enterprise

Results 1 - 25 of 6518Sort Results By: Published Date | Title | Company Name
Published By: Workday UK     Published Date: Sep 18, 2018
Read this whitepaper from CIO.com to understand why cloud architecture holds the most promise for today’s organisations and to gain valuable tips for evaluating cloud solutions.
Tags : 
    
Workday UK
Published By: Workday UK     Published Date: Sep 18, 2018
Get key takeaways for large enterprises from this February 2018 Workday-commissioned study conducted by Forrester Consulting. Learn what’s driving the need for a more frequent performance review cycle and how technology can help.
Tags : 
    
Workday UK
Published By: Workday     Published Date: Sep 18, 2018
Get key takeaways for large enterprises from this February 2018 Workday-commissioned study conducted by Forrester Consulting. Learn what’s driving the need for a more frequent performance review cycle and how technology can help.
Tags : 
    
Workday
Published By: Workday     Published Date: Sep 17, 2018
Get key takeaways for large enterprises from this February 2018 Workday-commissioned study conducted by Forrester Consulting. Learn what’s driving the need for a more frequent performance review cycle and how technology can help.
Tags : 
    
Workday
Published By: Workday     Published Date: Sep 17, 2018
Read this whitepaper from CIO.com to understand why cloud architecture holds the most promise for today’s organisations and to gain valuable tips for evaluating cloud solutions.
Tags : 
    
Workday
Published By: Entrust Datacard     Published Date: Sep 14, 2018
With more and more dependency on mobile and cloud, digital enablement is key to business success. Now IT has an increased impact on how to drive strategy and implementation to reach business goals. But the reality of distributed applications and connected devices has introduced new security challenges. To secure information and provide users seamless access to data, you need to reevaluate your approach to authentication. You need a modern authentication solution that is agile and secure, enabling your digital transformation. This buyer's guide will help you determine whether a cloud-based multi-factor authentication solution is right for your organization and details the top features to look for in an authentication solution to securely enable your digital transformation. Download the Cloud-Based Authentication Buyer’s Guide — to learn more.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Sep 14, 2018
Are you trying to secure cloud applications, while reducing user friction? With the right technology, IT/Security professionals can empower employees to work securely and efficiently anywhere, anytime. Office 365 is the world’s most used enterprise cloud application, but it’s just one of many applications and services a company might need to authenticate. This white paper explores the widespread use of Office 365, what that means from a security perspective and how a cloud-based authentication solution can enable single sign on for Office 365 and a range of other business-critical services and applications. Learn how to achieve high assurance with a solution that is invisible to your users when you download the white paper, Secure SSO to Office 365 and Other Cloud Applications with a Cloud-Based Authentication Solution.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Sep 14, 2018
Digital is changing the face of business, and your security needs are evolving along with it. The widespread adoption of technologies and applications like mobile, VPN and Office 365 have enabled your users a more frictionless work experience. But how can you ensure those experiences are also secure? Forrester recently surveyed 100 IT and security executives to understand their current approaches to user authentication and access management. Check out the 2018 Forrester Opportunity Snapshot — Modern Authentication Methods Protect and Enable study to learn what authentication methods other companies are using and which of these methods are most effective.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: Workday     Published Date: Sep 14, 2018
Enterprise software upgrades have traditionally been a real headache. But do they have to be? See how the experience of a major application upgrade process differs for two CIOs—one using on-premise software and one using Workday.
Tags : 
    
Workday
Published By: Workday     Published Date: Sep 14, 2018
Cloud implementation, integration and delivery once again topped the National State Chief Information Officer’s list of priorities facing state CIOs in 2018. The same is true on the local government side of the equation, with organizations pursuing infrastructure-as-a-service and platform-as-a-service models. However, now that those deployments are being realized, governments are looking for more opportunities to reap the cost-savings, flexibility and scalability of cloud environments.
Tags : 
    
Workday
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
CA Privileged Access Manager protects an organization’s business and empowers its people. The solution protects critical accounts and endpoints while providing a seamless user experience. CA commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and objectively examine the potential return on investment (ROI)enterprises may realize by deploying its Privileged Access Manager solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the CA Privileged Access Manager solution on their organizations
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
At A Glance The misuse or takeover of privileged accounts constitutes the most common source of breaches today. CA Threat Analytics for PAM provides a continuous, intelligent monitoring capability that helps enterprises detect and stop hackers and malicious insiders before they cause damage. The software integrates a powerful set of user behavior analytics and machine learning algorithms with the trusted controls provided by CA Privileged Access Manager (CA PAM). The result is a solution that continuously analyzes the activity of individual users, accurately detects malicious and high-risk activities and automatically triggers mitigating controls to limit damage to the enterprise.
Tags : 
    
CA Technologies EMEA
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
Complete enterprise security requires coordination. Firms must integrate the technologies and data that come from the endpoint and network layers to make accurate decisions that ensure optimal threat detection, containment, and remediation. Unfortunately, too many firms rely on a huge variety of solutions that require manual integration and correlation, leading to wasted time and poor threat detection. Security leaders must automate these processes to eliminate detection lag and improve prevention efforts.
Tags : 
    
Cisco DWA Security
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
NSS Labs performed an independent test of the Cisco AMP for Endpoints v6.0.5. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v2.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com. As part of the initial AEP test setup, products were configured in a deployment mode typical to enterprises. As such, products were configured to mimic an enterprise environment by applying typical applications such as exclusion policies and tuning requirements. All product-based configurations are reviewed, validated, and approved by NSS prior to the test. Every effort is made to ensure optimal security effectiveness, as would be the aim of a typi
Tags : 
    
Cisco DWA Security
Published By: Erwin     Published Date: Sep 13, 2018
Do you know what data you have, where it is and how to wring all the possible value from it? By harmonizing your data management and data governance efforts, you can accelerate your time to data preparation, data visibility and data-driven insights. Then you’ll know how to get the results you need.
Tags : 
    
Erwin
Published By: Databricks     Published Date: Sep 13, 2018
Learn how to get started with Apache Spark™ Apache Spark™’s ability to speed analytic applications by orders of magnitude, its versatility, and ease of use are quickly winning the market. With Spark’s appeal to developers, end users, and integrators to solve complex data problems at scale, it is now the most active open source project with the big data community. With rapid adoption by enterprises across a wide range of industries, Spark has been deployed at massive scale, collectively processing multiple petabytes of data on clusters of over 8,000 nodes. If you are a developer or data scientist interested in big data, learn how Spark may be the tool for you. Databricks is happy to present this ebook as a practical introduction to Spark. Download this ebook to learn: • Spark’s basic architecture • Why Spark is a popular choice for data analytics • What tools and features are available • How to get started right away through interactive sample code
Tags : 
    
Databricks
Published By: CA Technologies EMEA     Published Date: Sep 12, 2018
To compete successfully in today’s economy, companies from all industries require the ability to deliver software faster, with higher quality, and reduced risk and costs. This is only possible with a modern software factory that can deliver quality software continuously. Yet for most enterprises, testing has not kept pace with modern development methodologies. A new approach to software testing is required: Continuous Testing. In the first session in a series, join product management leadership to gain in-depth insights on how by shifting testing left, and automating all aspects of test case generation and execution, continuous testing, it enables you to deliver quality software faster than ever. Recorded Feb 5 2018 49 mins Presented by Steve Feloney, VP Product Management CA Technologies
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: Epicor Software Corporation     Published Date: Sep 11, 2018
This report outlines the reasons that organizations choose not to upgrade ERP solutions, and cautions against this approach, by supplying research that illustrates the benefits of keeping your ERP current and up-to-date.
Tags : 
erp solutions, cloud erp, global supply chain, enterprise applications, business process automation, enterprise resource planning, financial systems
    
Epicor Software Corporation
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Suddenly, the network is cool again. Tech trends such as the Internet of Things, software-defined networking and growing end-user expectations all add up to a demand for “dialtone” network performance and reliability. But as the data deluge continues to accelerate, and as organizations continue to rely on multiple clouds to achieve business goals, how can the network keep up, much less meet tomorrow’s demands? This e-book looks at the trends that are impacting the enterprise network—the modern network—the issues it creates for NetOps professionals, and how organizations can act today to plan for tomorrow.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The advent of cloud computing and software-defined data center architectures for modern application delivery has made networking more sensitive than ever before. Applications in the digital age require networks that can expand and contract dynamically based on consumer demand. Enterprises are implementing software-defined networking (SDN) to deliver the automation required by these new environments, but the dynamic nature of SDN makes network management and monitoring fundamentally more challenging. Network infrastructure teams need monitoring tools that can provide visibility into these new and constantly changing networks. This white paper explores the importance of SDN monitoring and examines a leading example of a solution, CA Performance Management with CA Virtual Network Assurance integration.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
At a Glance Today’s workforce has grown accustomed to using personal technologies that make communication easy and simplify their lives. But many enterprise tools haven’t kept pace. Most current project and portfolio management solutions fail to provide simple ways of performing everyday tasks. They don’t facilitate contextual communication that would help to solve problems, and they lack key functionality: the ability to narrow the focus to relevant data, to drill down for additional information and to efficiently forecast financials and model outcomes. Download this whitepaper now to see how CA PPM brings more value to your business by providing 15 key features that remain unaddressed by other products on the market today.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
In too many organizations today, innovation isn’t happening fast enough. Within these businesses, skills are siloed and resources are misaligned. As businesses seek to speed innovation and meet their growth and revenue targets, they have to get maximum utility out of all their investments—including in the areas of IT infrastructure, product development and human resources. This buyer’s guide is intended to help those decision makers tasked with making this critical buying decision—focusing on the characteristics that help enterprises address both their immediate and long term needs. This guide shows how leveraging a PPM platform that delivers both top-down, strategic portfolio management, as well as bottom-up project management capabilities, helps organizations maximize their ROI over the long term.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
The ‘80s Called… … And they don’t want their enterprise Project and Portfolio Management (PPM) tools back. If your Project Management Office (PMO) is still relying on the same or similar processes and systems used when neon and mullets were trending, it will never keep pace with today’s market demands or shifts in technology. Six-month deployment schedules and command and control models of yesteryear are actively being replaced with continuous delivery methods and practices like agile and lean—all in the interest of driving greater customer engagement.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Reconstructing resource management tools to simplify tasks, drive collaboration and facilitate action. People who use technologies at home expect the same ease of use and intuitiveness for the tools they use in the workplace. But enterprise tools aren’t keeping up with the pace of change. Many product and portfolio management (PPM) solutions force resource managers to create entire workflows or navigate through multiple screens just to see the fundamental component of resource management—what their people are working on. Resource managers also cite shortcomings such as no simple way to perform everyday tasks, communicate in context with others, drill down into key information, narrow the field of resources and forecast financials and model outcomes.
Tags : 
    
CA Technologies EMEA
Published By: Group M_IBM Q4'18     Published Date: Sep 10, 2018
IBM LinuxONE™ is an enterprise Linux server engineered to deliver cloud services that are secure, fast and instantly scalable. The newest member of the family, IBM LinuxONE Emperor™ II, is designed for businesses where the following may be required: • protecting sensitive transactions and minimizing business risk • accelerating the movement of data, even with the largest databases • growing users and transactions instantly while maintaining operational excellence • accessing an open platform that speeds innovation
Tags : 
    
Group M_IBM Q4'18
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.