automation tools

Results 1 - 25 of 73Sort Results By: Published Date | Title | Company Name
By: Workday     Published Date: Sep 14, 2018
Customer insight professionals won’t want to miss this Forrester report on professional services automation (PSA) tools. See how Workday and other vendors perform when it comes to functionality, vertical market focus, and more. Read the report to get an overview of 17 PSA providers, along with recommendations to help you find a vendor that fits your firm's needs.
Tags : 
     Workday
By: ASG Software Solutions     Published Date: Nov 05, 2009
Effective workload automation that provides complete management level visibility into real-time events impacting the delivery of IT services is needed by the data center more than ever before. The traditional job scheduling approach, with an uncoordinated set of tools that often requires reactive manual intervention to minimize service disruptions, is failing more than ever due to todays complex world of IT with its multiple platforms, applications and virtualized resources.
Tags : asg, cmdb, bsm, itil, bsm, metacmdb, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application
     ASG Software Solutions
By: Gigamon     Published Date: Oct 25, 2017
Read the Joint Solution Brief Accelerate Threat Detection and Response to learn how Gigamon helps Splunk Enterprise users effectively analyze and remediate network security threats. Benefits include enhanced visibility and deeper, faster security analytics from precise, targeted network metadata generated from the traffic flowing in your network. Also learn how automation of common security tasks, across the Gigamon platform and third-party security tools, from within the Splunk platform helps increase analyst efficiency and reduce errors.
Tags : 
     Gigamon
By: CA Technologies     Published Date: Sep 25, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : cloud applications, infrastructure, optimization, automation tools, administrative power, ca technologies
     CA Technologies
By: Juniper Networks     Published Date: Oct 20, 2015
This paper explores automation and orchestration tools as well as the architectural simplifications that enable these tools to work well, paving the way for software-defined networks (SDNs) and greater operational efficiencies across the enterprise.
Tags : juniper, automation, efficiency, sdn, software, network
     Juniper Networks
By: HP Enterprise Business     Published Date: Jan 20, 2017
HPE adds new mobile testing capabilities to its comprehensive testing suite. Download now to learn more!
Tags : 
     HP Enterprise Business
By: CA Technologies EMEA     Published Date: Sep 11, 2018
The advent of cloud computing and software-defined data center architectures for modern application delivery has made networking more sensitive than ever before. Applications in the digital age require networks that can expand and contract dynamically based on consumer demand. Enterprises are implementing software-defined networking (SDN) to deliver the automation required by these new environments, but the dynamic nature of SDN makes network management and monitoring fundamentally more challenging. Network infrastructure teams need monitoring tools that can provide visibility into these new and constantly changing networks. This white paper explores the importance of SDN monitoring and examines a leading example of a solution, CA Performance Management with CA Virtual Network Assurance integration.
Tags : 
     CA Technologies EMEA
By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Do you want to bring continuous delivery to your organization? Or would you simply like to begin your automation Journey? CA Technologies Automation Solutions (formerly Automic) proposes a fourstage blueprint to continuous delivery to assist enterprises at any stage of their DevOps journey. This e-book sets out a plan that can take a company of any maturity level all the way up to enterprise-scale continuous delivery using a combination of CA Continuous Delivery Automation, 40-plus years of business automation experience, and the proven tools and practices the company is already leveraging.
Tags : 
     CA Technologies_Business_Automation
By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Application release automation (ARA) tools enable best practices in deploying and promoting applicationrelated artifacts, properties, configurations and even data across an application lifecycle in a safe, predictable and repeatable manner. Gartner reports that using an ARA tool is key to enabling DevOps and achieving continuous delivery. Wikipedia also defines five dimensions of scalability that can apply to ARA tools: • Administrative scalability • Functional scalability • Geographic scalability • Load scalability • Generational scalability This white paper will explain how each of these criteria is relevant when choosing an ARA product that is capable of scaling along with the growth of your enterprise.
Tags : 
     CA Technologies_Business_Automation
By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
Technology is in a constant state of evolution, and the world of automation is no exception. In this eBook, we’ll consider how you can stay ahead of the competition—because in the application economy, it’s vital to ensure the tools your organization uses are capable of positioning you at the forefront of industry—not just today, but tomorrow as well. We are heading toward a scenario where workload automation tools are capable of thinking for themselves and making decisions based on policy; this is what we at CA Technologies are calling intelligent automation. At the same time, however, more and more challenges are being presented as the increasingly fragmented places our workloads run begin to impact our analytics, reporting and processes. The task is to navigate these hurdles while at the same time allowing our enterprises to harness the power of new technology.
Tags : 
     CA Technologies_Business_Automation
By: CA Technologies_Business_Automation     Published Date: Jun 29, 2018
CA Technologies automation solutions help organizations increase business productivity by simplifying the management of complex workloads and empowering development teams with self-service tools that accelerate the development and delivery of new and enhanced applications. CA Technologies commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) that enterprises may realize from automation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of CA on their organizations. To better understand the benefits, costs, and risks associated with CA workload automation (WLA) solutions, Forrester interviewed an existing customer with years of experience using CA. The organization that Forrester interviewed manufactures consumer electronics that it sells through retailers around the globe. Download this whitepaper to find out more.
Tags : 
     CA Technologies_Business_Automation
By: IBM     Published Date: Apr 11, 2016
Automating for Digital Transformation: Tools-driven DevOps and Continuous Software Delivery in the Enterprise. Learn why companies are adopting DevOps to speed software delivery and innovation Understand why “speed with quality” is the real challenge of Continuous Delivery and the importance of automation Explore DevOps best practices and automation tools in place at high performing companies
Tags : ibm, ibm urbancode, cloud, digital transformation, ema study, devops
     IBM
By: Dynatrace     Published Date: May 20, 2016
In this eBook, we will: -Tell you how to get started with performance metric monitoring -Share real-life examples of application failures and how to avoid them by using 7 key metrics to find problems early on -Show you how stuff really works in "the life of a metric" and how to integrate performance metrics into automation tools throughout your application delivery chain Get the right processes and metrics in place to support continuous delivery and build a better digital experience, faster.
Tags : dynatrace, software delivery, digital, performance metrics, mobile consumer, digital experience
     Dynatrace
By: CA Technologies     Published Date: Jun 01, 2018
Challenge Understanding, managing and containing risk has become a critical factor for many organizations as they plot their hybrid architecture strategy. Access by an expanding array of privileged identities looms large as a risk concern once organizations look beyond tactically using cloud services for cost and agility efficiencies. Existing approaches developed for static infrastructure can address initial risk concerns, but fall short in providing consistent policy enforcement and continuous visibility for dynamic, distributed infrastructure. Opportunity Multiple elements factor into how effectively an enterprise can embrace automation and advance the maturity of their transformation. However, security tools are central to enabling a structured and measured approach to managing critical access risks at each stage of the maturity model journey. With the right privileged access platform and set of tools, enterprises can progressively automate and scale access management to align risk
Tags : 
     CA Technologies
By: Oracle Marketing Cloud     Published Date: Oct 11, 2017
Successful email marketing, demand generation, and lead management processes hinge on a modern strategy aligned to buyer needs across all phases of the buying process — marketing automation. Using a wide spectrum of digital channels, today’s buyers employ an extensive network of tools and resources to make the most informed purchase decisions. The Modern Marketing era is driven by the self-educated buyer who marketers must engage to achieve a relevant, targeted, and value-based customer experience. Find marketing automation fundamentals here.
Tags : 
     Oracle Marketing Cloud
By: IBM     Published Date: Apr 11, 2016
Automating for Digital Transformation: Tools-driven DevOps and Continuous Software Delivery in the Enterprise. Learn why companies are adopting DevOps to speed software delivery and innovation - Understand why “speed with quality” is the real challenge of Continuous Delivery and the importance of automation - Explore DevOps best practices and automation tools in place at high-performing companies
Tags : ibm, ibm urbancode, cloud, digital transformation, ema study, devops
     IBM
By: Fiserv     Published Date: Nov 07, 2017
Learn how loan onboarding can become more efficient and accurate by eliminating manual data validation with automation technology that is poised to transform mortgage servicing. From end-to-end, tools can simplify workflow processes, driving time and cost efficiencies. Trained staff can be deployed to greater effect and can be crucial to eliminating servicing errors. In the process, servicers improve data quality, save time and money, and deliver a better borrower experience.
Tags : loan quality, loan data quality, mortgage quality, mortgage data quality, loan compliance, lending compliance, mortgage compliance, lending efficiency, loan automation, lending automation, mortgage automation, ucd, uniform closing dataset, borrower satisfaction, borrower experience, mortgage origination, mortgage origination automation, mortgage servicing, mortgage servicing automation
     Fiserv
By: Brightcove     Published Date: Sep 17, 2014
Increase conversions by making video a seamless part of your content marketing.
Tags : marketing automation, content marketing, marketing automation tools, video engagement metrics
     Brightcove
By: K2     Published Date: Aug 24, 2015
This complementary template focuses on the eight key areas for business process automation success to help you evaluate the quality of the platforms you are considering – and to ensure that the system you choose is agile and flexible enough to meet your business needs. WORKFLOW TOOLS AND FEATURES FORMS INTEGRATION AND DATA SECURITY MOBILE USER AND RUN-TIME EXPERIENCE REPORTING, ANALYTICS AND MONITORING MAINTENANCE/SUPPORT/HELP DOCUMENTATION
Tags : 
     K2
By: Juniper Networks     Published Date: Nov 01, 2016
In this white paper we offer a six-step guide to getting started with network automation. We outline the processes involved in planning for automation and define areas of the business that can benefit, while also discussing how to overcome cultural challenges and ensure that you choose the right tools and partners.
Tags : 
     Juniper Networks
By: Fiserv     Published Date: Mar 02, 2018
According to the report, Benchmarking the Accounting Function 2015, only 56% of companies currently use automation to reconcile accounts. While many finance leaders want to change the process of reconciliation, the task can seem overwhelming. However, developing a plan does not have to be complicated or time-consuming – and the benefits far outweigh the risks. A smooth, stress-free financial close adds qualitative value to the company by freeing employees to focus on strategic initiatives and ways to grow business. A CFO’s Guide to Transforming the Financial Close shares how to build a center of excellence to streamline reconciliation so you can align objectives to overall business goals. Leading-edge automation tools can stop the madness of shuffling papers, sorting emails and searching spreadsheets, turning the reconciliation process from a cost center to a value-add for the company.
Tags : automating financial close, streamlining reconciliation, data integrity, single version of truth, reconciliation process
     Fiserv
By: Cybric     Published Date: Oct 30, 2017
Learn how a security rationalization process helps CISOs optimize your security infrastructure while improving the bottom line. Development velocity is accelerating as enterprises adopt DevOps methodologies, yet security is still not integrated into the coding and deployment processes. Security teams are falling further behind as their manual processes and controls can’t scale at the same rate as development. This paper discusses: The impact the current approach to application security has on business How shifting security left in the application development process, seamlessly integrating it “early and often,” can accelerate innovation Questions the Board and C-suite are now asking about security: are you prepared? Read this paper to learn how, by shifting security left in the development process, it’s now no longer an obstacle to velocity, innovation and competitiveness. Instead, it’s an asset.
Tags : application security, (security) automation, (security) orchestration, security visibility, devsecops, devops, security assurance, security resilience, application security tools, cio, ciso, appsec
     Cybric
By: Cybric     Published Date: Oct 30, 2017
Committed to advancing brain research, The Dana Foundation needed to transition to the cloud to drive efficiency and more effectively manage risk. With this shift, Dana moved from waterfall development to DevOps but still needed to maintain its strict security posture. In this case study Jim Rutt, CIO of The Dana Foundation, discusses his use of the CYBRIC continuous application security platform to move to DevOps, embedding security earlier in the development process and gaining full security visibility across the SDLC.
Tags : cybersecurity, cyber security, cio, application security, (security) automation, (security) orchestration, security visibility, devsecops, devops, security assurance, security resilience, application security tools, cloud security, transformation
     Cybric
Start   Previous   1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com