disruption

Results 251 - 275 of 314Sort Results By: Published Date | Title | Company Name
Published By: CDW     Published Date: Sep 29, 2015
This is a whitepaper about disruption in the data center and the rise of server virtualization.
Tags : 
enterprise, datacenter, virtualization, server, platform, scaling, san, storage, networks, disruption, transformation
    
CDW
Published By: CDW     Published Date: Sep 29, 2015
This is a whitepaper about how the enterprise datacenter has gone through waves of disruption and transformation over the past couple of decades.
Tags : 
hyper-convergence, cloud, infrastructure, ecosystems, network, datacenter, storage, server, application, software
    
CDW
Published By: Microsoft Office 365     Published Date: Mar 01, 2018
Digital disruption is imminent in every industry The real question is: how do you adopt technology in a way that optimizes your existing processes and transforms your organization? Of course, no two businesses are the same, and transformation will look different for each business. That's why Microsoft has pinpointed a pattern to success in digital transformation across companies - both small and large. These companies all used technology to achieve fundamental goals that ladder up to four principles: Engage customers Empower employees Optimize business processes and operations Transform products through digital content
Tags : 
    
Microsoft Office 365
Published By: LogicNow     Published Date: Mar 10, 2016
Focusing your managed services business on cybersecurity creates several opportunities to increase margins; most significantly, by implementing layers of security at client sites you can reduce costly security-related issues. In this whitepaper we highlight the reasons why an effective cyberdefense strategy should involve multiple layers of technology and detail why customer disruption is a revenue killer in world of the managed service provider (MSP).
Tags : 
managed services, cyber security, logicnow, cyberdefense
    
LogicNow
Published By: CloudEndure     Published Date: Oct 12, 2018
Maintaining business continuity is your highest priority. In today’s commercial landscape, business continuity depends on the efficient, uninterrupted flow of data across the organization – from operations to sales to fulfillment. Even a brief lapse in workload continuity can mean thousands of lost sales opportunities, disruption to production, and compromised customer trust. The causes of those lapses can range from natural disasters to mechanical failure or human error. You need a data platform and a proactive disaster recovery (DR) strategy that will help you stay up and running in the event that your physical infrastructure is unavailable for any length of time. BUSINESS CONTINUITY Fulfilling orders, providing a high level of customer service, and keeping consumers engaged all depend on the efficient, uninterrupted flow of data throughout your organization. CUSTOMER TRUST Above all, protecting customer data—especially personally identifiable information (PII) —is critical
Tags : 
    
CloudEndure
Published By: FTI Consulting     Published Date: Mar 03, 2017
2016: The year in crisis provides The Economist Intelligence Unit’s assessment of sources of corporate risk in the year 2016, its evolution over the next three years, and a perspective on the role of the board of directors in managing crises.
Tags : 
fti, fti consulting, crisis management, corporate risk, cyber attacks, political disruption, corporate crisis
    
FTI Consulting
Published By: Insight     Published Date: Dec 05, 2017
Will you evolve with the digital workforce? New-era workers are breaking the confines of their cubicles. That means businesses need to offer more digital work experiences — but the path isn’t always clear. We’re rallying three workplace technology experts to discuss how to orchestrate a modern device and cloud application rollout to empower your anywhere, anytime workforce. Today’s solution landscape is ripe with effective ways to help organizations empower modern workers. In this exclusive Livestream, you’ll learn the true value of modern devices and cloud applications — and how to orchestrate every moving part of a connected workforce without compromising security.riving workplace disruption? This Livestream recording will reveal: -What’s driving workplace disruption? -What real-world tactics can we implement to conquer disruption? -How can we leverage the cloud? -What are the biggest challenges IT faces when modernizing?
Tags : 
technology, forum, workforce, workers, business, security
    
Insight
Published By: Sitecore     Published Date: Jul 23, 2015
Rapid technology disruptions, high customer demands, and gaps in staff skills to address both, are some of the crucial challenges most digital marketers face today.
Tags : 
marketing maturity, uponor, sitecore, crm, customer experience, digital presence, sitecore
    
Sitecore
Published By: Webroot     Published Date: Sep 18, 2013
Webroot conducted research on web security in the US and the UK. As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate network or other corporate online resource via their laptops, tablets or smartphones. • 90% of companies agree that managing the security of remote users is extremely challenging • Twice as many companies with remote users reported Web-borne attacks by criminals, which compromised the security of customer data • 50% of firms with remote users say web-borne attacks impacted company financials
Tags : 
security, remote users, cybercrime, web attacks, malware, phishing, mobile browser security, mobile device
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
Webroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences, and how IT pros are responding. Among the results, the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012. The survey report also includes recommendations—such as deploying a secure web gateway—for responding to this new threat environment. Key findings include: • 8 in10 companies experienced web-borne attacks in 2012 • The majority of respondents reported significant impacts such as increased help desk time, reduced employee productivity and disruption of business activities • Secure web gateways are a critical component of an effective defense against web-borne threats
Tags : 
web threats, data loss, security, web gateway, web attacks, security breach
    
Webroot
Published By: McAfee     Published Date: Nov 14, 2012
Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary damage in its many forms: business disruption, bad publicity, stiff fines for noncompliance, and undermined customer confidence.
Tags : 
database, security, mcafee, data breach
    
McAfee
Published By: SAP     Published Date: Feb 05, 2008
Many CEOs have told us that business transformation needs to be done effectively and efficiently, without much disruption to the business. And it should be a continuous process, not a one-time event. Continuous business transformation, accomplished over time, requires a new degree of flexibility and adaptability in all parts of the enterprise. So how do you get ready to change and continue to change?
Tags : 
sap, business transformation, enterprise applications, market leadership
    
SAP
Published By: SAP     Published Date: Jun 27, 2009
As corporations become more dependent on their ERP systems, they struggle to strike the right balance between regularly updating the software and minimizing cost and disruption to the business. This Report offers advice on how to develop and communicate a practical upgrade strategy and then build an effective process for maintaining your ERP asset.
Tags : 
sap, business intelligence, erp, sme, shipping, transportation, enterprise applications, enterprise, resources, infrastructure
    
SAP
Published By: SAS     Published Date: Mar 06, 2018
The headlines and major company announcements share a common theme: Competitive disruption is reshaping business models and organizations’ very futures. Around the global automotive industry, component and original equipment manufacturers (OEMs) are taking a hard look at where their future growth will come from ? and it’s not all based on their core businesses. New technology has opened the door for new services and revenue streams.
Tags : 
    
SAS
Published By: Microsoft Office 365     Published Date: Sep 08, 2016
As a tech leader, you recognize that disruption is a fact of life. According to Gartner, enterprise IT has entered an era of digitalization where disruptive new products are providing a continuous stream of growth, innovation, and differentiation.
Tags : 
    
Microsoft Office 365
Published By: Citrix Online     Published Date: Aug 09, 2010
When a workplace disruption hits, you need to act fast to ensure your employees are safe, keep them informed and maintain productivity. This new Forrester white paper explores the critical role that the help desk should play in your organization's business continuity planning.
Tags : 
citrix, business operations, workforce management, recovery, it operations, help desk, critical path, call centers, business security, workplace
    
Citrix Online
Published By: IBM     Published Date: Sep 30, 2015
Customer experience in the telecommunications industry.
Tags : 
telecommunications, csp's, ott, customer loyalty, big data
    
IBM
Published By: Symantec     Published Date: Jun 13, 2018
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices desktops, laptops, tablets, and smartphones with various operating systems to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. In the wake of this disruption, vendors offered myriad point products that solve only a portion of the security problem. These products usually require costly custom integrations and high management overhead to boot. Making matters worse, traditional security approaches can’t address an evolving threat landscape that includes ransomware, stealthy attacks that dwell in a customer’s environment for months, and threats targeting iOS and Android devices. In fact, the mobile workforce is more vulnerable than ever before.
Tags : 
    
Symantec
Published By: IBM     Published Date: Jul 15, 2015
This paper talks about the importance of adapting to changes in fraud attacks without significant bank involvement or end user disruptions.
Tags : 
cyber threats, fraud prevention, fraud management, holistic solutions, end user disruptions, defrauding, malware management
    
IBM
Published By: Cisco     Published Date: Jul 11, 2016
Digitization is reshaping the business landscape at an unprecedented rate. The disruption of established businesses used to take decades, but natively digital organizations such as Uber, Google and Amazon have disrupted their respective markets in fewer than 10 years. Digital transformation is creating new winners and losers faster than ever before. Exhibit 1 shows that in 1960, on average, businesses remained on the S&P 500 Index for 50 to 60 years; by 1980, the rate of change was cut in half. Based on these trends, by 2025, businesses are forecast to stay on the index for an average of only 12 years. Leveraging this economic data, ZK Research predicts that 75% of the index will turn over in the next 10 years. New market leaders will emerge, and established organizations will struggle to survive.
Tags : 
    
Cisco
Published By: IBM     Published Date: Jul 26, 2017
Ponemon Institute is pleased to present the results of Uncovering the Risks of SAP Cyber Breaches sponsored by Onapsis. The purpose of this study is to understand the threat of an SAP cyber breach and how companies are managing the risk of information theft, modification of data and disruption of business processes. The companies represented in this study say their SAP platform has been breached an average of two times in the past 24 months.
Tags : 
cyber breach, data security, information theft, security risk, risk management
    
IBM
Published By: IBM     Published Date: Oct 19, 2017
In the digital economy, big IT budgets, lots of brick sand mortar and an established market presence are no longer at the foundation of a competitive advantage. What matters now is the agility and speed to ensure that customer centricity is supported as an overriding priority of business operations and decision making. Game-changing ideas are developing and competitive threats are emerging at a rapid and unpredictable pace. The resulting digital disruption is not just occurring at the margins or within isolated pockets of industry and commerce. It’s the new normal and its consequences are far reaching. The essential question for every organization in every sector is simply: Will we be the disruptor or will we allow ourselves to be the disrupted? Staying ahead requires adopting a combination of technology solutions. Key among them is a smart process and decision management system that infuses every process with intelligence in order to continuously raise the bar for customer centricity,
Tags : 
    
IBM
Published By: IBM     Published Date: Oct 19, 2017
In the digital economy, big IT budgets, lots of brick sand mortar and an established market presence are no longer at the foundation of a competitive advantage. What matters now is the agility and speed to ensure that customer centricity is supported as an overriding priority of business operations and decision making. Game-changing ideas are developing and competitive threats are emerging at a rapid and unpredictable pace. The resulting digital disruption is not just occurring at the margins or within isolated pockets of industry and commerce. It’s the new normal and its consequences are far reaching. The essential question for every organization in every sector is simply: Will we be the disruptor or will we allow ourselves to be the disrupted? Staying ahead requires adopting a combination of technology solutions. Key among them is a smart process and decision management system that infuses every process with intelligence in order to continuously raise the bar for customer centrici
Tags : 
    
IBM
Published By: InMage     Published Date: Feb 18, 2009
Business-critical data and applications must be available around the clock or serious business disruption could result.
Tags : 
inmage, practical business protection, dr-scout, continuous data protection, cdp, encryption support, host-agents, control servers
    
InMage
Published By: Zycus     Published Date: Apr 08, 2010
In the past decade, procurement and finance executives have become generally aware of the potential impact of supplier insolvencies, supply disruptions, commodity pricing volatility and the impact that these-not to mention a range of other dangers lurking within their supply chain can have on their business.
Tags : 
zycus, supply chain risk management, analytics
    
Zycus
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.