enterprise management

Results 251 - 275 of 1482Sort Results By: Published Date | Title | Company Name
Published By: Sage Software (APAC)     Published Date: May 02, 2018
Forward-looking enterprises are deciding to replace their legacy systems with more modern enterprise management solutions that provide a better way to manage the entire business, at a lower cost and on a global scale. Sage Business Cloud Enterprise Management solution is changing how enterprises compete and grow, by delivering faster, simpler and flexible enterprise management, at a fraction of the cost and complexity of typical enterprise ERP systems. Break free from the constraints of traditional ERP solutions and discover how Sage Business Cloud Enterprise Management can accelerate your business.
Tags : 
    
Sage Software (APAC)
Published By: CA Technologies     Published Date: Aug 24, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies
Published By: Dyn     Published Date: Nov 03, 2016
We all know that hybrid cloud adoption is exploding, with 80% of enterprises having at least some infrastructure in the cloud. This growth includes increased use of the internet to deliver applications, sites and services to employees, partners and customers. These companies need an internet performance management (IPM) strategy to ensure those services reach users effectively, starting with DNS. Join Trip Kucera and Dyn VP, Gary Sloper, as they discuss the impact of cloud and internet infrastructure across the cloud adoption lifecycle. Key focus points include: • Optimizing round trip times and latency, from time to first byte, to internet routing • Understanding and comparing cloud service providers • Protecting your service from route hijacks, DDoS attacks and mitigating vulnerabilities. Watch this short Video Webinar and learn how focusing on the DNS layer can help you plan, migrate and optimize your way to cloud success!
Tags : 
dyn, dns, hybrid, hybrid cloud, ipm
    
Dyn
Published By: IBM     Published Date: Jan 09, 2017
Security managers should evaluate MSSPs for enterprise scale operations, multinational and local presence, and effective threat management and compliance capabilities. Use this Magic Quadrant to evaluate MSSPs to support global service requirements, regional presence and leading-edge services.
Tags : 
ibm, security, maturity, gartner, magic quadrant, managed security services
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
Every day, torrents of data inundate IT organizations and overwhelm the business managers who must sift through it all to glean insights that help them grow revenues and optimize profits. Yet, after investing hundreds of millions of dollars into new enterprise resource planning (ERP), customer relationship management (CRM), master data management systems (MDM), business intelligence (BI) data warehousing systems or big data environments, many companies are still plagued with disconnected, “dysfunctional” data—a massive, expensive sprawl of disparate silos and unconnected, redundant systems that fail to deliver the desired single view of the business. To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize
Tags : 
scalability, data warehousing, resource planning
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
To compete in today’s fast-paced business climate, enterprises need accurate and frequent sales and customer reports to make real-time operational decisions about pricing, merchandising and inventory management. They also require greater agility to respond to business events as they happen, and more visibility into business activities so information and systems are optimized for peak efficiency and performance. By making use of data capture and business intelligence to integrate and apply data across the enterprise, organizations can capitalize on emerging opportunities and build a competitive advantage. The IBM® data replication portfolio is designed to address these issues through a highly flexible one-stop shop for high-volume, robust, secure information replication across heterogeneous data stores. The portfolio leverages real-time data replication to support high availability, database migration, application consolidation, dynamic warehousing, master data management (MDM), service
Tags : 
ibm, infosphere, data replication, security, data storage
    
IBM
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: IBM     Published Date: Mar 13, 2014
This report takes an in-depth look at the primary challenges facing IT and how the IBM X6 Portfolio can deliver the performance needed as a solution to these challenges.
Tags : 
ibm, enterprise applications, data, server, memory, storage, management platforms
    
IBM
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: Sage EMEA     Published Date: May 13, 2019
Enterprises must continuously change to keep ahead of the competition, reduce silos, improve connectivity and respond rapidly to a changing world. Organisations also need to drive continuous innovation with technology that helps them adapt faster. So if you’re thinking of replacing your legacy ERP system, start by asking yourself these three essential questions:
Tags : 
    
Sage EMEA
Published By: Sage EMEA     Published Date: May 13, 2019
Your ERP system might be out of date and too complex to handle your industry’s challenges. Should you upgrade to an enterprise management solution? Now you can. Here are 4 reasons why
Tags : 
    
Sage EMEA
Published By: CA Mainframe     Published Date: Sep 12, 2008
This White Paper discusses end-to-end application performance management in the context of the impact to the business. It then highlights CA’s application quality and performance manage­ment solutions for both Web and mainframe applications, with particular focus on the integration of CA Wily with AQM Solutions’ TRILOGexpert APCTM for TriTuneTM with Performance Desktop.  It concludes with the Enterprise Management Associates (EMA) perspective on the market in general, and on the CA solution in particular.
Tags : 
ca mainframe, application performace management, quality management, application quality, mainframe
    
CA Mainframe
Published By: CA Mainframe     Published Date: Sep 12, 2008
Increasing infrastructure complexity has led to unprecedented growth in enterprise systems management data on all systems, including the mainframe and it is becoming more complex to manage SMF data.  Download this Technology Brief to learn how to address the complexity of managing SMF data.
Tags : 
smf, service management, data management, infrastructure, systems management, ca mainframe, mainframe
    
CA Mainframe
Published By: HP - Enterprise     Published Date: Jun 05, 2013
Whether you want to map directions, find a restaurant, look up your flight details, see where your next meeting is, or just check your email, chances are you do it on your smartphone. Just about everything is going mobile. Industries such as retail and financial services are going mobile to increase efficiency and generate more revenue. Mobile business apps and mobile enterprise apps have the potential to transform organizations. This white paper discusses key mobile trends and analyzes how financial services organizations must change their IT application development, testing, monitoring, and management methodologies while extending their services to multi-client mobile environments, leveraging both Native and Mobile-oriented Web apps.
Tags : 
mobility, financial services, revenue stream, application development
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Obrela, an Enterprise information security service provider, leveraged HP ArcSight to improve and protect their complex work environment
Tags : 
obrela, hp arcsight, siem, security information, event management solution, security industries
    
HP - Enterprise
Published By: Liaison Technologies     Published Date: Nov 21, 2011
In this whitepaper, we describe how executive and IT management can get and maintain control of their company's data architecture to help meet business objectives. We describe the relationship between data integration projects and data architecture concepts and practices. We describe how the business planning and IT development processes that direct and leverage data integration projects depend on tooling. We describe breakthrough ways in which data architects, business analysts, programmers, and business users can collaborate to address their organization's pressing business challenges.
Tags : 
enterprise, soa, technology, liaison, business, data integration, data architecture, it management
    
Liaison Technologies
Published By: NetApp and VMware     Published Date: Jan 09, 2012
Magna International implemented NetApp storage to drive innovation while achieving enterprise IT efficiencies and agility. Read on to find out more.
Tags : 
private cloud, manufacture, innovation, assemblies, modules, enterprise, benefits, iaas, saas, netapp solutions for service providers, service-oriented infrastructure (soi), secure multi-tenancy, service automation and management, data mobility, storage efficiency, integrated data protection
    
NetApp and VMware
Published By: Lieberman Software     Published Date: Mar 27, 2012
Lieberman Software offers a solution today that helps secure unmanaged privileged accounts in your datacenter and prevent data breaches. Watch how we do it in this brief two minute video.
Tags : 
privileged identity management, enterprise password management, administrator access control, privilege account management, security management, it security audit, enterprise security
    
Lieberman Software
Published By: Lieberman Software     Published Date: Mar 27, 2012
When Carnegie Mellon University required a way to automatically update and securely store privileged account passwords, the IT group turned to Lieberman Software. Lieberman's Enterprise Random Password Manager was operational in less than one day.
Tags : 
privileged identity management, enterprise password management, administrator access control, privilege account management, security management, it security audit, enterprise security
    
Lieberman Software
Published By: Lieberman Software     Published Date: Mar 27, 2012
Without a reliable method to locate and change its privileged account passwords, Wings Financial was burdened with a variety of security and regulatory problems. Lieberman Software's Enterprise Password Manager solved all of this - find out how!
Tags : 
privileged identity management, enterprise password management, administrator access control, privilege account management, security management, it security audit, enterprise security
    
Lieberman Software
Published By: Lieberman Software     Published Date: Mar 27, 2012
Download "Privileged Identity Management: An Executive Overview" to learn where privileged identities can be found on your network; the challenges to discover, secure and manage them; and why unsecured privileged account credentials are dangerous.
Tags : 
privileged identity management, enterprise password management, administrator access control, privilege account management, security management, it security audit, enterprise security
    
Lieberman Software
Published By: Teradata     Published Date: Jan 30, 2015
Hadoop is the rising star of the business technology agenda for a simple reason — it disrupts the economics of data, analytics, and someday soon, all enterprise applications; it is secretly becoming an application platform too. Application development and delivery (AD&D) professionals should be aware of and take action on these eight predictions, including the disruptive power of “Hadooponomics,” Hadoop’s current killer app, the closing data management gap, and the emergence of brand new distros.
Tags : 
hadoop, hadoop adoption, cornerstone, business technology, hadooponomics, enterprise adoption, applications
    
Teradata
Published By: Genesys     Published Date: Oct 16, 2013
Presumably, service-oriented businesses already have customer relationship management (CRM) and business process management (BPM) systems in place that create workflows and processes. However, traditional systems aren't enough - they often result in blind spots in the completion of work processes. To meet the increasing demands of customers in today's fast-paced marketplace, you need a way to manage these efficiency gaps - to effectively assign work and monitor completion. In other words, you need workload management. Download this resource to get a more in-depth look at the shortcomings of traditional customer service processes, and learn how enterprise workload management can help you overcome these issues as well as: • Create a holistic view • Increase flexibility • Reduce cost • And more
Tags : 
contact center, customer service, customer relationship management, technology, business process management, bpm, crm
    
Genesys
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.