Skip to content
 

more visibility

Results 1 - 25 of 121Sort Results By: Published Date | Title | Company Name
Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies
Published By: Butler Technologies     Published Date: Jul 02, 2018
As enterprises become more distributed and migrate applications to the cloud, they will need to diversify their network performance management solutions. In particular, the network operations team will need to complement its packet-based monitoring tools with active test monitoring solutions to enhance visibility into the cloud and help enterprises scale monitoring gracefully and cost-effectively.
Tags : 
    
Butler Technologies
Published By: Lookout     Published Date: Apr 18, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
Cylance
Published By: BlackLine     Published Date: Aug 06, 2018
The biotechnology and pharmaceutical industry is among the most heavily regulated industries in the world, challenged by evolving regulations, complex compliance requirements and close regulatory scrutiny. At the same time, companies must address the market pressures of globalization, the use of predictive data analytics and digital technologies, and the industry’s ongoing consolidation. In this challenging environment, confidence in internal controls is crucial. To ensure the integrity of transactional data, biotechnology and pharmaceutical companies must have visibility into the underlying details. No industry spends more capital—literally billions of dollars—on drug research and development annually. Yet, the risk of product failure exists at every stage of the drug lifecycle process. From an accounting and reporting standpoint, companies must have proper accounting software, procedures and controls in place to manage their financial data, and realtime visibility into this informat
Tags : 
    
BlackLine
Published By: Nextgen     Published Date: Aug 08, 2017
Meditouch helps integrate patient engagement across your practice and the care continuum. Foster patient satisfaction and achieve front office efficiency. YourHealthFile patient portal for convenience, transparency, and communication. Patient-generated data alleviates staff burnout via manual duties; prevents bottlenecks. Easily refill Rx, reduce no-shows, quickly fill cancellations. iPad functionality supports education and doctor patient relationship. Garner better reviews, gain more online visibility, market your practice to new patients.
Tags : 
patient engagement, patient care, healthcare, patient communication
    
Nextgen
Published By: Symantec     Published Date: Aug 15, 2017
Stay ahead of the evolving threats. Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. The longer the time before detection and resolution, the more damage is inflicted. The risk and size of fines, lawsuits, reparation costs, damaged reputation, loss of operations, loss of sales, and loss of customers pile up higher and higher. The complexity of website security management and lack of visibility across website ecosystems is further impacted by the fact that it is nearly impossible to know how and where to allocate resources. Website security must be evolved in line with these growing threats and challenges.
Tags : 
    
Symantec
Published By: Gigamon     Published Date: Oct 19, 2017
Register for the Enterprise Strategy Group’s Research Insights Paper, Understanding the State of Network Security Today to learn more about the challenges, changes, best practices and solution requirements for network security operations and tools. See why ESG recommends improving network visibility and reducing security vulnerabilities by consolidating tools through a platform-based approach to visibility in which data, analytics and reports from multiple tools are aggregated and consumed in one control panel. Download to learn more.
Tags : 
    
Gigamon
Published By: Dome9     Published Date: Apr 25, 2018
Last year at this time, we forecast a bumpy ride for infosec through 2017, as ransomware continued to wreak havoc and new threats emerged to target a burgeoning Internet of Things (IoT) landscape. ‘New IT’ concepts – from DevOps to various manifestations of the impact of cloud – seemed poised to both revolutionize and disrupt not only the implementation of security technology, but also the expertise required of security professionals as well. Our expectations for the coming year seem comparatively much more harmonious, as disruptive trends of prior years consolidate their gains. At center stage is the visibility wrought by advances in data science, which has given new life to threat detection and prevention – to the extent that we expect analytics to become a pervasive aspect of offerings throughout the security market in 2018. This visibility has unleashed the potential for automation to become more widely adopted, and not a moment too soon, given the scale and complexity of the thre
Tags : 
    
Dome9
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Discover the best practices for securing and protecting your Hybrid IT environments from HPE’s Advisory Consulting services. Businesses and organizations are building new hybrid infrastructures to deliver new IT services that require agility, resiliency and security. Success will require more automation, integration and end-to-end visibility supported by threat intelligence and threat analytics. This blueprint provides proven strategies and approaches based on the IT digital transformation experience and many customer engagements. It will help customers determine where to start and how to approach this topic
Tags : 
    
Hewlett Packard Enterprise
Published By: SafetyCulture     Published Date: Aug 14, 2018
Consistency and customer experience are key to quality and profitability in retail. Manual reporting processes can be unwieldy and time-consuming, but bringing together all compliance procedures under one digital platform means fast, consistent and easy-to-access performance data. Using real-time insights into best practice improves the reporting of quality control, stock loss prevention, inspection processes, logistics and more – saving time, increasing efficiency and boosting customer satisfaction. Benefits include better branding through monitoring rollouts with uploaded photos and videos, protection against shrinkage through improved inspection processes and audits, and clearer visibility of issues which means a speedier response.
Tags : 
    
SafetyCulture
Published By: Riverbed     Published Date: Jul 17, 2013
How to effectively troubleshoot your VDI deployment Virtual desktop infrastructure has come a long way since the first steps were taken a decade ago to run desktop workloads in the data center. While more pervasive today, VDI technologies are latency-sensitive, and wholly dependent on the network. Complaints of poor end-user experience persist, especially over the WAN at branch offices where bandwidth constraints and latency delays are common. But there is a way to ensure consistent and reliable VDI performance to deliver: Reduced downtime Faster troubleshooting Improved SLAs Enhanced planning and control Read this brief to learn how the Riverbed® Cascade® application-aware network performance management (NPM) solution unlocks VDI visibility.
Tags : 
virtual desktop, infrastructure, deployments, cascade, riverbed
    
Riverbed
Published By: IBM APAC     Published Date: Aug 22, 2017
For any sized organization, securing data and networks today is a daunting task. New vulnerabilities are discovered almost daily; new malware strains are developed as soon as a detection script is written for the old ones; and cybercriminals can buy prepackaged exploit kits on the Darknet backed by professional support teams. As a security analyst, you need more than a few point solutions designed to defend the network’s edge. You need visibility, perspective and an innate sense of when things just don’t seem right.
Tags : 
ibm, qradar, cloud, analytics, flexibility, scalability, organization
    
IBM APAC
Published By: Intacct Corporation     Published Date: Jan 26, 2016
Get the white paper "Mastering the Complexity of Revenue Management" to learn: • 5 specific steps you can take to ensure better compliance, improved visibility, and lower costs. • 9 key revenue management technology requirements that decision makers can't afford to miss. • Why Vendor Specific Objective Evidence (VSOE) is worrying more and more revenue managers and what you need to do about it. • 7 benefits that optimized revenue management brings to your organization, including accelerated closing, reduced revenue leakage, and forecasting visibility.
Tags : 
    
Intacct Corporation
Published By: IBM     Published Date: Apr 06, 2016
"Discover the benefits of deployment automation and how to maximize your automation investments! IT organizations have been finding it increasingly difficult to deploy more quickly without adding more people and incurring additional risks. Only until recently have there been more viable automated deployment options to offer an alternative to the slow and error prone process of manual deployment. Read the paper to learn about: • The limitations of manual deployment, namely its inconsistency, lack of visibility, and proneness to error • The benefits of deployment of automation • The base set of features that an automated system should provide"
Tags : 
ibm, deployment automation, consistent deployments, urbancode
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
To compete in today’s fast-paced business climate, enterprises need accurate and frequent sales and customer reports to make real-time operational decisions about pricing, merchandising and inventory management. They also require greater agility to respond to business events as they happen, and more visibility into business activities so information and systems are optimized for peak efficiency and performance. By making use of data capture and business intelligence to integrate and apply data across the enterprise, organizations can capitalize on emerging opportunities and build a competitive advantage. The IBM® data replication portfolio is designed to address these issues through a highly flexible one-stop shop for high-volume, robust, secure information replication across heterogeneous data stores. The portfolio leverages real-time data replication to support high availability, database migration, application consolidation, dynamic warehousing, master data management (MDM), service
Tags : 
ibm, infosphere, data replication, security, data storage
    
IBM
Published By: Oracle Commerce Cloud     Published Date: Feb 05, 2016
Batesville deployed Oracle Sales Cloud to replace an aging custom application that didn’t support managers’ need for greater visibility into the company’s evolving product mix. Nucleus found the deployment enabled Batesville to increase the productivity of sales people and managers and enable managers to have more visibility into the pipeline to increase coaching opportunities.
Tags : 
    
Oracle Commerce Cloud
Published By: UPS     Published Date: Sep 01, 2017
Growth in new markets introduces new costs to control, regulations to manage, and supply chain complexities to solve. Longer, more complicated cold chains mean that collaboration with third party logistics providers (3PLs) can help make the difference between profitable simplicity and unmanageable complexity. Companies are increasingly relying on their 3PLs for services such as monitoring and intervention, contingency planning, and cost control. Reduce risk by improving packaging, visibility, and establishing QA best practices. Improved visibility, new tools, new monitoring capabilities and appropriate packaging can also help drive down costs for shippers.
Tags : 
healthcare, cold chain, efficiency, ups, practices
    
UPS
Published By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 12, 2017
Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success. If handled correctly, your supply chain should improve customer service—along with the reputation of your brand—and boost your bottom line. But, as with many areas of business, the rules of the game are changing. What’s changing? Well, everything. New regulations, increased buyer expectations, shorter product lifecycles, fluctuations in demand, new market entrants, more ethical supplier management, poor visibility of globalized supply chains—all these things, and more, are testing the limits of the traditional supply chain model. The simple truth is that the way things used to be done, and the solutions that enabled it, are no longer up to the job.
Tags : 
cloud, supply chain management, scm, cloud computing
    
Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
Published By: Juniper Networks     Published Date: Feb 01, 2016
According to TechTarget, partnering with the right vendor to modernize your network can benefit business in three ways: Simplify the network to make management more efficient Secure the network for total visibility and control Adopt an open framework for agility and scalability
Tags : 
    
Juniper Networks
Published By: Concur ENT     Published Date: May 11, 2018
VAT has been a valuable source of revenue for the UK Government since 1973. Yet, despite more than 40 years of getting used to calculating, paying and reclaiming VAT, businesses still struggle to adhere to HMRC guidelines. With support from SAP Concur, it doesn’t have to be this way. First, we offer an expense audit solution to check for fraud and non-compliance. Secondly, we work with tax specialists to help you comply with VAT regulations. Thirdly, we give you visibility and control over all aspects of your travel, expense and invoice spending. Crucially, we see VAT reclaim as an opportunity to reduce business costs and put money back in your budget.
Tags : 
    
Concur ENT
Published By: Workday     Published Date: Mar 02, 2018
It’s hard to imagine a world without Netflix. Yet less than 20 years ago, the world’s leading internet television network was nothing more than an idea and a vision. To meet incredible global demand and figure out how to expand rapidly, Netflix turned to Workday to help scale its resources quickly and modernize its systems. Check out this compelling story from Netflix to discover how Workday enabled Netflix to consolidate 11 systems into 1, streamline workflows, increase visibility, and bring its HR, IT, and finance functions together as a single team.
Tags : 
streamline workflow, increase visibility, global demand, modernize systems
    
Workday
Published By: Workday     Published Date: Mar 19, 2018
It’s hard to imagine a world without Netflix. Yet less than 20 years ago, the world’s leading internet television network was nothing more than an idea and a vision. To meet incredible global demand and figure out how to expand rapidly, Netflix turned to Workday to help scale its resources quickly and modernize its systems. Check out this compelling story from Netflix to discover how Workday enabled Netflix to consolidate 11 systems into 1, streamline workflows, increase visibility, and bring its HR, IT, and finance functions together as a single team.
Tags : 
netflix, global demand, streamline workflow, modernize
    
Workday
Published By: ServiceNow     Published Date: Nov 22, 2013
An effective service catalog enables IT to deliver business services that are more customer and service focused, which results in higher customer satisfaction, provides standardization and consistency and increases IT visibility across the organization.
Tags : 
servicenow, enterprise it, boost visibility, business value, service catalog, service management, infrastructure library, budget effectiveness, customer-focused services, business critical asset, customer requirements, service level management
    
ServiceNow
Published By: McAfee     Published Date: Sep 15, 2014
With networks sprawling to massive proportions and malicious activity hitting hard, fast, and constantly evolving, situational awareness is more vital than ever in keeping your network secure. Situational awareness refers to the continuous monitoring of your network by analyzing bulk data collected from sources across the board. In other words, it delivers a detailed overview of all areas of your network so you know exactly what’s going on through increased visibility and response capabilities.
Tags : 
best practices, network security, it security, security management, threat response, hacker detection
    
McAfee
Start   Previous   1 2 3 4 5    Next    End
Search      

Find Research

Add Research

Get your company's research in the hands of targeted business professionals.