Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

ema

Results 1 - 25 of 3891Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
The Cloud, once a radical idea in IT, is now mainstream. Whether it’s email, backup or file sharing, most consumers probably use a cloud service or two. Similarly, most IT professionals are familiar with cloud service providers such as Amazon, Google and Microsoft Azure, and many companies have moved at least some of their information technology processes into the cloud. In fact, the cloud has become so popular it’s easy to assume that running IT applications on-premises is not cost competitive with a cloud based service. In this report Evaluator Group will test the validity of that assumption with a TCO (Total Cost of Ownership) model analyzing a hyperconverged appliance solution from HPE and a comparable cloud service from Amazon Web Services (AWS).
Tags : 
infrastructure, cost competitive, cloud, hyper converged, amazon web services, total cost of ownership, tco
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
In recent years, it seems like technology is changing faster than it used to in decades past. As employees devour newer technologies such as smartphones, tablets, wearables, and other devices, and as they become more comfortable with solutions such as Dropbox and Skype, their demands on enterprise IT intensify. Plus, management and other decision makers are also increasing their demands on enterprise IT to provide more infrastructure with less cost and time. Unfortunately, enterprise IT organizations often don’t see much, if any, associated increases in funding to accomodate these demands.
Tags : 
hyperconverged, infrastructure, implementation, data metrics, protection, recovery, public cloud
    
Hewlett Packard Enterprise
Published By: Dell     Published Date: Dec 12, 2017
Fast-moving employees demand access to people, programs and data from anywhere. Power up their productivity with greater portability and connectivity. Begin by downloading “On the go Professional,” a brief by Dell that uncovers the key needs around convenience, connectivity and access required by mobile professionals. The brief also covers technology recommendations for you to consider, such as the robust line of Dell Latitude and Venue devices powered by Intel®, to meet the preferences of your users. Take advantage of the solutions that maximize enterprise productivity and employee satisfaction today. Download the brief now!
Tags : 
    
Dell
Published By: Oracle     Published Date: Nov 08, 2017
All’inizio, probabilmente avrai scelto di adottare l’infrastruttura cloud con una certa prudenza, limitandoti a un approvvigionamento rapido o alla riduzione dei costi operativi o delle macchine. Ma come resistere ai vantaggi di questo nuovo modo di fruire della tecnologia? Il cloud continua a evolvere e a conquistare credibilità in tutti i settori. Oggi, ci aspettiamo che ogni sistema aziendale possa beneficiare dei vantaggi del cloud.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Oracle     Published Date: Nov 08, 2017
Digital developments are forever shaping the way we work, bringing new innovations through our office doors almost every day. These high-demand technologies have increased expectations, with organizations now having to drive business agility at unprecedented levels. Although we’re presented with enormous opportunity, we also face new obstacles that can block the path to success; obstacles such as the need to innovate quickly, keep costs down, and actively respond to competitive pressures.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: HP Inc.     Published Date: Dec 06, 2017
Shapeways builds consumer demand with HP 3D printing. While many consumer manufacturers debate when 3D printing will be ready for final-part production, Shapeways is busy proving that it is.
Tags : 
case study, manufacturer, consumer, printing, production
    
HP Inc.
Published By: Cisco     Published Date: Dec 27, 2017
The market for communications is shifting to one in which multi-modal interactions will become the norm. Voice, video, and messaging Communications and Collaboration will drive the future of this market. As messaging becomes a larger part of the Communications landscape, Mobile Collaboration is poised to take on a larger enterprise role, by way of shifting email to more of a confirmation tool. Moreover, the convergence of content types under UCC will be greatly enhanced by a categorized and dynamic ontology-driven knowledge framework that goes beyond search. Once the framework supports are in place, UCC will accelerate its momentum at an even greater rate than it already is today. This Research Note identifies the new elements of UCC and how enterprises can plan for the shift to multi-modal communications.
Tags : 
    
Cisco
Published By: Mimecast     Published Date: Nov 28, 2017
Does your organization have a plan for complying with the European Union’s General Data Protection Regulation (GDPR)? If email isn’t a part of that plan, you could face significant challenges, including severe financial penalties. Download now to get the facts about: • Why you can’t compromise when it comes to protection of email data • The challenges presented by Subject Area Requests • How noncompliance could cost your organization more than just money
Tags : 
gdpr, email compliance, data protection, compliance
    
Mimecast
Published By: Carbonite     Published Date: Jan 04, 2018
Backup and high availability are both essential forms of protection that fulfill different roles within a data protection strategy. So which type of protection is right for different systems? According to recent analyst reports, experts recommend a blended approach that aligns data protection with type of data.By aligning data protection with data urgency, businesses can ensure higher levels of resiliency and reduce demands on internal resources.
Tags : 
    
Carbonite
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Banques, gestionnaires de patrimoines, établissements de crédit et autres institutions financières. Tous constatent d’importants changements, conséquence d’une évolution de la demande et du nouvel arsenal réglementaire. Ces entreprises sont tenues de revoir leurs priorités, leurs processus et leurs produits, avant de jeter les bases de leur future réussite. La solution ? Les logiciels.
Tags : 
api, application programming interface, psd2, open banking, json, github, api gateway, apim
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Sie müssen stets für das kontinuierliche Wachstum Ihres Unternehmens sorgen. Im Zuge der anhaltenden Dynamik der Application Economy setzen Sie zur Förderung dieses Wachstum vermutlich auf digitale Unternehmensinitiativen. Wie organisieren und verwalten Sie nun am besten ein APIProgramm, ohne Ihr geistiges Eigentum außerhalb des Unternehmens auf problematische Weise zu exponieren? Nachfolgend stellen wir eine Reihe von Early Adopters vor, die ihr Wachstum erfolgreich mit APIs befördert haben.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices
    
CA Technologies EMEA
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Get enterprise-class encryption to help meet regulatory demands and secure data in on-premises, cloud and hybrid cloud environments.
Tags : 
encryption, regulatory demands, ibm encryption
    
Group M_IBM Q1'18
Published By: Workday     Published Date: Jun 05, 2017
Aging HCM technology in many organizations contrasts sharply with the demands of digital business and the future world of work. HR IT leaders should use this strategic roadmap to plan their future HCM technology landscape to leverage the cloud, deeper automation and embedded advanced analytics.
Tags : 
workday, integrated learning, workplace success, gartner, hcm technology
    
Workday
Published By: Workday     Published Date: Nov 27, 2017
The new revenue recognition standard is going to shake things up in your business beyond just accounting. This new eBook from CFO, an Argyle company and sponsored by Workday—an early adopter—offers insight into preparing and planning for the new standard, along with strategies for meeting the new demands.
Tags : 
    
Workday
Published By: Mimecast     Published Date: Nov 28, 2017
With the healthcare industry as the #1 target for ransomware attacks, it’s critical to ensure steps are taken to prevent, detect and respond to these attacks without downtime – and without loss of patient data. A multi-layered approach to protective controls – including a Secure Email Gateway (SEG) with advanced threat protection capabilities – will start your healthcare organization on the right path to ransomware resilience. Download and use this top 10 list of how to protect your organization now. Use it as a reference tool for frequent health checks of your own ransomware resilience program.
Tags : 
healthcare, ransomware, ransomware attack, seg, secure email gateway
    
Mimecast
Published By: Lookout     Published Date: Aug 28, 2017
The time has come for enterprise risk management to change. Mobile devices have become core to our personal and professional lives, yet most enterprises remain focused on traditional PC endpoints. Although many of the same elements of risk that affect PCs also apply to mobile endpoints, simply extending current PC security controls to your mobile feet is ineffective.
Tags : 
mobile risk, enterprise risk management, endpoint security, mobile-specific security, mobile threats
    
Lookout
Published By: Lookout     Published Date: Dec 07, 2017
How to think about the risk to data from the mobile ecosystem Mobile devices, even those that are corporate owned, are personal. Your CEO uses the same smartphone to send confidential emails, snap family photos, inspect customer records, get directions to meetings, and scrutinize financial reports. Every employee in your organization does the same thing. Your organization's critical data is constantly being accessed by mobile devices, and once it leaves the network you have no visibility into where it goes, and little or no ability to enforce your security policy to protect it. Your organization’s sensitive data has made the mobile ecosystem the new frontier for a wide spectrum of risk that every CISO must now understand. Take a deep dive into all twelve elements of the Mobile Risk Matrix in the interactive table below.
Tags : 
    
Lookout
Published By: Fiserv     Published Date: Jan 16, 2018
For the past decade, financial institutions have created sophisticated digital platforms for consumers to access, save, share and interact with their financial accounts. As sophisticated as these digital platforms have become, cyber criminals continue to pose an ever-present risk for everyone – from individual consumers to large corporations In his recent article, 2018 Outlook: Customer Experience and Security Strike a Balance, Andrew Davies, vice president of global market strategy for Fiserv’s Financial Crime Risk Management division, explains how and why security will become a key differentiator for financial institutions as they respond to a changing landscape, which includes: •Global payment initiatives •Open Banking standards •Artificial intelligence and machine learning •Consumer demand for real-time fraud prevention and detection
Tags : 
2018 trends, aml trends, money laundering trends
    
Fiserv
Published By: Mimecast     Published Date: Oct 25, 2017
Even as cyberattacks have evolved, phishing remains the number one threat delivery tactic. Why? Because it’s effective. That’s the bad news. The good news is, your organization can effectively defend against phishing attempts with the right program in place. You can stand in the way of the abuse of your most mission-critical communications app. There are six key areas to consider. Read this Gartner research note, Fighting Phishing: Optimize Your Defense, to advance your anti-phishing program.
Tags : 
anti-phishing, cyber security, secure email gateway, url filtering, mimecast
    
Mimecast
Published By: Mimecast     Published Date: Jan 19, 2018
Any digital device or application can be a vector for a cyberattack, but email is an especially acute problem for many organizations. As individuals or members of organizations, most people rely on email to communicate with colleagues, whether in the next cubicle or across the globe. For many in the business world, 24/7 access to email is routine, and often required. Instant, ubiquitous and inexpensive communication gives us quick access to others in our business and personal lives, but gives criminals easy and direct access to us as well.
Tags : 
phishing, email threats, cyberattack, email protection
    
Mimecast
Published By: AppDynamics     Published Date: Dec 08, 2017
It’s principally about the importance today of ensuring application performance and reliability at unprecedented scale. Conventional IT Operations teams are increasingly unable to ramp their manual activities to keep up with the rapidly growing extent and complexity of modern software applications – and the demand placed upon them by users.
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Dec 08, 2017
It’s principally about the importance today of ensuring application performance and reliability at unprecedented scale. Conventional IT Operations teams are increasingly unable to ramp their manual activities to keep up with the rapidly growing extent and complexity of modern software applications – and the demand placed upon them by users.
Tags : 
    
AppDynamics
Published By: Group M_IBM Q1'18     Published Date: Dec 21, 2017
More so than ever before, agility matters. A shifting competitive landscape along with heightened customer demands, technological transformations, digital disruptions and a host of other trends, combine to create distinct challenges for business operations executives. Achieving and maintaining a competitive edge in this climate requires an advanced framework for pivoting whenever needed—with minimal cost, maximum efficiency and optimal outcomes. The question for every enterprise in the current environment: Do we have the required agility to drive decision-making capabilities that will continuously sharpen our competitive edge?
Tags : 
operational agility, technological transformations, digital disruptions, decision management
    
Group M_IBM Q1'18
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search