overview

Results 401 - 425 of 680Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Jul 30, 2014
This report focuses on commercial-software-only private infrastructure-as-a-service (IaaS) cloud solutions and serves as a refresh to Forrester’s “Market Overview: Private Cloud Solutions, Q2 2011” report.
Tags : 
iaas, cloud solutions, hp cloudsystems, private cloud solutions
    
HP
Published By: Citrix     Published Date: Jul 18, 2014
This Citrix Key Project Design Guide provides an overview of the solution architecture and implementation used in the key project on remote access for enterprise PCs.
Tags : 
citrix, enterprise pc, remote access, remote network management, network architecture, mobile workers, xendesktop
    
Citrix
Published By: HP     Published Date: Jul 15, 2014
This report focuses on commercial-software-only private infrastructure-as-a-service (IaaS) cloud solutions and serves as a refresh to Forrester’s “Market Overview: Private Cloud Solutions, Q2 2011” report.
Tags : 
iaas, cloud solutions, hp cloudsystems, private cloud solutions
    
HP
Published By: Symantec Corporation     Published Date: Jul 11, 2014
Symantec Certificate Intelligence Center discovers and monitors SSL certificates from any Certificate Authority as well as automates SSL certificate lifecycle management for operational efficiency and business continuity.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: IBM     Published Date: Jul 07, 2014
Forrester states that businesses today struggle to understand and leverage the tools necessary to create and manage unified, multichannel Digital Customer Experiences across multiple touchpoints including, web and mobile experiences for customer transactions and mobile applications. Read this report to understand how IBM's Digital Experience software is delivering solutions for the emerging Digital Customer Experience platform and integrating best-of-breed components into software offerings that manage multiple facets of the Digital Customer Experience.
Tags : 
ibm, forrester, digital, customer experience, platforms, integration
    
IBM
Published By: DNN Corp.     Published Date: Jun 30, 2014
This planning checklist offers an overview of the 5 most important elements to consider when planning a customer support community.
Tags : 
dnn, online communities, marketing communities, community management, email marketing
    
DNN Corp.
Published By: Hippo     Published Date: Jun 24, 2014
A Forrester report on the market overview of web content management systems.
Tags : 
hippo, web content management systems, forrester, market overview, wcm market
    
Hippo
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts,risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, rackspace, pci, pci dss, payment security, compliance, cloud pci
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.
Tags : 
alert logic, sungard, pci, pci dss, payment security, compliance, cloud pci
    
Alert Logic and Sungard Availability Services
Published By: Cisco     Published Date: Jun 16, 2014
A paper providing an overview of Cisco Email Security
Tags : 
email security, cisco, email security, threat detection network
    
Cisco
Published By: Cisco     Published Date: Jun 16, 2014
A paper providing an overview of Cisco Email Security
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 12, 2014
A paper providing an overview of Cisco Email Security
Tags : 
email security, cisco, email security, threat detection network
    
Cisco
Published By: IBM     Published Date: Jun 10, 2014
Download this short paper for an overview of the benchmark, the result and understand the importance to businesses deploying Hadoop into their data warehouse environments.
Tags : 
ibm, big sql, hadoop, sql
    
IBM
Published By: Schneider Electric     Published Date: Jun 04, 2014
70% of data center outages are directly attributable to human error according to the Uptime Institute’s analysis of their “abnormal incident” reporting (AIR) database1. This figure highlights the critical importance of having an effective operations and maintenance (O&M) program. This paper describes unique management principles and provides a comprehensive, high-level overview of the necessary program elements for operating a mission critical facility efficiently and reliably throughout its life cycle. Practical management tips and advice are also given.
Tags : 
schneider, electric, data, center, facility, operations, maintenance, management
    
Schneider Electric
Published By: SilverSky     Published Date: May 09, 2014
This paper provides an overview of the benefits of outsourced security solutions such as managed security services. The managed security services option saves money, improves the network security posture, and maximizes the efficiency of existing corporate resources.
Tags : 
silversky, business value, security services, the cloud, security conundrum, decrease threats, service providers, managed solutions
    
SilverSky
Published By: McAfee     Published Date: May 07, 2014
An introduction and overview of McAfee Real Time Command.
Tags : 
real time command, mcafee, enterprise assets, control
    
McAfee
Published By: Oracle Social Cloud     Published Date: May 02, 2014
This white paper offers a brief overview of how organizations can best use social data by implementing a framework to integrate social data with other enterprise and public or curated data. This framework provides a platform for uncovering new insights that can be fed into business intelligence and customer experience management systems in near real-time to help marketing, sales, service, and commerce teams accelerate decision-making and create long-term, profitable customer relationships.
Tags : 
oracle, srm, social media, social data, digital marketing
    
Oracle Social Cloud
Published By: IBM     Published Date: Apr 22, 2014
This ebook presents an overview of the B2B integraiton landscape: its challenges, its opportunities, and the approaches that leading organizations follow in developing a robust and scalable EDI solution. It also summarizes the IBM B2B Cloud Services offering, with real-world examples of how companies are leveraging the IBM Cloud to excel amid escalation global complexity, demand volatility and new customer requirements.
Tags : 
ibm, b2b, b2b cloud integration, cloud, optimization, value chain, edi solution, ibm cloud
    
IBM
Published By: FireEye     Published Date: Mar 05, 2014
From sophisticated new forms of malware to nation-state sponsored attacks and the advanced persistent threat, cybersecurity incidents have evolved at a rapid pace and are taking down entire networks, successfully stealing sensitive data and costing organizations millions to remediate. In this white paper this report, you'll receive a comprehensive overview of survey results and expert analysis on: The top security threats for global organizations in 2013; The largest gaps in organization's detection and response to threats; How these gaps will be filled in the coming year - new staff, tools or services; What organizations must do to stay ahead of these advanced threats.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: IBM     Published Date: Mar 04, 2014
This white paper discusses the key market trends and challenges facing organizations as they seek to deploy mobile enterprise solutions and examines the growing requirements of these firms. It also delivers an overview of how enterprises can address the challenges in terms of repackaging and optimizing applications to better operate in a converged, dynamic mobile world.
Tags : 
ibm, mobile, mobile enterprise, market trends, deployment, mobile enterprise solutions, applications, application performance
    
IBM
Published By: Smarsh     Published Date: Feb 27, 2014
An overview of the important considerations that both senior business management and IT management should think about as they decide whether or not to migrate some or all of their messaging and collaboration capabilities to the cloud.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
    
Smarsh
Published By: Oracle     Published Date: Feb 26, 2014
This white paper offers a brief overview of how organizations can make best use of social data by implementing a framework to integrate social data with other enterprise and public or curated data. This framework provides a platform for uncovering new insights that can be fed into business intelligence and customer-experience-management systems in near real time to help marketing, sales, service, and commerce teams accelerate decision-making and create long-term, profitable customer relationships.
Tags : 
oracle, srm, social, social data, enterprise, business intelligence, customer experience management, customer experience
    
Oracle
Published By: IBM     Published Date: Feb 04, 2014
This ebook presents an overview of the B2B integraiton landscape: its challenges, its opportunities, and the approaches that leading organizations follow in developing a robust and scalable EDI solution. It also summarizes the IBM B2B Cloud Services offering, with real-world examples of how companies are leveraging the IBM Cloud to Excel amid escalation global complexity, demand volatility and new customer requirements.
Tags : 
ibm, smarter commerce, b2b, cloud integration, optimizing chain value, cloud transformations, edi networks, increase efficiency
    
IBM
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
In the era of social media, social selling isn’t a revolution — it’s just common sense. Today’s highly informed buyers need salespeople who can provide relevant knowledge and help them tackle business challenges. Social selling practices will enable your reps to connect with prospects at the right time, with the right information, and close deals fast.
Tags : 
social media, social media management, enterprise, hootsuite, executives, social selling
    
uberVU via HootSuite
Published By: Red Hat     Published Date: Jan 08, 2014
This overview includes key benefits and a summary of Red Hat Enterprise Linux and Red Hat Enterprise Virtualization, with a limited time promotional offering that will save you up to 26% while enabling increased performance, scalability and security.
Tags : 
red hat, rhel, rhev, enterprise linux, enterprise virtualization, virtualization, servers, scalability
    
Red Hat
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.