RecruitingBlogscom

Follow Us:

 

mba

Results 1 - 25 of 373Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. It’s become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: IBM APAC     Published Date: Oct 11, 2019
Several countries in the Asian region are experiencing strong growth in their economies, but a large part of the population of many of these countries remains unbanked. In such a scenario, Techcombank, a bank in Vietnam, knew it had to deliver a differentiated banking experience for its prospective customers. The bank had to transform its IT infrastructure and it zeroed in on IBM LinuxONE because of its ability to handle very large and variable workloads, combined with strong security and cost-efficiency. As a result, it was able to handle 4X the transactions during peak season effortlessly along with 44% lower total cost of ownership while also winning new customers. Find out more.
Tags : 
    
IBM APAC
Published By: SailPoint Technologies     Published Date: Oct 23, 2019
Don’t just manage user access, control it. With identity governance, you can be sure only the right people are accessing the right applications, files and data. Download this brief to find out how you can truly combat security risks and stay compliant.
Tags : 
    
SailPoint Technologies
Published By: Iovation     Published Date: Aug 02, 2019
Account takeover. Synthetic identities. The security risks that financial services and online merchants face are endless, and the fraud landscape is changing dramatically. You not only need to be aware of how it’s evolving, but how to address these threats, protect your customers and your brand. iovation has analyzed data from our consortium made up of six billion devices seen, 55 million fraud reports, and thousands of fraud analysts to determine the most significant fraud trends and what you can do to combat them.
Tags : 
    
Iovation
Published By: Cisco     Published Date: Jan 04, 2016
Sin embargo, los costes operativos se dispararon, ya que se necesitó una serie de procesos complejos y laboriosos. Con el tiempo, estos costes se controlaron gracias a una mayor integración de los servidores y la infraestructura de la red, así como a capacidades de software más avanzadas.
Tags : 
cisco, virtualization, sdn, wan, cloud, networking, wireless, data center
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco
Published By: SAS     Published Date: Jan 17, 2018
We have conditioned patients not only to expect opioids for pain relief, but to utilize more and more of them, and the addiction is both psychological and physical. To remedy the situation, a lot of policies and practices and behaviors must change around how the health care system approaches pain. But we do not yet have the data and analytics we need to determine what specifically to do at the patient level or the policy level. Download this whitepaper to learn more about the resources available and how we can fix this issue.
Tags : 
    
SAS
Published By: Gigamon     Published Date: Oct 19, 2017
Read the Gigamon white paper, Harnessing the Power of Metadata for Security, to see why metadata is the new security super power for enterprises looking to separate signals from noise, reduce time to threat detection, and improve overall security efficacy to combat ever more advanced and persistent cyber attacks. Download now!
Tags : 
    
Gigamon
Published By: Dell EMC Storage     Published Date: Nov 28, 2018
Technology is quickly moving to the forefront as organizations undertake digital and information technology (IT) transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. The reality is, most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on IT transformation to modernize and automate their legacy infrastructure and prime themselves to achieve their digital business goals. IDC interviewed organizations of various sizes to understand the impact of moving significant parts of their storage environments to Dell EMC Flash Storage, powered by Intel® Xeon® processors. Download this report to learn more.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC Storage     Published Date: Nov 29, 2018
Technology is quickly moving to the forefront as organizations undertake digital and information technology (IT) transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. The reality is, most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on IT transformation to modernize and automate their legacy infrastructure and prime themselves to achieve their digital business goals. IDC interviewed organizations of various sizes to understand the impact of moving significant parts of their storage environments to Dell EMC solutions, powered by Intel®. Download this report to learn more.
Tags : 
    
Dell EMC Storage
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
La tecnología del hardware no dura para siempre. Tiene un ciclo de vida, un comienzo y un final medibles con respecto a su productividad y valor. El departamento de TI se encarga de optimizar el ciclo del ciclo de vida de los PC e impulsar al mismo tiempo avances estratégicos para la organización. Sin embargo, lidiar con el coste alto y la complejidad que impone la gestión de los PC deja poco tiempo para la innovación. Ofrecemos opciones de financiación flexibles que ayudan a garantizar que el departamento de TI siempre tenga todo lo que necesita y cuando lo necesita para que los usuarios finales nunca tengan que interrumpir su trabajo por problemas de este tipo. Obtenga más información acerca de las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Shell U.K. Limited     Published Date: Oct 30, 2019
Una lubricación eficaz es vital en la industria manufacturera, puesto que ayuda a reducir el coste total de propiedad gracias a unos costes de mantenimiento más bajos y a un incremento de la productividad. Sin embargo, seis de cada diez empresas no tienen claro de qué forma puede la lubricación afectar el tiempo imprevisto de inactividad o la disponibilidad de la maquinaria. En consecuencia, Shell Corena S3 RX ha sido diseñado para ofrecer a la industria manufacturera una solución fácil y directa a las preocupaciones más acuciantes sobre los procesos de producción. Corena S3 RX, el primer aceite para compresores obtenido de gas a líquido, ofrece: un aumento de la vida útil del aceite, un menor arrastre de aceite y una mayor eficiencia que mejora la productividad de sus equipos a largo plazo, con la consiguiente reducción del coste total de propiedad. Creado en colaboración con los fabricantes de equipos originales y los clientes, la gama de productos lubricantes Shell ha sido diseñada
Tags : 
    
Shell U.K. Limited
Published By: Cisco     Published Date: Jun 21, 2016
Businesses must become agile and provide differentiated service as customer demands and expectations change. Moving beyond simple phone transactions, customers are taking matters into their own hands and turning to their peers, the web and social media to find answers. Contact centers play a major role in determining the customer’s perception of a company. Often seen as brand ambassadors, agents are the main interaction point for customers. It is therefore critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud technology to add multichannel tools and support growing demand for chat, social, SMS and video.
Tags : 
    
Cisco
Published By: CA Technologies     Published Date: Nov 07, 2014
Guide pratique à l’attention des responsables métier et IT sur les actions à entreprendre dès MAINTENANT pour gérer la mobilité future de l’entreprise.
Tags : 
enterprise mobility, delivering a mobile strategy, flexible and secure infrastructures, byod, adopting mobility strategies
    
CA Technologies
Published By: Dell EMC     Published Date: Feb 07, 2018
Technology is quickly moving to the forefront of business priorities as organizations undertake digital and IT transformation projects that enable strategic differentiation in a world where users leverage applications and data in new ways. Organizations in all industries must better align with changing customer preferences to avoid being disrupted by a new crop of nimble competitors. Technology will increasingly determine how businesses define and distinguish themselves in the market. IDC has noted that most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. As a result, businesses must embark on an IT transformation initiative to modernize and automate their legacy infrastructure to prime themselves to achieve their digital business goals and initiatives. Intel Inside®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. a
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Feb 07, 2018
This paper is organized into sections describing the importance of IT infrastructure security and presents essential criteria IT leaders should use to identify end-to-end server security. 1. Trust and the Modern IT Infrastructure Why you should be concerned about server security (or the lack thereof). 2. End-to-end Server Security How Dell EMC defines end-to-end server security. In this section, we also provide crucial characteristics business and IT leaders can use to classify prospective server vendors. 3. Key Security Criteria for the Modern IT Infrastructure The security questions every IT leader should ask of their server vendor before embarking on an IT transformation. 4. Conclusion & Additional Resources The objective of this paper is to highlight the Dell EMC comprehensive approach to server security. PowerEdge servers come with security built-in, not bolted-on. Using a Cyber Resilient Architecture, Dell EMC commits to end-to-end server security on all PowerEdge servers.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 09, 2018
Modern businesses are increasingly embracing digital transformation — leveraging new technologies to reinvent core processes, business models, product offerings, and the customer experience. As businesses embark on the digital transformation journey, they need to modernize their underlying technology infrastructure to enable a more agile, customerfocused, flexible, and innovative digital workplace to drive greater human and operational efficiencies. Intel Inside®. Powerful Productivity Outside. Intel® Xeon® processor
Tags : 
    
Dell EMC
Published By: Ruckus Wireless     Published Date: Jan 19, 2016
Lodi USD needed a long-lasting wireless infrastructure with enough headroom to support media-rich apps running on tens of thousands of Chromebooks. This case study explains why the school district turned to Ruckus Wireless.
Tags : 
lodi school, student-to-mobile, students, wlan, wifi, mobile devise, network, wireless
    
Ruckus Wireless
Published By: Pega     Published Date: Aug 11, 2016
Citizens rely on government social services programs to help combat poverty, disease, disabilities, and economic and physical hardships. Governments are also tasked with providing healthcare, security, and infrastructure services.
Tags : 
    
Pega
Published By: Akamai Technologies     Published Date: Mar 19, 2019
If you have a website, you most likely have an infestation of bots. While some bots are beneficial, bots can make up a significant portion of your daily website traffic. Malicious bots bombard websites with direct and specific attack goals, such as stealing customer information, scraping content, and even initiating DDoS attacks. Our latest eBook explores the differences between good bots and bad bots, and explains the best way to manage harmful bots.
Tags : 
    
Akamai Technologies
Published By: VSP     Published Date: Sep 08, 2017
Research shows that wellness plans are extremely important to your clients. Employers have very solid reasons for embarking on a wellness program, including increased productivity and lower health costs for their employees. They are struggling to achieve their goals, however. Many employers aren’t sure how to begin a program; even the most advanced employers in terms of wellness are seeking ways to improve their wellness activities
Tags : 
    
VSP
Published By: Nuance EMEA     Published Date: Jun 04, 2019
New market entrants are shifting the way the financial sector operates, new business models are changing customer expectations, and ever-changing client demographics are forcing businesses to adapt the way they work. As we move into a decade of artificial intelligence (AI) and digital innovation, huge opportunities are opening up for the financial sector to combat these changes. But with this comes new challenges, and exponential increases in available information must be accompanied by smart tools and processes to make sense of it, ensure regulatory compliance, and add real value to clients. To find out more, download this ebook!
Tags : 
    
Nuance EMEA
Published By: Oracle     Published Date: Feb 15, 2018
I progressi nel campo digitale rivoluzionano in profondità il nostro modo di lavorare, introducendo innovazioni nei nostri uffici praticamente ogni giorno. Queste tecnologie hanno alzato il livello delle aspettative, costringendo le aziende a operare con un'agilità senza precedenti. Questi cambiamenti sono grandi opportunità, ma purtroppo ci imbattiamo anche in nuovi ostacoli che possono intralciare la nostra marcia verso il successo, come la necessità di innovare rapidamente, di minimizzare i costi e di reagire prontamente alle pressioni della concorrenza.
Tags : 
guida, approccio, integrato, odierne, informatica, oracle
    
Oracle
Published By: Oracle     Published Date: Mar 01, 2018
I progressi nel campo digitale rivoluzionano in profondità il nostro modo di lavorare, introducendo innovazioni nei nostri uffici praticamente ogni giorno. Queste tecnologie hanno alzato il livello delle aspettative, costringendo le aziende a operare con un'agilità senza precedenti. Questi cambiamenti sono grandi opportunità, ma purtroppo ci imbattiamo anche in nuovi ostacoli che possono intralciare la nostra marcia verso il successo, come la necessità di innovare rapidamente, di minimizzare i costi e di reagire prontamente alle pressioni della concorrenza.
Tags : 
guida, approccio, integrato, odierne, informatica, oracle
    
Oracle
Published By: Dell EMC     Published Date: Feb 14, 2019
Technology is quickly moving to the forefront as organizations undertake digital and IT transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. The reality is, most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. Read this executive summary from Dell and Intel® to learn why businesses must embark on IT transformation to modernize and automate their legacy infrastructure and prime themselves to achieve their digital business goals. Intel Inside®. Powerful Productivity Outside.
Tags : 
    
Dell EMC
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top