business com

Results 1 - 25 of 4497Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 08, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses
Tags : 
    
Cisco EMEA
Published By: Here Technologies     Published Date: Apr 02, 2019
In today’s interconnected world you need to future-proof the integrity and reputation of your business. Your company’s network remains the Achilles heel of the whole enterprise because once compromised, your company’s reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : 
    
Here Technologies
Published By: Sage     Published Date: Apr 19, 2019
The way we work has completely transformed. New technology is changing how, where and when we work. In this new landscape, businesses are facing challenges specific to growth, talent acquisition and productivity. Employers need to embrace new technology to get ahead in this new world of work, and put people at the heart of their strategy. However, HR and People leaders are in fierce competition for the all-important slice of budget, which makes it vital to build the strongest business case for technology investment. This guide is intended to help HR and People leaders like you get the financial support you need. You’ll get practical, effective tips on: • Understanding and explaining the true benefits of investing in a new HR system and the likely return on investment. • Positioning HR as a driver of change throughout your business. • Ensuring your HR vision aligns with the business strategy. • Getting management and key stakeholders to buy in. • Building the strongest business case pos
Tags : 
    
Sage
Published By: Cisco EMEA     Published Date: Mar 26, 2019
The modern workplace is anywhere Complex work. Specialised teams all over the place. They’re in offices, homes, hotels, cars and airports. It could hardly be any more different to the days when people sat in neat rows of desks. That’s the modern reality of business life—it’s happening everywhere at once. Not only that, it’s happening on all kinds of devices, from desktop to mobile. And every generation of worker expects to have its workstyle accommodated. Today, co- workers mingle flexibly in pairs and groups, and those teams thrive on exchanging creative energy. They meet up in spaces designed specifically to encourage the cross-pollination of ideas. Their disruptive new concepts are where the next big growth opportunities are. The modern workplace is one where ongoing innovation is valued above all else. And flexibility extends well beyond four walls. Think about the way you work today and how it has evolved. Chances are it’s no longer 9 ‘til 5. Mobile employees, contract workers, fr
Tags : 
    
Cisco EMEA
Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state, governmental, decisions, data management
    
Aberdeen
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
    
Rubrik EMEA
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
Ransomware is not going away. This makes it imperative for businesses across all industries to adopt a data management strategy of multi-layered security, easy automation, and quick recovery. To learn more about Rubrik and how it can ?t into your ransomware protection strategy while simplifying data protection across your entire datacenter, visit www.rubrik.com. As the leading next-generation data protection solution, Rubrik deploys as a plug-and-play appliance in less than an hour and has been adopted across all verticals and organization sizes including Fortune 50 companies.
Tags : 
data, backup, recovery, backups, solution, security, encryption, cyber, privacy, infrastructure
    
Rubrik EMEA
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Apr 22, 2019
In the Overall segment, the ISG Provider Lens Next-Gen ADM Quadrant Report cited LTI’s idea-led innovation approach to delivering unique business solutions; the organization’s digital way of working (WoW), designed to deliver and amplify outcomes; and an IP-led growth strategy as key strengths that earned the market leader designation. The ISG Provider LensTM report recognized LTI’s extensive experience in working with both packaged and custom software, running multi-year maintenance deals, and a growing digital portfolio, as factors that make it an attractive alternative to large multinational providers.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Red Hat     Published Date: Feb 25, 2019
Le applicazioni business-critical necessitano di una piattaforma con stabilità comprovata. La tecnologia Red Hat Enterprise Linux ti permette di raggiungere significativi risultati aziendali poiché in grado di offrire livelli eccezionali di affidabilità e sicurezza avanzata. La sottoscrizione a Red Hat Enterprise Linux Server ti consentirà di entrare in contatto con la community di partner clienti ed esperti più ampia del settore in grado di supportare e accelerare il tuo successo. Leggi la scheda tecnica per saperne di più.
Tags : 
    
Red Hat
Published By: Schneider Electric     Published Date: Mar 28, 2019
Because electricity is a key commodity for business it represents significant financial risk. Yet many power management systems remain isolated and separate from the rest of the business enterprise. The result is poor access to incomplete information, with only limited knowledge of risk exposure. An integrated, comprehensive power management system that includes metering, software, and power quality mitigation equipment offers the most holistic, systems-based approach to managing this risk exposure.
Tags : 
financial risk, power management system, quality migration, schneider electric, pms
    
Schneider Electric
Published By: Schneider Electric     Published Date: Mar 28, 2019
To win the colocation race you need to be faster, reliable, innovative and efficient –all while making smarter design choices that will ensure positive returns. Customers are demanding 100% uptime and always-on connectivity –be it small enterprises to large Internet Giants–and colocation providers need to meet these expectations. The growing adoption of prefabricated data centers allows just that. With the undisputed benefits of prefab modules and building components(like speed or quality),colocation providers can manage their business today, and deploy faster in the future. Chris Crosby, CEO for Compass Datacenters, is well-known for his expertise in the data center industry. From its founding in 2012, Compass’ data center solutions have used prefabricated components like exterior walls and power centers to deliver brandable, dedicated facilities for colocation providers. Prefabrication is the central element of the company’s “Kit of Parts” methodology that delivers customizable data center solutions from the core to the edge. By attending this webinar, colocation providers will: • understand the flexibility and value delivered via the use of prefabricated construction • Hear the common misperceptions regarding prefabricated modules and data center components • learn how prefabricated solutions can provide more revenue generation capability than competing alternatives • know what key things to consider when evaluating prefabricated data center design
Tags : 
data centers, colocation provider, schneider electric, - modular data centers, prefabricated data center
    
Schneider Electric
Published By: Schneider Electric     Published Date: Mar 28, 2019
Attracting Investors Webinar: With more than $18 billion in M&A activity in the first half of last year alone, the colocation industry is riding the bubble of rapid growth. Colocation data center providers are being evaluated by a wide range of investors, with varying experience and perspectives. Understanding the evaluation criteria is a critical competency for attracting the right type of investor and investment to your colocation business. Steve Wallage, Managing Director of Broad Group Consulting, has led more than 30 due diligence projects and will discuss specific areas of focus including assessment of financials, management, customers, business plan, competitive positioning and future strategy and exit. By attending this presentation colocation providers will: • Hear how investors are assessing colocation providers • Understand different types of investor strategy and positioning • Explore actual case studies –success stories as well as examples where investors walked away • Walk away with a greater understanding of how to not only attract investment, but the right type of investor to propel their business growth
Tags : 
investors, schneider electric, - colocation provider, attracting investors, colo data center
    
Schneider Electric
Published By: Unit4     Published Date: Apr 12, 2019
Financial planning and analysis is evolving to support digital business initiatives. Application leaders supporting finance transformation must focus on new ways of managing financial performance by enabling broader integration with operational plans and actionable performance reporting. Download this complimentary Gartner report and discover how.
Tags : 
    
Unit4
Published By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
    
Intel
Published By: Intel     Published Date: Apr 15, 2019
There’s never been a more urgent need for comprehensive security and surveillance solutions. GeoVision Inc. has built its business on helping meet this need, providing digital and networked video surveillance solutions to customers in 110 countries. To succeed in its highly competitive and fast-changing industry, GeoVision must always be on the lookout for ways to give its customers leading-edge performance. Find out how GeoVision is working closely with Intel to maximize the performance of the hardware using the tools in Intel® System Studio, a comprehensive development tool suite to optimize the computer vision and deep learning workloads.
Tags : 
    
Intel
Published By: Mimecast     Published Date: Apr 10, 2019
Email. It’s the number-one business application used by organizations. It’s also the number-one method used to execute cyberattacks, enabling malware delivery, phishing, impersonations, and the spread of threats that are already internal to your organization. In fact, 91 percent of all cyberattacks start with an email. And your organization can’t function for long without email. How many hours of email downtime can your organization comfortably live with? If email isn’t accessible due to an adverse incident like malicious intent, human error or technical failure, your organization would likely suffer. The only way to get ahead of cybercriminals and to holistically protect your business is to adopt a new approach to email security. You need a multidimensional approach that brings together threat protection, adaptability, durability and recoverability in a single cloud-based service. You need to enable these four dimensions to truly provide cyber resilience for your email.
Tags : 
    
Mimecast
Published By: Gigamon EMEA     Published Date: Apr 10, 2019
When selecting the right SOC for your business, taking into account current risks, threats and business objectives is absolutely critical. Get the Gartner report Selecting the Right SOC Model for Your Organization and decide for yourself which one makes the most sense for your company. This report looks at different factors for SecOps to consider for building, implementing, running, and sustaining the right SOC with 24/7 visibility into the IT environment.
Tags : 
    
Gigamon EMEA
Published By: HERE Technologies     Published Date: Mar 25, 2019
In the future, people won’t necessarily want to own cars, but they’ll need personal mobility. The mobility ecosystem can support a range of different services, but in the near-term, many of these nascent businesses face a range of operational challenges as they bid to grow and become profitable. This ebook explores the fundamental needs of new mobility providers as they target business improvements, looks at their considerations as they forge key technology partnerships, and shows how HERE's Auto Mobility Operations solution can help mobility services meet those requirements. This ebook will help you understand how Auto Mobility Operations helps: • Enable the creation and integration of key location features as applications for mobile operating systems through use of the HERE Mobile SDK • Manage and efficiently operate fleet assets with HERE Location Services, providing fresh, high-quality and global location-based data • Create a frictionless and compelling UX - with APIs, mapping
Tags : 
auto, mapping, location data
    
HERE Technologies
Published By: Loop Commerce     Published Date: Mar 08, 2019
As retail continues its internet-influenced change and customer demand for “right now” service increases, a new area is open for business. There is no reason to send a shirt that is the wrong size or give an impersonal gift card. G-Commerce is here, offering a new type of personalized transaction and digitalized merchandise for those shopping for others. Learn how Loop Commerce's flagship product, GiftNow: • Increased % of sales from gifts by 2X • Drove 24% of Christmas Eve sales • Increased 6X demand over gift cards Retailers can grab last-minute shoppers literally up to the moment before a holiday, and increase profits through fewer merchandise returns.
Tags : 
    
Loop Commerce
Published By: Illusive Networks     Published Date: Apr 10, 2019
During periods of rapid growth, your business is especially vulnerable to cyberattacks from both malicious insiders, and external threat actors. Extended periods of IT change and consolidation can open seemingly minor security gaps that can quickly become gaping holes attackers will exploit. This quick read will enrich your internal dialog about how to prepare for elevated risk of high-impact cyberattacks.
Tags : 
m&a, mergers and acquisitions, business infrastructure, external threats, cyber attacks, vulnerability management, business it, it security, network security, cyber risk, deception technology, endpoint security, illusive networks, lateral movement, enterprise security
    
Illusive Networks
Published By: Forcepoint     Published Date: Mar 14, 2019
Get a firsthand account of how Forcepoint’s CIO, Meerah Rajavel prepared for the regulation including collaborating with all stakeholders to jointly determine how the regulation applied to each part of the business and implementing a path to compliance.
Tags : 
gdpr, data protection, regulation, data protection regulation, general data protection regulation, data discovery, breach response, compliance, data governance, personal data, european union, breach detection
    
Forcepoint
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
Delivering personalized customer experience remains the top business challenge for communications service providers (CSPs). Ovum's recently published 2018 ICT Enterprise survey saw almost all CSP IT executives interviewed identify delivering personalized customer experience as one of their three most important business challenges for the next 18 months. This trend emphasizes the high priority CSPs place on how customer relationships are managed. However, several factors have an impact on CSPs' ability to identify and then deliver customers' core needs. These include understanding the data sets they should focus on; collecting, cleansing, and consolidating these data sets; and having the right expertise to mine the data sets.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
The data maturity curve As companies invest more and more in data access and organization, business leaders seek ways to extract more business value from their organization’s data. 92 percent of business leaders say that to compete in the future, their organization must be able to exploit information much more quickly than it can today.1 Chief Information Officers (CIO) need solutions that will allow them to evolve their organization’s approach to data and drive real value with strategic decisions. This journey can be depicted in a data maturity curve.
Tags : 
    
Group M_IBM Q2'19
Published By: Domino Data Lab     Published Date: Feb 08, 2019
As data science becomes a critical capability for companies, IT leaders are finding themselves responsible for enabling data science teams with infrastructure and tooling. But data science is much more like an experimental research organization than the engineering and business teams that IT organizations support today. Compounding the challenge, data science teams are growing fast, often by 100% a year. This guide will quickly help you understand what data science teams do to build their predictive models and how to best support them. Learn how to modernize IT’s approach to ensure your company’s data science teams perform their best, and maximize impact to the business. Some highlights include: Why data science should not be treated like engineering. How to go beyond simple infrastructure allocation and give data science teams capabilities to manage their workflows and model lifecycle. Why agility and special hardware to support burst computing are so important to data science break
Tags : 
    
Domino Data Lab
Published By: Domino Data Lab     Published Date: Feb 08, 2019
A data science platform is where all data science work takes place and acts as the system of record for predictive models. While a few leading model-driven businesses have made the data science platform an integral part of their enterprise architecture, most companies are still trying to understand what a data science platform is and how it fits into their architecture. Data science is unlike other technical disciplines, and models are not like software or data. Therefore, a data science platform requires a different type of technology platform. This document provides IT leaders with the top 10 questions to ask of data science platforms to ensure the platform handles the uniqueness of data science work.
Tags : 
    
Domino Data Lab
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.