Whitepaper Library
 

cio

Results 1 - 25 of 26Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Mar 21, 2017
A few years ago, the fourth largest credit union in Illinois embarked on a marketing makeover. In just one year, Baxter Credit Union (BCU) upgraded its outdated campaign management system and harnessed its scattered member data, creating more meaningful customer experiences and increasing profitability.
Tags : 
    
Adobe
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in accounting that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 13, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in finance that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: • How built-in data encryption keeps your data safe • Why more security pros are concerned with user behavior than cloud tools • What your firm should know to utilize the cloud with confidence
Tags : 
cloud security, client data protection, data encryption, cloud, user behavior
    
Citrix ShareFile
Published By: Workday     Published Date: Mar 20, 2017
Is your institution running on legacy technology? The Gartner report “IT Market Clock for Higher Education, 2016” gives CIO and IT leaders a model to assess current technology and future needs—allowing you to begin moving from legacy systems—such as ERP suites and on-premise and open source software—to the cloud.
Tags : 
workday, integrated learning, workplace success
    
Workday
Published By: Lookout     Published Date: Mar 29, 2017
When it comes to enterprise mobility, both iOS and Android suffer from major security vulnerabilities and are at risk of malicious threats and malware attacks. Read the Lookout’s review of today’s most prevalent issues, including OS, app, and jailbreak threats.
Tags : 
risks, mobile technology, enterprise, ios, android, lookout
    
Lookout
Published By: Infor     Published Date: Mar 07, 2017
En 2015, la mayoría de los fabricantes obtuvieron unos modestos niveles de rentabilidad debido a los bajos precios de los productos básicos y a la inflación salarial. Este entorno dio lugar a que se empezara a considerar el rol que las nuevas tecnologías ”disruptivas” podrían tener en las empresas manufactureras y posibles estrategias de inversión.
Tags : 
software, manufacturing software
    
Infor
Published By: Infor     Published Date: Mar 07, 2017
El objetivo de las operaciones de un almacén es dar una respuesta perfecta los pedidos: entregar exactamente lo que un cliente pide, a tiempo y con una eficiencia óptima. El módulo de almacenes de una solución de planificación de recursos empresariales (ERP – Enterprise Resources Management) puede ayudar a los almacenes más pequeños. Pero los módulos de gestión de almacenes de los ERP tienen limitaciones y, en el caso de empresas con operaciones más complejas, puede ser más inteligente optar por las capacidades adicionales de un sistema de gestión de almacenes avanzado (WMS, Warehouse Management System).
Tags : 
    
Infor
Published By: Infor     Published Date: Mar 07, 2017
Como responsable de ventas y operaciones, usted tiene importantes responsabilidades, tales como establecer prioridades, planificar e implementar estrategias de la cadena de suministro, impulsar mejoras y, al mismo tiempo, adaptarse rápidamente a los requisitos cambiantes del mercado y de los clientes, y ajustar esos cambios en la demanda y en la oferta, y todo sin olvidar los resultados financieros.
Tags : 
    
Infor
Published By: Sophos     Published Date: Mar 30, 2017
With an estimated 500,000 'Internet of Things' devices using default security credentials it's little wonder that the recent Mirai botnet's DDoS attack was able to cause such widespread disruption. But it isn't just the average home-user that's at risk. Organizations like yours are being targeted with bespoke malware in order to compromise your network and add your servers and devices to malicious botnets. This paper explains why these attacks are so successful, how a typical infection takes place and what security systems your organization should have in place to defend against botnet proliferation.
Tags : 
web protection, email protection, web application firewall, intrusion protection, sandboxing, threat protection
    
Sophos
Published By: Sophos     Published Date: Mar 30, 2017
Ransomware threats like Cryptowall, TeslaCrypt, and Locky are on the rise, targeting organizations of all sizes. This paper explains how these attacks work, and why a large number of new infections continue to surface despite existing protective measures. It also provides practical short- and long-term steps that organizations should take to protect against them.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Sophos
Published By: AppDynamics     Published Date: Apr 11, 2017
This white paper reveals the top 10 practices around DevOps your CIO and team need to know about to adopt the best model for success.
Tags : 
devops, infrastructure, cio
    
AppDynamics
Published By: Okta     Published Date: Apr 17, 2017
In today’s computing world, the nature of the network perimeter has changed. The threat of data breaches is growing, and CIOs are faced with the monumental challenge of securing information wherever it resides without interfering with the productivity of the increasingly mobile and connected workforce. In this webinar, we’ll review the current landscape of security challenges and the best ways to address them with Identity as a Service.
Tags : 
    
Okta
Published By: Mimecast     Published Date: Apr 18, 2017
"Whaling attacks have risen in recent months and these emails are more difficult to detect because they don’t contain a malicious hyperlink or attachment, and rely solely on social-engineering to trick their targets. In order to combat these attacks, organizations must be aware of the dangers presented by whaling, or CEO fraud, and put the right safeguards in place. Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming. Read this report to learn: - The five key phases of a whaling attack - How to protect your organization from a whaling attack through company exercises, education, and technology. - What Mimecast is offering to combat these attacks in its industry-leading Targeted Threat Protection service."
Tags : 
cyber security, cyber fraud, impersonation attacks, ceo fraud, whaling
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"Email-borne insider threats both accidental and malicious are a real and ongoing problem for organizations. A recent commissioned study conducted by Forrester Consulting reveals many firms have experienced some form of insider security incident in the past 24 months. Download this report to get the findings. Discover Forrester’s perspective on internal threats and how organizations are responding and how they should be responding."
Tags : 
forrester, insider security, cyber security, internal threats, email fraud
    
Mimecast
Published By: Okta     Published Date: Apr 17, 2017
Hear ENGIE’s Deputy Group CIO Claude Pierre and Chief Infrastructure Officer Youssef Tahani detail how they connected 24 business units globally, while facilitating adaptation and innovation at the local level.
Tags : 
    
Okta
Published By: Adobe     Published Date: Mar 02, 2017
Customers crave great content like kids in a candy shop. So enterprises worldwide are embracing design to give them a sweet experience across every touchpoint. Discover how to mold your content strategy to adapt to design trends and customer tastes.
Tags : 
content, content strategy, design, customer experience
    
Adobe
Published By: Viavi Solutions     Published Date: Apr 14, 2017
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
cloud privacy, cloud security, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 14, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 14, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
network security, security validation, technical security, cyber attacks, database security, it security, traffic analytics, data report
    
Viavi Solutions
Published By: NEC     Published Date: Sep 29, 2009
Written by: IDC Abner Germanow, Jonathan Edwards, Lee Doyle IDC believes the convergence of communications and mainstream IT architectures will drive significant innovation in business processes over the next decade.
Tags : 
it architecture, idc, automation, automated order processing, soa, service oriented architecture, soap, http
    
NEC
Published By: Nutanix     Published Date: Apr 24, 2017
Nube Empresarial para Dummies Descargue gratis el libro y aprenda cómo puede hacerlo ¿Qué es la Nube Empresarial? Cada vez más organizaciones líderes van más allá de la hiperconvergencia y se enfocan en una estrategia de nube empresarial para llevar agilidad, simplicidad y un modelo de consumo bajo demanda de nubes públicas a su propio datacenter. Este libro lo ayudará a entender lo qué es la nube empresarial y cómo diseñar una infraestructura en la nube para impulsar su organización hacia el futuro. Descarga gratis el libro
Tags : 
nube empresarial, nube empresarial para dummies, hiperconvergencia, que es la nube empresarial, infraesctructura en la nube, almacenamiento en la nube, virtualizacion en la nube, nutanix
    
Nutanix
Published By: Nutanix     Published Date: Apr 24, 2017
Conviértase en un experto en Infraestructura Hiperconvergente Descargué el libro. La infraestructura tradicional (legacy), con sus componentes aislados como almacenamiento, redes y servidores, ya no es adecuada para cubrir las demandas cada vez mayores de las aplicaciones empresariales actuales ni el ritmo acelerado de las empresas modernas. Hoy, los expertos y líderes de TI están utilizando infraestructura Hiperconvergente para eliminar las barreras y complejidad de las plataformas tradicionales y brindar servicios de infraestructura en sus propias instalaciones (on-premise) pero con la velocidad, agilidad y eficiencia operativa de una nube pública. Descarga gratis el libro
Tags : 
infraestructura hiperconvergente, hiperconvergencia, cómo funciona nutanix, nutanix, hiperconvergencia de nutanix, ¿qué es un sistema convergente?, hci, almacenamiento empresarial
    
Nutanix
Published By: ASG Software Solutions     Published Date: Oct 16, 2008
Limited visibility has tethered CIOs' success in both IT and business. However, using federated CMDB technology, CIOs can view the complete IT infrastructure and the entire lifecycle of a business service.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, automation
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Mar 01, 2010
In Q4, 2009, ENTERPRISE MANAGEMENT ASSOCIATES (EMA) analysts worked with ASG to research how executives in IT and within the lines of business use dashboards to gain holistic insights into IT services as they impact business outcomes.
Tags : 
asg, ema, enterprise management associates, dashboards, cio, ceo, coo, cfo
    
ASG Software Solutions
Previous   1 2    Next    
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.