Skip to content
 

esp

Results 1 - 25 of 2001Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Nov 08, 2017
La tecnologia IaaS, un tempo vista con scetticismo da molti responsabili IT, viene oggi adottata da molte aziende, che trasferiscono sul cloud i workload e accantonano l’architettura locale che prima ritenevano indispensabile. Nonostante i vantaggi in termini di prestazioni, flessibilità e opportunità di innovazione sperimentati dagli utenti che già hanno adottato questa tecnologia, alcune aziende ritardano la migrazione per paura del cambiamento.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Oracle     Published Date: Nov 08, 2017
Digital developments are forever shaping the way we work, bringing new innovations through our office doors almost every day. These high-demand technologies have increased expectations, with organizations now having to drive business agility at unprecedented levels. Although we’re presented with enormous opportunity, we also face new obstacles that can block the path to success; obstacles such as the need to innovate quickly, keep costs down, and actively respond to competitive pressures.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Workday     Published Date: Nov 22, 2017
The critical trends that are reshaping the world of work are colliding with the changing demographic profile of the employees and shifting expectations of the work experience. Despite an uncertain future, there is optimism in the air. The events of 2016 and early 2017 have set a course of change that brings the promise of more equity and transparency and more accountable decision making. An overarching theme of Empowerment permeates how business leaders. HR professionals, and employees are viewing the world of work, both today and in the future.
Tags : 
    
Workday
Published By: Cisco     Published Date: Dec 27, 2017
Among your primary responsibilities as a board member is providing advice on both business strategy and enterprise risk. A general understanding of risk management is essential when looking at cyber risk specifically. Ultimately, an enterprise should consider adding cybersecurity expertise to its board membership, but all members can benefit from increasing their understanding about how cyber risk affects corporate strategy and the overall enterprise risk profile. To provide effective strategic advice to company leadership on cyber risk, you must ask the right questions, including whether a company does ongoing cyber risk assessment and management, and how.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
Miercom was engaged by Cisco Systems to independently configure, operate and then assess aspects of competitive campus-network infrastructures from Cisco Systems and from Hewlett Packard Enterprise (HPE). The goal was to assemble the products of each vendor strictly according to their reccomended designs, and using their respectice software for campus-wide network management, control, configuration and monitoring.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
Miercom was engaged by Cisco Systems to independently configure, operate and then assess aspects of competitive campus-network infrastructures from Cisco Systems and Huawei Technologies. The products of each vendor were configured and deployed strictly according to the vendors' recommended designs, and using their respective software for campus-wide network management, control, configuration and monitoring.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
Flexible work arrangements (FWAs) can come in many forms, including telecommuting, compressed workweeks and flexible scheduling that allows employees to perform tasks outside of core business hours. Improvements in technology have made FWAs possible for a broader segment of the labor force, but some of these arrangements have yet to achieve widespread acceptance in many organizations’ workplace cultures. However, SHRM research shows that participation in some FWAs has risen in recent years, and these measures have yielded positive results for companies’ recruitment and retention efforts, as well as their employees’ development and productivity.
Tags : 
    
Cisco
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Secondary DNS (sometimes referred to as multi-DNS) operates in an “always on” manner to complement your existing infrastructure as an additional authoritative DNS service. When an end user’s recursive server initiates a DNS request, both the “primary” DNS service and the “secondary” DNS will respond as soon as they receive the request. The response that reaches the recursive server first will be passed back to the end user, completing their request.
Tags : 
dns, service, server, infrastructure, technology, business, optimization
    
Oracle Dyn
Published By: Oracle Dyn     Published Date: Dec 06, 2017
In this eBook, we’ll make the case for why you need to rethink DNS from several different and important perspectives. The first is to rethink your DNS choices. Choices around solutions, vendors and configurations that were made several years ago may no longer be optimal in today’s environment. The second is to rethink the importance of DNS for building digital resilience, including the need for a secondary DNS configuration. The third is to rethink the value of DNS as it has evolved to be so much more than simple domain name resolution. Modern DNS with intelligent response capabilities continues to open up new opportunities for traffic steering across hybrid resources.
Tags : 
scalability, dynamic network, dns, world wide, point of presence, pop, hardware, systems
    
Oracle Dyn
Published By: Carbonite     Published Date: Jan 04, 2018
It’s the moment every IT department dreads: A data loss event takes your business offline and the countdown clock begins. Despite spending countless hours safeguarding against and preparing for this moment, the impact of downtime is immediate and all-consuming. While IT pros can’t always avoid data loss events, they can prepare for them to ensure minimal downtime. To better understand the IT experience during a data disaster, EVault commissioned Spiceworks Voice of IT to survey IT pros regarding disaster recovery practices and perceptions. All survey respondents were based in the U.S. and have influence over backup/disaster recovery purchase decisions. This e-book will explore the impact of downtime and data loss on IT departments for small and midsize businesses.
Tags : 
    
Carbonite
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Aujourd’hui, le numérique est omniprésent : Cloud, appareils mobiles, réseaux sociaux et Internet des objets modifient notre manière de travailler et de nous divertir.
Tags : 
api, application programming interface, psd2, open banking, json, github, api gateway, apim
    
CA Technologies EMEA
Published By: Mimecast     Published Date: Nov 28, 2017
With the healthcare industry as the #1 target for ransomware attacks, it’s critical to ensure steps are taken to prevent, detect and respond to these attacks without downtime – and without loss of patient data. A multi-layered approach to protective controls – including a Secure Email Gateway (SEG) with advanced threat protection capabilities – will start your healthcare organization on the right path to ransomware resilience. Download and use this top 10 list of how to protect your organization now. Use it as a reference tool for frequent health checks of your own ransomware resilience program.
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Lookout     Published Date: Aug 30, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : 
byod, malware threats mobile security, data protection, mobile security solutions
    
Lookout
Published By: Fiserv     Published Date: Nov 09, 2017
Financial institutions seeking to attract new customers and revenue channels are expanding into digital services, real-time payments and global transactions. However, with every new service, criminals are developing innovative ways to infiltrate financial systems, and older technologies that mitigate fraud no longer work as effectively. So how can financial institutions respond to this growing threat? Fortunately, more advanced technologies hold great potential for real-time financial crime mitigation. Learn about five current and emerging technologies that could impact money laundering and fraud mitigation, including artificial intelligence/machine learning, blockchain, biometrics, predictive analytics (hybrid model) and APIs. Read the latest Fiserv white paper: Five Tech Trends That Can Transform How Financial Institutions Detect and Prevent Financial Crime.
Tags : 
kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report
    
Fiserv
Published By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 
2018 trends, aml trends, money laundering trends
    
Fiserv
Published By: Sprinklr     Published Date: Jan 05, 2018
Microsoft General Manager and CMO Grad Conn shares his thoughts on how brands must provide an experience that customers actually enjoy, as opposed to just hoping they elicit a certain response.
Tags : 
marketing, content marketing, user generated content, ugc, marketing strategy, social media strategy, social strategy, ugc strategy
    
Sprinklr
Published By: Mimecast     Published Date: Jan 19, 2018
Any digital device or application can be a vector for a cyberattack, but email is an especially acute problem for many organizations. As individuals or members of organizations, most people rely on email to communicate with colleagues, whether in the next cubicle or across the globe. For many in the business world, 24/7 access to email is routine, and often required. Instant, ubiquitous and inexpensive communication gives us quick access to others in our business and personal lives, but gives criminals easy and direct access to us as well.
Tags : 
phishing, email threats, cyberattack, email protection
    
Mimecast
Published By: Amazon Web Services     Published Date: Nov 28, 2017
You keep close control of the security you need to manage. You can stop being concerned about the security of the foundational services your IT infrastructure is built on. You get the benefits of a robust cloud infrastructure with a reliably secure service that’s scalable, responsive, and efficient. More control, more compliance, less time, less effort.
Tags : 
security, cost, compliance, disruption, mitigation, management, maintenance
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Nov 28, 2017
You know that moving to the cloud is a huge opportunity for your business do great things. Be more agile, be more responsive, do things better. But convincing everyone in your business isn’t easy, especially your security and compliance people who may well see the cloud as too big a risk. This eBook is about answering those security questions – and communicating the six core benefits a data secure cloud will bring to your organisation.
Tags : 
cloud, aws, security, organizations, visibility, control, networks, platforms
    
Amazon Web Services
Published By: Red Hat     Published Date: Jan 02, 2018
When Aviva plc, a multinational insurance provider group, acquired Friends Provident International (FPI), it needed to replace FPI’s costly proprietary imaging and bond management workflow system. With help from Red Hat Consulting, Aviva Asia Pte. Ltd. created and launched a new application based on Red Hat JBoss Middleware within a tight six-month time frame. With this new solution, Aviva has reduced costs by replacing proprietary licensing fees with Red Hat’s flexible, cost-effective subscription pricing model. In addition, hosting the new application locally on-premise has improved response times for end users, helping Aviva bring new services to market faster.
Tags : 
    
Red Hat
Published By: OracleSMB     Published Date: Jan 04, 2018
Finance has grown beyond recording and reporting. Leaders in fast-growing companies need not only the raw financial data, but the sophisticated analysis to make sense of it all. In today’s digital world, Finance must move out of the back-office and help drive the direction of the business, as well as improve the bottom line through more efficient processes and increased responsiveness. With the right tools, your finance team can simplify processes and fulfill its goal of adding value.
Tags : 
    
OracleSMB
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting their new job. Adding another layer of complexity is the concern about the effectiveness of your cybersecurity posture. Is your business a target for a cyberattack Is it a question of when, as opposed to if? And are you as prepared as you could be? The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges.
Tags : 
firewall, customer, optimization, employees, devices, cyber security, technology
    
Palo Alto Networks
Published By: Riverbed ANZ DWA IT Leads GTM     Published Date: Nov 22, 2017
In this report 1,500 Australians describe how they currently use and rate digital public sector services across all levels of government, and what they expect from them today and into the future. The survey shows that Australians regularly engage with government through digital services, with half of respondents saying they do so on a quarterly basis, and 30 per cent accessing them fortnightly; but that the quality of the digital experience is paramount.
Tags : 
digital, experience, australia, public, sector, transition, hardware, software
    
Riverbed ANZ DWA IT Leads GTM
Published By: Incapsula     Published Date: Nov 06, 2017
You’ve probably heard about distributed denial of service (DDoS) attacks, or maybe you’ve even been hit by one. If you’re like most organizations, you’ve already been DDoSed. Perhaps the attack was minor, a wakeup call, but then the attack subsided without causing damage and you just left DDoS protection on your “to-do list.” If you don’t have a DDoS attack plan, it’s probably time to bump it up to the top of your list. That’s because DDoS attacks are getting bigger, persistent, and more harmful. They inflict serious cost in terms of lost revenue, damaged systems and lost consumer trust. DDoS is no longer just a web server problem; infrastructure is now a target. The attacker’s ambition is clear: Take down your online existence and harm your organization.
Tags : 
    
Incapsula
Published By: Incapsula     Published Date: Nov 06, 2017
Distributed denial of service (DDoS) attacks have become a fact of life for any business with a web presence. Whether you’re an enterprise, e-commerce business, local organization, or government offce—it’s merely a matter of time before you’re going to have to deal with the inevitable DDoS attack. The question is what can you do before an attack so you can have adequate defenses already in place. This handbook is a practical guide for planning and executing a DDoS response plan. It outlines pragmatic steps and best practices for choosing and setting up the right mitigation solution for your organization, how to authoritatively respond to an attack, and conduct a thorough post-attack analysis for developing follow-up defense strategies.
Tags : 
    
Incapsula
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.