domains

Results 1 - 25 of 49Sort Results By: Published Date | Title | Company Name
Published By: IDERA     Published Date: Nov 07, 2017
Increasing dependence on enterprise-class applications has created a demand for centralizing organizational data using techniques such as Master Data Management (MDM). The development of a useful MDM environment is often complicated by a lack of shared organizational information and data modeling. In this paper, David Loshin explores some of the root causes that have influenced an organization’s development of a variety of data models, how that organic development has introduced potential inconsistency in structure and semantics, and how those inconsistencies complicate master data integration.
Tags : 
    
IDERA
Published By: Zynapse     Published Date: Sep 10, 2010
A whitepaper by Ventana Research discusses the need to combine business and technology in a unified approach for MDM implementations in diverse areas.
Tags : 
zynapse, erp projects, data information, data management, governance, mdm, master data management, odm, business intelligence, database development, data integration
    
Zynapse
Published By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
    
Cisco
Published By: Jonckers Translation & Engineering     Published Date: May 27, 2011
Download this case study now to see how Jonckers Translation & Engineering was able to help this customer meet its localization objectives.
Tags : 
jonckers, translation & engineering, asian languages, arabic, icann
    
Jonckers Translation & Engineering
Published By: Intel     Published Date: May 15, 2017
The intent of this document is to help customers who are interested in implementing security protection mechanisms in Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) domains.
Tags : 
software-defined wan, security, network functions virtualization, nfv, wide area network, intel
    
Intel
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Attacks have many phases. Before launching, the attacker needs to stage internet infrastructure to support each phase. Two early phases are to redirect or link to a malicious web domain or send a malicious email attachment. For the former, most attacks leverage exploit kits (e.g. Angler) as the first stage before dropping the final payload. Cisco Umbrella effectively blocks initial exploit and phishing domains. Unlike appliances, our cloud security platform protects devices both on and off the corporate network. Unlike agents, the DNS layer protection extends to every device connected to the network — even IoT. Umbrella truly is the easiest and fastest layer of security to deploy everywhere. Download today to find out more.
Tags : 
    
Cisco Umbrella EMEA
Published By: Boardwalktech     Published Date: Jun 05, 2018
Blockchain is reimagining the way enterprises operate. It’s a powerful new enterprise technology that can be used across vertical and application domains to realize greater efficiency, support new business models and revenue sources, and enhance the security and elevate the trust of enterprise transactions.
Tags : 
    
Boardwalktech
Published By: Proofpoint     Published Date: May 30, 2018
Email fraud is rife – business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email attacks are also preventable. Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains. Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block fraudulent emails before they reach your employees, customers and business partners. Protect your email ecosystem from today’s advanced email threats including business email compromise (BEC) and consumer phishing. Proofpoint Email Fraud Defence gives you the visibility, toolset and services needed to authorise legitimate email senders and block fraudulent messages before they reach the inbox.
Tags : 
    
Proofpoint
Published By: CA Technologies     Published Date: Jun 04, 2015
The research shows DevOps delivers 18% faster time-to-market and 19% better app quality/performance. The application economy is motivating leaders to make critical changes across IT and the business, one of the most significant being the adoption of DevOps. For enterprise IT organizations who need to accelerate delivery of apps and provide customers with higher-quality software, faster, DevOps–with its focus on collaboration across IT domains from development to delivery–is increasingly the answer.
Tags : 
    
CA Technologies
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Upon issuance, all SSL digital certificates have a finite lifespan and are no longer recognized as valid upon expiration. Certificates may have varying periods of validity and are often set to expire anywhere between one and five years based on company policy and/or cost considerations. This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
entrust, ssl, certificates, security, professionals, management, lifecycle, certificate, issues, holes, verification, applications, domains, audit, scan, systems, policies, monitor, inventory, business technology
    
Entrust Datacard
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
New functionality in BIG-IP v10--such as resource provisioning and route domains--coupled with existing administrative domain capabilities enables IT to virtualize application delivery functions across departments. Sharing the investment in a unified application delivery solution across business constituents increases the return on investment while reducing the complexity inherent in managing multiple devices.
Tags : 
big-ip, big-ipv10, resource, functionality, domain, administrative, application, function, investment, delivery, solution, business, technology, roi, management, enterprise applications
    
F5 Networks Inc
Published By: IBM     Published Date: May 29, 2008
IBM Multiform Master Data Management manages master data domains - customers, accounts, products - that have significant impact on the most important business processes and realize the promise of Service Oriented Architecture (SOA). IBM is the only vendor that delivers an integrated MDM product with significant out-of-the-box functionality for each MDM usage style - collaborative, operational and analytical - across multiple data domains, thereby managing the complete data lifecycle.
Tags : 
data management, mdm, data lifecycle, master data management, data integration
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
Take a business-level view of security and risk management, so you can prioritize security activities and focus on those that make the most strategic sense. With this white paper, learn to direct resources to mitigate risk and costs.
Tags : 
ibm, security, risk domains, cyber security industry alliance, network, server and end point, it security
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and more!
Tags : 
ibm iss x-force threat and risk report, ibm, web-related security threats, spam and phishing, malware, cvss, top vendor list, web application vulnerabilities, sql injection attacks, web browser exploitation, browser and plug-in vulnerabilities, activex, url spam, domains, international distribution of spam
    
IBM
Published By: Sponsored by HP and Intel®     Published Date: May 10, 2013
Thanks to the emergence of cloud computing, it’s no longer possible for IT departments to be just a builder and manager of technology; you must also now be a broker of IT services across the enterprise. Consequently, you need to design an IT environment that offers the flexibility, efficiency, and security to meet these expectations and aligns services with business needs. This is a task that’s best achieved by striking a balance among IT domains, spanning traditional internal IT, private, and public cloud environments. But how do you achieve the right IT balance for delivering cloud services? Read this white paper to find out. To Learn about the HP Discover 2013 event in Las Vegas, click here: http://bit.ly/PTt3yD Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
it environment, cloud, all about service, it departments, it services
    
Sponsored by HP and Intel®
Published By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
    
Centrify Corporation
Published By: Neustar Registry     Published Date: Oct 03, 2011
A brand Top-Level Domain is the next Internet shift. Learn the four benefits of TLDs that every marketer needs to know: campaign management, brand trust, SEO and ROI, and build & protect my brand.
Tags : 
domain, domains, domain names, new tlds, ntlds, brand marketing, campaign management, cmo, "chain of trust, " domain names, search results, natural search, search engine, web traffic, company reputation, marketing, brand affinity, counterfeit protection, neustar, registry
    
Neustar Registry
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
SANS conducted this survey to explore how organizations are handling prevention. Breaking down possible preventive measures into four major categories or domains (business, architectural design and development, operational, and technology), the survey sought to answer three major questions: 1. What measures have respondents implemented that they believe will prevent breaches? 2. What measures not necessarily implemented do respondents consider preventive? 3. What barriers have stopped respondents from doing what they should be doing?
Tags : 
    
Palo Alto Networks
Published By: Oracle     Published Date: Apr 28, 2014
Perfect order fulfillment requires companies to have seamless integration of all supply chain execution (SCE) including, logistics processes from manufacturing, transportation, warehouse, global trade to mobile and RFID. Recent research from Gartner reveals that most supply chain organizations continue to operate as functional silos – warehousing, transportation and manufacturing – with minimal, if any, process integration and synchronization between execution silos. The Gartner Research report provides key insights into how supply chain and IT leaders can transform logistics by breaking down functional silos, and designing business processes that span, optimize and synchronize across traditional functional domains.
Tags : 
oracle, logistics, value chain execution, silos
    
Oracle
Published By: SAS     Published Date: Mar 06, 2018
For data scientists and business analysts who prepare data for analytics, data management technology from SAS acts like a data filter – providing a single platform that lets them access, cleanse, transform and structure data for any analytical purpose. As it removes the drudgery of routine data preparation, it reveals sparkling clean data and adds value along the way. And that can lead to higher productivity, better decisions and greater agility. SAS adheres to five data management best practices that support advanced analytics and deeper insights: • Simplify access to traditional and emerging data. • Strengthen the data scientist’s arsenal with advanced analytics techniques. • Scrub data to build quality into existing processes. • Shape data using flexible manipulation techniques. • Share metadata across data management and analytics domains.
Tags : 
    
SAS
Published By: Salesforce.com     Published Date: Apr 26, 2007
This paper summarizes the key ingredients for a successful on-demand implementation. Find out how you can benefit from the knowledge gained by the Salesforce.com Global Services organization, as outlined in the seven domains described in this paper.
Tags : 
salesforce, salesforce crm, crm, customer relationship management, mobile, saas, sales tools, best practices
    
Salesforce.com
Published By: IBM     Published Date: Apr 18, 2017
Are you looking to add new data domains or solve new business problems? IBM InfoSphere MDM comprises a complete MDM suite with multi-domain MDM capabilities and built-in domain patterns. IBM offers several editions of InfoSphere MDM, each designed to integrate with your existing architectures and business processes. You can choose the platform that best meets your immediate and long-term needs.
Tags : 
cloud data, online marketing, customer acquisition, mobile marketing, social marketing, data warehouse, data storage, data collection
    
IBM
Published By: Astrocom     Published Date: Apr 23, 2008
The Domain Name System (DNS) is a hierarchical system that provides the IP addresses that correspond to a given Fully Qualified Domain Name (FQDN, often called a hostname or domain name). At the top of the tree structure are thirteen “root” Domain Name Servers that have the primary and secondary IP addresses of the DNS Authorities for all domains on the Internet.
Tags : 
dns, ip networks, networking, network management, powerlink, astrocom
    
Astrocom
Published By: IBM     Published Date: May 09, 2014
Agile methods have a reputation for being fast and adaptive and can enhance both quality and team productivity. For these reasons they are attractive to software teams in many different domains - including safety-critical systems development. But how can agile methods be adapted to meet the needs of such a challenging domain? In the fourth episode of the series, IBM Rational Chief Evangelist, Bruce Powel Douglass discusses how agile practices can be adapted to meet the evidence needs of safety-critical projects.
Tags : 
ibm, agile development, agile methods, safety critical systems development, project management, product development, productivity, qa quality assurance, testing, evidence oriented practices, software development
    
IBM
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection, data management
    
Cisco
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept