phi

Results 1 - 25 of 1796Sort Results By: Published Date | Title | Company Name
By: Hitachi Vantara     Published Date: Aug 16, 2018
In this infographic, we are going to show you the possibilities with modernized, optimized data infrastructure. In doing so, we aim to bring you ideas about how you can bring your own data-driven business vision to life, focusing on the outcomes that matter most to you. In essence, we will be discussing five main industries and the possibilities for modernized data infrastructure. We will be displaying how Banking and Financial Services, Telecommunications, Manufacturing, Healthcare and Retail can use data, analytics and automation to optimize their business, therefore bringing about a competitive edge which previously appeared unimaginable. Using data correctly, most importantly building proper data infrastructures, can be the driving force behind obtaining a competitive edge. Data is your story. And itís our story, too.
Tags : 
     Hitachi Vantara
By: HotSchedules     Published Date: Jan 17, 2019
Restaurant inventory management is not a favorite activity among restaurant managers, but that doesnít mean it has to be painful. The process ó especially when conducted with outdated methods ó is both tedious and time-consuming. But better inventory management could have a big impact on your restaurantís bottom line. This infographic tells you how to handle objections from managers who donít want to your inventory management system and lays out how to fix the problem with modern, mobile inventory tools.
Tags : 
     HotSchedules
By: DellEMC and Intelģ     Published Date: Oct 25, 2017
Now is the time to make the move to All-Flash. With the right combination of performance, price and density options, our broad portfolio puts flash within reach for any size organization, making 2016 The Year of the All-Flash Data Center. Reduce storage costs and complexity with reliable, low-latency performance ó discover how Dell EMC All-Flash storage solutions powered by Intelģ can modernize your data center today. Intel Insideģ. Para una productividad extraordinaria. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi e Xeon Inside s„o marcas comerciais da Intel Corporation ou de suas subsidiŠrias nos EUA e / ou em outros paŪses
Tags : ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
     DellEMC and  Intelģ
By: Menlo Security     Published Date: Jun 05, 2018
"Despite deploying multiple security layers to defend against cyberattacks, enterprises continue to be infected by web malware and have credentials stolen via phishing. Why is this? Hereís a 40 minute webinar featuring a representative of a leading insurance company - providing the customer perspective, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, to answer this. Together, they discuss: * The shortcomings of todayís reactive security philosophy * Why the web continues to present a risk to businesses * The benefits of embracing Isolation * How organizations should rethink their security strategy moving forward"
Tags : 
     Menlo Security
By: Menlo Security     Published Date: Jun 05, 2018
"2017 was marked by a significant number of high-profile cyber breaches. Web malware and phishing played a critical role in the vast majority of these attacks. Watch this webinar to learn from two of the industryís leading experts Ė Gartner Research Analyst Peter Firstbrook and Menlo Security CTO Kowsik Guruswamy: *Why web malware and phishing are so pervasive in today's cyber attacks *What the shortcomings of todayís reactive security philosophy are *Why the web continues to present a risk to businesses *How organizations rethink their security strategy moving forward"
Tags : 
     Menlo Security
By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
     IBM
By: Cisco     Published Date: Apr 11, 2016
Digital transformation isnít a technology or a product. Rather, itís a philosophy for using digital assets to change the way an organization runs. It involves realigning technology and modifying business processes to better engage employees, customers and other constituents of the extended enterprise. Digital transformation significantly improves the performance and reach of an enterprise and has become a top priority for IT and business leaders across the globe.
Tags : cisco, digital transformation, best practices, digital assets, digitization, networking, it management
     Cisco
By: Cisco     Published Date: Dec 21, 2016
Digital transformation isnít a technology or a product. Rather, itís a philosophy for using digital assets to change the way an organization runs. It involves realigning technology and modifying business processes to better engage employees, customers and other constituents of the extended enterprise. Digital transformation significantly improves the performance and reach of an enterprise and has become a top priority for IT and business leaders across the globe
Tags : 
     Cisco
By: Cisco     Published Date: Sep 21, 2017
Digital transformation isnít a technology or a product. Rather, itís a philosophy for using digital assets to change the way an organization runs. It involves realigning technology and modifying business processes to better engage employees, customers and other constituents of the extended enterprise. Digital transformation significantly improves the performance and reach of an enterprise and has become a top priority for IT and business leaders across the globe. Read on to find out how Cisco's Architecture can enable Digital Transformation.
Tags : digital transformation, architecture, business processes, best practices, customer engagement, employee engagement
     Cisco
By: WatchGuard Technologies     Published Date: Apr 21, 2010
With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.
Tags : watchguard technologies, anti spam, security, tco, xcs, anti-phishing, data loss prevention, encryption, email security appliances
     WatchGuard Technologies
By: Cylance     Published Date: Mar 12, 2019
Cyber attacks are increasing in frequency, sophistication, and effectiveness.1 The ongoing trend of successful attacks demonstrates that cybersecurity practices are not keeping pace with modern threats. Is your organization well-defended, or living on borrowed time? Here are ten signs to help you determine whether your endpoint protection is primed for action or ready for retirement.
Tags : 
     Cylance
By: Cylance     Published Date: Mar 12, 2019
Cyber attacks are increasing in frequency, sophistication, and e ectiveness.1 The ongoing trend of successful attacks demonstrates that cybersecurity practices are not keeping pace with modern threats. Is your organization well-defended, or living on borrowed time? Here are ten signs to help you determine whether your endpoint protection is primed for action or ready for retirement.
Tags : 
     Cylance
By: Clearswift     Published Date: Jun 09, 2008
Every enterprise has to find a balance between security and the ability to carry on conducting business freely. This short guide is about finding that balance. By following some basic principles, there's no reason you can't let legitimate business email move into, out of and within your enterprise while stopping the things that cause damage: viruses, spam, spyware, trojans, phishing, Denial of Service attacks, the loss of sensitive data and the collection of illegal, immoral and just plain offensive material.
Tags : e-mail security, guide, clearswift, clearswift
     Clearswift
By: F5 Networks     Published Date: Mar 18, 2015
The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs, and stay protected in the future.
Tags : f5 networks, ddos, ip security, real time attack, data protection, secure business
     F5 Networks
By: K2     Published Date: Apr 01, 2016
Microsoft SharePoint 2013 workflows are a powerful way to share information, collaborate on projects and automate business processes. However, in addition to the basic workflow capabilities that come with SharePoint, organizations also need sophisticated, reliable SharePoint workflow apps with advanced capabilities. Since custom code can be expensive and time-consuming, and customization options are limited in cloud hosted SharePoint environments, third-party applications make it possible to build advanced SharePoint workflow applications without dealing with the challenges of custom code. To help you evaluate third-party workflow solutions, here are 10 tips to consider.
Tags : sharepoint, microsoft, workflow, it management
     K2
By: Polycom     Published Date: May 12, 2015
Infographic featuring ten pieces of advice for successfully addressing issues with compliance, customers, competitiveness, and complexity.
Tags : polycom, enterprise, collaboration, fsi, compliance, customer
     Polycom
By: Panda Security     Published Date: Feb 27, 2008
E-mail is the primary communication tool upon which every business and corporation depends.  This communication source is also the battleground where cybercriminals use sophisticated email infiltration-techniques to propagate malware and attack corporate networks.
Tags : malware, hacker, hacking, hackers, email security, e-mail security, panda, panda security, denial of service, dos, phishing, spyware
     Panda Security
By: Staples Business Advantage     Published Date: Oct 13, 2016
How are you sitting right now? In your chair? Are you SURE thatís good for your back? This infographic gives you 11 things you could do to reduce workplace soreness and injuries.
Tags : ergonomics, healthier workforce, musculoskeletal disorders, productivity, furniture
     Staples Business Advantage
By: Akamai Technologies     Published Date: Aug 11, 2017
DNS is a well-worn data exfiltration and communication vector. Explore why targeted threats continue to use the DNS protocol to exfiltrate sensitive information, how itís done, and what might be next in the evolution of this attack vector.
Tags : domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
     Akamai Technologies
By: ScanLife     Published Date: Feb 25, 2012
The report details information such as overall barcode scanning trends, mobile operating systems scanning shares, representative demographics of users, and activities of overall states and/or countries with the highest scanning utilization.
Tags : scanlife, marketing, emerging marketing, mobile marketing, barcode, mobile phones, smart phones
     ScanLife
By: IBM     Published Date: Oct 09, 2012
Insights from the 2012 Global Reputational Risk and IT Study: How security, business continuity and technical support can shape the reputation and value of your company.
Tags : security risks, it security, reputational risk, business continuity, infographic, ibm, security, business technology
     IBM
By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Groupís second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
     Citrix Systems
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Get an overview of the cyberthreat landscape and see key findings from the ď2015 Cyberthreat Defense Report.Ē
Tags : citrix, cyberthreat, infographic, 2015 report
     Citrix Systems, Inc.
By: Lumension     Published Date: Jun 03, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : report, servers, cloud, applications, it network, business technology
     Lumension
By: Lumension     Published Date: Jun 05, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : report, servers, cloud, applications, it network, business intelligence, productivity
     Lumension
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com