esp

Results 1 - 25 of 2791Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: 3D Systems     Published Date: May 15, 2019
Investment casting is a precise manufacturing methodology that delivers value across industries, from mechanical, automotive and aerospace parts to intricate dental work, jewelry and sculpture. For centuries the trade-off for smooth and accurate investment casted parts has been high costs and long casting pattern lead times. Now the evolution of parts is accelerating dramatically in many industries resulting in shorter product life cycles and lower volumes of casted parts between cycles. Waiting for tooling for obsolete parts for aging aircraft also mean delays for aircraft to be repaired, costing time and money. Demand for faster foundry production is increasing in all industries and foundries need to be ready to respond. To find out how 3D Sysytems can help your business, download this eBook today.
Tags : 
    
3D Systems
Published By: Instructure     Published Date: May 30, 2019
The Future of Work: 10 Essentials for Winning Employee Development Your go-to guide for thriving in the changing face of work Employee development looks a lot different today than it did just a few years ago. This ebook details 10 trends that are crucial for keeping up with the ever-changing future of work. The modern workforce is a place where baby boomers, Gen X, millennials and now Gen Z all share the same Nespresso machine. That’s four distinct generations with different views, expectations and priorities. Companies will have to adopt new methods for just about everything—from recruitment and benefits to employee development and career planning. While there are several key differences between each generation in the modern workforce, how companies should treat them can be summarised in one word: individually. This ebook is designed to help HR and L&D professionals who want to turn their organisation into a learning environment well-equipped for the workplace of tomorrow, do ex
Tags : 
    
Instructure
Published By: Schneider Electric     Published Date: Jun 07, 2019
Descubra cómo sacar el máximo provecho a su futuro. Este informe puede ayudarle a afrontar los desafíos del futuro, superar las expectativas de sus clientes y encontrar maneras de coexistir con las soluciones competitivas de centros de datos. 451 Research reúne información de los compradores y de quienes toman decisiones sobre el tema de los espacios de colocación, y resume lo que debe hacerse en las empresas de centros de datos de colocación.
Tags : 
colocación
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
El montaje del marco de pod proporciona ganancias más rápido. Acumule ahorros de CapEx. Un marco independiente con refrigeración adjunta y una infraestructura de soporte lo convierten en una construcción de centro de datos sin problemas. Una vez que se montó el marco, simplemente coloque en un rack y comience a generar ingresos. Este informe técnico explica cómo puede poner en funcionamiento esta tecnología orientada al futuro para su negocio.
Tags : 
colocación, de centro de datos
    
Schneider Electric
Published By: Nice Systems     Published Date: Feb 26, 2019
NICE WFM 7.0’s Forecaster unlocks a high level of transparency into interaction history, allowing you to centrally forecast, schedule and manage contacts between multiple locations and ensure that site- and enterpriselevel objectives are met. With more than two thousand customers and two million users depending on its unparalleled ability to fine-tune the most precise forecasts, Forecaster allows you to plan and respond to the peaks and valleys of customer history through automatic collection of key historical data from all types of contact sources: • Automatic call distributors (ACDs) • Outbound dialers • Multi-channel routing platforms • Back-office employee desktops Download today to learn more.
Tags : 
    
Nice Systems
Published By: Sage EMEA     Published Date: May 13, 2019
Enterprises must continuously change to keep ahead of the competition, reduce silos, improve connectivity and respond rapidly to a changing world. Organisations also need to drive continuous innovation with technology that helps them adapt faster. So if you’re thinking of replacing your legacy ERP system, start by asking yourself these three essential questions:
Tags : 
    
Sage EMEA
Published By: Gigamon     Published Date: Jun 10, 2019
Read this ESG research brief to learn how to improve visibility across distributed computing environments without increasing staff or tools. Download “The Importance of a Common Distributed Data Services Layer” to learn why ensuring visibility in a distributed network environment is crucial and how a common distributed data services layer to collect, process and share data ensures that network operations teams are able to provide better digital experiences, mitigate risk and respond to changing environments.
Tags : 
    
Gigamon
Published By: Uberall     Published Date: Apr 12, 2019
Consumers search for online reviews for reassurance and greater confidence in their buying decision. As 59% of consumers believe online reviews are just as trustworthy as their friends1, they may well be more influential than you think. Embracing and encouraging customer reviews can seem a little daunting, especially with the prospect of attracting negative reviews. But it doesn’t need to be. Not least because more consumers take the time to write positive reviews (49%) than negative (34%)1, but because when managed effectively, negative reviews can make a positive impact on your online reputation, and ultimately your sales. There are of course other factors that can make review management tricky, including a large number of locations, the consistency and timing of the message and a lack of education across the business, to name but a few. This guide is here is to tackle all these challenges and give you practical tools and steps that you can implement straight away, to encourage m
Tags : 
engage; reviews, review management, reputation management, uberall, online reviews
    
Uberall
Published By: Infinidat EMEA     Published Date: May 15, 2019
2017 no fue un año fácil para los CIO/CISO, y 2018 tampoco da muestras de serlo. Con tantas brechas en los datos acaecidas tan solo en 2017 y capaces de acabar con la carrera de cualquiera, (Equifax, Uber, Yahoo son algunos ejemplos), y los requisitos normativos reforzados a nivel mundial, los CIO/ CISO tienen la responsabilidad corporativa de replantearse su enfoque sobre la seguridad de los datos.
Tags : 
    
Infinidat EMEA
Published By: Beqom     Published Date: Jun 19, 2019
Les lec?ons ignore?es qui vous aideront a? re?ussir votre passage au nume?rique Les responsables RH et commerciaux doivent rationaliser le processus de re?mune?ration tout en attirant et en gardant les meilleurs e?le?ments, en soutenant la strate?gie commerciale et en assurant la conformite? re?glementaire. Remplissez le formulaire pour télécharger instantanément notre livre blanc gratuit et pour connaître les cle?s de la réussite de votre transition nume?rique de la re?mune?ration globale.
Tags : 
    
Beqom
Published By: Intel     Published Date: Feb 28, 2019
The confluence of AI and Industry 4.0 is transforming image processing. As image vision becomes widespread, there is an increasing need to transition stand-alone imaging to an integrated driver of automation feeding insights back into the business systems that monitor overall factory performance. Download the whitepaper to learn more about fitting multiple demands into a single platform— • Building an industrial system with advanced functions like machine vision and Industry 4.0 connectivity • Minimizing the footprint of the systems to save space, cost and power consumption • Adhering to principles of long life, safety, reliability, real-time control functionality alongside AI and IIOT capabilities
Tags : 
    
Intel
Published By: CheckMarx     Published Date: Jun 07, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
    
CheckMarx
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
Empowering the Automotive Industry through Intelligent Orchestration With the increasing complexity and volume of cyberattacks, organizations must have the capacity to adapt quickly and confidently under changing conditions. Accelerating incident response times to safeguard the organization's infrastructure and data is paramount. Achieving this requires a thoughtful plan- one that addresses the security ecosystem, incorporates security orchestration and automation, and provides adaptive workflows to empower the security analysts. In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 08, 2019
IBM provides a security incident response (IR) solution called Resilient that helps its customers address security incidents quickly in an automated and orchestrated manner. IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Resilient. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the Resilient platform on their organizations.
Tags : 
    
Group M_IBM Q2'19
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 15, 2019
Il 2017 non è stato un anno facile per essere un CIO / CISO e il 2018 non sembra mostrare alcun segno di miglioramento in tal senso. Con così tante violazioni di dati in grado di rovinare un’intera carriera nel solo 2017 (Equifax, Uber, Yahoo per citare solo alcuni casi) e con requisiti normativi più rigorosi in tutto il mondo, i CIO / CISO hanno la responsabilità societaria di rivedere il loro approccio alla sicurezza dei dati.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Jun 10, 2019
Digital disruption, economic instability, political upheavals and skills shortages have all at some point in the past 24 months been blamed for business failure, or at the very least, lost profitability and earnings. It’s perhaps not a huge surprise that a Gartner CEO survey on business priorities revealed that digital business is a top priority for next year. Survey respondents were asked whether they have a management initiative or transformation program to make their business more digital. The majority (62 percent) said they did. Of those organisations, 54 percent said that their digital business objective is transformational while 46 percent said the objective of the initiative is optimisation.* So, for businesses it’s a case of learning to evolve and be agile, to use technology to help compete more efficiently and not fall victim to inertia. As businesses become increasingly dependent on the insights from data analytics and face-up to competition fuelled by the 24/7 society of in
Tags : 
    
Infinidat EMEA
Published By: Indegy     Published Date: Jun 17, 2019
The Indegy Industrial Cybersecurity Suite protects industrial networks from cyber threats, malicious insiders, and human error. From threat detection and mitigation to asset tracking, vulnerability management, configuration control and device integrity checks, our Industrial Control System (ICS) security capabilities maximize the safety and reliability of your operational environment. Deployed as a network or virtual appliance, Indegy’s agent-less solution offers comprehensive security tools and reports for IT security personnel and OT engineers. The Indegy Suite delivers crystal clear situational awareness across all sites and their respective OT assets - from Windows Servers to PLC backplanes - in a single pane of glass.
Tags : 
cybersecurity, industrial networks, security capabilities, indegy
    
Indegy
Published By: Zscaler     Published Date: Jun 19, 2019
Scoprite attraverso questa guida come ridirigere in maniera ottimale il traffico delle vostre filiali, per permmettere un accesso diretto ad internet e alle vostre applicazioni nel cloud. Abbassate i vostri costi, ottenete una visibilita’ completa sul vostro traffico e migliorate l’esperienza dei vostri utenti mettendo in sicurezza le vostre filiali remote.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 19, 2019
Le applicazioni, come ormai anche gli utenti, stanno abbandonando la rete corporate. Tuttavia i sistemi di sicurezza spesso si trovano ancora all’interno del DC. E’ ormai arrivato il momento di ripensare questa architettura e offrire un’esperienza sicura ed ottimale ai proprio utenti senza badare a dove si trovino. La sicurezza offerta dalla piattaforma cloud di Zscaler vi permette di trasformare la vostra rete per sfruttare i vantaggi di un mondo orientato verso il cloud e alla mobilita’ degli utenti. Scoprite di piu’ con questo rapporto.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 19, 2019
Office 365 non e’ un’applicazione SaaS come le altre. La sua ‘fame’ in termini di banda larga e la sua sensibilita’ alla latenza rappresentano un vero ostacolo per le appliance tradizionali. Perche’? Perche’ la modalita’ di rete a stella non permette di offrire un’esperienza utente efficiente, aumentando allo stesso momento i costi d’implementazione. Office 365 puo’ trasformare la vostra attivita’, ma solamente con una rete addata al suo utilizzo. Scoprite in questa guida come le soluzioni Zscaler, raccomandate da Microsoft, possono aiutarvi alla migrazione verso Office 365.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 19, 2019
Il concetto di backhaul verso un data center sembra interessante in un contesto in cui sia gli utenti che le applicazioni risiedono al suo interno. Tuttavia con i dipendenti nelle diverse filiali e le applicazioni che migrano verso il cloud, ridirigere il traffico su una rete a stella offre una pessima esperienza all’utente oltre ad essere costoso e introduce rischi non necessari. La rete SD-WAN rappresenta una soluzione a questo problema. Facilita le connessioni locali all’internet. Zscaler le mette in sicurezza. Scoprite come con questo rapporto.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 20, 2019
Une solution adaptée à un environnement IT qui évolue
Tags : 
    
Zscaler
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.