trend

Results 301 - 325 of 1944Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jan 09, 2017
Ponemon Institute is pleased to present the results of Uncovering the Risks of SAP Cyber Breaches sponsored by Onapsis. The purpose of this study is to understand the threat of an SAP cyber breach and how companies are managing the risk of information theft, modification of data and disruption of business processes.
Tags : ibm, security, ponemon institute, technology, fraud, sap, cyber breaches, enterprise applications, business technology
     IBM
By: IBM     Published Date: Jan 09, 2017
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents.
Tags : ibm, security, services operations, ibm emergency response services, cybersecurity, cyber crime, enterprise applications, business technology
     IBM
By: Akamai Technologies     Published Date: Oct 02, 2018
The Summer 2018 security report is about change: what’s new and unusual in DDoS attacks, where are the surprising data patterns, and how should enterprises and security professionals prepare for the unexpected. Looking back at November 2017 to April 2018, as well as year-over-year changes, Akamai analysts identified data trends that spotlight the new and unfamiliar. The Summer 2018 State of the Internet / Security: Web Attacks report covers atypical attack methods, credential abuse attacks and law enforcement prosecution of DDoS-for-hire platforms. Guest writer Rik Ferguson also explores future threat scenarios. Finally, the Integrate SID for your records (and in case you need it) for this program is: 0E9175. Anything else you need to hit the ground running with this program?
Tags : internet, web, attacks, technology, ddos
     Akamai Technologies
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
"In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical.
Tags : 
     Oracle PaaS/IaaS/Hardware
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Read this whitepaper by Forrester Research to gain perspective on the trends shaping development and operations strategies. Learn how progressive companies are handling application development and operations in a DevOps environment faster and at lower costs
Tags : 
     Oracle PaaS/IaaS/Hardware
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
     Trend Micro, Inc.
By: Adobe     Published Date: Feb 03, 2017
Econsultancy’s 2017 Digital Trends report, published in association with Adobe, is based on a global survey of more than 14,000 digital marketing and ecommerce professionals across EMEA, North American and Asia Pacific markets.
Tags : digital trends, customer experience, business transformation, customer experience management
     Adobe
By: JBoss Developer     Published Date: Oct 21, 2016
Microservices architecture is a new architectural style for creating loosely coupled but autonomous services. Emerging trends in technology—such as DevOps, Platform-as-a-Service (PaaS), containers, and continuous integration and delivery (CI/CD) methods—let organizations create and manage these modular systems on an unprecedented scale that exceeds earlier approaches like service-oriented architecture (SOA). But organizations that refactor monolithic applications into microservices experience widely varying degrees of success. The key to using microservices effectively is a solid understanding of how and why organizations should use microservices to build applications
Tags : microservices, architecture, java, paas, soa
     JBoss Developer
By: Workday     Published Date: Feb 04, 2019
"Read now to learn about three key steps drawn from the “2018 Deloitte Global Human Capital Trends” report that emerging organisations can take to attract and retain top talent, including: ? Redefining careers ? Creating more personalised performance enablement to boost employee engagement ? Using data-driven technology and analytics to enhance business value "
Tags : workday, workforce technology, digital strategy
     Workday
By: WNS     Published Date: Jun 21, 2017
E-commerce which till a few years back was of peripheral significance to the CPG industry is now one of the biggest drivers of change and innovation in the sector. The numbers representing growth are quite staggering with McKinsey1 believing that the online space will account for anywhere from 10 to 30 percent of total industry sales growth in the next five years. This equates to a market opportunity of USD 15 Billion to USD 50 Billion. Given how digital is impacting every part of the CPG value chain, companies need to be awake to the emerging trends as they can potentially have a make or break effect. This article discusses key trends that will define the CPG space in days to come.
Tags : ecommerce, cpg companies, personalization, market mix modeling, digital media, integrated it infrastructure, predictive demand, agile supply chain
     WNS
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: CA Mainframe     Published Date: Sep 12, 2008
This white paper describes the trends that are not only keeping the mainframe market alive but are supporting its growth. The growing complexity of IT makes consolidation and simplification of IT asset management essential. At the same time, increases in energy costs and concern about the environment are also impacting markets. Mainframes are uniquely positioned to provide the automation and virtualization today's complex infrastructures require while using less energy.
Tags : ca mainframe, mainframe
     CA Mainframe
By: HP - Enterprise     Published Date: Jun 05, 2013
The year 2011 ended with a staggering 5.9 billion mobile phone subscriptions, especially significant considering that the total world population is around 7.011 billion. Of course, a direct comparison is not fair since many people have multiple subscriptions, but it represents a window into the pervasiveness of these devices and how they are an integral part of people’s lives today. For enterprises, this also represents the impending end to the old computing era and the emergence of the mobile worker. Enabling mobility in the workplace is a top-of-mind goal for decision-makers within every organization. This necessity is brought about by the consumerization of IT and the requirement to develop policies to manage the “bring-your-own-device” (BYOD) trend.
Tags : mobile phones, mobility, it management
     HP - Enterprise
By: HP - Enterprise     Published Date: Jun 05, 2013
Whether you want to map directions, find a restaurant, look up your flight details, see where your next meeting is, or just check your email, chances are you do it on your smartphone. Just about everything is going mobile. Industries such as retail and financial services are going mobile to increase efficiency and generate more revenue. Mobile business apps and mobile enterprise apps have the potential to transform organizations. This white paper discusses key mobile trends and analyzes how financial services organizations must change their IT application development, testing, monitoring, and management methodologies while extending their services to multi-client mobile environments, leveraging both Native and Mobile-oriented Web apps.
Tags : mobility, financial services, revenue stream, application development
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies, technology security, web service security, vulnerability management, networking, application security, phishing, security management, security monitoring, security solutions, network security
     HP - Enterprise
By: iCims     Published Date: Feb 02, 2017
f there’s one thing we know about the world of talent acquisition, it’s that it’s always evolving. Staying ahead of the latest trends can give employers the edge they need to hire smarter in the year to come.
Tags : 
     iCims
By: TriNet     Published Date: Jul 28, 2015
The future of HR lies in technological advances and implementation for businesses of all sizes.
Tags : hr technology, hr data, technology providers, hr trends, mobility, cloud data security, hr terminology, business performance management, hr cloud, single-source outsourcing, in-house customization, licensing, multiple vendors
     TriNet
By: Brightcove     Published Date: Feb 04, 2015
Welcome to Content Marketing in Australia 2015: Benchmarks, Budgets, and Trends. This is the third year that Content Marketing Institute and the Association for Datadriven Marketing and Advertising (ADMA) have partnered to produce this report. This year, we look at how Australian for-profit marketers (both business-to-business and business-to-consumer) approach content marketing as compared with last year. Download the whitepaper to learn more!
Tags : australia, marketing, brightcove, benchmarks, budgets, trends, datadriven marketing and advertising, adma, for-profit marketers, content marketing institute
     Brightcove
By: Blue Coat Systems UK     Published Date: Nov 03, 2011
Learn how to proactively address the latest trends in WAN traffic. Tomorrow is here: video, Web 2.0, and SaaS applications are overtaking the WAN.
Tags : blue coat, wan optimization, secure web gateway, application performance monitoring
     Blue Coat Systems UK
By: Viavi Solutions     Published Date: Jul 21, 2017
The Tenth Annual State of the Network Global Study focuses on a lens on the network team's role in security investigations. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60% and software-defined networking is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. Study questions were designed based on interviews with network professionals and IT analysts. Results were compiled from the insights of 1,035 respondents, including network engineers, IT directors and CIOs around the world.
Tags : security investigation, security, sdn, cloud, data initiative, technology adoption, security trends, network performance monitoring, security threats
     Viavi Solutions
By: CEB     Published Date: May 09, 2013
What will differentiate the best HR leaders? Learn the three key trends you need to address over the next year that will unlock the potential for deeper contribution to your business.
Tags : talent assessment, workforce planning, succession management, human capital analytics, hr metrics, network performance
     CEB
By: CEB     Published Date: Jun 19, 2013
What will differentiate the best HR leaders? Learn the three key trends you need to address over the next year that will unlock the potential for deeper contribution to your business.
Tags : talent assessment, workforce planning, succession management, human capital analytics, hr metrics, network performance
     CEB
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com