framework

Results 26 - 50 of 580Sort Results By: Published Date | Title | Company Name
Published By: Riverbed     Published Date: May 24, 2012
Hybrid cloud architectures are growing in popularity as a way to cope with today's business needs. This paper outlines a framework and specific solutions for adopting a hybrid cloud architecture to support increased profits and productivity.
Tags : 
cio, cloud computing, hybrid cloud adoption, wan optimization, application delivery controllers, network performance management, cloud storage gateways
    
Riverbed
Published By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : 
security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security
    
HP
Published By: PC Mall     Published Date: Mar 02, 2011
Download this HP White Paper to learn how to protect your high value virtual assets with a combination of purpose-built IPS platforms and enterprise-class management solutions.
Tags : 
pc mall, virtualization, server virtualization, data centers, data center security, security
    
PC Mall
Published By: PC Mall     Published Date: Mar 21, 2011
Companies realize the benefits of moving to virtualization, however, most virtualized environments today are being deployed in an insecure manner. Download this HP White Paper to learn how to protect your high value virtual assets with a combination of purpose-built IPS platforms and enterprise-class management solutions.
Tags : 
keywords: virtualization, server virtualization, data centers, data center security, security
    
PC Mall
Published By: Aldon     Published Date: Jan 13, 2009
Learn what this regulation expects of IT and how to avoid the risk of expensive fines.
Tags : 
aldon, sox, sarbanes-oxley act compliance, sox responsibilities, automated change management
    
Aldon
Published By: Cision     Published Date: May 02, 2016
In the following paper, we will share the following key strategies that will fuel a successful social media strategy for your business. We will: - Outline the six strategies and technologies for creating a framework for success - Map out a social implementation model for setting up the distribution of your content in order to protect your brand when third-party platforms, such as Google and Facebook, inevitably make changes - Share the right way to think about measuring, monitoring and managing your social media strategy and performance
Tags : 
cision, social media, social media strategy, marketing
    
Cision
Published By: Lionbridge     Published Date: Nov 19, 2009
How Quality can Accelerate "Speed-to-Market". Read this white paper to find out more.
Tags : 
lionbridge, mobile software testing, quality assurance process, test automation, speed-to-market in mobile software, build validation, unit testing, mobility industry
    
Lionbridge
Published By: SchemaLogic     Published Date: Jun 11, 2008
SchemaLogic Enterprise Suite for Microsoft SharePoint 2007 (SES) resolves SharePoint issues by providing a framework that enables companies to model and connect the structures and relationships of the metadata across the entire SharePoint environment. SES continuously updates and synchronizes metadata across SharePoint site collections, Web applications and farms by leveraging and extending SharePoint’s native capabilities.
Tags : 
schemalogic, sharepoint, business tools, productivity, collaboration, collaboration tool, share point, microsoft
    
SchemaLogic
Published By: Websense     Published Date: Jan 25, 2013
In this whitepaper, we provide guidance and clarity to help you implement a DLP control that is practical, efficient, and effective. Learn about 4 key topics of data breaches, potential vendors, 9 step framework and other best practices.
Tags : 
websense, data loss prevention, executive guide, data loss, practical guide, 4 topics, potential vendors
    
Websense
Published By: Dell EMC     Published Date: Feb 23, 2017
This study provides IT decision-makers with insight on various types of clouds and how they are used today along with a practical framework to evaluate converged infrastructure versus do-it-yourself approaches.  Based on interviews with organizations that implemented VCE solutions, Forrester Consulting quantified how VCE converged infrastructure drove significant increases in IT efficiency and productivity, as well as decreases in the cost associated with infrastructure, security, and compliance. The study describes a process for setting improvement goals and measuring success for infrastructure modernization. This process is supported by an intuitive template.
Tags : 
    
Dell EMC
Published By: Dassault Systèmes     Published Date: Jul 21, 2017
This white paper outlines a framework that emphasizes digitization and business transformation and the new opportunities pull processes bring.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Dassault Systèmes
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This white paper outlines a framework that emphasizes digitization and business transformation and the new opportunities pull processes bring. The mechanism of “Pull” processes—those triggered by an actual event instead of a forecast—is nothing new. It is at the heart of many successful manufacturing strategies. Recent technological advances in digitization, including the harnessing of Big Data analytics, the use of the cloud, Business Process Management (BPM), social media, IIoT, and mobility, have extended the power of Pull beyond Lean manufacturing. In the wake of the current technological innovation wave, it is not uncommon for manufacturers to not know what next step to take. In light of these new developments, this white paper will focus on the mechanism of business transformation enabled by these technologies, which can be attributed to two major forces: the power of Pull and digitization. Nine practical applications are detailed, showing how innovative manufacturers can better
Tags : 
    
Dassault Systèmes
Published By: Dome9     Published Date: Apr 25, 2018
The term “Cloud First” was initially popularized by Vivek Kundra, who formerly held the post of White House CIO and launched this strategy for U.S. federal government IT modernization at the Cloud Security Alliance Summit 2011. The underlying philosophy of the cloud-first strategy is that organizations must initially evaluate the suitability of cloud computing to address emergent business requirements before other alternatives are considered. This paper offers guidance to help organizations establish a systematic and repeatable process for implementing a cloud-first strategy. It offers a high-level framework for identifying the right stakeholders and engaging with them at the right time to reduce the risk, liabilities, and inefficiencies that organizations can experience as a result of adhoc cloud decisions. The goal of this guidance is to help ensure that any new cloud program is secure, compliant, efficient, and successfully implements the organization’s key business initiatives.
Tags : 
    
Dome9
Published By: SAP     Published Date: Mar 24, 2011
Between May and June 2010 Aberdeen examined the experiences and intentations of more than 170 service and manufacturing enterprises in the use and selection of non-field based service delivery channels enterprises.
Tags : 
multi-channel service delivery, service delivery, multi-channel framework
    
SAP
Published By: Forcepoint     Published Date: Jul 30, 2019
How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Oct 03, 2019
Accelerate Cloud App Adoption without Compromising Security How secure is your cloud data? Security is still seen as the biggest concern when organizations consider cloud services. In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services, that adjusts to different cloud services, is well managed, can adapt to new cloud services and is scalable? In this session Forcepoint Senior Product Marketing Manager, Ankur Chadda, discusses: How to gain full visibility into your cloud environment, including shadow IT Unified policy management and enforcement for on-premises and cloud security How to control cloud access by unmanaged devices (BYOD)
Tags : 
    
Forcepoint
Published By: AWS     Published Date: Nov 16, 2018
"Today’s technology advances at a fast rate. Attempting to adopt modern architectures can uncover a knowledge gap with developers, who might be unfamiliar with new architecture patterns and frameworks. This includes adopting cloud-native architectures to help with greater efficiency and cost benefits. TIBCO’s integration solutions helps enable you to create an environment that simplifies the building of cloud-native applications, with support for modern architectures, such as microservices, event-driven APIs, serverless, and edge deployment. Download this solution brief to see how you can help accelerate your development on AWS cloud by: • Helping reduce your costs with modern application microservices and functions • Seamlessly migrating your integration workloads to Amazon Elastic Container Service using out-of-the-box migration utilities • Connecting your cloud, on-premises, and edge data sources, regardless of data formats "
Tags : 
    
AWS
Published By: Secure Computing     Published Date: Nov 30, 1999
Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. Find out in this paper how you can achieve automated configuration compliance with the SafeWord SecureWire IAM appliance from Secure Computing.
Tags : 
network architecture, network management, sarbanes oxley compliance, compliance, sox compliance, hipaa compliance, configuration management, government agency
    
Secure Computing
Published By: Aventail     Published Date: Aug 21, 2009
NAC is a multifaceted framework to thoroughly control who and what gets access to network resources, and help keep malware from entering the enterprise. Today, there are huge challenges to implementing as-yet immature NAC solutions on an enterprise-wide basis, including convoluted integration requirements, inadequate inspection capabilities, and weak policy management.
Tags : 
vpn, access control, security management, ssl, network access control, nac, policy management, security policies
    
Aventail
Published By: SAS     Published Date: Mar 06, 2018
As explored in this paper, the SAS Fraud Framework supports a complete, modular, enterprise-level program integrity solution that helps payers prevent, detect and manage fraud, waste and abuse across all silos and lines of business. Its fully integrated components offer both top-down and bottom-up functionality for exposing hidden and risky networks. This approach gives payers enhanced detection capabilities, greater insight into case management and improved operational efficiency while decreasing overall cost of ownership. The result is highly effective, early, and even preventative detection of fraud, waste, abuse and corruption that improves operational efficiency and reduces health care costs.
Tags : 
    
SAS
Published By: Adobe     Published Date: Mar 03, 2017
In the Media and Entertainment industry, it all comes down to acquiring and retaining audiences. The higher the audience value, the better. Our guide, Acquisition Evolved, gives you a four-part framework to identify and engage high-value audience segments across channels that drive engagement, subscriptions, and advertising opportunities. Read the guide to learn: • Tips to accelerate your data-driven marketing • How to overcome audience acquisition and engagement obstacles • How to identify the right marketing technology for audience acquisition
Tags : 
media and entertainment, acquiring audience, retaining audiences, data-driven marketing, engagement obstacles
    
Adobe
Published By: Adobe     Published Date: May 16, 2017
In the Media and Entertainment industry, it all comes down to acquiring and retaining audiences. The higher the audience value, the better. Our guide, Acquisition Evolved, gives you a four-part framework to identify and engage high-value audience segments across channels that drive engagement, subscriptions, and advertising opportunities. Read the guide to learn: • Tips to accelerate your data-driven marketing • How to overcome audience acquisition and engagement obstacles • How to identify the right marketing technology for audience acquisition
Tags : 
    
Adobe
Published By: IBM     Published Date: Mar 28, 2016
Workforce analytics is a very significant development in human resources. It promises the potential for deeper understanding of the ways workers contribute to organizational performance. However, workforce analytics is not just about analyzing data to reveal exciting insights; it also requires the active involvement of a firm’s workers if the potential of analytics is to be fully realized. Without active employee participation, workforce analytics efforts face at best, restricted data sources and data sets that are incomplete and at worst, the risk of damaging employee relations and, ultimately, productivity. This white paper summarizes recommendations that will encourage enthusiasm for workforce analytics and active employee participation, using the FORT (Feedback, Opt-in, Reciprocal, Transparent) framework. The FORT criteria could prove particularly useful in European countries. This is because the 1995 European Union Data Protection Directive, along with certain local legislative pr
Tags : 
ibm, ibm smarter workforce institute, work trends, employee engagement
    
IBM
Published By: IBM     Published Date: Jun 13, 2016
This white paper summarizes recommendations that will encourage enthusiasm for workforce analytics and active employee participation, using the FORT (Feedback, Opt-in, Reciprocal, Transparent) framework.
Tags : 
ibm, workforce analytics, hr analytics, human resources, employee engagement, employee participation
    
IBM
Published By: IBM     Published Date: Jul 20, 2016
This white paper summarizes recommendations that will encourage enthusiasm for workforce analytics and active employee participation, using the FORT (Feedback, Opt-in, Reciprocal, Transparent) framework.
Tags : 
ibm, workforce analytics, hr analytics, human resources, employee engagement, employee participation
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.