work solutions

Results 201 - 225 of 836Sort Results By: Published Date | Title | Company Name
Published By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
    
HP - Enterprise
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.
Tags : 
malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls, anti-virus, threats, solutions, webpulse, defense, cloud
    
Blue Coat Systems UK
Published By: Tellabs     Published Date: Mar 23, 2012
Tellabs' white paper explains how IPsec addresses the security issues inherent in LTE networks. It also reviews the end-to-end protection solutions available in the IETF IPsec standard.
Tags : 
deploy, tellabs, network migration, migration, synchronization, ethernet, backhaul, backhaul network, scalability, revenues
    
Tellabs
Published By: ClickExpress     Published Date: May 01, 2013
Even if you have only 15 mobile workforce employees, you can reduce costs and improve the customer’s experience using optimization software. Today, it’s easy because you don’t even have to provide dedicated mobile devices to your field employees, just an app. But how do you avoid difficult transitions for workers, long implementation times, and solutions that don’t work as you really needed? This paper walks you through the 6 steps to successful decision making.
Tags : 
6 essential, mobile, workforce, management, software, customer, experience, optimization, software, implementation
    
ClickExpress
Published By: ClickExpress     Published Date: May 01, 2013
Businesses with between 15-250 mobile workforce employees are looking for optimization software. At the same time, they don’t want a complex enterprise solution with long integration times and complex IT requirements. Many vendors are offering cloud-based solutions. But what does that mean? Is it secure? In this Q&A, we answer the most common questions about cloud-based software solutions for field service management.
Tags : 
cloud-based, solution, mobile, workforce, optimization, employees, software, enterprise, solutions
    
ClickExpress
Published By: ClickExpress     Published Date: May 01, 2013
Deploying a mobile workforce solution used to be a major undertaking. Today, it’s easy. You don’t need any specialized devices; management software is cloud-based, and training is short and simple. In other words, obstacles of the past have disappeared, and now is the time to implement mobile workforce solutions for organizations with between 15 and 250 mobile workforce. In this brief, you’ll see why it’s easier than ever to implement software solutions for mobile workforce.
Tags : 
mobile, workforce, solution, organizations, mobile, implement, software
    
ClickExpress
Published By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : 
ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
    
Viavi Solutions
Published By: Dyn     Published Date: Apr 27, 2016
Download this whitepaper and learn: - The six macro trends driving the need for application, network and Internet performance management solutions - Key insights you've been missing when it comes to your portfolio of online assets, and how they interact with the public Internet - How you can receive a true "end-to-end" view into Internet performance and ensure availability and implement advanced traffic steering capabilities to your existing infrastructure
Tags : 
dyn, internet performance, internet performance management
    
Dyn
Published By: SAP     Published Date: Jun 04, 2015
Workforce analytics solutions are the key to answering such questions and getting the metrics and insights needed to make informed HR decisions and create actionable workforce plans. This paper explores the business case for investing in workforce analytics. It focuses on how cloud-based solutions hide complexity associated with HR data, as well as deliver best practices, minimize maintenance costs, and provide quick time to value.
Tags : 
    
SAP
Published By: SuccessFactors, an SAP Company     Published Date: Jun 18, 2015
Workforce analytics solutions are the key to answering such questions and getting the metrics and insights needed to make informed HR decisions and create actionable workforce plans. This paper explores the business case for investing in workforce analytics. It focuses on how cloud-based solutions hide complexity associated with HR data, as well as deliver best practices, minimize maintenance costs, and provide quick time to value.
Tags : 
    
SuccessFactors, an SAP Company
Published By: Brother     Published Date: Mar 08, 2018
Documents are an integral component to the successful operation of an organization. Whether in hardcopy or digital form, they enable the communication, transaction, and recording of business-critical information. To ensure documents are used effectively, organizations are encouraged to continually evaluate and improve surrounding workflows. This may involve automating elements of document creation, securing the transfer and storage of information, and/or simplifying the retrieval of records and the data contained within. These types of enhancements can save time, money, and frustration. This white paper will discuss top trends and requirements in the optimization of document-related business processes as well as general technology infrastructures for document management. It will also address how some office technology vendors have reacted to these trends to guide their design and development of products, solutions, and services.
Tags : 
documents, workflows, business process, document management
    
Brother
Published By: Silver Peak     Published Date: Feb 11, 2016
This report outlines the limitations of legacy networks and how adding a technology called multipath networking can greatly improve the performance of cloud applications. It also provides advice on the evaluation criteria for multi-path networking solutions.
Tags : 
networking, cloud, cloud computing, multipath networking, multipath networking solutions, cloud applications, networking solutions
    
Silver Peak
Published By: Oracle     Published Date: Jan 20, 2017
"The need to simplify IT complexity has created a whole new market for converged infrastructure solutions that bring together servers, storage, networking, and systems software into a unified solution that is easier to deploy and manage. While these solutions can indeed help reduce operational costs and increase agility, Oracle believes there is a better approach."
Tags : 
    
Oracle
Published By: Oracle     Published Date: Jan 20, 2017
"Many large enterprises struggle to decide which workloads and systems should be deployed in the public cloud versus on premise. With a strong on-premises platform in place, organizations benefit from increased reliability, speed, and security. On the other hand, by leveraging the public cloud, they gain increased flexibility and recovery capabilities. So, what goes best where? Jim Rapoza, Senior Research Analysts at Aberdeen Group and Chuck Hollis, Senior VP at Oracle, will provide guidance aimed at helping organizations choose the right platforms for their critical workloads. They will analyze how Best-in-Class enterprises effectively integrate on-premises solutions and the public cloud, and recommend steps that businesses can take to become IT infrastructure leaders."
Tags : 
    
Oracle
Published By: Oracle ODA     Published Date: Aug 15, 2016
Oracle added two new models to the Oracle Database Appliance family in addition to the existing high availability model. With an entry list price starting at a fourth of the cost of the prior generation Oracle Database Appliance hardware and flexible Oracle Database software licensing, these new models bring Oracle Engineered Systems to within reach of every organization. Read about how the Oracle Database Appliance X-6 series expands the reach of the database appliance family to support various workloads, deployment scenarios, and database editions. They are especially designed for customers requiring only single instance databases, but who desire the simplicity, optimization, and affordability of the Oracle Database Appliance. These new models are ideal for customers who seek to avoid the complexity, tuning requirements, and higher costs of “build-your-own” database solutions.
Tags : 
    
Oracle ODA
Published By: Pure Storage     Published Date: Nov 02, 2017
In the new age of big data, applications are leveraging large farms of powerful servers and extremely fast networks to access petabytes of data served for everything from data analytics to scientific discovery to movie rendering. These new applications demand fast and efficient storage, which legacy solutions are no longer capable of providing.
Tags : 
big data analytics, genomics, medicine, digital science, engineering, design, software, development, next-generation
    
Pure Storage
Published By: WNS     Published Date: Apr 05, 2017
The client – a leading multi-line insurance provider working across life, general and health verticals – was looking for innovative solutions to adapt to the dynamic operational landscape. The focus was on combining high levels of operational expertise, tight financial discipline and technological excellence to deliver stronger balance sheets.
Tags : 
wns, wns solutions, customer experience, client service
    
WNS
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 11, 2017
Customers hate waiting for engineers to show up. The hours drift by. Clocks tick slower. They may have taken the day off work, but feel unable to start anything productive in case the doorbell rings. Fury builds. They call the contact centre – they’re told to keep waiting. It’s unacceptable. And in the 21st Century totally unnecessary. Solutions exist to provide customers with an accurate forecast of when field service agents will arrive and how long the job will take.
Tags : 
scheduling accuracy, jobs completed per day, customer satisfaction, skills, habits, driving style, qualifications
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Schneider Electric     Published Date: Apr 16, 2018
"Institute of Electrical and Electronics Engineers (IEEE) standard 1584 has been the de facto standard for calculating the arc energy levels at different points in a power system. However, NFPA 70E provides the option of using the Arc Flash Hazard PPE Category task tables for PPE selection. Which is right for you, and what do you need to know about each option? Find answers in our white paper, which describes how both types of analysis systems work and how to be sure you are using the tables correctly."
Tags : 
arc flash, nfpa 70e compliance, ieee, electrical workplace safety, arc flash risk assessment, arc flash analysis, arc flash mitigation, solutions, ppe, tables, arc flash hazard, osha, electrical safety
    
Schneider Electric
Published By: Schneider Electric     Published Date: May 04, 2018
The challenges facing industrial companies grow more daunting by the day. Globalization, energy markets that change in real time, variations in materials and prices, aging of the industrial workforce, inability to attract the next generation of Talent, and difficult regulatory pressures have all contributed to an extremely stressful industrial business environment. Fortunately, the right automation system can now offer cutting-edge packaging solutions for meeting at least three of these challenges.
Tags : 
keywords, packaging, oem, smart machines, food & beverage, bottling, conveying, industrial automation, energy, robotics
    
Schneider Electric
Published By: ServiceNow     Published Date: Aug 02, 2019
To meet rising demands, hospitals and acute?care facilities are turning to stronger workflow management solutions to ensure time and resources are where they need to be – focused on the patients they serve. Learn how hospitals are driving Better Patient Experiences Through Workflow Technology
Tags : 
servicenow, cost, time, resources, management, solutions, technology
    
ServiceNow
Published By: Splunk     Published Date: Aug 21, 2018
Alice Bluebird, a quirky security analyst for hire, is hunting down a nation state of hackers thirsty for the recipes of Frothly, a cutting-edge craft brewery. Follow Alice as she works to solve the mystery of the breach. Did she catch the incident before the hackers managed to steal Frothly’s super secret formulas? Did the hackers act alone or — scarier yet In this light hearted graphic novel “Through the Looking Glass Table”, discover how machine data, as well as an analytics-driven platform, log management, SIEM, UEBA and SOAR solutions, can help anyone — IT managers and sophisticated SOC analysts — better understand and respond to incidents, breaches, phishing attempts, insider threats and more.— did they have help from the inside?
Tags : 
    
Splunk
Published By: Fortinet EMEA     Published Date: Dec 11, 2018
If you’re dealing with the high cost and complexities of delivering reliable wide area connectivity over traditional carrier-based networks, you’re probably considering some form of software-defined wide area networking (SD-WAN). With the variety of constraints that you face, selecting the right SD-WAN solution for your enterprise may require a few compromises. Security, however, should not be one of them. There are various models for combining SD-WAN and network security, but only one that can truly be called “secure SD-WAN.” Fortinet, the most trusted name in network security, has leveraged its industry-leading FortiGate Next Generation Firewall (NGFW) to deliver integrated best-of-breed SD-WAN capabilities. Powered by the new FortiOS 6.0 operating system, SD-WANenabled FortiGate solutions provide the right level of service for every application, while ensuring effective protection from advanced evolving threats across your distributed enterprise.
Tags : 
    
Fortinet EMEA
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.