fti

Results 51 - 75 of 239Sort Results By: Published Date | Title | Company Name
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: Workday     Published Date: Nov 22, 2017
The critical trends that are reshaping the world of work are colliding with the changing demographic profile of the employees and shifting expectations of the work experience. Despite an uncertain future, there is optimism in the air. The events of 2016 and early 2017 have set a course of change that brings the promise of more equity and transparency and more accountable decision making. An overarching theme of Empowerment permeates how business leaders. HR professionals, and employees are viewing the world of work, both today and in the future.
Tags : 
    
Workday
Published By: Cybric     Published Date: Oct 30, 2017
Learn how a security rationalization process helps CISOs optimize your security infrastructure while improving the bottom line. Development velocity is accelerating as enterprises adopt DevOps methodologies, yet security is still not integrated into the coding and deployment processes. Security teams are falling further behind as their manual processes and controls can’t scale at the same rate as development. This paper discusses: The impact the current approach to application security has on business How shifting security left in the application development process, seamlessly integrating it “early and often,” can accelerate innovation Questions the Board and C-suite are now asking about security: are you prepared? Read this paper to learn how, by shifting security left in the development process, it’s now no longer an obstacle to velocity, innovation and competitiveness. Instead, it’s an asset.
Tags : 
application security, (security) automation, (security) orchestration, security visibility, devsecops, devops, security assurance, security resilience, application security tools, cio, ciso, appsec
    
Cybric
Published By: XpertHR     Published Date: Oct 23, 2017
This guide explores dos and don’ts for every employer when it comes to drafting and implementing employee handbooks in the workplace. It explores the following topics: }}Considering Whether to Have an Employee Handbook }}Assembling an Employee Handbook }}Determining What Topics to Include in an Employee Handbook }}Drafting the Provisions of an Employee Handbook }}Finalizing and Distributing an Employee Handbook }}Creating an Employee Handbook as a Multistate Employer }}Updating an Employee Handbook
Tags : 
    
XpertHR
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Banken, Vermögensberater, Zahlungsanbieter und andere Finanzinstitutionen erleben tief greifende Veränderungen in Form von sich entwickelnden Marktanforderungen und neuen Vorschriften. Diese Unternehmen müssen ihre etablierten Prioritäten, Prozesse und Produkte überdenken, um das Fundament für den künftigen Erfolg zu legen. Software ist der Schlüssel.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices, api gateway, apim, api management, full api lifecycle, restful web services, rest, integration, api portal
    
CA Technologies EMEA
Published By: Pure Storage     Published Date: Oct 09, 2017
Digitale Technologien verändern alles – und ihr disruptiver Einfluss ist sowohl in der Konsum- als auch in den Unternehmenslandschaften spürbar. Verbrauchern steht es dabei theoretisch frei, digitale Lösungen anzunehmen oder zurückzuweisen. Für Unternehmen sieht es jedoch anders aus: Entweder sie rüsten sich für diesen Wandel – oder sie riskieren unterzugehen. Unternehmen in Deutschland haben verschiedene Trends nicht nur analysiert und evaluiert, sondern sich auch damit beschäftigt, wie sie digitale disruptive Strömungen, Technologien und Produkte für sich nutzen können. Angesichts der bisher nicht gekannten regulatorischen Veränderungen wird digitale Technologie als wertschöpfende, Umsatz generierende Kraft gesehen.
Tags : 
digitale, abhangigkeit, investitionsprioritaten, cloud, beste, beiden welten, daten
    
Pure Storage
Published By: Rosetta Stone     Published Date: Oct 02, 2017
The need for restaurant workers shows no signs of slowing down. Analysts predict that over the next decade, an additional 1.6 million jobs will be created. But the workforce is shifting significantly.
Tags : 
    
Rosetta Stone
Published By: Zebra Technologies     Published Date: Sep 22, 2017
Whether you’re scanning products, medicine, parts or shipping labels, your data capture needs are dramatically shifting. Traceability demands more data in smaller spaces; mobile payments are on the rise; scanning multiple barcodes consumes valuable time, and there’s less tolerance for inefficiency – capabilities only imaging technology can ful?ll.
Tags : 
future of technology, imaging scanners, barcode technology, inventory management, fast checkouts, managing processing data, barcode readers, camera-based scanners, 1d barcodes, omni-directional reading, enhanced scanner range, data capture, 2d barcodes, high density scanner, scanner identity verification, optical character recognition, barcode capabilities, 1d to 2d scanner, omnichannel, qr code measurement
    
Zebra Technologies
Published By: Fiserv     Published Date: Sep 14, 2017
Global anti-money laundering (AML) standards have long required that understanding beneficial ownership be a part of a financial institution’s AML program. Beneficial ownership outlines the identity of individuals with a controlling interest in a privately held company, enabling a financial institution to understand the ultimate beneficiary of a financial transaction. Identifying beneficial ownership can be a complex process, but it’s one that institutions must conquer if they are to remain in compliance with industry rules and legislation.
Tags : 
anti-money laundering, aml, aml software, anti-money laundering software, beneficial ownership, risk management, aml requirements, complex ownership structures, financial action task force, fincen, financial crimes enforcement network, eu aml directive
    
Fiserv
Published By: CA Technologies     Published Date: Aug 22, 2017
Banken, Vermögensberater, Zahlungsanbieter und andere Finanzinstitutionen erleben tief greifende Veränderungen in Form von sich entwickelnden Marktanforderungen und neuen Vorschriften. Diese Unternehmen müssen ihre etablierten Prioritäten, Prozesse und Produkte überdenken, um das Fundament für den künftigen Erfolg zu legen. Software ist der Schlüssel.
Tags : 
    
CA Technologies
Published By: Polycom     Published Date: Aug 16, 2017
"40% of Skype for Business customers are now using the platform for voice communication, and many of these customers are now considering complementing the deployment with or shifting to Microsoft’s cloud suite, Office 365. When migrating to Office 365 cloud voice, customers should evaluate whether their existing audio devices are compatible or whether new technology will be needed. If you’re thinking about making the switch to cloud voice, download the report for the 5 Key Considerations when Choosing Technology for Use with Office. 365. "
Tags : 
polycom, office 365, cloud, voice, skype
    
Polycom
Published By: Juniper Networks     Published Date: Aug 08, 2017
A leader in shale oil and gas production, this global Fortune 500 oil and gas company transformed its business, shifting its focus to oil and gas exploration and production and divesting refineries and gas stations. Central to this transformation was to improve operating performance to deliver more value to shareholders.
Tags : 
    
Juniper Networks
Published By: Nextgen     Published Date: Aug 08, 2017
You need a solutions partner who can help you navigate the shifting healthcare landscape and remain a successful, independent practice. Unleash your practice’s true revenue potential, without errors.
Tags : 
    
Nextgen
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
In a series of articles Paul Gerrard, a testing guru and consultant, discusses a range of testing topics. Test models are fundamental to testing and, in this article, Paul talks about the art of creating and using models. If testers are “shifting left,” pairing with developers or at least working more closely with developers, testers (and developers) need to be able to create models, learn how to articulate and share them, and support better collaboration.
Tags : 
testing effort, delivery model, sdlc, ca technologies, continuous testing, testing effort, service virtualisation, delivery ecosystem
    
CA Technologies EMEA
Published By: Host Analytics     Published Date: Aug 01, 2017
There's a shift in the landscape of corporate performance management (CPM). The market is shifting to cloud-based vendors and moving companies like Host Analytics into the Leaders quadrants and shifting mega vendors out of it. We believe the 2017 Gartner Magic Quadrants for Financial and Strategic CPM reports are guaranteed to shake up the market and shape the coming year. These reports provide valuable insights into the latest market trends, the current Leaders, and key vendor evaluation criteria. Download the Gartner reports to learn: -Why cloud has become the preferred deployment model -Who the key vendors are and how they compare -Why mega vendors no longer dominate the market -Best practices in evaluating and selecting a vendor
Tags : 
gartner mq
    
Host Analytics
Published By: Symantec     Published Date: Jul 11, 2017
Given the evolving way Web and Cloud applications are used—and the constantly shifting threat landscape organizations must confront—proxy architecture is more important than ever in terms of securing Internet access. It’s imperative to have effective compliance and company policy enforcement, and the use of a secure web gateway with advanced functionality is a key piece of an enterprise’s security architecture.
Tags : 
secure web gateway, web application, cloud application, encryption, web threats
    
Symantec
Published By: Determine (Selectica)     Published Date: Jun 29, 2017
Procurement has shifting priorities. In CPO Rising 2017: Tools of the Trade you’ll learn what competencies and capabilities are required to become – and stay – best in class.
Tags : 
    
Determine (Selectica)
Published By: RICOH     Published Date: Jun 09, 2017
Through this report we aim to assist employers as they prepare for change and give them confidence that they have the invaluable support of their staff.
Tags : 
digital transformation, work place, work landscape, change
    
RICOH
Published By: RICOH     Published Date: Jun 09, 2017
Download this infographic to discover some interesting statistics in these times of change.
Tags : 
digital transformation, work place, work landscape, change
    
RICOH
Published By: Oracle HCM Cloud     Published Date: May 25, 2017
"Higher education is entering a historic period that has the potential to be the next golden age. Priorities are shifting to focus on improving student outcomes, institutional standing, and operational management. Technology will be a critical part of how these challenges are addressed. Ovum recommends five steps for future-proofing your techoloy foundation. Find out more."
Tags : 
    
Oracle HCM Cloud
Published By: Druva     Published Date: May 22, 2017
Enterprise data is growing at an exponential rate. Download now to learn more!
Tags : 
    
Druva
Published By: Druva     Published Date: May 22, 2017
Enterprise data is growing at an exponential rate. Download now to learn more!
Tags : 
    
Druva
Published By: Dell EMC     Published Date: May 10, 2017
While just about everyone is writing about how IT and the businesses it serves need to be transformed, the actual industry answers to both digital and IT transformation remain unclear at best. Are transformational initiatives all about analytics and big data? Or are they about the move to cloud in all its varieties? Support for mobile? More agile ways of working and developing software? Or are they actually all about crafting teams to promote more proactive dialog between the business and IT? The truth is, of course, digital and IT transformation depend on all of the above and more. They also depend on a resilient infrastructure that’s easily adapted to changing business priorities without requiring long hours spent on maintenance, updates, and addressing problems of service availability. But making all this work clearly and cohesively is far beyond the purview of almost any solution today—whether from a software management perspective or from a hardware infrastructure perspective.
Tags : 
    
Dell EMC
Published By: Raritan     Published Date: May 09, 2017
This paper examines the forces of change and disruption over the next decade, makes predictions about new datacenter types and specific use cases, and finally suggests ways to future-proof existing datacenters against disruption and to capitalize on innovation.
Tags : 
raritan, data center management, iot, power and energy, infrastructure, servers, cloud computing, data center design and management
    
Raritan
Published By: IBM     Published Date: May 09, 2017
Shifting business requirements for digital content and new technologies are changing the ECM market. This Magic Quadrant analyzes these dynamics, their impact on ECM vendors and their implications for application leaders in charge of content management.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.