it strategy

Results 1 - 25 of 1653Sort Results By: Published Date | Title | Company Name
Published By: SunGard Availability Services     Published Date: Mar 31, 2014
A Florida Hospital performs recovery tests twice a year, recovering more than 100 applications. The healthcare organization needed a recovery strategy that improved communication and efficiency, managed a complex change control process, and that would keep staff at home during a disaster.
Tags : 
    
SunGard Availability Services
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: Butler Technologies     Published Date: Jul 02, 2018
As enterprises become more distributed and migrate applications to the cloud, they will need to diversify their network performance management solutions. In particular, the network operations team will need to complement its packet-based monitoring tools with active test monitoring solutions to enhance visibility into the cloud and help enterprises scale monitoring gracefully and cost-effectively.
Tags : 
    
Butler Technologies
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
There’s no turning back from the fact that disruptive business automation is here. As artificially intelligent functionality delivers more capabilities that we increasingly take for granted, it’s difficult to grasp all the implications of this transformation. In this eBook, the aim is to illustrate what it means for business, for the people who work in those businesses, and for people served by those businesses every day. To better understand how automation is changing business, and with the generous support of CA Technologies, we reached out to 39 experts to get their opinion. By providing practical insights into what is happening today and what may be just over the horizon, I believe this eBook will be a valuable resource for anyone planning an automation strategy.
Tags : 
    
CA Technologies_Business_Automation
Published By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
In the 26-criteria evaluation of continuous delivery and release automation (CDRA) providers, we identified the 15 most significant — Atlassian, CA technologies, Chef Software, Clarive, CloudBees, electric Cloud, Flexagon, Hewlett packard enterprise (Hpe), IBM, Micro Focus, Microsoft, puppet, Red Hat, VMware, and Xebialabs — and researched, analyzed, and scored them. We focused on core features, including modeling, deploying, managing, governing, and visualizing pipelines, and on each vendor’s ability to match a strategy to these features. this report helps infrastructure and operations (I&o) professionals make the right choice when looking for CDRA solutions for their development and operations (Devops) automation.
Tags : 
    
CA Technologies_Business_Automation
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
Start the journey to operational and digital excellence by gaining a clear strategy for the first steps forward. This resource includes: • An executive summary of Smart Manufacturing • Benchmarking manufacturing operations management • The road to MOM 4.0 • Digital transformation is a vehicle, not a destination • Recommendations to achieve digital excellence Manufacturers need to start now and follow a clear path from corporate strategic objectives through to successful program implementation.
Tags : 
    
Dassault Systèmes
Published By: KPMG     Published Date: Jul 10, 2018
With disruptive ideas and technologies coming thick and fast, formulating a strategic response is critical to long-term survival. How can you prepare a strategy for success? Read this report to find out: • how established organisations are meeting the challenge from disruptors • what models they’re using to gain first-mover access to technology innovation • why designing an overall portfolio of disruption responses is key • how to navigate disruption successfully, with a clear four-step approach.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 10, 2018
Initiatives that provide a digital customer experience or digitise existing processes merely scratch the surface. To unleash the true potential of digital, you need to reimagine your business model. Download this report to find out: • ten key technologies that will change business forever • why strategy beats technology in the race to transform • where business leaders think the key changes happen • the three categories of innovation that will drive digital business models of the future.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 10, 2018
Manufacturers are already investing in select industry 4.0 technologies and capabilities. But their investments won’t automatically deliver success. What strategy should you follow to become an i4.0 leader? Read this report to find out: • how leading manufacturers invest to optimise the benefits of industry 4.0 • why deploying at the right scale is key to delivering enterprise value • what capabilities, controls and culture are required to support i4.0 success • how to use i.4 to deliver better value for customers • why i.4. leaders are bringing suppliers into the i4.0 environment.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 10, 2018
With disruptive ideas and technologies coming thick and fast, formulating a strategic response is critical to long-term survival. How can you prepare a strategy for success? Read this report to find out: • how established organisations are meeting the challenge from disruptors • what models they’re using to gain first-mover access to technology innovation • why designing an overall portfolio of disruption responses is key • how to navigate disruption successfully, with a clear four-step approach.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 10, 2018
Initiatives that provide a digital customer experience or digitise existing processes merely scratch the surface. To unleash the true potential of digital, you need to reimagine your business model. Download this report to find out: • ten key technologies that will change business forever • why strategy beats technology in the race to transform • where business leaders think the key changes happen • the three categories of innovation that will drive digital business models of the future.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 24, 2018
In a fast-changing marketplace, customers expect a seamless experience across every channel. To compete successfully and win their custom, you need to become a customer-centric, connected enterprise. Read this guide to find out: • why it pays to be a connected enterprise • eight connected capabilities your business needs to develop • five key steps to developing your strategy • ‘what good looks like’ – for your customers and your organisation. Get the guide
Tags : 
    
KPMG
Published By: IBM     Published Date: Jul 02, 2018
Businesses are struggling with numerous variables to determine what their stance should be regarding artificial intelligence (AI) applications that deliver new insights using deep learning. The business opportunities are exceptionally promising. Not acting could potentially be a business disaster as competitors gain a wealth of previously unavailable data to grow their customer base. Most organizations are aware of the challenge, and their lines of business (LOBs), IT staff, data scientists, and developers are working to define an AI strategy. IDC believes that this emerging environment is to date still highly undefined, even as businesses must make critical decisions. Should businesses develop in-house or use VARs, systems integrators, or consultants? Should they deploy on-premise, in the cloud, or in some hybrid form? Can they use existing infrastructure, or do AI applications and deep learning require new servers with new capabilities? We believe that many of these questions can be
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 16, 2018
Do your plans and forecasts need a reality check? The quality of your strategic decisions is only as good as the quality of your forecasts. And forecasts are only good if they reflect current reality—not the reality of two, three or more quarters ago. Enter “continuous planning.” With a methodology for forecasting at frequent intervals throughout the year, continuous planning “enables managers to see trends, patterns, and ‘breaks in the curve’ long before their competitors, and thus make better informed decisions regarding products and markets.” In this free online webinar, speakers Jim Collins & Guy Jones will explain how continuous planning keeps you in touch with current reality - and one step ahead of competitors. Jim Collins, Performance Management Strategy Executive, IBM Guy Jones, Worldwide Technical Sales Executive, IBM Performance Management,
Tags : 
    
IBM
Published By: Menlo Security     Published Date: Jun 05, 2018
"2017 was marked by a significant number of high-profile cyber breaches. Web malware and phishing played a critical role in the vast majority of these attacks. Watch this webinar to learn from two of the industry’s leading experts – Gartner Research Analyst Peter Firstbrook and Menlo Security CTO Kowsik Guruswamy: *Why web malware and phishing are so pervasive in today's cyber attacks *What the shortcomings of today’s reactive security philosophy are *Why the web continues to present a risk to businesses *How organizations rethink their security strategy moving forward"
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Jun 05, 2018
"Despite deploying multiple security layers to defend against cyberattacks, enterprises continue to be infected by web malware and have credentials stolen via phishing. Why is this? Here’s a 40 minute webinar featuring a representative of a leading insurance company - providing the customer perspective, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, to answer this. Together, they discuss: * The shortcomings of today’s reactive security philosophy * Why the web continues to present a risk to businesses * The benefits of embracing Isolation * How organizations should rethink their security strategy moving forward"
Tags : 
    
Menlo Security
Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research
    
Virtela Communications, Inc.
Published By: Epson     Published Date: May 14, 2018
Consumers worldwide continue to adopt and use technology in their shopping experience. Faced with rising customer expectations and increasing competitive pressures, retailers now are prioritizing in-store innovation. Many retailers have adopted multichannel implementations, in which mobile, web, and in-store shopping are enabled but not delivered consistently to the customer. The next step in this evolution is an omnichannel strategy, now being deployed by some retailers, which presents a consistent shopping experience across mobile, web, and in-store channels. Omnichannel also enables retailers to integrate back-end infrastructure technologies (e.g., servers, databases, etc.) and cloud-based services (e.g., loyalty programs, personalized recommendations, inventory management, etc.) to improve many aspects of store and enterprise operations. An omnichannel strategy relies on several core and supporting technologies. The key factors in evaluating any omnichannel-enabling solution includ
Tags : 
    
Epson
Published By: MuleSoft     Published Date: Jul 13, 2018
"In the wake of recent legislative pressures and the formation of the Digital Transformation Agency, Australian state and federal government agencies face an imperative to deliver superior digital services to employees and citizens without a corresponding increase in budget. As a result, many agencies have turned to IT modernisation as a means of driving more cost-effective digital transformation. The key to successful execution of digital transformation initiatives depends on a new approach to integration and API strategy called API-led connectivity. In this whitepaper, you will learn: -Why Australian government agencies must change how they deliver IT projects, and the role integration and an API strategy play in supporting the modernisation of government IT -How to build out an API-led architecture within a government agency to realise 2-5x increases in IT productivity -How best practice from initiatives like Service NSW provide a model for government agencies to pursue digital t
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Jul 13, 2018
"Digital transformation is increasingly becoming a “when, not an if” for most companies. MuleSoft surveyed 650 IT decision makers across the globe. The research shows that three-quarters of companies are currently undertaking digital transformation initiatives, and 80% say if they don’t complete those initiatives, their companies will lose revenue in the next 12 months. How does your company stack up? Download the Connectivity Benchmark Report 2018 to find out: -The top digital trends companies are investing in for 2018 -The biggest challenges holding companies back from achieving their digital transformation goals -The one strategy companies use to develop applications and projects more efficiently"
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Jul 13, 2018
"IT teams across industries face growing pressure to deliver projects faster while reducing costs. All too often, dated legacy systems hinder IT’s ability to accomplish either of these objectives. Legacy systems can also slow the speed at which IT can deliver new projects to support the business. For these reasons, legacy modernization has emerged as a key strategic imperative. But where should organizations start? One large global bank provides a detailed blueprint for how large enterprises can do so. Read this legacy modernization blueprint to learn: -Best practices for modernizing legacy SOA web services -How to think about re-architecting monolithic applications into microservices -The role that APIs play in driving an effective legacy modernization strategy -The bank’s legacy modernization strategy, and how they used Anypoint Platform"
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Jul 13, 2018
"Omnichannel is becoming more than connecting system A to system B - but rather preparing for the future as new channels continue to arrive. By leveraging an API-led approach, organizations can develop more meaningful (and valuable) relationships with their customer and improve customer engagement—moving beyond transactions through multi-channel engagement. This whitepaper outlines why and how to develop an omnichannel strategy. Accenture and MuleSoft are uniquely positioned to help companies realize the revenue potential and capture the operational synergies of an omnichannel strategy. Read this whitepaper to discover: -How API-led connectivity leads to developing an omnichannel strategy -Case studies of Accenture and MuleSoft customers who achieved strong business outcomes with omnichannel -How to accelerate the omnichannel journey with an application network"
Tags : 
    
MuleSoft
Published By: Microsoft     Published Date: Jul 20, 2018
In the two years since we first began working on Enterprise Cloud Strategy, much has changed. Cloud technology has evolved from being an “if” to a “when,” and across almost all enterprises, the cloud has now become an integral part of IT strategy. Further, there is now a growing realization that cloud computing not only represents a set of technical opportunities for efficiencies and cost savings, but also provides the potential to significantly transform the scope of enterprise computing. In fact, many enterprises are finding that cloud computing offers entirely new business models, revenue streams, and vehicles for customer intimacy. Few technological changes have the potential to so dramatically change to the way we do business. The last time we experienced such a tectonic shift was the with arrival of the Internet itself. Yet, as we noted in the first edition of this book, when briefing CIOs and senior IT executives at Microsoft, we are often told that migrating IT workloads to the
Tags : 
    
Microsoft
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search