sca

Results 1 - 25 of 3784Sort Results By: Published Date | Title | Company Name
Published By: Dell APAC     Published Date: May 29, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
Published By: Dell APAC     Published Date: May 30, 2019
Digital transformation (DX) is reaching a macroeconomic scale. DX business objectives are balanced between tactical and strategic objectives and range from improvement in operational efficiencies and customer satisfaction to increasing existing product revenue to improving profit margins to launching new digital revenue streams. Successful DX relies on utilizing data for services as well as converting data into actionable insights. This reliance on data is contributing to a new digital era. 3rd Platform (cloud, social, mobile, and Big Data) computing is the underpinning of DX worldwide. It enables collection of a vast breadth of data sets and delivers the agility and efficiency needed to accelerate DX
Tags : 
    
Dell APAC
Published By: Cisco EMEA     Published Date: Mar 08, 2019
Learn what the Small Business cyber-threat landscape looks like today so your business can survive; reduce operational costs and grow securely; make security a priority for everyone, and protect your business with Cisco. As your business grows, it gets noticed and not all of the attention is welcome. More and more sophisticated criminal gangs are going after small businesses
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldn’t be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. It’s also highly likely that other threats, such as unauthorized M
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
For more than a decade, Cisco's security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organisational implications. Today, Cisco is publishing its second report for 2019: Defending against today's critical threats. This white paper looks back at the threat landscape over the past year, highlighting some of the key cyber security incidents during that timeframe. However, this isn't just another retrospective report, fondly looking back at events that have already come to pass.
Tags : 
    
Cisco EMEA
Published By: MediaPass     Published Date: Apr 02, 2013
Read this paper to understand 3 sudden industry shifts that affect your site’s ability to survive in a changing landscape.
Tags : 
    
MediaPass
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
    
Rubrik EMEA
Published By: Dell EMC     Published Date: May 08, 2019
Greater performance, agility and security are the new imperatives of the modern data center, and according to the Edison Group, Dell EMC PowerEdge servers outperform HPE servers. PowerEdge servers?with Intel® Xeon® Scalable processors? have customer-centrice innovation that is better able to meet the advance demands of IT Transformation, today and tomorrow. Download this infographic to learn the 5 reasons why.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
Traditional methods for provisioning and deploying end-user devices can present real headaches to IT staff and business in general. In comparison, Dell Provisioning for Vmware Workspace ONE® saves time for small and large-scale deployments. This service enables a company to pre-configure devices before they leave the factory, with no ongoing IT involvement. Download this white paper from Dell and Intel® to learn how to; eliminate on-site adminstrative deployment time, deploy large quanitites of fully provisioned devices with a single one-time configuration, and, expedite getting fully configured systems to end-users.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
Data security is a top priority and a daunting challenge for most organizations. Costly data breaches are incresing in number and sophiscation, and a growing list of regulations mandate that personal data be protected. At the same time, security technologies must not impede user productivity by creating obstacles or slowing performance, otherwise users might disable or circumvent them. A robust security strategy that includes authentication, encryption and advanced malware prevention enables an organization to keep data safe while enabling the way people work. Dell has conceived and executed an innovative securtiy strategy that provides date protection and threat prevention across an extensive line of products. Download this white paper from Dell and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
Disaster recovery (DR) and long-term retention of data, for security as well as regulatory compliance, can be very challenging for mid-sized organizations. Keeping a secondary site up for DR can get very expensive and dealing with tape can be slow and costly. As a result, many mid-sized organizations are looking to the efficiencies of the cloud, such as scale, elasticity, agility, and lower initial storage costs, to expand their data protection environments. Check out this easy-to-absorb infographic to learn how to achieve powerful, converged, easy to deploy and manage, cloud-ready data protection.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2019
.As midmarket companies pursue business growth, they must deliver differentiated products and experiences without compromising business or customer data. Crucial to this is having the most up-to date IT infrastructure to support the scale and complexity of a changing application landscape. Midmarket businesses (MBs) must modernize their data centers refreshing server infrastructure and automating their IT management processes. Those that do will propel business innovation and deliver superior customer experiences with secure, fast, and reliable business technology. Download this paper, commissioned by Dell, to learn more.
Tags : 
    
Dell EMC
Published By: Emarsys - APAC     Published Date: Jun 12, 2019
Omnichannel isn’t just another buzzword you can ignore. In fact, today’s most successful marketing strategies all take an omnichannel track that puts customers at the center of a diverse network of interactions and engagements. In this white paper, you’ll learn: • How email can serve as the foundation of your omnichannel strategy • How Artificial intelligence marketing (AIM) can make it possible to not only achieve true 1:1 personalization, but also scale it • How to apply a step-by-step roadmap to your brand’s pursuit of omnichannel excellence
Tags : 
    
Emarsys - APAC
Published By: Cisco and NVIDIA Corporation     Published Date: Jun 13, 2019
IT organizations are no longer just a business support function and cost center—they are expected to drive business as part of the core corporate strategy. Adding to this, IT landscapes continue to increase in complexity, complicating management and innovation. Digital transformation helps IT adapt to these changes. Building a hybrid or multi-cloud IT environment can help you transform successfully. An effective cloud environment can provide: • Improved infrastructure management and flexibility • More time for IT to focus on strategic projects rather than manage data centers. • Better IT cost management In fact, 49% of companies cite “modernized IT infrastructure and technologies with increased agility, flexibility, manageability, and security” as a digital initiative on their long-term roadmap. To learn more, download this eBook!
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Gigamon     Published Date: Jun 10, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper. 
Tags : 
    
Gigamon
Published By: Rackspace     Published Date: May 28, 2019
Enterprises in Asia Pacific now run multiple clouds with sizeable workloads, and cloud technologies have become increasingly challenging to manage. While IT organizations seek specialized expertise to keep pace with the constant change and complexity, what they are met with instead, is a global shortage of skilled cloud experts. As the costs in recruiting and training talent rises, the situation escalates into a hurdle to implementing cloud strategies. To better understand the cost of cloud expertise, Rackspace teamed up with the London School of Economics (LSE) and independent research house Vanson Bourne, to research on the severity of the problem. This e-book covers the findings to provide thought-provoking insights into why you should drive your cloud journey along the managed cloud provider route, if you were to be caught in a no-win HR loop.
Tags : 
cloud expertise, outsourcing, cloud services, managed cloud
    
Rackspace
Published By: Gigamon     Published Date: Apr 10, 2019
Upgrading your network doesn’t have to be a big headache. Get the Securosis report Scaling Network Security and scale security controls and policy without starting over. Discover your options for improving security architecture on your terms, using existing infrastructure and intelligently applying security controls at scale without major overhauls. With this approach, your network protection can evolve with applications, attackers and technology—even in today’s demanding 100Gbps network environment.
Tags : 
    
Gigamon
Published By: Workday APAC     Published Date: May 08, 2019
" How do some of the world’s biggest organizations transform their global HR operations? The five companies profiled in this eBook made their HR transformation journeys in very different ways, but they all arrived at the same destination—a single system that streamlines processes and boosts engagement across the entire organization. Read now to get their stories."
Tags : 
    
Workday APAC
Published By: HotSchedules     Published Date: Mar 28, 2019
Let’s just say it — inefficient restaurant employee scheduling practices can be Hell for managers. Trying to manage schedules with spreadsheets, sticky notes, missed phone calls and text messages isn’t just source of pain for your employees — it can also do more damage to your business than you might expect, including unnecessary labor spend, increased employee turnover and decreased customer satisfaction. In this eBook, we’re going to take a journey through the 9 Circles of Restaurant Employee Scheduling Hell and outline tangible paths to scheduling and labor management salvation.
Tags : 
    
HotSchedules
Published By: CheckMarx     Published Date: Jun 07, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
    
CheckMarx
Published By: Uberflip     Published Date: Jun 11, 2019
Personalized content experiences now play a key role in how we engage our customers throughout the buyer journey. With that, more and more companies are looking to invest in technology to help them create and manage personalized content experiences at scale. But with a growing list of vendors, it’s becoming increasingly difficult for organizations to pinpoint the right solution.
Tags : 
    
Uberflip
Published By: Anaplan     Published Date: Mar 12, 2019
In this paper, learn how Tata Steel Europe achieved 2-3x faster and more efficient planning Tata Steel Europe (TSE) knew they wanted to connect supply chain processes to the rest of the business—and that required a true platform. “The deciding factor was the robust nature of Anaplan’s platform. It is not just a planning solution for supply chain planning experts,” said Ardy Duwel, Head of Commercial Projects Office at TSE. “We wanted something that would scale to meet the needs of our planning professionals while bringing the rest of our business into the planning process."
Tags : 
    
Anaplan
Published By: Anaplan     Published Date: Mar 12, 2019
In this paper, learn how Tata Steel Europe achieved 2-3x faster and more efficient planning Tata Steel Europe (TSE) knew they wanted to connect supply chain processes to the rest of the business—and that required a true platform. “The deciding factor was the robust nature of Anaplan’s platform. It is not just a planning solution for supply chain planning experts,” said Ardy Duwel, Head of Commercial Projects Office at TSE. “We wanted something that would scale to meet the needs of our planning professionals while bringing the rest of our business into the planning process."
Tags : 
    
Anaplan
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.