn from interactions and reason through dynamic experience just like humans? With rapidly increasing volumes of Big Data, there is a compelling need for smarter machines to organize data faster, make better sense of it, discover insights, then learn, adapt, and improve over time without direct programming. This paper is sponsored by: Cognitive Scale.
Tags : 
data, data management, cognitive computing, machine learning, artificial intelligence, research paper
    
DATAVERSITY
Published By: Success Factors     Published Date: Jul 10, 2014
Technology plays an integral role in enabling businesses to have access to insightful analytics. By providing metrics on core workforce facts, workforce financials, productivity and performance, talent development and succession and human capital risk, companies are able to identify those 10- 15 metrics most important to business goals. This will enable them to present the Board of Directors with a comprehensive and concise story of workforce capabilities. The best place, we suggest, is with expert, practical guidance. Download this informative resource.
Tags : 
success factors, workforce data, boardroom, metrics, workforce facts, workforce financials, hr metrics, tecnhology
    
Success Factors
Published By: Success Factors     Published Date: Jul 08, 2014
Technology plays an integral role in enabling businesses to have access to insightful analytics. By providing metrics on core workforce facts, workforce financials, productivity and performance, talent development and succession and human capital risk, companies are able to identify those 10- 15 metrics most important to business goals. This will enable them to present the Board of Directors with a comprehensive and concise story of workforce capabilities. The best place, we suggest, is with expert, practical guidance. Download this informative resource.
Tags : 
success factors, workforce data, boardroom, metrics, workforce facts, workforce financials, hr metrics, tecnhology
    
Success Factors
Published By: MemSQL     Published Date: Jun 25, 2014
Emerging business innovations focused on realizing quick business value on new and growing data sources require “hybrid transactional and analytical processing” (HTAP), the notion of performing analysis on data directly in an operational data store. While this is not a new idea, Gartner reports that the potential for HTAP has not been fully realized due to technology limitations and inertia in IT departments. MemSQL offers a unique combination of performance, flexibility, and ease of use that allows companies to implement HTAP to power their business applications.
Tags : 
    
MemSQL
Published By: Schneider Electric     Published Date: Jun 04, 2014
70% of data center outages are directly attributable to human error according to the Uptime Institute’s analysis of their “abnormal incident” reporting (AIR) database1. This figure highlights the critical importance of having an effective operations and maintenance (O&M) program. This paper describes unique management principles and provides a comprehensive, high-level overview of the necessary program elements for operating a mission critical facility efficiently and reliably throughout its life cycle. Practical management tips and advice are also given.
Tags : 
schneider, electric, data, center, facility, operations, maintenance, management, it management, knowledge management, business technology, data center
    
Schneider Electric
Published By: HP     Published Date: May 14, 2014
As a long-time leader in data protection and backup solutions, and with innovations such as HP StoreOnce deduplication, HP TapeAssure and HP StoreOpen with LTFS, HP understands your immediate requirements and strategic business direction. With an integrated approach to comprehensive business protection, we can help you safeguard the integrity of your data and rapidly restore access whenever, wherever, and however you need it.
Tags : 
hewlett packard, data protection, storeonce, tapeassure, ltfs, it management, data management
    
HP
Published By: Sage     Published Date: Mar 26, 2014
Spreadsheets have become one of the most prevalent software applications used by businesses. They are used for everything from simple calculations to impromptu databases. While inherently useful, spreadsheets are frequently used for tasks in which they are ill-suited. In fact, too many companies overlook the importance of accurate fixed asset tracking and rely on spreadsheets to track value, depreciation, and tax calculations. Unwittingly, this results in the direct loss of money and time.
Tags : 
sage, fixed assets, spreadsheets, tax payments, sarbanes-oxley, depreciation, tracking, planning, reporting, business intelligence, business technology
    
Sage
Published By: Progress Software     Published Date: Mar 12, 2014
This paper demonstrates how Progress DataDirect Connect helps you accelerate your business by paving the way for operational excellence, customer satisfaction, revenue growth, profitability and market leadership.
Tags : 
progress software, connectivity, isv, datadirect connect, customer satisfaction, software development, data management, business technology, data center
    
Progress Software
Published By: Progress Software     Published Date: Mar 12, 2014
For IT managers, choosing the wrong vendor can lead to disruption, high costs, and the loss of confidence from within the business. Learn how to de-risk your vendor selections by aligning with market trends.
Tags : 
progress software, choosing vendors, datadirect, connectivity, saas applications, big data, data warehousing, nosql, newsql, and non-relational databases, networking, software development, it management, data management, data center
    
Progress Software
Published By: Progress Software     Published Date: Mar 12, 2014
Big data and cloud data are still hurling outward from the “big bang.” As the dust settles, competing forces are emerging to launch the next round of database wars—the ones that will set new rules for connectivity. Progress® DataDirect Cloud™ is well positioned to help organizations establish data control amid the chaos. How? Information workers at all levels require easy access to multiple data sources. With a premium cloud based connectivity service, they can count on a single, standardized protocol to inform their most business critical applications.
Tags : 
progess software, datadirect, big data, cloud computing, connectivity, data management, cloud data, database wars, networking, software development, it management
    
Progress Software
Published By: Riverbed     Published Date: Jan 28, 2014
Forrester benchmark data on current state of application availability and performance within the enterprise. In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services. Read the report to learn the key findings of this study.
Tags : 
riverbed, forrester consulting, application performance management, application availability, enterprise, it transactions, business services, business-critical applications, proactive performance management, lowering operational costs, it efficiency, meaningful alerts, proactive alerting, root-cause identification, end user experience monitoring, wan optimization technologies, networking, it management, knowledge management, enterprise applications
    
Riverbed
Published By: Oracle     Published Date: Jan 22, 2014
More than ever, marketers are being held accountable for demonstrating how marketing investments directly translate into sales. That’s why Modern Marketing is fueled by intelligent data analytics and reporting. Implementing the proper analytics systems can help you make critical decisions regarding which parts of your marketing efforts are working or not, and provide the reporting tools necessary to justify those decisions by connecting them directly with pipeline and revenue. By implementing systems for reporting and intelligence, you can better understand the impact that sales and marketing efforts are having on overall business. You then can refine strategies and develop repeatable processes for success.
Tags : 
analytics, modern marketing, tenants, customer journey, segmentation, lead generation, eloqua, oracle
    
Oracle
Published By: Oracle     Published Date: Jan 22, 2014
More than ever, marketers are being held accountable for demonstrating how marketing investments directly translate into sales. That’s why Modern Marketing is fueled by intelligent data analytics and reporting. Implementing the proper analytics systems can help you make critical decisions regarding which parts of your marketing efforts are working or not, and provide the reporting tools necessary to justify those decisions by connecting them directly with pipeline and revenue. By implementing systems for reporting and intelligence, you can better understand the impact that sales and marketing efforts are having on overall business. You then can refine strategies and develop repeatable processes for success.
Tags : 
analytics, modern marketing, tenants, customer journey, segmentation, lead generation, eloqua, oracle
    
Oracle
Published By: Oracle     Published Date: Jan 21, 2014
More than ever, marketers are being held accountable for demonstrating how marketing investments directly translate into sales. That’s why Modern Marketing is fueled by intelligent data analytics and reporting. Implementing the proper analytics systems can help you make critical decisions regarding which parts of your marketing efforts are working or not, and provide the reporting tools necessary to justify those decisions by connecting them directly with pipeline and revenue. By implementing systems for reporting and intelligence, you can better understand the impact that sales and marketing efforts are having on overall business. You then can refine strategies and develop repeatable processes for success.
Tags : 
analytics, modern marketing, tenants, customer journey, segmentation, lead generation, eloqua, oracle
    
Oracle
Published By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security, wireless security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept