large enterprise

Results 76 - 100 of 272Sort Results By: Published Date | Title | Company Name
By: Workday     Published Date: Mar 09, 2018
Workday has been recognized by global market intelligence firm, IDC, as a Leader in the IDC MarketScape for Midmarket ERP applications. This report is a guide highlighting the most important criteria for midsize companies to considers when selecting a system. Being named a Leader also underscores the value that Workday brings customers ranging from mid-sized business to the world’s largest enterprises.
Tags : market intelligence, midsize companies, global intelligence
     Workday
By: NetApp     Published Date: Dec 09, 2014
This paper examines that there are all sorts of elements—differing applications, attitudes, budgets, outcomes for the business—that go into the decision of how much and what type of solid-state storage to use. And how this large range of use cases inherently means that users are going to need a portfolio of solid-state deployment options because no single product is going to solve everything for everyone. The paper then examines NetApp’s flash portfolio and belief that the right storage solution at all times balances performance, capacity, functionality and manageability: this means that for flash too, multiple approaches will become the standard for enterprises as they evolve their long-term IT strategies.
Tags : flash storage, flash solutions, it-strategies, netapp, business objectives, solid-state storage, it strategies, it management
     NetApp
By: McAfee     Published Date: Sep 15, 2014
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : network survival, network security management, best practices, firewalls, hacker detection
     McAfee
By: Rackspace     Published Date: Apr 17, 2018
Read this blog to see how larger enterprises are modernizing their infrastructure. Specifically, three tips to reduce risk and complexity that accompanies such efforts: Adopt tooling and prioritize automation Make sure operations has a seat at the table Adapt and update IT policies While those might sound obvious, it’s remarkable how many organizations attempt short cuts that almost inevitably lead to early failure. Read this blog to learn more!
Tags : 
     Rackspace
By: Genesys     Published Date: Nov 17, 2017
This eBook focuses on two profiles for small contact centers, small business and small of large - a small contact center that is part of a much larger enterprise. Get key insights from independent market research that will help you make a case to take your customer communications platform to the cloud. With the right solution, your business can benefit from enterprise-quality capabilities at a price you can afford. And you can realize a return on investment in as little as three months!
Tags : ebook, contact centers, cloud, customer experience
     Genesys
By: Hewlett Packard Enterprise     Published Date: Sep 25, 2017
Solid state storage is increasingly deployed in all sizes of datacenters, from the small and medium business to the large enterprise. It comes in many forms including hybrid arrays, direct attached drives, PCIe flash and accelerators that fit somewhere in between servers and storage. With the price of flash continuing to drop, hybrid storage is becoming more compelling to the small and medium business for critical computing applications such as databases and day-to-day operational computing.
Tags : 
     Hewlett Packard Enterprise
By: Determine (Selectica)     Published Date: Sep 13, 2016
We came to the above conclusion because even though suites solved many of the problems of independent, standalone modules to support integrated procurement processes in terms of data management nightmares, process inefficiency and visibility gaps that were common with first generation "best-of-breed" solutions, many mature organizations are increasingly finding that suites are not enough if they do not connect into larger enterprise processes and support the stakeholder organizations that procurement needs to work with. Are you with us? If you are, then you know that something else is needed: a source-to-pay (S2P) procurement
Tags : 
     Determine (Selectica)
By: Lookout     Published Date: Aug 30, 2017
This report examines enterprise security threats for iOS and Android. While Android has higher consumer market share, iOS commands more market share in the enterprise, accounting for 72% of enterprise mobile activations in Q1 2015 compared to Android’s 26% activation share1 . The perception that iOS is more secure has helped drive its enterprise adoption, but this perception comes largely from security trends observed in the consumer space. Android, with a more open mobile platform and 81% global market share2 , predictably invites more broad-based attacks than iOS. When it comes to iOS and Android in the enterprise, however, both need threat protection because at a fundamental level both platforms are subject to similar vulnerabilities and attack methods. iOS attacks may be relatively uncommon today, but they have happened and can occur. Moreover, enterprises increasingly rely on iOS app-distribution methods that forgo Apple’s app-review and they face the risk that attackers will cont
Tags : enterprise security, enterprise mobile security, ios attacks, mobile threat protection, android attacks
     Lookout
By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
     Lookout
By: IBM APAC     Published Date: Jul 19, 2019
With businesses developing larger data volumes to improve their competitiveness, their IT infrastructures are struggling to store and manage all of the data. To keep pace with this increase in data, organizations require a modern enterprise storage infrastructure that can scale to meet the demands of large data sets, while reducing the cost and complexity of infrastructure management. This white paper examines IBM’s FlashSystem 9100 solution and the benefits it can offer businesses.
Tags : 
     IBM APAC
By: CheckMarx     Published Date: Nov 02, 2018
In today’s era of digital transformation, time-to-market is the new name of the game, and DevOps is changing the way software is built. As developers have taken on a much larger role in the software development lifecycle, including developing secure code, building containers and ensuring quality, security cannot be separated from DevOps and engineering. Unfortunately, traditional software security testing tools have operated in isolation and have forced developers to change the way they work. Checkmarx, however, has developed a more agile and responsive solution: Checkmarx’ Software Exposure Platform. Taking a holistic, platform-centric approach, the platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper Delivering Secure Software at the Speed of DevOps to learn how Checkmarx provides the combinatio
Tags : 
     CheckMarx
By: Pure Storage     Published Date: Oct 09, 2018
Massive amounts of data are being created driven by billions of sensors all around us such as cameras, smart phones, cars as well as the large amounts of data across enterprises, education systems and organizations. In the age of big data, artificial intelligence (AI), machine learning and deep learning deliver unprecedented insights in the massive amounts of data.
Tags : 
     Pure Storage
By: Amazon Web Services     Published Date: Nov 28, 2017
So you’re thinking about moving to the cloud. Which means you’ve got some new (and some old) security issues to think about. Where do you start? What should you look for when you’re planning your cloud migration or expansion, and what features do you need to tick off your list when you compare partners for the project? At AWS, we’ve worked with millions of cloud users in 190 countries, from all kinds of industries – large enterprise, start-ups, non-profits, education and government. Every organisation's needs are different, but we’ve identified the top features of any successful cloud security initiative. Here are six must-haves for cloud security confidence.
Tags : integration, security, compliance, visibility, control, privacy, data, marketplace
     Amazon Web Services
By: Oracle     Published Date: Jan 28, 2019
Oracle Private Cloud Appliance is a converged infrastructure system designed for rapid and simple deployment of private cloud at an industry-leading price point. Whether customers are running Linux, Microsoft Windows or Oracle Solaris applications, Oracle Private Cloud Appliance supports consolidation for a wide range of mixed workloads in medium-to-large sized data centers. High-performance, low-latency Oracle Fabric Interconnect and Oracle SDN allow automated configuration of the server and storage networks. The embedded controller software automates the installation, configuration, and management of all infrastructure components at the push of a button. Customers need to enter only basic configuration parameters and create virtual machines (VMs) manually or by using Oracle VM Templates to get a full application up and running in a few hours. With Oracle Enterprise Manager, the Oracle Private Cloud Appliance is transformed into a powerful private cloud infrastructure that integrates
Tags : 
     Oracle
By: Entrust Datacard     Published Date: Jun 09, 2017
The rapid adoption of Office 365 means that work created using the Microsoft product contains a large amount of the business world’s sensitive information. In fact, in most enterprises using Office 365, more than half of that highly valuable information — including business plans, sales data, product designs, M&A details and financial forecasts — is contained within Excel, PowerPoint, Word, Outlook and other Microsoft software. Securing the information created with its products has emerged as a primary concern for CSOs, CIOs, IT departments and other C-level executives.
Tags : 
     Entrust Datacard
By: IBM     Published Date: Jul 13, 2012
Learn how respondents, including nearly 400 senior executives from some of the world's largest enterprises, are incorporating holistic business resilience planning into their businesses through top-level findings and case studies. Download the research report here.
Tags : ibm, technology, risk management, global technology, technology, risk study, business technology
     IBM
By: Citrix     Published Date: Nov 09, 2012
Cloud is a rapidly emerging necessity in IT. Relied upon the world's largest enterprise data centers and cloud networks, NetScaler is universally recognized as an outstanding application delivery controller. Learn how NetScaler beats the competition.
Tags : citrix, adc, application delivery controllers, citrix netscaler, cloud, cloud computing, business technology
     Citrix
By: Oracle     Published Date: Sep 21, 2016
Overhauling your processes, rewiring your product focus, creating a new culture: large-scale, transformative organizational development and change is messy, difficult—and usually fails. This digibook contains a step-by-step guide to leading process management and overcoming the cultural and procedural challenges, with case studies and examples of how smart CFOs are leading the transformation of their enterprises.
Tags : 
     Oracle
By: Red Hat     Published Date: Sep 25, 2014
Enterprises are increasingly adopting Linux as a secure, reliable and high-performing platform that lowers acquisition and operating costs while providing the agility needed to anticipate and react to changing business conditions. In particular, the Red Hat Enterprise Linux (RHEL) operating environment, which is based on the Linux open-source kernel, has become widely deployed by medium-sized and large businesses, by enterprises in their data centers, and in private and public cloud infrastructures. RHEL is distributed and supported by Red Hat Inc., the world’s largest provider of open-source software solutions, accounting for 74.7% of worldwide Linux operating system (OS) revenue. As a development and deployment platform, RHEL offers an efficient, scalable and robust operating environment with certified security and flexible deployment options in physical and virtualized environments.
Tags : enterprise solutions, open-source software, it management, storage, data center
     Red Hat
By: HP     Published Date: Feb 02, 2015
The Colonial Companies is one of the largest mortgage loan servicers in the United States. Facing rapid expansion, the company needed to update an aging infrastructure that was not enterprise-ready. HP and partner OnX provided an HP Converged Infrastructure comprising HP networking solutions, servers, and storage. Benefits include rock-solid uptime, enterprise-class scalability, and simplification of IT processes and maintenance.
Tags : 
     HP
By: Kontiki     Published Date: Sep 16, 2014
Learn how to maximize the engagement of your employees by using video and see how this allows for greater collaboration between employees.
Tags : employee engagement, greater collaboration, large enterprise organizations, business efficiencies, human resource technology
     Kontiki
By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
     Palo Alto Networks
By: Genesys     Published Date: Feb 21, 2018
In the ongoing evolution of the customer experience, organizations continue to rely on phone and email while introducing new customer engagement channels. With the channel mix rapidly changing, it has become more important than ever to accurately identify and proactively deploy the next-best channels for engaging customers today and tomorrow. Gartner Research has profiled 15 ways that organizations will engage customers over the next 20 years. This includes augmented reality, virtual reality and mixed reality immersive solutions which will be adopted by 20% of large enterprises by 2020. By learning which engagement channels will best meet your customers’ needs in the future and prioritizing those aligned with your business model, you can improve customer engagement and
Tags : gartner, customer engagement, customer experience, gartner research
     Genesys
By: Genesys     Published Date: Feb 27, 2018
What if the cloud could radically improve your customer’s experience, your operations, and your bottom line? There’s a reason why many organizations are taking advantage of the benefits of cloud for contact centers. This eBook, focuses on two profiles for small contact centers, small business and small of large - a small contact center that is part of a much larger enterprise. Get key insights from independent market research that will help you make a case to take your customer communications platform to the cloud. With the right solution, your business can benefit from enterprise-quality capabilities at a price you can afford. And you can realize a return on investment in as little as three months! Download this eBook and learn: • How to calculate ROI and time-to-value in different types of small contact center profiles • What factors to consider when selecting a cloud vendor • Three common myths about the cloud
Tags : ebook, cloud, customer experience
     Genesys
By: CloudHealth by VMware     Published Date: Feb 14, 2019
Whether you’re a leader of Infrastructure & Operations for a large enterprise or a mid-sized business looking to scale, you’ll likely have similar questions about multicloud that need answers. Read this eBook for a better understanding of multicloud architecture, and get answers to questions such as: -What’s the difference between hybrid cloud and multicloud? -What are the top benefits and challenges of multicloud? -What is the value proposition of multicloud management? -What is a multicloud strategy? Download this free eBook today to get started on your multicloud management journey.
Tags : multicloud managment, cloud management
     CloudHealth by VMware
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com