RecruitingBlogscom

Follow Us:

 

generation

Results 201 - 225 of 1518Sort Results By: Published Date | Title | Company Name
Published By: CDW     Published Date: Sep 10, 2014
Learn how to optimize your next-generation unified storage for virtualized applications and see how this can help with timely retrieval of information to facilitate transactions and decision-making.
Tags : 
protection, storage, architecture, massive growth, integrated, data
    
CDW
Published By: CDW     Published Date: Mar 27, 2015
Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of workers raised on mobile technologies. Consumer devices and bring-yourown-device (BYOD) programs are driving a new wave of business process innovation, changing the way customers, employees and partners interact with organizations and with each other. In fact, mobile devices and applications are catching up with — and in many cases surpassing — PCs in the quality and functionality of their applications.
Tags : 
mobile, application, content, innovation, functionality, customer, employee, smartphone, tablet, device, consumerization, wireless, data management
    
CDW
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
In today’s ‘always on, always connected’ world where sensitive data is almost certain to be stored electronically, organizations can no longer afford to operate without some form of Endpoint Protection. The costs related to network downtime or stolen data resulting from malicious attacks significantly outweighs that of maintaining an up to date solution. Although the unified nature of Endpoint Protection has made extensive security functionality easier to manage, selecting the right products can be a difficult task. This whitepaper aims to explain how the core functionality of Enterprise Protection suites have developed, what to look for in a solution, and which technologies will need to be considered in the future. In today’s business environment, it is no longer a question of whether to invest in Endpoint Protection, but a question of which solution is right for your organization.
Tags : 
endpoint security, data security, endpoint protection, enterprise protection, technology, networking, security, it management
    
CDW-Trend Micro
Published By: CEB     Published Date: Aug 12, 2013
B2B buyers are learning on their own and delaying contact with suppliers until late in the purchase. Most B2B marketers are fighting back with thought leadership—but it’s not working. The Challenger Marketing approach helps marketers stand out amongst the noise and more reliably reset the customer’s purchase criteria decisively in theirf avor.
Tags : 
content marketing, thought leadership, b2b marketing, demand generation, lead generation
    
CEB
Published By: CEB     Published Date: Sep 04, 2013
B2B buyers are learning on their own and delaying contact with suppliers until late in the purchase. Most B2B marketers are fighting back with thought leadership—but it’s not working. The Challenger Marketing approach helps marketers stand out amongst the noise and more reliably reset the customer’s purchase criteria decisively in their favour.
Tags : 
content marketing, thought leadership, b2b marketing, demand generation, lead generation
    
CEB
Published By: CEB     Published Date: Nov 24, 2014
Many brands are struggling to keep up and are losing ground as consumers demand higher levels of service through a more digital experience. Making matters worse, these changes are driven by a massive generation that is notoriously difficult to engage. Winning consumers over today requires building new capabilities that make brands more agile and provides deeper, more intimate knowledge of buyers.
Tags : 
b2c marketing insights, b2c marketing teams, consumers demand insights, customer experience, effortless experience, marketing leaders, global marketing executives, digital marketing strategies, marketing executives, traditional marketing, sales
    
CEB
Published By: Centrica Business Solutions     Published Date: Aug 14, 2018
It's demanding times for businesses. Facing risks as diverse as extreme weather and cyber-attacks, ?rms are focusing more intently on business continuity plans. At the same time, the digital revolution is changing lifestyles, disrupting business models and acting as a catalyst for change. Energy itself is undergoing a transformation, as generation moves towards renewables and decentralization, while technological advances present new opportunities. Energy now has the potential to deliver competitive advantage, to enhance sustainability and resilience, and to power innovative business models. But equally, the range of new options available is making the management of energy more complex. Read this thought leadership paper to find out how energy can drive your business strategy.
Tags : 
business, strategy, energy, efficiency, performance
    
Centrica Business Solutions
Published By: Centrify     Published Date: May 26, 2016
This paper examines how securing identity is at the center of protecting your users, systems and data. In fact, today’s threats require a next-generation identity platform. And how Centrify secures enterprise identities through the Centrify Identity Platform.
Tags : 
data security, security, cyber attacks, threat and vulnerability management
    
Centrify
Published By: Centrify Corporation     Published Date: Dec 04, 2014
The number of identities that an organization must control and secure is exploding as companies support the evolution of business. Traditional users, customers and partners, outsourced or offshore IT, support and development teams, and new users from mergers and acquisitions are working from increasingly distributed locations and devices and to be efficient they need the right set of privileges across a diverse set of servers and applications. So, how can an organization successfully control privilege for all of these identities to mitigate identity-related risk without slowing down the business? From this webinar you will learn: • Forrester’s predictions for next generation privileged identity management. • How best-in-class organizations are successfully controlling privilege and mitigating risks
Tags : 
identity management, it support, security, identity management, controlling privilege, enterprise applications
    
Centrify Corporation
Published By: CheckMarx     Published Date: Nov 02, 2018
Dinosaurs are super cool, but there are some places where dinosaurs don’t belong, and one of those is in your fast-paced DevOps environment. We’re in a new world where traditional security solutions no longer make the cut. Software is increasingly complex, and when deployed at the speed of DevOps, it creates a new type of risk: Software Exposure. Legacy application security tools are too big, too slow, and too clunky to deliver the innovation needed to protect your customers in the 21st century. The Software Exposure Platform from Checkmarx is an entirely new species heralding the next generation of software security. The platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper The Demise of the AppSec Dinosaur to learn how Checkmarx provides the combination of integrations and automation required in
Tags : 
    
CheckMarx
Published By: Cherwell Software     Published Date: Sep 22, 2015
The next generation user expects more do-it-yourself IT offerings. Whether it’s self-service portals with interfaces to rival Amazon or personal mobile devices with 24/7 business access, users are requesting more self-service functions and capability. To the modern user of technology “consumer-grade” has become a standard, and it’s ITs’ job to not only appease but genuinely satisfy contemporary users. This research highlights four ways to satisfy the modern user who brings their own knowledge, devices, applications and technical expectations to the workplace.
Tags : 
business enablement, cloud applications, cloud computing, cloud infrastructure, cloud strategy
    
Cherwell Software
Published By: CIC Plus     Published Date: Sep 23, 2014
Learn three reasons that being a competitive employer of choice demands that you take advantage of a cloud-based, paperless system for generating and storing pay stubs and the increasing amount of data they contain.
Tags : 
payroll, payroll processing, multigeneration workforce, payroll company, payroll strategy, pay stubs, online pay stubs, online hr forms, onboarding, new employee, new employee orientation, w-2, w-4, hr form hosting, payroll form hosting, human resources
    
CIC Plus
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
    
Ciena
    
Ciena
    
Ciena
    
Ciena
Published By: Cisco     Published Date: Jul 01, 2011
Read this white paper to learn how IT organizations can implement an effective Service Catalog that will enable them to reap the full benefits of self-service in virtualized and cloud computing environments.
Tags : 
cisco, automization, service catalog, self-service, datacenter, virtualization, private cloud, infrastructure, newscale
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : 
malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic, networking, security, software development, it management, business technology
    
Cisco
Published By: Cisco     Published Date: Jul 27, 2011
Read this white paper to learn how IT organizations can implement an effective Service Catalog that will enable them to reap the full benefits of self-service in virtualized and cloud computing environments.
Tags : 
cisco, automization, service catalog, self-service, datacenter, virtualization, private cloud, infrastructure, newscale
    
Cisco
Published By: Cisco     Published Date: Jan 16, 2014
Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls
Tags : 
cisco, security, next-gen threat defense, byod, saas, firewalls, next-generation firewalls
    
Cisco
Published By: Cisco     Published Date: Jan 16, 2014
Comprehensive network visibility and control increases business efficiency and enables business growth while maximizing security.
Tags : 
cisco, next-generation firewall, byod, bring your own devise, security
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Optimize benefits from your Cisco ASA 5500-X Series Next-Generation Firewall, and better secure your network from malicious activity, with a proven firewall and IPS design guide. Use this guide for faster, more reliable, and more predictable deployment.
Tags : 
security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network, vulnerabilities, firewall, optimize, security
    
Cisco
Published By: Cisco     Published Date: Sep 12, 2014
Every day, the threat landscape changes, and it can be hard to keep up. To help you strengthen your network security, Cisco has compiled the top 10 considerations that midsize companies should keep in mind when buying a next-generation firewall. Complete the form to download the white paper "Selecting a Next-Generation Firewall: Top 10 Considerations." You will learn about: Deep visibility into applications Requirements for proactive threat protection Services that can improve your migration plan and ongoing support management Read White Paper
Tags : 
firewall, buying, next-generation, companies, midsize, strengthen, network, security, visibility, management, support, migration, services, applications, improve, proactive, protection, data management
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
The data center has gone through many major evolutionary changes over the past several decades, and each change has been defined by major shifts in architectures. The industry moved from the mainframe era to client/server computing and then to Internet computing. In 2011, another major shift began: the shift to a virtual data center. This has been the primary driver in enabling customers to transition to the cloud and ultimately IT as a service. The shift to a virtual data center will be the single biggest transition in the history of computing. It will reshape all the major data center tiers: applications, storage, servers and the network.
Tags : 
data center, consolidation, server virtualization, new applications, it management, data management
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.
Tags : 
firewall, buyers guide, protocols, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, it management, data management
    
Cisco
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top