bi solutions

Results 1051 - 1075 of 1079Sort Results By: Published Date | Title | Company Name
Published By: CBRE     Published Date: Aug 02, 2017
MobileIron Access Overview
Tags : 
mobileiron, access, software solutions
    
CBRE
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : 
(delete)mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Published By: IBM     Published Date: Oct 16, 2017
This white paper examines how some of the ways organizations use big data make their infrastructures vulnerable to attack. It presents recommended best practices organizations can adopt to help make their infrastructures and operations more secure. And it discusses how adding advanced security software solutions from IBM to their big-data environment can fill gaps that big-data platforms by themselves do not address. It describes how IBM® Security Guardium®, an end-to- end solution for regulatory compliance and comprehensive data security, supports entitlement reporting; user-access and activity monitoring; advanced risk analytics and real-time threat detection analytics; alerting, blocking, encryption and other data protection capabilities, as well as automated compliance workflows and reporting capabilities, to stop threats.
Tags : 
security, big data, ibm, data protection
    
IBM
Published By: Lookout     Published Date: Dec 13, 2016
Get all of your questions about enterprise mobile security, threats, and solutions answered in this essential guide.
Tags : 
mobile security, mobile device management, identity management, network attacks, malicious apps
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2017
In the past year, Gartner has provided guidance on the differences between Enterprise Mobility Management (EMM) and mobile security solutions. The excerpts below highlight some key takeaways from recent Gartner research, and Lookout encourages organizations to read the full reports to learn more.
Tags : 
insights, mobile, emm, security, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
insights, mobile, security, byod, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 28, 2017
It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used. Gradually add MTD systems to the organization to mitigate attacks, emphasizing integration, and avoid long-term contracts.
Tags : 
mobile, threat, defense, lookout, mtd
    
Lookout
Published By: Lookout     Published Date: Mar 29, 2017
Read the Gartner report for an overview of the mobile threat defense market (MTD), including detailed reviews, analyses, and recommendations and an assessment of 17 leading MTD vendors.
Tags : 
gartner, mobile, threat, defense, solutions, lookout
    
Lookout
Published By: Lookout     Published Date: Mar 30, 2018
Mobile security presents one of the federal government’s biggest information technology challenges. Read the Lookout report to learn about the greatest risks, current security solutions, and the future for BYOD.
Tags : 
    
Lookout
Published By: Progress     Published Date: Jan 06, 2017
Digitalization brings both new opportunities and confusion to even the most carefully planned selection processes for WCM. CIOs and IT leaders aiming to boost the effectiveness of their digital business strategy should use this document to help them select the most appropriate vendor and solution. Gartner Magic Quadrant reports are the standard of excellence for vendor evaluation, research and reporting. While many vendors are evaluated, only a select few meet the stringent criteria for inclusion. Continuing its long-standing tradition, Gartner has released the 2016 Magic Quadrant for Web Content Management (WCM). Progress is recognized as a “Challenger” in this year's report, based on a combination of completeness of vision and ability to execute. This is the third consecutive inclusion for the company's award-winning web content management and digital experience solutions. Web content management is an integral piece to any successful digital transformation strategy. In our minds t
Tags : 
    
Progress
Published By: Fujitsu     Published Date: Feb 01, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. Devices such as computers and tablets make these tactics possible. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in today’s digital world, everything they do may be recorded and posted online. Intel inside, powerful productivity outside.
Tags : 
technology, mobile, safety, security, tablet, solutions, fujitsu
    
Fujitsu
Published By: Juniper Networks     Published Date: Jun 22, 2017
Juniper’s security solutions seamlessly extend across private and public cloud architectures without compromising security, flexibility, and manageability. With midrange, high-performance, space-efficient, next-generation firewalls, smarter and faster centralized management, and highly evolved security intelligence and automation tools, Juniper Networks allows you to secure your network, keep operational costs down, and easily migrate to a hybrid cloud architecture. For more information about Juniper’s security solutions, please visit us at www.juniper.net/us/en/products-services/security and contact your Juniper Networks representative.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Juniper Networks
Published By: Juniper Networks     Published Date: Jun 29, 2017
The ongoing success of 7ticks depends on having an IT infrastructure that adapts and scales to unforgiving reliability, performance, and transparency requirements. To support the torrid growth of data, 7ticks needed to expand the IP/MPLS network connecting its data centers to 40 Gbps—and have an immediate path to 100 Gbps and beyond. Within its data centers, 7ticks needed network and security solutions that would keep pace—and would simplify service management and support automation. “Our biggest challenge is performance at scale,” says Scott Caudell, founder of the 7ticks business and vice president of IT infrastructure at Interactive Data. “IT is our business. The 7ticks infrastructure helps customers get a lower time to market and faster execution speeds at a cost that’s sustainable for their businesses.”
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
Facing the future requires enterprises to embark on a digital transformation, employing new technologies such as AI, big data, IoT, and the cloud. Enterprises need a long-term, trusted partner who will support them on their journey and understand their vision. Switch to Juniper Networks and align your enterprise with an innovation leader that places scalable solutions, high availability, productivity, security, and R&D at the forefront, all while keeping simplicity and savings in mind.
Tags : 
security, switching, routing, operating system, secure network, sdsn, solutions
    
Juniper Networks
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
Dassault Systèmes' has been named by Gartner, Inc. as a “Leader” in its 2017 Magic Quadrant for Manufacturing Execution Systems. 2017 is the first year for the Gartner Magic Quadrant for MES, which specifically covered the MES market, including MOM applications. Because of our position as a Leader in the Gartner Magic Quadrant we believe it confirms the positive response we are receiving on our vision and ability to execute the transformation of manufacturing. We also believe we are being recognized for our unique and holistic approach to MOM / MES and the greater transformative value that digital continuity with DELMIA has across manufacturing engineering, manufacturing operations and the supply chain. DELMIA® Manufacturing Operations Management solutions transform global production operations to achieve and sustain operational excellence. This is accomplished through digital continuity, a shared digital landscape connecting all stakeholders to improve visibility into, control over a
Tags : 
    
Dassault Systèmes
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
GDPR compliance can be achieved through a combination of people, processes and technology. This document has described solutions that can help organizations with their GDPR journey. But you can extend that protection and strengthen security controls even further via strong and risk authentication or workload automation for the processing automation of personal data helping you comply with GDPR as well as similar mandates. Regulations tend to set the minimum standards to be required, but in the application economy, open enterprises must ensure due diligence to protect one of the most important and critical assets: private customer information.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Encore à l’heure actuelle, l’une des priorités pour les entreprises, quelle que soit leur taille, est de protéger les accès à forts privilèges et d’empêcher les violations de sécurité. Les attaquants font appel à des méthodes toujours plus variées et sophistiquées pour infiltrer les systèmes vulnérables. Et bien que les attaques ayant une origine extérieure fassent souvent la une, les entreprises doivent également pouvoir se défendre contre les menaces internes. Il est clair aujourd’hui que, du fait de la généralisation de l’externalisation et de la sous-traitance pour des fonctions clés, davantage d’utilisateurs bénéficient d’un accès à forts privilèges aux systèmes critiques de l’entreprise. En outre, il est essentiel que les administrateurs système actuels comprennent comment les systèmes sont utilisés, qui les utilisent et dans quelles conditions. Malheureusement, les solutions de sécurité standard ne parviennent pas à sécuriser efficacement les accès internes/à forts privilèges ;
Tags : 
    
CA Technologies EMEA
Published By: Wasabi     Published Date: Oct 20, 2017
The Kim Komando Show, the largest weekend radio show in the United States, with an estimated reach of 6.5 million listeners, uses Wasabi hot storage for costeffective, fast and reliable data protection for its business-critical multimedia content. Wasabi’s cloud storage service extends the broadcaster’s on premises networkattached storage (NAS) investments and eliminates the hassles and inefficiencies of tape-based data backup and recovery solutions.
Tags : 
wasabi, data protection, multimedia, recovery solutions, disaster recovery
    
Wasabi
Published By: Wasabi     Published Date: Oct 24, 2017
An explosion of data storage needs, both in terms of volume and accessibility, are unmet by first-generation storage solutions. The massive datasets being generated are un-storable due to costs and unable to be fully leveraged because of speed limitations. The needs of individual businesses, and our greater economy, demand the commoditization of cloud storage. Cloud Storage 2.0 represents a new generation of solutions that promise to turn Cloud Storage into a utility along the lines of bandwidth and electricity. Leading this evolution with high-speed, low cost, reliable cloud storage is Wasabi. In this white paper we look at the genesis and possibilities of Cloud Storage 2.0, and Wasabi’s place at its forefront. Free trial with no credit card required offer available as well.
Tags : 
    
Wasabi
Published By: Cisco EMEA Tier 3 ABM     Published Date: Mar 05, 2018
When thinking about how the workforce is evolving, you need to think about what really matters to employees and how you can integrate technology in the workplace for the digital nomads of today. Corporate real estate, IT, and HR executives need to do a lot to meet those needs and achieve their HR goals. Cisco has the expertise needed to deliver high-quality mobility and collaboration solutions. We make business-critical communications possible in real time, across multiple channels. Cisco Workforce Experience offers are complete, enterprise-class solutions designed to scale smoothly and make your vision of the digital workspace a reality.
Tags : 
workforce, corporate, real estate, executives, employees
    
Cisco EMEA Tier 3 ABM
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
IT market intelligence agency, IDC, conducted a global study of 3500+ IT leaders around the world and found that companies at all levels are considering PC Lifecycle as a Service models to reduce costs, shorten refresh cycles and procure better equipment for their employees. Dell PC as a Service (PCaaS) combines hardware, software, lifecycle services and financing into one all-encompassing solution – providing a single, predictable price per seat per month provided by Dell Financial Services. Intel Inside®. Intel islemciler ile daha yüksek verimlilik. Learn more about Dell solutions powered by Intel®.
Tags : 
market, idc, lifecycle, service, dell intel
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Mar 09, 2018
The Dell EMC All-Flash storage solution is versatile like a swiss army knife. They have a full suite of best-of-breed products that provide organizations the flexibility to meet their data storage requirements. They allow organizations to customize and choose across best-of breed solutions to meet their needs.
Tags : 
    
Dell PC Lifecycle
Published By: Workday France     Published Date: Mar 08, 2018
Nous connaissons actuellement une révolution technologique sans précédent. Entre les appareils mobiles avec écrans tactiles interactifs, la 3D au cinéma et à la télévision, et la possibilité d’accéder à Internet presque n’importe où dans le monde, la technologie semble apporter de nouvelles solutions à presque tout. in•no•ver (verbe) : introduire une nouveauté (méthodes, idées ou produits) au sein de quelque chose d’établi. Pourtant, cette innovation semble avoir du mal à imprégner le monde des logiciels de gestion d'entreprise. Alors que le grand public utilise de plus en plus Internet pour trouver des informations et que les appareils sont de plus en plus simples à utiliser, les dirigeants ont toujours du mal à obtenir des informations précises et mises à jour sur la situation financière de leur société, même si toutes les données dont ils ont besoin sont disponibles dans leurs systèmes.
Tags : 
    
Workday France
Start   Previous    30 31 32 33 34 35 36 37 38 39 40 41 42 43 44    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.