awareness

Results 201 - 216 of 216Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Jul 17, 2012
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
business, sap, white paper, technology, location, intelligence, business value, data services
    
SAP
Published By: TIBCO     Published Date: Oct 28, 2013
The right integration platform lets you extract more value from your ERP system - including improved business performance, increased organizational awareness, and better coordination of processes.
Tags : 
tibco, erp, integration, value, data management
    
TIBCO
Published By: IBM     Published Date: Sep 06, 2013
In this report, we look at the four things you can do now to help keep your organization safe: Prioritize your business objectives and set your risk tolerance, protect your organization with a proactive security plan, prepare your response to the inevitable: a sophisticated attack and promote and support a culture of security awareness.
Tags : 
responding to attacks, recovering from attacks, sophisticated security attacks, ibm, security risks, educated staff, it environments, attack protection, attack prevention, compliance demands, security, enterprise applications, data management
    
IBM
Published By: Varonis     Published Date: Nov 12, 2013
Odds are fairly high that there is sensitive data on your corporate network that is overexposed and itching to escape. But will it ?Forrester thinks so – in a recent survey, 22% of security decision makers reported a data breach in the past twelve months, and at an average cost of $7.2 million per breach, it’s no shock that organizations are constantly working to strengthen their defenses.
Tags : 
varonis, data protection, context awareness, inevitable breach, sensitive data, corporate network, security decision-makers, data breach, it professionals, security professionals, leaked critical data, endpoint protections, network protections, server protections, dlp solutions, metadata, it management
    
Varonis
Published By: Adobe     Published Date: May 15, 2014
From web-enabled wristwatches to high-resolution tablets, new mobile devices are popping up all the time, and customers expect your content to work flawlessly and look great across all of them. But that doesn’t mean you have to keep re-inventing your digital assets for every new innovation.
Tags : 
adobe, web design, responsive web design, brand awareness, customer engagement, web analytics, smartphone, tablet, online marketing, web experience, web presence, roi, conversion rates, traffic, web development
    
Adobe
Published By: Nasuni     Published Date: Nov 19, 2014
The increasing user-friendliness of cloud computing is making it more accessible to users as they better understand its capabilities and realize how easy and affordable it can be. As cloud infrastructure has started offering a wider range of storage functionality, IT professionals are finding that they can make use of the benefits it provides both operationally and financially. But achieving this optimum result is neither easy nor prevalent; awareness of the upside can sometimes blind prospective users to the potholes and blind curves on the road to cloud storage bliss. This paper assumes at least a general awareness of the methods and advantages of cloud storage, and perhaps even an acknowledgement that it is a natural infrastructure development, and is therefore designed to provide pragmatic advice to help with specific deployment choices.
Tags : 
cloud storage, cloud computing, cloud infrastructure, it infrastructure, it management, knowledge management, enterprise applications, data management
    
Nasuni
Published By: Akamai Technologies     Published Date: Nov 13, 2018
Competitive pressures from peers are forcing CSPs to evolve beyond connectivity and offer incremental valueadded services to sustain revenue growth. Security services are an obvious candidate for consideration since awareness of the need for security protections is extremely high due to regular media coverage highlighting Internet exploits. Threat trends and strong alignment with large customer segments are creating opportunity for CSPs to offer a foundational layer of web protection for every Internet access connection. They can provide a previously unavailable level of web security that reduces the risk their customers face, without imposing a configuration or management burden.
Tags : 
    
Akamai Technologies
Published By: Veracode     Published Date: Oct 26, 2016
When a high-profile, or simply branded, vulnerability is disclosed, security teams are expected to abandon their planned activities and react. But, these responses can be time-consuming and costly. Even if the vulnerability is achieving mainstream awareness, enterprises need to balance responses against risk. Download this handy report for guidance on preparing for a high-profile vulnerability disclosure so risk-management or security teams can respond with the appropriate level of urgency.
Tags : 
veracode, security, vulnerability, high-profile vulnerability disclosure, vulnerability disclosure, enterprise applications
    
Veracode
Published By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime associated with server migration have prevented many IT organizations from making the move to cloud. Some have valid concerns about cloud lock-in. Still, without cloud, IT teams are less agile, less flexible and less able to meet the demands of their business. With so much C-suite awareness of the cloud competitive edge, IT can no longer avoid taking this step. Carbonite DoubleTake™ Cloud Migration Center quickly and easily migrates physical, virtual and cloud workloads over any distance with minimal risk and near-zero downtime. The streamlined process automates 100 manual steps into five easy steps, automating everything from server discovery to target VM provisioning to the ultimate cutover. Using efficient real-time, byte-level replication technology, Cloud Migration Center creates a replica of the entire server being migrated and keeps it in sync with production systems. The migrated data can be validated without disrupting business operations, and downtime is
Tags : 
carbonite, cloud migration, automation, virtual workload, cloud workload
    
Carbonite
Published By: Anaplan     Published Date: Mar 29, 2018
Finance has a mandate to become a strategic business partner. Integrated business planning offers organizations the ability to align operations and sales strategy with the company’s continuous financial performance. An increasing number of organizations have shown that even small steps toward integrated business planning have helped them deliver immediate benefits to the business, including light-touch forecasts, rapid “what-if” analyses, and more accurate budgets. Improved collaboration between departments, driving more awareness and shared understanding of potential issues, allows the business to take the prompt and incisive actions needed to keep performance on track. The question to consider is not “When are we going to do this?” but “Why don’t we start now?” because time is ticking away.
Tags : 
finance, business, planning, integration, strategy, company
    
Anaplan
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: Tenable     Published Date: Mar 07, 2018
"Learn how you can accelerate development and strengthen security – without disrupting your operations. Organizations that effectively meld DevOps and InfoSec can shift security from an afterthought to an integrated, automated, and proactive practice. By reading this paper from IDG, you’ll learn three reasons why DevOps is a game-changer for security and steps you can take foster a more collaborative and proactive approach to securing your enterprise. Topics covered include: - Adapting security testing tools and processes to the developer - Automating security into the CI/CD toolchain - The impact of secure DevOps on your bottom line - Increasing security awareness and commitment across teams This paper provides high-level guidance for DevOps and InfoSec professionals seeking collaborative, efficient approaches for strengthening application and information security."
Tags : 
secure devops, container security, docker, infosec
    
Tenable
Published By: Pattern     Published Date: Jan 09, 2019
As an eCommerce professional you're always looking for ways to sell more online. With Amazon capturing roughly 49.1 percent of all online retail spend in the United States it is the perfect platform to boost sales and awareness of your products. But with the number of sellers and products added to Amazon every day, how can your product rank number one in an Amazon search? Our Ultimate Guide to Amazon SEO will give you the tips and tricks you need to make the most out of your Amazon product listings and get to the top of Amazon's search results.
Tags : 
    
Pattern
Published By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
Today's energy, environment, and utility companies face an unfamiliar landscape in which they must integrate alternative energies, expand situational awareness across the system, and deepen their relationships with customers-all while continuing to deliver reliable, safe, and affordable electricity, gas and water to everyone.By combining predictive analytics with IoT, cloud and mobile technologies, utilities companies can Lower costs, improve operational efficiency and increase equipment reliability.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
Today's energy, environment, and utility companies face an unfamiliar landscape in which they must integrate alternative energies, expand situational awareness across the system, and deepen their relationships with customers-all while continuing to deliver reliable, safe, and affordable electricity, gas and water to everyone.By combining predictive analytics with IoT, cloud and mobile technologies, utilities companies can Lower costs, improve operational efficiency and increase equipment reliability.
Tags : 
    
Group M_IBM Q2'19
Start   Previous    1 2 3 4 5 6 7 8 9     Next   End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.