Whitepaper Library
 

generation

Results 301 - 325 of 1388Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Jan 20, 2015
CIOs and CISOs can avoid risky tradeoffs by deploying next-generation firewalls that are built for both security and network performance.
Tags : 
next generation firewall, network performance, mcafee next generation firewall, ngfw, networking
    
McAfee
Published By: McAfee     Published Date: Jan 20, 2015
Network availability and survivability in the face of an attack requires specific tools and processes. Are you using RBAC, hierarchical policy management and individual domain control? Find out which eight features you must deploy now.
Tags : 
network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation, networking
    
McAfee
Published By: McAfee     Published Date: Jan 20, 2015
The only way to be prepared is to be aware. Make sure you have the right tools for optimal situational awareness of your network security.
Tags : 
situation awarenss, network awareness, network security tools, essential network tools, next generation firewall, next generation firewall features, ngfw, networking
    
McAfee
Published By: McAfee     Published Date: Jan 20, 2015
Downtime is not acceptable. Make sure you have these eight features in your enterprise network security architecture to assure high availability, even in times of crisis.
Tags : 
network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime, networking
    
McAfee
Published By: McAfee     Published Date: Jan 20, 2015
Evaluating next generation firewalls? See what SANS says about the management features and advanced security capabilities of the McAfee NGFW.
Tags : 
sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall, networking
    
McAfee
Published By: NetApp     Published Date: Feb 19, 2015
Gartner predicts that the next generation technology will evolve integrated and converged infrastructure to be in step with applications and service delivery. Convergent designs will focus on performance, capacity, provisioning, service demands, infrastructure optimization and cloud stacks.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Sep 21, 2017
The five architectural principles guiding the development of a next generation data center are provided in this paper, describing key market influences leading a fundamental enterprise IT transformation.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, data
    
NetApp
Published By: NetApp     Published Date: Sep 21, 2017
A visual infographic highlighting the five architectural principles of developing the Next Generation Data Center (NGDC), including scale-out, guaranteed performance, automated management, data assurance, and global efficiencies. This infographic typically accompanies the white paper, Designing the Next Generation Data Center, which is more in-depth account of the 5 principles.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, data
    
NetApp
Published By: NetApp     Published Date: Sep 21, 2017
An overview of EMC's ExtremIO architecture as it compares to NetApp SolidFire. Provides an overview of each solution's differences and their overall impact suitability needs of a next generation data center
Tags : 
netapp, database performance, flash storage, data management, cost challenges, solidfire, emc
    
NetApp
Published By: NetApp     Published Date: Sep 21, 2017
A NetApp SolidFire pure storage architectural comparison brief. Covers each solution's architectural elements, where they differ and the impact on the overall suitability needs of a next generation data center.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, solidfire, pure storage
    
NetApp
Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns.
Tags : 
intralinks, content, security, data, regulatory, information, management
    
Intralinks
Published By: SAP     Published Date: Nov 04, 2015
Download this whitepaper to discover how global companies are using innovative technologies such as beacons, dynamic pricing and adaptive analytics to flourish in the modern-day, next-generation retail world. Learn what they believe they’re doing well and where they’re struggling as they adapt to today’s rapidly evolving marketplace. These insights can help your business thrive in an increasingly disruptive retail landscape.
Tags : 
consumer behaviors, sap, dynamic pricing, beacons, adaptive analytics, marketplace, fulfillment, customer experience
    
SAP
Published By: Vectra Networks     Published Date: Aug 03, 2015
Learn how Vectra protects Tri-State’s corporate and subscriber data and prevents cyberattacks to the power grid.
Tags : 
utilities provider, cyberattack detection, vulnerability management, security management, it security, security solution, network breaches, false threats, real-time insights, critical infrastructure, ids, ips
    
Vectra Networks
Published By: Intralinks     Published Date: Nov 23, 2015
This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns.
Tags : 
intralinks, content, security, data, regulatory, information, management
    
Intralinks
Published By: Mitel     Published Date: Apr 07, 2017
Für intelligentere Geschäfte Die heutige Geschäftswelt wird zunehmend schnelllebiger, wettbewerbsorientierter und globaler, außerdem nimmt der Einfluss von Technologie immer mehr zu. Kulturelle, technologische und physische Elemente greifen ineinander und treiben den Wandel voran wie nie zuvor. Gefordert wird eine freiere Arbeitsgestaltung, der Trend zur „BYOD“-Praxis (bring your own device) setzt sich immer weiter durch, echnologieinnovationen und neue Geräte, Plattformen und Anwendungen halten immer weiter Einzug und internationale und regionale Grenzen werden überwunden.
Tags : 
    
Mitel
Published By: Mitel     Published Date: Apr 07, 2017
Mitel Mobilität Wenn es früher darum ging, die besten Mitarbeiter zu finden und zu halten, kam es auf den traditionellen Arbeitsplatz in einem repräsentativen Gebäude mit eigenen Büros in erstklassiger Lage an. Dieses Konzept eines Arbeitsplatzes in einem festen Büro, das wir jeden Tag aufsuchen, gilt nicht mehr. Es ist bei bestehenden und neuen Mitarbeitern nicht mehr gefragt und akzeptiert bzw.für diese nicht mehr interessant. Die heutige Generation der Arbeitskräfte hat eine ganz andere Vorstellung vom Arbeitsleben, die oft wie folgt zusammengefasst wird: „Mein Arbeitsplatz ist überall dort, wo ich mich gerade befinde, und mein Arbeitgeber stellt mir die Tools zur Verfügung, damit ich meine Arbeit überall erledigen kann, wo ich möchte.“ Wir zeigen Ihnen fünf Möglichkeiten, mit Mobility die besten Mitarbeiter zu finden und zu halten.
Tags : 
    
Mitel
Published By: Oracle Oracle Marketing Cloud     Published Date: Oct 20, 2015
As more and more of today’s empowered customers embrace it as both a communication platform and as a source of reliable information, demand generation professionals cannot afford to ignore it.
Tags : 
generating leads, demand generation, information management, content management, social media
    
Oracle Oracle Marketing Cloud
Published By: Ping Identity     Published Date: Feb 12, 2016
In order to meet the challenges presented by the use of mobile apps and cloud services in the enterprise, a new generation of identity protocols has been developed. OpenID Connect 1.0 uses the same building blocks as the modern application architectures and APIs it secures—REST and JSON. This allows it to profile and extend OAuth 2.0 to add an identity layer—creating a singular, cohesive framework that promises to secure APIs, mobile native applications and browser applications. This paper introduces OpenID Connect (Connect), detailing its features and its application in enterprise use cases.
Tags : 
    
Ping Identity
Published By: Genesys     Published Date: May 10, 2016
When people engage via digital touchpoints with your organization, they may forge seemingly random, winding paths along their journeys. Yet, no matter how many channels or interactions are involved, for the customer it is a single experience.
Tags : 
call center, cloud call center, cloud contact center, omnichannel, genesys, ebook, digital customer service, customer experience, contact center, touch points, omni channel
    
Genesys
Published By: Genesys     Published Date: Nov 06, 2017
Whether you want to replace a legacy contact center solution or you’re transforming your customer experience strategy, PureCloud by Genesys delivers fast results and helps you deliver next-generation customer experiences.
Tags : 
purecloud, genesys, contect center solution, customer experience
    
Genesys
Published By: Reputation.com     Published Date: Sep 26, 2016
As a marketing professional, one of the single most important things you can do for your organization’s reputation is develop an online review generation and monitoring program. This white paper shows the 5 steps towards getting great online patient reviews.
Tags : 
    
Reputation.com
Published By: Jamf     Published Date: May 04, 2017
"With technology seemingly everywhere, a new generation of employees seeks a seemingly modern technology experience at work. This shift in employee mentality is prompting IT to reevaluate the definition of IT service, and the practices and workflows they deploy to users. The question is how does IT shift their practices to embrace the user-centric trend? Download this e-book for answers and learn: - The origins of the user-centric trend - Apple's role in evolving IT practices - Ways to implement and benefit from this new IT
Tags : 
    
Jamf
Published By: Brainshark     Published Date: Aug 02, 2017
Whether your sales reps are 25 or 65, sales enablement leaders all have the same goal: to ensure that reps are prepared to have impactful conversations with each and every buyer. However, the preferred methods of sales coaching change from generation to generation. Thankfully, sales coaching technology helps sales enablement leaders bridge that gap. This exclusive eBook provides details on how to use technology to alter your coaching strategy to appeal to next-gen sales reps, including: • Mobile and video-based coaching • Options for both formal and informal learning • Coaching for both individual and organizational mastery
Tags : 
next-gen sales force, sales enablement, coaching, salesforce
    
Brainshark
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
We came to the above conclusion because even though suites solved many of the problems of independent, standalone modules to support integrated procurement processes in terms of data management nightmares, process inefficiency and visibility gaps that were common with first generation "best-of-breed" solutions, many mature organizations are increasingly finding that suites are not enough if they do not connect into larger enterprise processes and support the stakeholder organizations that procurement needs to work with. Are you with us? If you are, then you know that something else is needed: a source-to-pay (S2P) procurement
Tags : 
    
Determine (Selectica)
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.