Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

ids

Results 151 - 175 of 509Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
It seems like every day there’s another article about IoT, big data analytics, and cloud architectures—and their unlimited potential for companies trying to gain a competitive edge in this digital world. If your business is in the midst of a digital transformation (and chances are, it is), you’re probably already enjoying some the benefits of the public cloud: economies of scale, preconfigured solutions that can be spun up with a few clicks, utility billing, and more. What you may not have heard, however, is how the shared security model of the public cloud affects your security responsibilities —and how it can be used to your advantage in these multicloud environments.
Tags : 
roi, cloud, security, architectures, business, economies
    
F5 Networks Inc
Published By: TriNet     Published Date: Nov 08, 2017
This white paper discusses the mot critical compliance concerns for small and midsize businesses, from potential workplace litigation issues and benefit regulation mistakes to lack of HR expertise within the company and onboarding errors. Solutions are offered as well.
Tags : 
    
TriNet
Published By: Mimecast     Published Date: Feb 28, 2017
Vervalsing van e-mail verpersoonlijking – ook wel bekend als CEO fraude of "whaling" aanvallen vormen een groeiende bedreiging voor bedrijven van elke omvang. Deze veiligheidsbedreiging heeft in de afgelopen 3 jaar meer dan 2 biljoen Euro aan schade veroorzaakt.* Denkt u dat deze aanvallen geen bedreiging voor u opleveren? Even wakker worden! Download nu het nieuwe Mimecast – e-boek: Anatomie van een "whaling" aanval, om meer te leren over deze bedreiging voor uw organisatie, de feiten, kosten en de schade die het kan veroorzaken – en hoe u het kan voorkomen. - See more at: http://info.mimecast.com/anatomievaneenwhalingaanval.html#sthash.rjajy1cW.dpuf
Tags : 
financieel, e-mail, phishing, veiligheid, whaling
    
Mimecast
Published By: SAP     Published Date: Jul 18, 2016
Building a talent strategy for a Small or Midsize Enterprise (SME) isn't a one-size-fits-all proposition. In fact, it might feel like hitting the road without a GPS. Read this white paper to create the right road map for your talent journey.
Tags : 
    
SAP
Published By: IBM     Published Date: Mar 29, 2017
This Ventana Research e-Book presents background, adoption, benefits, advantages to midsize businesses, security considerations, challenges of hybrid cloud adoption and recommendations for evaluating hybrid cloud for midsize organizations Download now to learn more!
Tags : 
ibm, ventana research, hybrid, midsize businesses, hybrid cloud, cost reduction, business proficiency, cloud computing
    
IBM
Published By: IBM     Published Date: Mar 30, 2017
This Ventana Research e-Book presents background, adoption, benefits, advantages to midsize businesses, security considerations, challenges of hybrid cloud adoption and recommendations for evaluating hybrid cloud for midsize organizations Download now to learn more!
Tags : 
ibm, ventana research, hybrid, midsize businesses, hybrid cloud, cost reduction, business proficiency, cloud computing
    
IBM
Published By: Datastax     Published Date: Aug 23, 2017
A holistic approach to using customer data to enable data-driven decisions for attracting, retaining, and delivering value through customer experience is what is going to drive many business initiatives over the next 12-month period. Though they each have varying degrees of capability to transform their customer experience applications and remain continuously available no matter what is critical to their success. Companies surveyed are eager to deliver a great customer experience and capture market share, but many CX journeys are hindered by business unit siloes, insufficient budget, and technical challenges. The responses provide key insights into the business priorities, challenges, and data technology needs of companies embarking on or in the midst of their CX journey.
Tags : 
datastax, customer data
    
Datastax
Published By: Sage Software     Published Date: Jun 20, 2018
Enterprise Management is changing how midsize enterprises compete and grow by offering simpler, faster and more flexible business management capabilities at a fraction of the cost and complexity of typical enterprise systems. According to a recent Total Economic Impact (TEI) study by Forrester, Enterprise Management customers can expect a favorable ROI of 177% with total benefits of £1.2M from cost savings over 3 years.
Tags : 
sage enterprise management, forrester, tei, bms, erp, bom, enterprise accounting, enterprise intelligence, drp, enterprise, mrp resource planning
    
Sage Software
Published By: Centrica Business Solutions     Published Date: Aug 14, 2018
The energy landscape has become increasingly complex. Globally, we’re relying less on centralized, steady power sources – such as gas-fired and coal-fired power stations – and more on mixed, locally-distributed renewable energy supplies including solar, wind, tidal and battery. While this is positive for the environment and carbon emissions, it makes balancing power grids a much more complex task. Power quality and reliability becomes more variable in output, while demand for power continues to increase steadily. But when it comes to energy resilience, many organizations simply don’t know where to start. What solutions are available? Which are the best ones for their specific situation and physical premises? What will be their return on investment? Is it simply the cost of doing business, or is there actually a business case? The guide will give you the tools and data to build your understanding and quantify the benefit for your organization.
Tags : 
energy, resilience, building, business, energy
    
Centrica Business Solutions
Published By: Group M_IBM Q119     Published Date: Mar 04, 2019
One of the biggest changes facing organizations making purchasing and deployment decisions about analytic databases — including relational data warehouses — is whether to opt for a cloud solution. A couple of years ago, only a few organizations selected such cloud analytic databases. Today, according to a 2016 IDC survey, 56% of large and midsize organizations in the United States have at least one data warehouse or mart deploying in the cloud.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q119     Published Date: Mar 11, 2019
One of the biggest changes facing organizations making purchasing and deployment decisions about analytic databases — including relational data warehouses — is whether to opt for a cloud solution. A couple of years ago, only a few organizations selected such cloud analytic databases. Today, according to a 2016 IDC survey, 56% of large and midsize organizations in the United States have at least one data warehouse or mart deploying in the cloud
Tags : 
    
Group M_IBM Q119
Published By: Epicor     Published Date: Aug 02, 2012
The capabilities that enterprise resource planning (ERP) systems enable in wholesale and distribution have a wide umbrella of influence throughout an organization. Using ERP data to make better business decisions while cutting your costs is only one way you can make the most of your system.
Tags : 
wholesale distribution, leading wholesalers, leading distributors, erp strategies, erp capabilities, cross functional teams, full visibility, operations and transactions, technology aids, erp modules and extensions, forecasting, demand planning, transportation management, warehouse management, supply chain planning, supplier relationship management, distribution requirements planning, optimization, measurable benefits, social media
    
Epicor
Published By: MessageLabs     Published Date: May 28, 2008
Whether its spyware hidden amidst a seemingly innocuous download, a “spoofed” social networking identity, or phishing emails that gain access to valuable information, web and email-based security threats are more advanced and more covert than ever before. Learn how MessageLabs integrated web and email security services protect your business.
Tags : 
anti spyware
    
MessageLabs
Published By: Red Hat, Inc.     Published Date: Jul 10, 2012
Today, as IT departments struggle to design and implement solutions capable of managing exponential data growth with strict requirements for application scale and performance, many of them are turning to in-memory data grids (IMDGs).
Tags : 
it departments, data growth, managing data growth, application scale, application performance, in-memory data grids, imdgs, big data, data volume, data velocity, data variability, data management, data collection, data processing, data scaling, data storage systems, data access, data solutions, data challenges, management tooling
    
Red Hat, Inc.
Published By: AMD     Published Date: Jul 23, 2012
Virtualization deployment will continue to grow dramatically, fueled by a variety of factors, including continued use of virtualization to support consolidation efforts; growth of virtualization use in mission-critical applications and workloads; growth in virtualization among small and midsize organizations; successful deployment of virtualization as a strategic initiative to enhance business agility; and virtualization as the foundation for next-generation cloud computing services.
Tags : 
virtualization, microsoft hyper-v, incremental consolidation, it agility, business agility, business continuity, return on investment, roi, scalability, legacy applications, data management, financial management, expense management, data center
    
AMD
Published By: Workday     Published Date: Sep 14, 2018
" Looking to start the evaluation process for a new technology provider? This complete guide for midsize organizations walks you through how to prepare for your evaluation and what your company should look for in a vendor, so you can be confident in your search and selection. Read the guide now. "
Tags : 
    
Workday
Published By: Workday     Published Date: Sep 14, 2018
"Looking for an agile and scalable ERP system but don’t know where to start? IDC MarketScape is a comprehensive guide specifically for midsize companies. Read an excerpt from the report to learn the capabilities your midsize company should expect from cloud-enabled ERP applications. https://www.workday.com/en-us/forms/reports/idc-me-landscape.dl.html "
Tags : 
    
Workday
Published By: Workday     Published Date: Jan 09, 2019
In this five-episode video series, Jason Averbook shows you the ins and outs of workforce technology and how to use it to achieve HR success. Watch the series to learn ways to develop a digital HR strategy, get executive buy-in, and maintain success.
Tags : 
    
Workday
Published By: Workday     Published Date: Oct 11, 2018
Get insight from 12 successful CEOs of midsize companies as they reveal best practices on how to recruit the right employees and cultivate a happy, productive workforce. Also included is an interview with Workday Chief People Officer Ashley Goldsmith on how to ensure top talent finds their way to your organization, and what you can do to keep them there.
Tags : 
    
Workday
Published By: Brainshark     Published Date: Oct 16, 2013
Breaking through to customers and prospects is harder in the midst of constant competitive messaging. Inside this E-book, you’ll learn about some of the innovative ways companies have used Brainshark’s solutions to identify the hottest prospects, engage customers, better enable their sales teams, and improve their processes.
Tags : 
sales enablement, sales training, sales productivity, sales effectiveness, sales revenue, sales costs, product marketing, content marketing, onboarding sales, sales new hires, mobile sales, sales mobility, powerpoint, ppt, presentation, video, video training, ipad, iphone, video marketing
    
Brainshark
Published By: Cisco     Published Date: Jan 20, 2014
Midsize organizations strive for success, and being successful means consistently making smart decisions—including smart technology purchases. Technology should enable a midsize organization to meet the needs of its employees and customers today and also allow it to make simple but value-rich changes in the future. Technology must support changes that occur in a business without increasing the risks associated with providing excellent customer service, engaging with suppliers, and conducting many common business processes.
Tags : 
cisco, unified communications, collaboration, unified communications, it management
    
Cisco
Published By: FireEye     Published Date: Feb 28, 2014
Organizations face a new breed of cyber attacks that easily thwart traditional defenses. These advanced attacks are targeted. They are persistent. And they are devastatingly effective at breaching your systems and stealing your sensitive data. This paper examines: The limitations of existing security solutions; Several security architectures, including sandbox-based products; An architecture built from the ground up to truly protect against today's advanced attacks.
Tags : 
fireeye, persistent threats, advanced attacks, data centers, cyber-attacks, speed of detection, accuracy of detection, small businesses, information security, security threats, fireeye platform, protecting data, cyber targets, cybercriminals, prime target, midsize businesses, security, it management, best practices, business activity monitoring
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Cyber attacks are growing more sophisticated and, more often than not, target small and midsize businesses (SMBs). One unlucky click - a malicious email attachment, a link to a legitimate but compromised website - could result in a costly data breach that drains your bank account and customer trust. This paper explains targeted attacks and examines reasons cyber attackers are aiming at small and midsize businesses, including: Value of your data; Low risk and high returns for criminals; Why SMBs are easier targets.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye
Published By: CEB     Published Date: May 19, 2014
Twelve Key Trends in Contract Management CEB Legal’s contract management survey results allow general counsel to evaluate their current contract review and monitoring processes against hundreds of their peers at midsized companies. Your peers are using our 12 Key Trends in Contracts Management to: o Gain in-depth insight into the challenges and viable solutions presented by the current contracts management landscape. o Determine the scope of their contract review policies. o Identify opportunities to accelerate their approach across the contract life cycle -- from drafting through negotiation, review, and monitoring. o Improve efficiency using contract management software, including a review of key features and associated costs
Tags : 
ceb, legal, contract management, contract review process, contract management software, contract life cycle
    
CEB
Published By: AlienVault     Published Date: Oct 05, 2016
UW-Superior’s IT team was looking to replace their outdated intrusion prevention system. After a full evaluation of AlienVault’s Unified Security Management™ (USM) platform, they decided to leverage it to meet their IDS needs. As the team became familiar with using AlienVault USM as their intrusion detection system, they began to implement the other tools that make up the USM platform. They realized that because so many security features were already included in USM, like behavioral monitoring, SIEM and vulnerability assessment, they would not have to purchase additional security tools that they previously thought they would need.
Tags : 
    
AlienVault
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search