adoption

Results 276 - 300 of 908Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: Aug 25, 2017
Transitioning from traditional IT to cloud IT is not an all-at-once, big bang effort. Rather, the cloud adoption process should be an agile, incremental process. And the first part of that process is understanding the different cloud models. Contrary to popular belief, cloud isn’t necessarily only public cloud, multi-tenant, and hosted in a vendor’s data center. It can also be private cloud, single-tenant, and/or hosted in a corporate data center. Often the best solution is a hybrid combination of these options. This paper will show you the advantages of hybrid cloud applications and explore the considerations you should make to find an optimal solution for your organization.
Tags : 
cost reduction, cost optimization, business agility, innovation, business models
    
IBM APAC
Published By: KPMG     Published Date: Jul 10, 2018
The Oracle and KPMG cloud threat report 2018 provides an up-to-date review of the cybersecurity implications and challenges of rapid cloud adoption. Is your organisation prepared? Read this report to find out: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
    
KPMG
Published By: CA Technologies     Published Date: Jan 06, 2014
As most European organisations open up their applications for external users, Identity Access Management (IAM) is becoming ever more critical to drive business growth.
Tags : 
mediacom, byoid, identity access management, iam, business growth, directories of identities, it professionals, external business users, primary motivator, secondary motivator, implementing iam, security goals, regional perceptions, it management, cloud resource, enforcement, iam adoption, deploy iam, access control, application security
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 06, 2014
This report examines the issues around the adoption of cloud-based services and looks at the security technology that is being deployed by enthusiasts and why the avoiders are holding back.
Tags : 
mediacom, cloud-based services, adopt the cloud, security of data, effective security, security technology, sensitive data, cloud avoiders, in-house deployments, cost of ownership, external interaction, identifiable data, security services, access management, identity governance, drivers and blockers, data management, infrastructure, application integration, change management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management, identity, security, wireless, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Quocirca surveyed over 300 organisations across the UK, France, Germany, the Nordics, Benelux, Italy, Iberia and Israel on their attitudes to cloud-based services. The research revealed that cost is not the only thing driving the adoption of cloud services; improved efficiency and easier external interaction are also important. Another finding was that impediments to cloud adoption vary significantly by industry. A key finding was that “cloud enthusiasts” are more aware of, and likely to invest in, security technologies like identity and access management than “cloud avoiders”.
Tags : 
ca technologies, quocirca, cloud, cloud based services, cloud security, cloud adoption, security technologies, access management, identity, security, wireless, cloud computing
    
CA Technologies
Published By: Entrust Datacard     Published Date: Jun 09, 2017
The rapid adoption of Office 365 means that work created using the Microsoft product contains a large amount of the business world’s sensitive information. In fact, in most enterprises using Office 365, more than half of that highly valuable information — including business plans, sales data, product designs, M&A details and financial forecasts — is contained within Excel, PowerPoint, Word, Outlook and other Microsoft software. Securing the information created with its products has emerged as a primary concern for CSOs, CIOs, IT departments and other C-level executives.
Tags : 
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jun 09, 2017
Learn why mobile is the future of enterprise authentication. Discover how mobile: • Elicits stronger, more convenient authentication • Promotes quicker and better user adoption • Future-proofs your organization
Tags : 
    
Entrust Datacard
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
Some organizations have carefully crafted strategies for cloud technology adoption; but for most, their journey to the cloud has been an ad hoc affair. Many have deployed applications in a number of different clouds: public clouds, private clouds, and even combinations of the two. While public and private clouds demonstrate how effective they can be in enabling companies to deploy applications quickly, hybrid cloud strategies prove the value of hosting applications in both cloud and on-premises environments. Similarly, SaaS offerings transform the way businesses interact with customers, partners, and vendors.
Tags : 
cloud, public, private, technology, organizations, strategies, business
    
F5 Networks Inc
Published By: Citrix Systems     Published Date: Jul 28, 2015
This white paper explores the evolution of secure remote access requirements, focusing in particular on the impact of user mobility and growing adoption to bring your own device (BYOD) practices.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Sep 17, 2015
A range of business issues are driving IT towards desktop virtualization. One solution-Citrix XenDesktop with FlexCast technology-helps IT teams empower their workforces, one project at a time. See the trends driving the adoption of virtual desktops and the top use cases IT teams are deploying today.
Tags : 
citrix, xendesktop, it management, virtual desktop, software development, platforms
    
Citrix Systems
Published By: Kofax     Published Date: Oct 20, 2011
In this report, we look at the drivers for ECM investment, the adoption of collaborative technologies, use of outsourcing, user priorities, views of the future as regards cloud and open source, and spend intentions for the next 12 months.
Tags : 
kofax, business, finance, ecm, investment, report, technology, asset management, financial advisors, capital
    
Kofax
Published By: Brainshark     Published Date: Mar 22, 2013
With unprecedented adoption among businesses and consumers, the iPad is quickly becoming the preferred device for mobile sales professionals. Find out how enterprise adoption of iPads gives organizations an advantage when in sales and marketing.
Tags : 
ipads, enterprise, powerpoint, sales, marketing, iphone, apple, smartphone, tablets, mobile, mobility, presentations, mobile sales professionals, mobile presentations, powerpoint presentations, ipad presentations, slideshark, brainshark, enterprise sales, sales enablement
    
Brainshark
Published By: Teradata     Published Date: Jul 30, 2013
This paper examines the obstacles that make interactive customer management a challenge for many insurance carriers. It describes how they can create a more customer-centric business by using a sophisticated analytics platform to uncover valuable insights into their business and provides concrete examples of specific areas where insurers gain value. The adoption of a customer-centric approach need not be accomplished all at once. Rather, it can be managed and self-funded by following a roadmap that delivers incremental capabilities and revenue.
Tags : 
insurance policies, integrated data warehousing, interactive customer management, customer management, insurance carriers
    
Teradata
Published By: RelayHealth     Published Date: Mar 29, 2013
Widespread electronic health record (EHR) adoption has ushered in a pivotal moment in laying the groundwork for health information exchange (HIE).
Tags : 
meaningful use, hie, health information exchange, ehr, electronic health records, connectivity, care coordination, population health
    
RelayHealth
Published By: NetApp     Published Date: Nov 26, 2014
IT organizations need the right tools and technologies to make hybrid cloud strategies a flexible and efficient reality for their organizations. Learn how to address inhibitors to cloud adoption, recognize data challenges in the cloud and seamlessly move data in the cloud.
Tags : 
cloud, netapp, hybrid cloud, cloud adoption, data center
    
NetApp
Published By: Red Hat     Published Date: Sep 25, 2014
When a company sells services to a consumer audience primarily through a Web user interface (UI), that Web UI had better be online and available, all the time, especially if you are an airline. Such is the real-world scenario that faces Chris Skretowski, Linux Specialist at Devon, United Kingdom-based Flybe, Europe's largest regional airline. Despite being a relatively small IT function, it powers a regional airline with over 1,700 employees and 55 aircraft, and the company has big ambitions, driven top down by a new CEO who believes that technology adoption and use can make a real difference in the company's bottom line. Having a board that is supportive of IT as a strategic business driver means there is lots of open air ahead for Skretowski, who is responsible for all the Linux infrastructure that front ends the company's missioncritical Web presence. Flybe was one of the 21 companies that were interviewed for quantitative results on their operations as part of an IDC ROI analys
Tags : 
web user interface, it function, it infrastructure, roi analysis, it management, data management
    
Red Hat
Published By: Red Hat     Published Date: Sep 25, 2014
Today’s mega IT trends – cloud computing, big data, mobile and social media –have dramatically altered how enterprises work, requiring datacenters to find new, more flexible and cost effective ways to meet computing demands. For most datacenters, the path toward tomorrow's compute paradigm mandates an investment in standardization and consolidation as well as a more robust adoption of enterprise virtualization software, along with cloud system software to extend that virtualized infrastructure into a true private cloud environment. Linux has emerged as one of the key elements to a modernization program for a datacenter.
Tags : 
datacenter, modernization, enterprise virtualization, infrastructure, private cloud enviornment, it management, data management, data center
    
Red Hat
Published By: NetApp     Published Date: Sep 11, 2014
"VMware Horizon View is an enterprise-class desktop virtualization solution that delivers virtualized or remote desktops and applications to end users through a single platform. Horizon View is a tightly integrated, end-to-end solution built on the industry-leading virtualization platform, VMware vSphere. Although Horizon View enables levels of availability and agility of desktop services unmatched by traditional PCs, the complexity of deploying and managing thousands of virtual desktops in a VMware environment can be daunting without the right tools. Storage is often the leading cause of end-user performance problems. The NetApp all-flash FAS solution with the FAS8000 platform solves the performance problems commonly found in VDI deployments. In this reference architecture, NetApp tested VMware Horizon View user and administrator workloads to demonstrate how the NetApp all-flash FAS solution eliminates the most common barriers to virtual desktop adoption. The testing covered common
Tags : 
virtualization platform, remote desktop and applications, fas solution, storage utilization
    
NetApp
Published By: Kontiki     Published Date: Sep 16, 2014
Learn how to reach and engage remote employees within your organization and see how this will strengthen employee engagement, create personal connection with executives, and increase collaboration between teams and employees.
Tags : 
employee engagement, adoptions trends, solutions, best practices, video webcasting, internal communication, company-wide participation
    
Kontiki
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.