data assets

Results 51 - 75 of 121Sort Results By: Published Date | Title | Company Name
By: CA Technologies EMEA     Published Date: May 23, 2018
Increasingly, enterprises are opening their data and applications to partners, developers, mobile apps and cloud services. APIs provide a standardized way to open up information assets across the web, mobile devices, serviceoriented architecture (SOA) and the cloud. However, to make API information sharing safe, reliable and cost-effective, enterprises must deal with critical security, performance management and data adaptation challenges. CA API Management combines advanced functionality for back-end integration, mobile optimization, cloud orchestration and developer management. It is unique in its ability to address the full breadth of enterprise API management challenges.
Tags : 
     CA Technologies EMEA
By: Motorola Solutions     Published Date: Nov 29, 2018
When it comes to worker safety, mitigating downtime, and boosting productivity, nothing is faster than right NOW. Organizations across various industry segments — construction, food and beverage, chemical and industrial, and transportation equipment manufacturers — are juggling a mix of communication devices, slowing response times. Gaps in coverage, poor battery life and aging equipment reduce your ability to safely and efficiently meet production deadlines. The power of NOW puts instant communications at your workers’ fingertips — because when communication slows, production slows. Manufacturers today are under immense pressure to produce goods safely, efficiently and profitably. Meeting these goals requires reliable, clear voice and data communications. So the production line is always moving. So well-executed logistics exceed expectations. So materials and operations are tracked to maintain efficiency. So your most valuable assets — your people — are safe and connected. Unified tea
Tags : 
     Motorola Solutions
By: HP Data Center     Published Date: Mar 25, 2009
When considering server virtualization, planning and design are critical.  How do you optimize your environment through virtualization?  How do you keep your server sprawl from becoming virtual server sprawl?  How will a virtualized environment help your business?  Will your existing data center meet current, and future, business requirements? Answer your Questions today!
Tags : hp data center, virtualization, server planning, server design, server sprawl, tco, roi, server consolidation, decentralized environments, centralized environments, it assets, data center design, eos
     HP Data Center
By: Quest Software     Published Date: Jul 28, 2011
In this white paper Quest's data protection experts offer five tips for effective backup and recovery to help you avoid the challenges that might keep you from fully protecting your virtual assets and infrastructure.
Tags : quest, storage virtualization, it management, systems management solutions, virtualization managemen, windows, database, application, oem, innovation accelerator, smb, recovery, data protection, identity management, development, optimization, access management, migration, consolidation, performance
     Quest Software
By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data, access, it organization, security, protection, network, access, control, nac, interoperability, 802.1x standards, control, options
     ForeScout
By: McAfee     Published Date: Feb 06, 2013
Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets.
Tags : big data analytics, gartner, big data, big security data, advanced targeted attacks, advanced persistent threats, atas, context aware security intelligence, threat intelligence, siem
     McAfee
By: McAfee     Published Date: Mar 08, 2013
Databases store companies’ most valuable information assets, but in most cases they’re poorly protected. It’s important to secure databases as well as or better than other systems in the enterprise. But it’s not that simple.
Tags : real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention, authentication and access control, database security
     McAfee
By: QTS Data Centers     Published Date: Mar 31, 2015
One of IT’s biggest balancing acts is to make data transactions easily available to authorized users while preventing all others from accessing its data assets. With high-profile data security breaches splashed across headlines nearly every day, CIOs are understandably worried about protecting their data. And for IT leaders who are considering moving their business to the cloud it is critical to ensure the provider they select has undertaken full and robust measures for physical and logical security.
Tags : qts, cloud, security, data transactions, cio report, cyber threats, security breaches, it leaders, it management
     QTS Data Centers
By: Zebra Technologies     Published Date: Jun 15, 2017
Zebra’s broad range of enterprise-level, healthcare-designed, end-to-end solutions provides a wealth of benefits throughout a healthcare facility, enabling clinicians, staff and administrators to sense, analyze and act in real time. Identity solutions can help improve accuracy and enhance patient safety, deliver greater operational efficiency and caregiver confidence, and improve the patient experience. Mobility solutions help improve staff communication and collaboration with enterprise effectiveness and workflow efficiency. Intelligence solutions offer greater visibility to data on patients, staff, assets and the facility overall for better decision making.
Tags : overview, brochure, zebra, enterprise, healthcare, solutions, mobility
     Zebra Technologies
By: Citrix     Published Date: Jan 20, 2009
With server virtualization now well established in the world's datacenters, IT leaders are turning their attention to virtualizing and centralizing desktop PCs to address some of their toughest computing challenges: . Managing complex end-user hardware and software infrastructure . Securing networks and information assets . Supporting a global workforce in an environment of constant change
Tags : citrix, virtualization, desktop virtualization, blade pc, on demand, hdx, xendesktop, sla, service level agreement, scalable, streamline, tco, view composer, virtual machine, total cost of ownership, hyper-v, microsoft, datacenter, server virtualization, servers
     Citrix
By: HP     Published Date: Jun 23, 2008
HP is increasingly demonstrating that its vision includes positioning itself as an innovator at the high end especially with respect to managing heterogeneous storage assets. HP appears to be a leading proponent of avoiding dreams of owning the entire data center storage infrastructure. Rather its aim appears to add customer value by recognizing and accommodating the diversity of installed storage assets at customer sites.
Tags : hp disaster proof, disaster proof, disaster-proof, storage, storageworks, continuous access, high availability
     HP
By: SRC,LLC     Published Date: Jun 01, 2009
Companies spend millions of dollars every year on building data warehouses, buying business intelligence (BI) software tools and managing their analytic processes in the hope of gaining consumer insight and winning market share. Yet, many companies fail to realize the full benefits of their technology investments because they are hamstrung by the layers of expertise and the complexity of technology tools needed to integrate various data warehouses and associated tools within their existing analytic environments. Since analysis is only as good as the accessibility, timeliness and accuracy of the information being analyzed, the interoperability of any data warehouse with any analytic environment is essential to achieving insightful, actionable analysis and making better decisions.
Tags : src, enterprise, streamline, analytics, economy, analytic imperative, business intelligence, seamless, data warehouse, interoperability, analytic environment, data assets, report generation, output options, total cost of ownership, tco, roi, return on investment, olap, enterprise applications
     SRC,LLC
By: SRC,LLC     Published Date: Jun 01, 2009
We work in an ever-changing landscape of competitors, market forces, customer relationships, partner alliances, political and regulatory pressures, and global climate effects. The common mechanism for coping effectively with change is to refer to canned reports and dashboards, dump reporting data into a spreadsheet and look for answers to today's questions. All too often, we have to rely on estimates rather than models, and gut feel rather than data, because we can't get answers in a timely fashion. Yet we know that the answers lie hidden in the morass of corporate data.
Tags : business intelligence, src, capabilities, unified enterprise, spatial intelligence, alteryx, oracle, netezza, teradata, gui, ford, experian, sql, enterprise applications
     SRC,LLC
By: Kaseya     Published Date: Mar 12, 2015
Turn management data into actionable business information that helps create operational efficiencies and demonstrate value.
Tags : data management, business information, audits, inventory information, it policies, automation management systems, it assets, it solutions
     Kaseya
By: JBoss Developer     Published Date: Oct 21, 2016
Digital transformation (DX) is the continuous process by which enterprises adapt to or drive disruptive change by leveraging digital competencies, such as harnessing sensor data or using location, customer profile, and a mobile app to make shopping recommendations. DX reshapes the organization's culture where required; leverages existing processes, systems, and assets; and creates net-new digital capabilities as needed. With DX, there is the need to embrace new business models and new architectures and technologies that will help an enterprise with customer-facing innovation as well as transition existing systems, processes, organization structure, and relationships to support the transformation.
Tags : api, market intelligence, advisory services, digital transformation, data
     JBoss Developer
By: AppNexus     Published Date: Apr 04, 2017
Email marketing is one of digital media’s most effective channels. Inside the inbox, marketers can capture the consumer’s undivided attention in a uniquely intimate environment, creating a perfect opportunity for meaningful brand engagement and driving new purchase transactions. However, with open rates for even the most effective brands hovering around 25%, there is huge opportunity for marketers to reach their customers with impactful formats on the open internet to successfully engage them across the marketing funnel. Download the free eBook “Beyond The Inbox: How To Transform Your Email Marketing Platform Into An Omnichannel Solution” to learn: • How to rapidly build an omni-channel solution for your clients • How AppNexus can help your platform reach your marketer’s customers most cost-effectively • How AppNexus ensures complete security for your client’s CRM data assets ?
Tags : appnexus, email marketing, omni-channel, crm data, branding, marketing, brand engagement, customer engagement
     AppNexus
By: AWS - ROI DNA     Published Date: Aug 09, 2018
In today's data -driven digital environment, companies are collecting, transforming and connecting data in innovative and meaningful ways. A robust information and data management solution enables you to leverage the power of your data, exploring and uncovering insights in documents, images and audio across billions of inputs and existing data assets.
Tags : 
     AWS - ROI DNA
By: IBM     Published Date: Feb 08, 2008
Technology has helped financial institutions work harder and faster than ever before. The downside: Sensitive data is more vulnerable than ever before. Financial Insights offers ideas and solutions to improve Information Security (IS). Click to learn more on protecting your most important assets, your data.
Tags : bank, banks, financial, financial institutions, fisma, compliance, data security, information management, information security, database security, customer data, ibm
     IBM
By: IBM     Published Date: Jun 24, 2009
Improving access to core applications and data is just one of many mandates facing IT, along with improving collaboration, reducing administration costs and improving performance. Fortunately, shops running System z have an advantage. You can integrate and enhance your System z assets faster when you use the version 6.1 update to IBM WebSphere Portal on z/OS. Use it to quickly deploy business applications across the enterprise, reduce costs and increase flexibility with workloads centralized on System z.
Tags : websphere, portal, version 6.1, web 2.0, web interfaces, intuitive applications, enhanced web 2.0, ibm, business applications, leveraging, ibm, system z, platform, mission critical applications, web facing, workloads, z/os, ibm racf, workload manager, soa
     IBM
By: VMware     Published Date: Sep 13, 2011
Federal datacenters, which house an enormous wealth of legacy assets, are the primary targets for agencies evaluating different cloud computing approaches. When agencies begin their journey to the cloud with virtualization-an IT transformation starting point that preserves existing investments-they realize significant agility, cost and security benefits. Federal IT leaders are deploying VMware cloud infrastructure solutions to meet these new directives.
Tags : vsphere, vmware, storage, vsa, cluster service, technology, storage
     VMware
By: SafeNet     Published Date: Jan 14, 2014
Today’s data resides in a virtualized world, but the risks are all too real, and, in many organizations, too frequently realized. This paper examines the fundamental security implications of cloud services and virtualization, and it details an approach organizations can take to safeguard sensitive assets in a way that is aligned with today’s dynamic environments.
Tags : virtualization, cloud services, security, encryption, safenet
     SafeNet
By: Evident.io     Published Date: Nov 19, 2015
Evident.io has a significant head start in this nascent corner of the cloud security space. Besides addressing a critical portion of the cloud's attack surface that isn't well covered by other vendors yet, Evident.io has built a platform that transcends the niche it currently addresses. The API/SDK consumption capabilities, data analytic and user workflow portions of the company's Evident Security Platform are valuable assets that it can leverage to grow into other areas in the future.
Tags : evident, cloud security, security platforms, datacenter, firewalls, public cloud, api consumption, networking, security, it management, data management, data center
     Evident.io
By: AWS     Published Date: Jul 16, 2018
The Internet of Things (IoT) is composed of sensor-embedded devices and machines that exchange data with each other and the cloud through a secure network. Often referred to as “things” or “edge devices”, these intelligent machines connect to the internet either directly or through an IoT gateway, enabling them to send data to the cloud. Analyzing this data can reveal valuable insights about these objects and the business processes they’re part of, helping enterprises optimize their operations. Devices in IoT deployments can span nearly any industry or use case. Each one is equipped with sensors, processing power, connectivity, and software, enabling asset control and other remote interactions over the internet. Unlike traditional IT assets, these edge devices are resource-constrained (either by bandwidth, storage, or processing power) and are typically found outside of a data center, creating unique security and management considerations.
Tags : 
     AWS
By: McAfee     Published Date: Mar 31, 2017
The widespread adoption of cloud services has resulted in sensitive data assets being stored in cloud services. This solution brief takes a deep dive of McAfee’s unified approach to data security that protects both on premise and cloud-resident data from loss and to meet and maintain compliance
Tags : unified data protection, data protection, cloud adoption, cloud vsibility, cloud data protection, cloud access security broker, shadow it
     McAfee
By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity, zero-day attacks, it systems, security, data security, resiliency layers, hardened assets, identification
     Qualys
Start   Previous    1 2 3 4 5    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com