otp

Results 76 - 100 of 141Sort Results By: Published Date | Title | Company Name
By: LockLizard     Published Date: Jun 10, 2009
Is the PDF security software you are looking to purchase really secure? If the PDF security software you are evaluating can be simply broken then you might as well save your money. What PDF security vendors are not telling you about their products and solutions, and what questions you should be asking.
Tags : pdf, pdf security, locklizard, software, cost savings, recovery, passwords, restrictions, adobe, affiliate scheme, footprint, risk management, risk, vulnerabilities, dmca, digital millennium copyright act, adobe reader, usability, encryption, security
     LockLizard
By: Shavlik Technologies     Published Date: Apr 14, 2011
This white paper will illustrate how implementing an effective power management strategy, complete with easy-to-deploy technology, will enable an organization to reduce costs, improve security and become a greater steward of the environment.
Tags : shavlik, power management, security, cyberattacks, internet attacks, lan, wake-on-lan, csci, climate savers computing initiative, carbon footprint
     Shavlik Technologies
By: Intel     Published Date: Aug 10, 2012
Learn about Intel IPT with Public Key Infrastructure including protected transaction display as well as One Time Password (OTP).
Tags : it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications, data management, business technology
     Intel
By: GE Healthcare     Published Date: Oct 14, 2015
Download this Interactive Resource Guide today to learn more about the role GE Healthcare plays in optimizing healthcare organizations’ investment in imaging IT to help streamline healthcare costs, increase diagnostic confidence and enhance the quality of patient care.
Tags : gneral electric, ge helathcare, imaging, workglow, centricity, archiving, business technology
     GE Healthcare
By: Qlik     Published Date: Jun 24, 2016
This research reveals some key opportunities for these companies to broaden their analytical footprint and magnify the impact of business analytics.
Tags : qlik, analytics, business analytics, finance business intelligence, business technology
     Qlik
By: Oracle     Published Date: Feb 10, 2016
Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success. If handled correctly, your supply chain should improve customer service—along with the reputation of your brand—and boost your bottom line. But, as with many areas of business, the rules of the game are changing. What’s changing? Well, everything. New regulations, increased buyer expectations, shorter product lifecycles, fluctuations in demand, new market entrants, more ethical supplier management, poor visibility of globalized supply chains—all these things, and more, are testing the limits of the traditional supply chain model. The simple truth is that the way things used to be done, and the solutions that enabled it, are no longer up to the job. Today, organizations need levels of flexibility, integration, and visibility that are beyond what those systems were designed to deliver.
Tags : oracle, supply chain leaders, cloud migration, supply chain management, operational efficiency best practices, it management, data management
     Oracle
By: EMC Backup & Recovery Solutions     Published Date: Feb 05, 2010
Read this IDC white paper to understand the various approaches to solving today's backup and recovery challenges leveraging deduplication. The paper discusses how to dramatically improve IT economics by optimizing network bandwidth, backup windows, and storage footprint requirements in distributed and datacenter locations alike.
Tags : emc, data domain, efficiency, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication
     EMC Backup & Recovery Solutions
By: AWS     Published Date: Oct 02, 2019
As organizations expand their cloud footprints, they need to reevaluate and consider who has access to their infrastructure at any given time. This can often be a large undertaking and lead to complex, sprawling network security interfaces across applications, workloads, and containers. Aporeto on Amazon Web Services (AWS) enables security administrators to unify their security management and visibility to create consistent policies across all their instances and containerized environments. Join the upcoming webinar to learn how Informatica leveraged Aporeto to create secure, keyless access for all their users.
Tags : 
     AWS
By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : cyber attacks, cia, nsa, wannacry, notpetya
     BlackBerry Cylance
By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) seems to be on everyone’s mind. It powers natural language recognition within voice-powered assistants like Siri and Alexa, beats world-class Go players, and enables hyper-targeted e-commerce and content recommendations across the web, as we see with Amazon and Netflix. But recently, AI has begun actively expanding its footprint within the enterprise. Executives are trying to more fully comprehend what AI is and how they can use its insights into their data to better capitalize on business opportunities. This additional information can enable engaging with customers more productively and efficiently, forming an edge against the competition. Read more in our AI survey summary.
Tags : artificial, intelligence, enterprise
     BlackBerry Cylance
By: Druva     Published Date: Aug 04, 2016
Whether your enterprise is on a journey of cloud transformation or you simply need to do more with less, moving backup to the cloud offers unprecedented cost savings. These 7 points will show you—and your CIO and CFO — how to dramatically reduce the overall storage footprint of your organization and slash costs while gaining the efficiencies of the cloud.
Tags : cloud backup, enterprise, cloud computing, best practices, storage
     Druva
By: Numara Software     Published Date: Jul 09, 2009
Discover the unparalleled flexibility of Numara FootPrints 9 for the service desk, as well as the unique process automation capabilities for the service desk and beyond IT. You'll also learn about the fast-to-implement ITIL® service lifecycle workflow automation capabilities in Numara FootPrints 9. Ensuring a quick return on your investment, Numara FootPrints offers a very short time to production and easy customization - all without any programming. Learn more today!
Tags : numara, it service management, service, footprints, it budgets, cost cutting, flexible, itil, service delivery, support costs, fast-to-implement, incidents, customer experience, workflow, service desk, tracking, change management, it management
     Numara Software
By: Numara Software     Published Date: Jul 09, 2009
With Numara FootPrints for Customer Service, an award-winning, 100% web-based customer service management solution, you can deliver breakthrough service to customers throughout the world faster, and enhance the quality of your web-based service desk, with less effort than today, and at a low total cost of ownership. Learn more today!
Tags : numara, footprints, service excellence, customer experience, hosting service, call center, it service management, call volume, it budget, service channel management, customer experience, sla, service management solution, projects, surveys, workflow, service desk, tracking, billing, accounts receivable
     Numara Software
By: Numara Software     Published Date: Jul 09, 2009
In this informative webinar, you will learn about the challenges of implementing configuration management along with suggestions on how to get started, and best practices to ensure success. You will also learn how Numara® FootPrints® Configuration Management, with its fast implementation, practical approach to implementing configuration management and automated integration to auto-discovery tools, takes the pain and time out of creating and maintaining a functional CMDB. Learn more today!
Tags : configuration management, cmdb, numara, footprints, auto-discovery tools, hardware, itil, service management, call volume, it budget, service channel management, customer experience, sla, service management solution, projects, surveys, workflow, service desk, tracking, billing
     Numara Software
By: Numara Software     Published Date: Jul 09, 2009
This webinar will discuss the challenges in designing a workable change management process, defining approval workflows, and conforming to IT governances such as Sarbanes-Oxley and SAS70. This webinar will also show you how quickly Numara FootPrints Change Management can help you effectively and easily manage change, ensure compliance in IT, as well as other functional areas of your business. Learn more today!
Tags : change management, numara, footprints, sox, sarbanes-oxley, itil, compliance tracking, sas70, infrastructure, control, purchasing, process management, facilities maintenance, it service management, compliance, it management
     Numara Software
By: Numara Software     Published Date: Jul 09, 2009
This webinar and service catalog demo will show you how Numara FootPrints Service Catalog will help your organization quickly provide an attractive menu of services tailored to your customers while providing transparency of service costs - all integrated into your service management workflow. Learn more today!
Tags : itil v3, numara, footprints, service catalog, service request, service management, call volume, it budget, service channel management, customer experience, sla, service management solution, projects, surveys, workflow, service desk, tracking, billing, accounts receivable, automated integration
     Numara Software
By: Numara Software     Published Date: Jul 16, 2009
Delivering world class customer service in today’s fast paced business environment is becoming more difficult as information and data requires instant access.
Tags : footprints, numara, blackberry, mobile, service desk, on-the-go, slas, service level agreements, smartphone, off-line synchronization, critical data, projects, surveys, workflow, service desk, tracking, billing, accounts receivable, automated integration, automated tools
     Numara Software
By: Webroot Inc     Published Date: Jan 14, 2015
Seeing traditional security software become too big and too much of a burden on endpoint devices, networks and IT staff, Webroot decided to start fresh. We built a new type of security software that completely does away with old-school approaches like signature downloads, the need for constant updates and big footprint client software. The result is Webroot SecureAnywhere Business Endpoint Protection, the fastest, least disruptive and most effective endpoint protection - ever.
Tags : endpoint protection, networks, security software, endpoint devices, security
     Webroot Inc
By: Hewlett-Packard     Published Date: Aug 02, 2013
When rack-mounted servers first appeared on the scene in the 1990s, they offered considerable advantages over the behemoth boxes they replaced. Their small, standardized footprint went a long way toward making data centers easier to manage. In the ensuing decades, form factor size and compute power have had an inverse relationship. Their universal standardization earned them the nickname “pizza box” servers, and it was a key driver of the scale-out computing model popular in the early 2000s. Populating a rack of eight servers and either clustering them or implementing failover from one to the other was far easier than previously possible.
Tags : blade, servers, infrastructure
     Hewlett-Packard
By: IBM     Published Date: Sep 30, 2013
There’s no stopping information growth. How then, can your midsize business meet new demands for data storage with limited resources? IBM® Storwize® V7000 has the answers. In this eguide, you’ll find out that this innovative solution can radically improve storage performance—while minimizing expenses
Tags : ibm, storwize, storwize v7000, storage, storage performace, storage footprint, virtualization, disk utilization, compression, eguide, business technology
     IBM
By: IBM     Published Date: Jan 02, 2014
Buy-and-hold strategies can actually add costs to the datacenter, as systems age in place. Not only do hardware maintenance and software maintenance fees rise, over time – but the aging of applications also costs the organization money. Investing in a transition from POWER5 to POWER7 resulted in a return on investment (ROI) of more than 150 percent over three years.An insightful and and compelling discussion by IDC that reviews the primary reason for maintaining current systems -- Return on Investment. IDC studied IBM Power Systems sites that remained on the POWER5 platform long after its initial introduction in 2004. When comparisons to the succeeding generation of POWER7 are made, customers have found that the increase in scalability and performance of POWER7 systems, combined with a reduction in server "footprint" size and overall electrical requirements, resulted in significant reductions in ongoing costs, or opex, per 100 end users supported.
Tags : ibm, idc, server transition, server alternatives, business value, operating costs, hardware platforms, server life cycles, hardware maintenance, software maintenance, application costs, modernization, business continuity, power5, power7, leveraging technology, it managers, it infrastructure, technology replacement cycle, data center
     IBM
By: Ciena     Published Date: May 22, 2015
By leveraging Ciena’s state-of-the-art WaveLogic 3 Extreme chipset, Waveserver offers high capacity in an extremely compact footprint, with a web-scale operations toolkit and open programmability—all the essential ingredients to help DCI compete in the web-scale era.
Tags : ciena. data center, interconnect, dci applications, web scale
     Ciena
By: BlackBerry Cylance     Published Date: Apr 15, 2019
Artificial intelligence (AI) leads the charge in the current wave of digital transformation underway at many global companies. Organizations large and small are actively expanding their AI footprints as executives try to comprehend more fully what AI is and how they can use it to capitalize on business opportunities by gaining insight to the data they collect that enables them to engage with customers and hone a competitive edge. But, while AI may indeed be the frontier of enterprise technology, there remain many misconceptions about it. Part of the confusion stems from the fact that AI is an umbrella term that covers a range of technologies — including machine learning, computer vision, natural language processing, deep learning, and more — that are in various stages of development and deployment. The use of AI for dynamic pricing and targeted marketing has been in use for a while, but actual AI computing where machines think like humans is still many years from becoming mainstream. T
Tags : 
     BlackBerry Cylance
By: IBM     Published Date: Nov 19, 2014
According to a recent survey by the Compliance, Governance and Oversight Council, almost 70% of the electronic content and information organizations retain has no business or legal value. It’s simply digital detritus, retained because 1) we think we might need it sometime, 2) we forget about it, or 3) we don’t have policies and software in place to get rid of it. Ultimately, though, this unnecessary accumulation of content can create real problems in terms of e-discovery, regulation, management and cost. Watch this video white paper to learn more about: - How to get started on an information management strategy - The right combination of software and policy for successful information governance - The business case for proactive management of an organization’s digital footprint
Tags : compliance, governance, oversight, digital debris, data cleanup, legacy data cleanup, information management, information management strategy, information governance
     IBM
By: Cisco     Published Date: Jan 05, 2016
With a global monthly reach consisting of more than 500 million mobile users and billions of requests, Tapjoy historically relied heavily on their IT footprint. They needed an environment that would allow them to accelerate the development and improve the performance of their big data algorithms, which help drive real time decision-making that delivers the best content to their global audience. Read more to learn how Tapjoy engineers opted for a cloud-based model to run their big data platform instead of bare metal, prioritizing agility and the ability to scale over bare metal performance.
Tags : 
     Cisco
Start   Previous    1 2 3 4 5 6    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com