cloud based data

Results 126 - 150 of 208Sort Results By: Published Date | Title | Company Name
By: CIC Plus     Published Date: Sep 23, 2014
Learn three reasons that being a competitive employer of choice demands that you take advantage of a cloud-based, paperless system for generating and storing pay stubs and the increasing amount of data they contain.
Tags : payroll, payroll processing, multigeneration workforce, payroll company, payroll strategy, pay stubs, online pay stubs, online hr forms
     CIC Plus
By: Coupa     Published Date: Dec 14, 2018
Many procurement departments are still using traditional manual processes or outdated technology. The result? Rogue spending, missed discounts from supplier contract pricing, reconciliation headaches, and the list goes on. These business risks are driving more organizations towards the cloud-based, secure, and workflow-friendly world of eProcurement solutions. These solutions are saving money and resources, improving use of budgets and personnel, enabling centralization, and using data to improve and streamline end-to-end purchasing processes. Download this report to learn about: Procurement trends from 400 organizations surveyed Operational and cost-savings benefits of eProcurement Leading features and functionality in eProcurement Adoption best practices and how to get started
Tags : 
     Coupa
By: IBM     Published Date: Jan 27, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain a competitive advantage in their industry. However, as discussed in “The truth about information governance and the cloud,” most organizations will be confronted with the challenging task of reconciling their legacy on-premises data with new, third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
     IBM
By: IBM     Published Date: Apr 14, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain a competitive advantage in their industry. However, most organizations will be confronted with the challenging task of reconciling their legacy on-premises data with new, third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : cloud-based data, data quality, data management, hybrid environment, decision making
     IBM
By: Dataguise     Published Date: Aug 20, 2019
Co-presented by Dataguise and Amazon Web Services (AWS), this webinar looks at ways this highly regulated industry uses cloud-based technology to manage data governance and data privacy compliance across multiple services within AWS, including S3, RDS, Aurora, and Redshift. This is especially important given new data privacy laws set forth by the General Data Protection Regulation (GDPR) and the California Consumer Protection Act (CCPA) of 2018. You’ll learn specific steps to take toward successful data privacy compliance.
Tags : 
     Dataguise
By: Veeam Software     Published Date: Nov 28, 2012
Windows Server 2012 represents a paradigm shift from the traditional client/server model to a new cloud-based infrastructure. Is your business ready? Download this whitepaper to learn the 7 key questions you need to answer now
Tags : hyper v, servers, storage, cloud based infrastructure, storage solutions, data center, backup and recovery, disaster recovery
     Veeam Software
By: Epicor     Published Date: Apr 17, 2018
Running a successful firearms and shooting sports retail business offers unique challenges. To achieve growth, you need a software solution that streamlines nearly every aspect of your firearms business—letting you focus on running a more compliant, efficient, and profitable operation. Created in collaboration with Orchid Advisors, Epicor FFL Compliance Manager is a robust, cloud-based system for firearms retailers that seamlessly manages ATF compliance for higher profits and faster growth. This fast, easy-to-use bound book solution can: • Quickly package compliance reports on demand and review bound book activity with dashboards to support ATF inspections • Save time by scanning serial numbers instead of entering them manually • Relieve audit stress thanks to easy access to bound book data and on-demand, ATF-friendly reporting Read on to hear from businesses currently powered by Epicor FFL Compliance solutions.
Tags : firearms collection software, firearms inventory software, firearms management system, firearms tracking software
     Epicor
By: Delphix     Published Date: May 28, 2015
In a world of privacy regulation, intellectual property theft, and cybercrime, only a masking solution can secure vital data and enable outsourcing, third party analysis, and cloud deployments. Delphix delivers rapid deployment of masked data in minutes, service-based masking of production systems, and the ability to ship masked data across sites, to third parties, and into the cloud, with minimal network footprint.
Tags : 
     Delphix
By: Ricoh     Published Date: Oct 04, 2019
On June 25, 2018, Ricoh announced its Cloud Workflow Solutions portfolio, a collection of cloudbased solutions and services that bring streamlined processes to SMBs in scalable, subscriptionbased packages. With an emphasis on addressing specific challenges facing smaller businesses, these solutions are meant to empower digital workplaces by eliminating manual steps, reducing manual data entry, and improving speed and accuracy to increase productivity and reduce overall costs. Many SMBs struggle to move beyond the challenges associated with content silos, lack of interoperability, and ongoing transition to mobile work environments. Much like their enterprise counterparts, smaller businesses face various complexities and pain points associated with interdepartmental workflows combined with a real need to enable employees to work when, where, and how they desire. Ricoh's Cloud Workflow Solutions platform is designed to address these challenges by streamlining and automating common busines
Tags : 
     Ricoh
By: Ricoh US     Published Date: Oct 04, 2019
On June 25, 2018, Ricoh announced its Cloud Workflow Solutions portfolio, a collection of cloudbased solutions and services that bring streamlined processes to SMBs in scalable, subscriptionbased packages. With an emphasis on addressing specific challenges facing smaller businesses, these solutions are meant to empower digital workplaces by eliminating manual steps, reducing manual data entry, and improving speed and accuracy to increase productivity and reduce overall costs. Many SMBs struggle to move beyond the challenges associated with content silos, lack of interoperability, and ongoing transition to mobile work environments. Much like their enterprise counterparts, smaller businesses face various complexities and pain points associated with interdepartmental workflows combined with a real need to enable employees to work when, where, and how they desire. Ricoh's Cloud Workflow Solutions platform is designed to address these challenges by streamlining and automating common busines
Tags : 
     Ricoh US
By: Cisco     Published Date: Jul 11, 2016
With a global monthly reach consisting of more than 500 million mobile users and billions of requests, Tapjoy historically relied heavily on their IT footprint. They needed an environment that would allow them to accelerate the development and improve the performance of their big data algorithms, which help drive real time decision-making that delivers the best content to their global audience. Tapjoy engineers opted for a cloud-based model to run their big data platform instead of bare metal, prioritizing agility and the ability to scale over bare metal performance. Initially they deployed at AWS, but as the platform grew and their AWS costs increased, Tapjoy began to look for ways to better manage their growing public-cloud spend while increasing efficiency. They needed to do this without compromising the cloud experience they were giving their developers.
Tags : 
     Cisco
By: Dell Software     Published Date: Nov 17, 2014
In the race to establish and maintain strong customer relationships, line-of-business executives are increasingly turning to cloud-based, software-as-a-service (SaaS) applications like Salesforce. That’s because these applications offer greater functionality and scalability than on-premises applications. An enterprise-grade, Integration platform as a Service (iPaaS) application can provide a unified approach and toolset to support today’s disparate, hybrid IT landscape, and offer benefits for companies of all sizes. Read this guidebook to learn how to build better customer relationships by connecting the data the data that runs your business, and automating business processes that can benefit from Salesforce application integration.
Tags : integration, customer relationships, cloud-based software, functionality, scalability, data, enterprise applications
     Dell Software
By: McAfee EMEA     Published Date: Mar 14, 2018
Use of cloud computing services continues to grow rapidly as organizations migrate business applications and data to cloud-based software, platform and infrastructure services. Gartner estimates 2017 will see growth of 18% in spending on public cloud services and that cloud adoption will infuence more than 50% of IT spending through 2020. Deloitte Global predicts that by the end of 2022 more than half of all IT spending will go to IT-as-a-service providers. In the 2016 edition of this survey, 56% of the security professionals responding said limitations on access to collect incident response data and evidence for forensic analysis was a key challenge to securing the cloud. Sixty-two percent said they were concerned about unauthorized access by outsiders, and 59% said they worried about access by other cloud tenants. Of the 10% who reported being breached, half blamed stolen credentials or compromised accounts.
Tags : 
     McAfee EMEA
By: Citrix Systems     Published Date: Jul 28, 2015
As the transition to cloud-based data centers marches on, it is becoming apparent that organizations need to keep going after they virtualize their server, storage and switching infrastructure.
Tags : 
     Citrix Systems
By: Oracle     Published Date: Oct 20, 2017
Oracle’s new cloud platform, included a new line of servers for cloud and scale-out applications: Oracle’s SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracle’s breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers’ needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in memory and can prevent hacking explo
Tags : 
     Oracle
By: Oracle CX     Published Date: Oct 20, 2017
Oracle’s new cloud platform, included a new line of servers for cloud and scale-out applications: Oracle’s SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracle’s breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers’ needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in memory and can prevent hacking explo
Tags : 
     Oracle CX
By: Riverbed Technology, Inc.     Published Date: Apr 08, 2014
As enterprises focus on consolidation of data centers, they continue to expand the roles and numbers of branch offices, often in locations that are difficult to support and protect. Learn to extend the virtual edge of the data center to branch offices, enabling complete consolidation of servers and data, improving security, and providing LAN performance at the edge via the WAN.
Tags : wan, cloud based computing, optimization, performance, data center, data consolidation, servers, disaster recovery
     Riverbed Technology, Inc.
By: Cisco     Published Date: Dec 11, 2018
The most significant IT transformation of this century is the rapid adoption of cloud-based applications. Most organizations are now dependent on a number of SaaS and IaaS platforms to deliver customer satisfaction and empower employee productivity. IT teams are responsible for delivering a high quality user experience for cloud applications while they struggle to manage a secure environment with advanced persistent threats. The WAN is the fabric to connect and control access between remote users and cloud-based applications. The WAN fabric needs to identify application type, location, apply prioritization and route traffic across the appropriate (multiple) WAN links to deliver on user experience. Different types of users/devices connecting to the cloud (via the Internet) means security policies must be enforced at branch, data center and in the cloud.
Tags : 
     Cisco
By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : mobile, cloud, best practices, productivity, technology
     Microsoft
By: Palo Alto Networks     Published Date: Sep 30, 2016
Virtualization is helping organizations like yours utilize data center hardware infrastructure more effectively, leading to a reduction in costs and improvements in operational efficiencies. In many cases, virtualization initiatives begin internally, with your own hardware and networking infrastructure augmented by tools like VMware® or Linux® KVM and OpenStack® to help manage your virtualized environment. Often referred to as private cloud, these projects are fueling significant expansion into what can be referred to as the public cloud.
Tags : 
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Sep 30, 2016
Virtualization is helping organizations like yours utilize data center hardware infrastructure more effectively, leading to a reduction in costs and improvements in operational efficiencies. In many cases, virtualization initiatives begin internally, with your own hardware and networking infrastructure augmented by tools like VMware® or Linux® KVM and OpenStack® to help manage your virtualized environment.
Tags : palo alto, virtualization, cloud, firewall, security, digital
     Palo Alto Networks
By: Qualys     Published Date: Nov 16, 2012
This whitepaper discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smalles to multinational enterpries, to put trust back into the security equation.
Tags : cloud based services, security, it security, data breach, ssl, ssl governance, business technology
     Qualys
By: Qualys     Published Date: Nov 05, 2013
Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.
Tags : qualys, security, cloud, internet ecosystem, cloud computing, cloud based services, cloud solutions, cloud services
     Qualys
By: K2     Published Date: Jan 07, 2016
The cloud is here to stay, and Microsoft SharePoint users are finally making the move. Since 2013, the number of SharePoint users with intentions of moving their SharePoint sites to the cloud has doubled, according to a 2015 AIIM survey.1 Many users are making the change to reduce IT costs, improve access for external partners and increase mobility. Casey, IT manager at a mid-size healthcare organization, is one of those users planning to move his organization to a cloud-based SharePoint infrastructure. But because Casey works in healthcare, he’s especially concerned about the security of the cloud. And he’s not alone with that concern — AIIM reports that 62 percent of SharePoint users cite security as their biggest concern when considering a cloud or hybrid solution for SharePoint. More specifically, many SharePoint users are concerned about the following three areas of security in the cloud: • Identity and access • Data protection and privacy • Compliance and governance
Tags : security confidence, cloud, microsoft sharepoint, cloud solution, hybrid solution, security, it management, wireless
     K2
By: CDW     Published Date: Nov 13, 2012
With the right SaaS security solutions, small businesses can gain enterprise-class safeguards at an affordable price.
Tags : cdw, cloud, cloud computing, cloud based security, cybertheft, data breaches, business technology
     CDW
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com