Whitepaper Library
 

rsa

Results 1 - 25 of 503Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Fast alles, das mit einer Anwendung in Berührung kommt, verbessert oder verschlechtert ihre Performance. Die Herausforderung liegt in der Ermittlung der Ursache: Codeänderung, API, Netzwerk, Anwendungsarchitektur oder verbundener Service? Lesen Sie dieses eBook und erfahren Sie, welche komplexen Umgebungen erforderlich sind für ein modernes digitales Unternehmen und welches APM Modell die entscheidungsrelevanten Einblicke bieten kann, die zur Maximierung der Performance erforderlich sind.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Auf einen Blick Mitarbeiter von heute sind es gewohnt, privat digitale Technologien zu nutzen, die eine problemlose Kommunikation ermöglichen und die Abläufe des täglichen Lebens vereinfachen. Bedauerlicherweise können viele Unternehmenstools nicht Schritt halten. Die meisten Projekt- und Portfoliomanagementlösungen, die heute eingesetzt werden, bieten keine unkomplizierten Optionen, um alltägliche Aufgaben auszuführen. Sie ermöglichen keine kontextbasierte Kommunikation, mit der sich Probleme lösen lassen, und verfügen nicht über entscheidende Funktionalität. Dazu zählen z. B. die Möglichkeit, den Fokus auf relevante Daten einzuschränken, das Durchführen von Drilldowns, um zusätzliche Informationen zu erhalten, sowie die Vorhersage finanzieller Entwicklungen und das Modeling von Ergebnissen.
Tags : 
    
CA Technologies EMEA
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
As signaling and scrubbing technology evolve (and as your solutions become more and more adaptable), DDoS attacks will become less effective and less attractive to would-be adversaries. The time will soon come when a 1 Tb attack from an IoT botnet will seem like a mere annoyance, rather than a catastrophic event—if you even notice it at all. So how do you get there faster? Plan ahead by designing a defense in-depth DDoS strategy and partner with a trusted security provider to handle the large attacks. Upfront preparation will pay off when the threat of DDoS attacks no longer keeps you up at night.
Tags : 
strategy, ddos, spam, technology, solutions
    
F5 Networks Inc
Published By: Forcepoint     Published Date: Aug 31, 2018
Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Enterprise-grade SD-WAN connectivity. Deploy and operate connections between more than 1,000 sites from a single console Security. Top-rated security that doesn’t impede performance and reliability Ease of Deployment and Operation. Built specifically for true, centralized manageability, even at enterprise scale Future-Proof Agility and Flexibility. Adapts to different environments seamlessly Read Modernizing the Distributed Enterprise Network and take the first step toward true network efficiency.
Tags : 
    
Forcepoint
Published By: IBM     Published Date: Apr 19, 2018
IBM DB2 with BLU Acceleration helps tackle the challenges presented by big data. It delivers analytics at the speed of thought, always-available transactions, future-proof versatility, disaster recovery and streamlined ease-of-use to unlock the value of data.
Tags : 
db2, data migration, ibm, oracle
    
IBM
Published By: Iterable     Published Date: Sep 07, 2018
Since the term “omni-channel” was first coined by the Harvard Business Review in 2011, some marketing technology vendors claimed that they could provide businesses with this holy grail of brand ubiquity. Unfortunately, most of these early claims were false starts where vendors over-promised and under-delivered. The good news is that a select number of solutions have caught up with all the promises and can now turn them into action. In this guide, we explain why the conversation around omni-channel marketing has changed and how you can transform your marketing strategy to leverage this new, powerful technology. We’ll give you a heads up on the roadblocks you’ll encounter on your journey to achieving omni-channel relevance and the benefits you’ll gain once you reach your destination. No highfalutin jargon, no talking in circles and no nonsense. Just practical advice on how to create a superb customer experience.
Tags : 
    
Iterable
Published By: Genesys     Published Date: Jun 08, 2018
Artificial Intelligence (AI) is staggering in its speed of handling simple requests and automating conversations. But AI solutions are not enough for the best customer experiences. Human emotions sometimes demand the human touch that only live agents can provide. Kate, Customer Experience AI by Genesys, combined with the power of human touch can improve customer experience, empower employees and dramatically reduce costs. This seamless combination of AI technology and humans, or “Blended AI by Genesys,” addresses the entire customer journey for the best possible outcomes. Download the eBook and learn how Kate and Blended AI lets you: • Personalize self-service • Connect customer conversations • Create smart agent experiences • Start small and deploy fast with Microapps
Tags : 
ai solutions, customer experience
    
Genesys
Published By: StrongMail     Published Date: Sep 08, 2010
With more than 500 million active users, Facebook can be an extremely effective channel for engaging customers around your brand. However, before you rush out to build a fan page, you need to first understand the best way to interact with them based on conversations about your brand that are already happening on the social web.
Tags : 
strongmail, email, facebook, channel, social networking
    
StrongMail
Published By: Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
Cylance
Published By: Big Bang LLC     Published Date: May 31, 2012
Cost-effective and fully automated device driver management for Microsoft SCCM with the Universal Imaging Utility System Deploy Plug-in. The UIUSD completely eliminates the need for SCCM admins to manage and package drivers.
Tags : 
    
Big Bang LLC
Published By: Evatronix     Published Date: Nov 02, 2012
ARM® TrustZone® along with Trusted Execution Environments provide a secure, integrated and convenient way to manage sensitive and valuable assets on a mobile device. It adjusts the device to the user, not vice versa, and thus opens a whole new
Tags : 
    
Evatronix
Published By: SAS     Published Date: Aug 17, 2018
What if we stopped arguing over which analytics software is best, and decided instead to use them all? With today’s analytics technologies, the conversation about open analytics and commercial analytics is no longer an either/or discussion. You can now combine the benefits of SAS and open source analytics within your organization. Download this e-book to learn how businesses in multiple industries are integrating disparate code and information to deploy models and deliver critical results with analytics.
Tags : 
    
SAS
Published By: Cisco EMEA Tier 3 ABM     Published Date: May 15, 2018
Your employees, customers, and partners need the ability to connect and collaborate, at any time, from any location—across time zones or simply across the conference table. And those workplaces are expanding faster than ever, powered by mobile and cloud usage that makes virtual meetings essential. With scalable and secure voice, video, and content sharing, real-time collaboration can happen anywhere. Staying connected can lead to improved productivity and faster decision-making, as well as better customer service. But only if the technology offers a seamless experience and is intuitive enough to drive user adoption. While the need for better meetings is universal, not all conferencing tools are the same. Choosing the wrong tool could actually decrease productivity by wasting valuable meeting time troubleshooting the technology, or by providing a negative experience that will deter users from embracing it. This is especially true in situations where poor meeting quality could impact
Tags : 
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Jun 01, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses and evade detection. The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
Tags : 
    
Cisco EMEA Tier 3 ABM
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
IIDC erwartet, dass bei Unternehmenskunden das Wachstum bei Flash-Speicher weiterhin höher als bei rotierenden Festplatten ist und dass die ausgelieferte SSD-Kapazität jedes Jahr um mehr als 75 % ansteigt.2 Eine mögliche Ursache dafür ist, dass die Preise schneller sinken als erwartet. Eine aktuelle Studie zeigt, dass Flash in Bezug auf die Gesamtbetriebskosten über einen Zeitraum von vier Jahren gesehen das kostengünstigste Medium für alle Speicherumgebungen ab 2016 sein wird.3 Die Gesamtbetriebskosten für Flash werden bis 2020 weiter sinken und einen ROI ermöglichen, bei dem Lösungen mit rotierenden Festplatten nicht mithalten können.
Tags : 
    
Hewlett Packard Enterprise
Published By: Freshdesk     Published Date: Aug 15, 2016
When 76% of consumers say they view customer service as the true test of how much a company values them, you have to make sure that your strategy, and tool, are top notch. Here's a collection of best practices, drawn from our conversations with customers, to help you improve your agents' productivity and win customer love. In this whitepaper, we detail how you can - Provide your agents with complete context by pulling data from your third party systems into your helpdesk - Reduce ticket volume and help customers help themselves by setting up a knowledge base - Automatically assign tickets to the right team with ease thus reducing your agent's workload and many more!
Tags : 
    
Freshdesk
Published By: Freshdesk     Published Date: Aug 15, 2016
While email is perfect for one-to-one communication, it doesn't work half as well for managing many-to-many conversations like a helpdesk would. When businesses use email to support customers, they leave room for conversations to get lost, ignored or forgotten. Not to mention, the lack of accountability and metrics to gauge the process and figure out what's working and what's not working. In this whitepaper, we discuss, for those businesses, the advantages a helpdesk has over email and lay out just how easy it can be to win customer love.
Tags : 
    
Freshdesk
Published By: Commvault     Published Date: Jul 06, 2016
Data conversations continue to change as all businesses are trying to figure out today's reality of the move to the cloud, anywhere/anytime computing, and the explosive growth of data. These trends have drastically reshaped the IT industry and data management forever. With continued market innovations in storage, cloud, and hyper-converged infrastructures, there are six key modern IT needs that are increasingly the focus of CIO and technology leaders.
Tags : 
commvault, modern data protection, data security, storage, cloud, hyper converged infrastructures, access and collaboration, new recovery mandates, virtualization, networking
    
Commvault
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The NSA’s Information Assurance Directorate left many people scratching their heads in the winter of 2015. The directive instructed those that follow its guidelines to postpone moving from RSA cryptography to elliptic curve cryptography (ECC) if they hadn’t already done so. “For those partners and vendors that have not yet made the transition to Suite B elliptic curve algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum-resistant algorithm transition.” The timing of the announcement was curious. Many in the crypto community wondered if there had been a quantum computing breakthrough significant enough to warrant the NSA’s concern. A likely candidate for such a breakthrough came from the University of New South Wales, Australia, where researchers announced that they’d achieved quantum effects in silicon, which would be a massive jump forward for quantum computing.
Tags : 
quantum computing, quantum, computing, browser encryption. encryptionm
    
F5 Networks Inc
Published By: Cisco     Published Date: Jun 21, 2016
The demands on IT today are staggering. Most organizations depend on their data to drive everything from product development and sales to communications, operations, and innovation. As a result, IT departments are charged with finding a way to bring new applications online quickly, accommodate massive data growth and complex data analysis, and make data available 24 hours a day, around the world, on any device. The traditional way to deliver data services is with separate infrastructure silos for various applications, processes, and locations, resulting in continually escalating costs for infrastructure and management. These infrastructure silos make it difficult to respond quickly to business opportunities and threats, cause productivity-hindering delays when you need to scale, and drive up operational costs.
Tags : 
    
Cisco
Published By: SAP SME     Published Date: May 09, 2017
A transformação digital está diretamente relacionada à mudança em curso da economia digital, que se traduz na interconexão em tempo real de indivíduos, empresas e sociedade, com respaldo da tecnologia. Pense nos recursos avançados que estão modificando a natureza dos negócios: » Hiperconectividade –decorrente das comunicações a qualquer hora e lugar. » Poder computacional ilimitado, disponibilizado pelas diversas plataformas. » Computação em nuvem, com acesso facilitado a softwares e serviços hospedados. » Proliferação de sensores e dispositivos móveis, que oferecem novas e contínuas fontes de informação, bem como meios de acessá-las. » Avanços na segurança cibernética, que garantem acesso confiável e uso de informações essenciais, minimizando vulnerabilidades internas e externas.
Tags : 
    
SAP SME
Published By: SAP SME     Published Date: May 09, 2017
A transformação digital está diretamente relacionada com a mudança em curso da economia digital, que se traduz na interconexão em tempo real de indivíduos, empresas e sociedade, com suporte da tecnologia. Pense nos recursos avançados que estão modificando a natureza dos negócios: » Hiperconectividade – decorrente das comunicações em qualquer tempo e lugar » Poder computacional ilimitado, disponibilizado pelas diversas plataformas » Computação em nuvem, com acesso facilitado a software e serviços hospedados » Proliferação de sensores e dispositivos móveis, que oferecem novas e contínuas fontes de informação, bem como meios de acessá-las » Avanços na segurança cibernética, que garantem acesso confiável e uso de informações essenciais, minimizando vulnerabilidades interna e externa
Tags : 
    
SAP SME
Published By: Dell EMC     Published Date: May 21, 2018
Office technology continues to become ever more powerful, versatile, and efficient, including display technology, which has made incredible strides in performance, functionality, agility, precision, and color. Dell is at the forefront of this rapid evolution of high-performance displays with innovative, award-winning monitors with a wide range of sizes, features, and price points.
Tags : 
    
Dell EMC
Published By: Cisco Spark     Published Date: Jun 22, 2017
The most successful businesses are greater than the sum of their parts. When individuals work together well, they fill in each other's blind spots and build on each other's great ideas. These conversations ultimately help teams be more productive, reduce time-to-market and come up with more innovative ideas. But if your teams are spread across different offices, or working from home, can you create the same collaborative magic? Web-based collaboration tools claim to break down the collaboration barriers that distance can build. Everyone agrees they can reduce the time and cost of travel. And yes, these tools can stream your colleagues' voices, facial expressions, and slide decks into your meeting room, so you can get a clearer picture of verbal and behavioral signals. But if you're researching collaboration platforms, you'll hear skepticism, too. Naysayers declare that: People won’t participate because they’re afraid of digital change. You just can’t trust the security of collaborati
Tags : 
    
Cisco Spark
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.