as service

Results 4201 - 4225 of 4331Sort Results By: Published Date | Title | Company Name
Published By: Wasabi     Published Date: Nov 13, 2018
For the past decade Amazon, Google and Microsoft offering comparable service have dominated cloud storage. Armed with revolutionary technology, Wasabi is transforming what technology can be and do. It is bringing low cost and high speed storage to everyone, eliminating vendor lock-in, and complicated tiers and pricing plans. In this white paper we focus on cloud storage pricing, comparing the economics of Wasabi versus the leading cloud storage options.
Tags : 
    
Wasabi
Published By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
Today, businesses pour Big Data into data lakes to help them answer the big questions: Which product to take to market? How to reduce fraud? How to retain more customers? People need to get these answers faster than ever before to reduce “time to answer” from months to minutes. The data is coming in fast and the answers must come just as fast. The answer is self-service data preparation and analytics tools, but with that comes an expectation that the right data is going to be there. Only by using a data catalog can you find the right data quickly to get the expected insight and business value. Download this white paper to learn more!
Tags : 
    
Waterline Data & Research Partners
Published By: Waterline Data & Research Partners     Published Date: Nov 07, 2016
Business users want the power of analytics—but analytics can only be as good as the data. To perform data discovery and exploration, use analytics to define desired business outcomes, and derive insights to help attain those outcomes, users need good, relevant data. Executives, managers, and other professionals are reaching for self-service technologies so they can be less reliant on IT and move into advanced analytics formerly limited to data scientists and statisticians. However, the biggest challenge nontechnical users are encountering is the same one that has been a steep challenge for data scientists: slow, difficult, and tedious data preparation.
Tags : 
    
Waterline Data & Research Partners
Published By: WebEx     Published Date: Dec 14, 2007
With the growing array of hardware, software, and systems necessary to support businesses, today more than ever, software-as-a-service or on-demand solutions offer feature-rich, real-time functionality without the burden associated with deploying, managing and supporting an in-house approach.  See if it’s right for you.
Tags : 
service management, saas, software as a service, customer service, smb, small business, soho, midsize
    
WebEx
Published By: WebEx     Published Date: Apr 02, 2009
This document educates end-users and decision makers on Software-as-a-Service (SaaS), where it differs from traditional software, and what the key benefits are when deploying SaaS applications. In addition, this document also provides the reader with a comprehensive look at the Total Cost of Ownership (TCO) analysis any decision maker should complete before making a choice between a SaaS or a traditional software deployment.
Tags : 
webex, software-as-a-service, saas, saas applications, tco, total cost of ownership, traditional software deployment, break-even point
    
WebEx
Published By: WebEx     Published Date: Apr 02, 2009
The business of taking care of remote hardware and software has never been bigger:-Managed systems and services for retail, point of sale, hospitality, and other distributed operations are a hot growth area.- Enterprise help desks manage an increasingly dispersed array of hardware and software.- Enterprise software providers are moving to managed services and other value added support offerings to preserve margins in the face of increasing price pressure.
Tags : 
webex, virtual support networks, virtual support network, vsn technology, standard remote management, it server management, local area network, lan
    
WebEx
Published By: WebEx Communications     Published Date: Dec 14, 2007
Based on a survey conducted by ServiceXRG, this paper explores the use and effectiveness of remote support technology across all industry sectors and how companies can take remote support to the next level to significantly improve the support transaction process, reduce service delivery costs and increase solution effectiveness.
Tags : 
remote support, remote access, help desk, helpdesk, customer support, support, customer experience, customer satisfaction
    
WebEx Communications
Published By: WebiMax     Published Date: Nov 25, 2009
It may be easily understood SEO can immensely help marketing efforts, yet with so many providers available, the process of deciding upon a service can be confusing. First, it is important to understand what search engine optimization is and what it can do for your company. Basically, SEO providers employ a number of tactics to gain positive momentum for your Web site on the search engines. Using specific, germane words and phrases related to a site's goods and services, an SEO service helps to make the site widely recognized by consumers and attract more revenue.
Tags : 
webimax, seo, search engine optimization, optimized, service provider
    
WebiMax
Published By: webmechanix     Published Date: Mar 19, 2014
Introducing ETO Cloud for Government Agencies. Interoperable case management software designed to deliver better results by connecting people, programs, and services. Learn how it can put you in control of your organization’s data and help you produce measurable change in the communities you serve.
Tags : 
interoperability, case management software, eto software, human services software, workforce reporting, workforce development software, workforce development, wia reporting software
    
webmechanix
Published By: webMethods     Published Date: Aug 21, 2009
This white paper explores why service-oriented architecture has emerged as one of the most significant developments in IT, and is followed by an overview of how businesses can make the transformation to service-orientation.
Tags : 
soa, service-oriented architecture, service oriented architecture, service management, web methods, webmethods, software development, it management
    
webMethods
Published By: webMethods     Published Date: Aug 21, 2009
One of the most significant IT initiatives underway is the adoption of service-oriented architecture (SOA), where IT assets are aligned to business services in a standard, flexible and architected fashion. The concept is often discussed in conjunction with Web services, though the two are not synonymous.
Tags : 
soa, service-oriented architecture, service oriented architecture, service management, alignment, web service, web methods, webmethods
    
webMethods
Published By: Webroot     Published Date: Jul 08, 2011
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
Tags : 
webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center
    
Webroot
Published By: Webroot     Published Date: Jul 08, 2011
This paper reviews the business value of IT security, illustrates the business case for SaaS over "do it yourself" premise-based solutions, and outlines what to look for in SaaS solutions you can adopt with confidence and count on as you grow.
Tags : 
webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center
    
Webroot
Published By: Webroot     Published Date: Dec 06, 2011
Unlock the true business value of IT security, and learn why companies of all sizes are choosing SaaS over on-premise solutions.
Tags : 
saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring
    
Webroot
Published By: Webroot     Published Date: Nov 07, 2012
This case study describes how one of the UK's leading charities used the Webroot® Web Security Service to resolve problems with its existing Web security solution, which revolved mainly around administration and reporting.
Tags : 
web security service, case study, deployment, it security, case study, security
    
Webroot
Published By: Webroot     Published Date: Nov 07, 2012
This case study describes how a technical services firm benefited from deploying Webroot for layered Web and endpoint security.
Tags : 
endpoint security, web security, it security, security solutions, case study, mobile security, mobility, security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : 
mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as: • Better defense against zero-day threats and spam servers • More comprehensive signature and URL database • Supports remote users more securely and without the cost of putting servers in every location
Tags : 
web threat, content filtering, the cloud, security, web gateway, cloud-based applications, cloud computing
    
Webroot
Published By: Webroot Inc     Published Date: Mar 05, 2014
In this paper we will look at factors favoring cloud and SaaS solutions in general, reasons why secure web gateways in the cloud can provide better security than appliances and local servers, and how the Webroot Web Security Service can maximize security and minimize costs using a cloud-based architecture.
Tags : 
web threat, security, could, saas solutions, webroot, knowledge management, electronics, data center
    
Webroot Inc
Published By: Webroot Inc     Published Date: Mar 05, 2014
In this white paper we will summarize the decline of Phishing 1.0, discuss how phishing has turned toward business and become more costly, outline the structure of new Phishing 2.0 attacks, delineate how the new campaigns evade standard antiphishing countermeasures, and describe how web security services with real-time antiphishing capabilities can protect against Phishing 2.0 attacks.
Tags : 
phishing, campaigns, antiphishing, security, social media, malware, block, network
    
Webroot Inc
Published By: Webroot Inc     Published Date: Sep 09, 2016
This guide will examine a number of mitigation strategies that will help protect your organizations’ data from crypto-ransomware attacks. Crypto-ransomware is no longer an annoyance. It’s a highly persistent and organized criminal activity with Ransomware as a Service (RaaS) at its core.
Tags : 
security management, web service security
    
Webroot Inc
Published By: Webroot UK     Published Date: Nov 11, 2009
The software-as-a-service model can help you stay ahead of Web and email threats without breaking the bank on infrastructure and management. Find out more in this whitepaper.
Tags : 
webroot, saas, software-as-a-service, web security, email security, threats, storage management, tco
    
Webroot UK
Published By: Webroot UK     Published Date: Nov 11, 2009
Software as a Service (SaaS)-delivered e-mail and Web security suites offer a good solution that Butler Group recommends as part of a more comprehensive security architecture comprising gateway and end point-based security solutions. Find out more in this whitepaper!
Tags : 
webroot, saas, software-as-a-service, web security, email security, policy-based encryption, security management, data loss prevention
    
Webroot UK
Published By: Webroot UK     Published Date: Mar 22, 2010
By using a service based in the cloud, protection against threats is brought nearer to where those threats are located, making it easier and more effective to protect users against security threats such as malware.
Tags : 
webroot, cloud-based service, web security, malware, security threat, anti spyware, web service security, cloud computing
    
Webroot UK
Published By: Webroot UK     Published Date: Mar 22, 2010
The components required of an effective web security solution are many and varied, including a range of tools that guard against specific types of threats
Tags : 
webroot, web security service, cloud computing, web threats, business process automation, anti spam, anti spyware, anti virus
    
Webroot UK
Start   Previous    160 161 162 163 164 165 166 167 168 169 170 171 172 173 174    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.