assets

Results 101 - 125 of 587Sort Results By: Published Date | Title | Company Name
By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
     Fidelis Cybersecurity
By: Capita     Published Date: Jun 25, 2019
Introducing ECG: Enterprise Connectivity Grading. The key metrics of organisational well-being have changed. While indicators like strategy, sales, margins, and profitability remain crucial, these now hinge on other vital factors. The organisation’s ability to leverage key assets like its people and data. Its agility, mobility, and adaptability. Its capacity to transform, evolve, and grow over time. And these factors in turn are now fundamentally contingent on something else. Connectivity. Download the eBook and learn more>>
Tags : 
     Capita
By: IBM     Published Date: Apr 12, 2016
The digital transformation that organizations are striving for today requires a mindset of "no limits" in terms of securely exposing critical business assets for internal and external consumption. In order to be an agile, digital business, enterprises need to seamlessly connect across hybrid environments, applications, data and processes, keeping a keen eye on an open cloud strategy. They also need a secure integration framework to provide controlled access, a single dashboard providing performance insights, and easy access to digital assets for your developers. This webcast will explore all of these areas in depth, to support your enterprise's quest to become a next-generation digital business.
Tags : ibm, digital business, api economy, api management, apim, api
     IBM
By: Oracle     Published Date: Sep 08, 2016
This Webcast explores what the next generation of Finance function looks like. Watch this webcast now to find out: How companies are monitoring and measuring intangibles within their business. How the CFO role is evolving in this increasingly digital economy that we are all living.
Tags : digital technologies, digital landscape, finance, business models, next generation finance, finance function, cloud, big data
     Oracle
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
     CA Technologies
By: Schneider Electric     Published Date: Apr 23, 2019
Manufacturing presents one of the largest opportunities for seizing the value of IoT integration — and among the fastest to adopt IoT solutions. Manufacturers see IoT as an improvement to help manage the large number of assets involved in manufacturing and to reduce the time it takes to make products. Still, many wonder what value IoT can actually bring their business. This interactive eBook from IDC and Schneider Electric identifies the top reasons to invest in IoT, and how to ensure manufacturers get the most out of their investments.
Tags : smart manufacturing, iot, digital
     Schneider Electric
By: Schneider Electric     Published Date: Jul 01, 2019
How digital transformation is blending information and operational technology for asset performance improvements that will reduce costs, optimize efficiency, and improve conservation.
Tags : asset performance, water, augmented reality, pumps
     Schneider Electric
By: Schneider Electric     Published Date: Jul 01, 2019
This eGuide examines how digital technology is integrating real-time monitoring of pump energy usage, maintenance, and operations for maximum payback.
Tags : pump, tco, water
     Schneider Electric
By: Schneider Electric     Published Date: Jul 01, 2019
As water is increasingly being recognized as a high-value commodity, aging assets present a major threat to organizations that treat and deliver it. Improving asset performance is one of the most effective strategies water and wastewater plants and networks can implement to reduce costs and protect quality.
Tags : water, plant, pump
     Schneider Electric
By: CA Mainframe     Published Date: Sep 12, 2008
The CA Automated Storage Optimization Mainframe Suite provides a best-practices-based and intelligent approach to SRM, delivering the tools to identify and classify your storage assets. Access this Technology Brief to understand how to maximize use of existing storage resources and ensures protection of business-critical applications and information.
Tags : srm, storage resource management, zos, z/os, ibm, ibm server, ca mainframe, mainframe
     CA Mainframe
By: Cisco     Published Date: Sep 15, 2015
To effectively respond to these challenges, public safety agencies must be able to rely on secure networks with integrated voice, video, and data capabilities. With these networks and their associated assets, agencies can obtain more timely and accurate information, enhancing situational awareness and improving response times. Cisco and our partners can help agencies obtain secure networks.
Tags : public safety, iot, law enforcement, emergency response, strategy
     Cisco
By: Dyn     Published Date: Apr 27, 2016
Download this whitepaper and learn: - The six macro trends driving the need for application, network and Internet performance management solutions - Key insights you've been missing when it comes to your portfolio of online assets, and how they interact with the public Internet - How you can receive a true "end-to-end" view into Internet performance and ensure availability and implement advanced traffic steering capabilities to your existing infrastructure
Tags : dyn, internet performance, internet performance management
     Dyn
By: Dell EMC     Published Date: Aug 29, 2017
Choose your Isilon hardware based on your need, all-flash; accelerate demanding file workloads with extreme performance and scalability, Hybrid; Realize performance, capacity, and value for a wide range of enterprise file workloads and Archive; Lower the cost to store and protect aging data assets while providing near-primary accessibility.
Tags : 
     Dell EMC
By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets – leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : network security, security breaches, pci, dss, hippa
     Brother
By: Dynatrace     Published Date: May 20, 2016
The Art of DevOps: Embark on a mission to continuously deliver assets to the operational battlegrounds safely, securely, and quickly. This eBook gives you, a veteran of application development wars, recommendations that will put you at strategic advantage to win today's war: - Supplement manual tests with automated testing - Add advanced performance monitoring technology to your arsenal to prevent problems from infiltrating your code after check-in - Leverage best-in-class communications and advanced performance monitoring to quickly identify and prevent casualties resulting from poor performance
Tags : dynatrace, devops, software development, application development, testing
     Dynatrace
By: Akamai Technologies     Published Date: Mar 10, 2016
When your Internet-facing network comes under DDoS attack, does your entire organization panic – or does everyone know exactly what to do? Read this whitepaper to learn how to protect network assets, websites, and web applications against DDoS attacks and best practices for adding DDoS mitigation to a corporate incident response plan.
Tags : ddos mitigation, best practices, akamai technology, cyberdefense, cyber security
     Akamai Technologies
By: Hewlett Packard Enterprise     Published Date: Oct 11, 2017
In a world without definable, defensible perimeters, how do you protect critical data and assets in your small or midsize business? Well, you start by deploying infrastructure components that are designed with security baked in at every level, from the core to the cloud and everywhere in between.
Tags : 
     Hewlett Packard Enterprise
By: CA Technologies     Published Date: Jul 26, 2017
Extending DevOps to mainframe applications and teams is essential towards the agility and velocity that enterprises require to remain innovative in today’s turbulent digital business environment. Talking Points: • For enterprises with mainframes, trying to achieve the benefits of Digital Transformation without dealing with existing mainframe assets is a fool’s errand. • Breaking down silos and moving to DevOps is central to what it means to undergo Digital Transformation. • Including the mainframe in modern software development approaches can improve quality overall, reduce test cycles and deployment timeframes, and ensure mainframe-based applications support the end-to-end performance requirements that today’s customers demand.
Tags : 
     CA Technologies
By: Intel     Published Date: May 15, 2017
Read on to find out how to catch malicious activities targeting your critical assets, verify compliance, set early warning systems, and empower your existing tools with premium, contextual alerts.
Tags : threat detection, threat and vulnerability management, compliance, security, cyber security, cyber attacks
     Intel
By: Schneider Electric     Published Date: Jun 05, 2018
Balancing the increased pressure to improve productivity and quality, while reducing cost against mandated safety regulations is one of the most complex challenges in industry today.
Tags : process automation, ecostruxure plant, operational profitability, cybersecurity, safety, smart control, empowered operators, optimized assets
     Schneider Electric
By: Schneider Electric     Published Date: Jun 05, 2018
Integrating safety and process environments can improve reliability, profitability and cybersecurity. Read Frost & Sullivan’s white paper and plan your digital transformation today.
Tags : process safety, profitable safety, smart control, empowered operators, optimized assets, future of automation, reliability, cybersecurity
     Schneider Electric
By: Schneider Electric     Published Date: Jun 05, 2018
Since the sepia-toned days of the early 19th century, industry has sought effective ways to control manufacturing and production processes. New technology has greatly influenced factories and plants, resulting in new operational approaches to maximize benefits and achieve 100% ROI in a very short time.
Tags : process control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
     Schneider Electric
By: Schneider Electric     Published Date: Jun 05, 2018
Power industries - including Nuclear, Fossil, Hydro, Wind and Geothermal - are susceptible to a variety of cyber threats which can wreak havoc on control systems. Management, engineering and IT must commit to a comprehensive approach that encompasses threat prevention, detection and elimination.
Tags : smart control, power generation, power industry, empowered operators, optimized assets, future of automation, reliability, safety
     Schneider Electric
By: Schneider Electric     Published Date: Jun 05, 2018
Cybersecurity threats are an unfortunate reality for industry everywhere. How do you protect your business while still embracing new technologies that enable you to grow and deliver the best possible results? Robust cybersecurity protection is a must, as well as rigorous mindset, policies, and methodologies. Download the whitepaper to learn more.
Tags : cybersecurity, smart control, empowered operators, optimized assets, future of automation, reliability, safety, operational profitability
     Schneider Electric
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com