data information

Results 151 - 175 of 892Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Sep 22, 2011
This e-book offers tips and solutions to help you optimize infrastructure, boost development productivity and improve database administrator (DBA) efficiency. With intelligent actions and technologies, you can better manage and deliver the information your company needs-along with cost savings, risk reduction and increased performance-to drive smarter business outcomes.
Tags : 
ibm, data management, dba, productivity, infrastructure, development, productivity, analytical applications, data quality
    
IBM
Published By: IBM     Published Date: Sep 22, 2011
This white paper highlights the performance and scalability potential of InfoSphere DataStage 8.1 based on a benchmark test simulating a data warehouse scenario. The benchmark is designed to use the profiled situation to provide insight about how InfoSphere DataStage addresses key questions customers frequently ask when designing their information integration architecture.
Tags : 
ibm, infosphere, data performance and scalability, customers, datastage, data quality
    
IBM
Published By: Dell Storage     Published Date: Apr 23, 2012
This solution guide describes the Dell HTSS which integrates PV DL2200 running CV Simpana 9 Data & Information Management Software with the Dell NSS and PowerVault ML6000 Tape Libraries to provide a multi-tiered Hierarchical Storage Management system
Tags : 
storage, nas, object storage, tco, dell, long term archive, strategy, cost of ownership, archive, tco, tape, knowledge management, data management, data center
    
Dell Storage
Published By: Voltage Security     Published Date: Sep 28, 2012
Meeting Data Residency and Compliance Challenges in Global Enterprises
Tags : 
data residency, information privacy, patriot ii act, voltage security, business technology
    
Voltage Security
Published By: MedeAnalytics     Published Date: Mar 09, 2012
Put simply, the aim of reporting is to translate or convert data into information. Reporting done well often prompts end-users to raise questions about the business. Analytics fills in the gap, answering the questions raised by reporting, thereby transforming data into insights. Read more to find out how analytics can go beyond reporting to provide actionable recommendations to improve business performance.
Tags : 
analytics, reporting, healthcare, business intelligence, business, hospitals
    
MedeAnalytics
Published By: Intel® Services     Published Date: Aug 12, 2014
As more data becomes available and the demand for better health and fitness information increases, it’s clear that a solid API strategy is needed to integrate these disparate sources while protecting sensitive data.
Tags : 
    
Intel® Services
Published By: GE Healthcare     Published Date: May 12, 2015
Help optimize cardiovascular care with a single database of images and information from virtually anywhere there is an internet connection.
Tags : 
cardiovascular diagnostics, image quality, secure web-based data integration, remote access, it management, business technology, information technology
    
GE Healthcare
Published By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Across industry sectors, the boundaries of the traditional enterprise are blurring, as organizations open up their on-premise data and application functionality to partner organizations, the Web, mobile apps, smart devices and the cloud. APIs (application programming interfaces) form the foundation of this new open enterprise, allowing enterprises to reuse their existing information assets across organizational boundaries.
Tags : 
    
CA Technologies
Published By: Carbonite     Published Date: Apr 09, 2018
Global data deduplication provides important benefits over traditional deduplication processes because it removes redundant data through entire enterprises, not just single devices. Global deduplication increases the data deduplication ratio—the size of the original data measured against the size of the data store after redundancies are removed. This helps reduce the amount of storage required at a time when businesses face exponential storage growth. Chief benefits of global deduplication include: • Reductions in storage of up to 60% • The most optimal deduplication ratio • Enterprise-wide reach • Massive reductions in backup-related WAN traffic By shrinking storage capacity needs, data deduplication can cut storage costs quickly. At the same time, businesses today need to access and utilize their data in real time, making the most recent and relevant information available. By eliminating redundant data, deduplication technology makes it simpler for data to be managed across various b
Tags : 
    
Carbonite
Published By: Juniper Networks     Published Date: Aug 10, 2017
Resistance to change is futile. Financial services are becoming more embedded in the banking customer’s everyday life, driving unprecedented levels of change across the industry. The unfolding digital economy is ushering a new era of technology adoption in banking. From cloud to open banking APIs, these play a defining role in enabling banks to create new digital products and services, refresh the bank branch, find new customer segments, and monetize underutilized data and information assets.
Tags : 
opening banking, api, data, currency, cloud transformation, frictionless banking, business model disruption
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
Interactive Data is a trusted leader in financial information, delivering a comprehensive set of products and services designed to meet the needs of the front, middle, and back offices at some of the largest and most well-known institutions around the world. These clients trust Interactive Data to help support their investment activities and operational workflow through a broad range of offerings.
Tags : 
interactive data, financial services, global network, market data, ethernet switches, low latency, it infrastructure
    
Juniper Networks
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
With the application economy in full swing, more organizations are turning to Continuous Testing and DevOps development practices in order to quickly roll out applications that reflect the ever-changing needs of tech-savvy, experience-driven consumers. Rigorous data they need, in the right formats. This forces teams to postpone their testing until the next sprint. As a result, organizations like yours are increasingly looking for ways to overcome the challenges of poor quality data and slow, manual data provisioning. They are also concerned about compliance and data privacy when using sensitive information for testing. CA Test Data Manager can help you mitigate all these concerns, so you’re positioned to achieve real cost savings.
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
At a Glance Today’s workforce has grown accustomed to using personal technologies that make communication easy and simplify their lives. But many enterprise tools haven’t kept pace. Most current project and portfolio management solutions fail to provide simple ways of performing everyday tasks. They don’t facilitate contextual communication that would help to solve problems, and they lack key functionality: the ability to narrow the focus to relevant data, to drill down for additional information and to efficiently forecast financials and model outcomes. Download this whitepaper now to see how CA PPM brings more value to your business by providing 15 key features that remain unaddressed by other products on the market today.
Tags : 
    
CA Technologies EMEA
Published By: TIBCO Software APAC     Published Date: May 31, 2018
Integration is the lifeblood of today’s digital economy, and middleware is the software layer connecting different applications, services, devices, data sources, and business entities. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT leaders, including chief information officers (CIOs), enterprise/integration architects, integration competency center (ICC)/integration center of excellence (CoE) directors, and digital transformation leaders select a middleware-as-aservice (MWaaS) suite best suited to their specific hybrid integration requirements.
Tags : 
    
TIBCO Software APAC
Published By: Google     Published Date: Oct 26, 2018
The Internet of Things is growing fast: By 2025, IoT devices will transmit an estimated 90 zettabytes of data to their intended targets, according to IDC. Armed with information, businesses can revolutionise everything from fraud detection to customer service. But first, they need an architecture that supports real-time analytics so they can gain actionable insights from their IoT data. Read the complete report sponsored by Google Cloud, and learn how to mitigate key IoT-related challenges.
Tags : 
    
Google
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Finding a strategic partnership with a trusted security expert that can assist you in all the aspects of information security is vital. SecureWorks is a market leader in security that can close the security gap in organisations by evaluating security maturity across an enterprise, help define security strategies and implement and manage security program plans. We are a true strategic partner that can help a CISO embed security at all levels of the organisation.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisation’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept