"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

data information

Results 326 - 350 of 805Sort Results By: Published Date | Title | Company Name
    
Ciena
Published By: Dassault Systèmes     Published Date: Aug 08, 2017
Learn how Dassault Systèmes Program Management solutions can help Aerospace and Aviation companies reliably execute on their proposed plans to meet their design, cost and schedule targets. Read this whitepaper and gain insights into new practices in four key areas: • Consolidate all program data in one central data repository to use institutional knowledge and improve design analysis and decision support • Data reuse between organizations to avoid duplicate efforts and misunderstandings • Real-time reporting automation of key data to assess program performance and anticipate risks and opportunities • Program control with real-time, up-to-date, detailed and verifiable information while preserving program and partner IP
Tags : 
dassault, systemes, program management, aerospace and aviation, program data, automation
    
Dassault Systèmes
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Much has been written about Payment Services Directive 2 (PSD2) and its potential to herald a new era of open banking where banks no longer have a monopoly on payment services. Instead they will be forced to provide full access to customer accounts to third parties looking to provide financial services of their own, on top of banks’ existing data and infrastructure. All of this could prove to be true, just not on January 13th 2018, the deadline for national governments to transpose PSD2 into law. This is because there is still so much to be decided and clarified. The European Banking Authority’s longawaited regulatory technical standards (RTS) on strong customer authentication (SCA) were issued in March 2017 but missing some of the finer details, such as the methods to remotely access customer data and account information and the measures around the use of application programming interfaces (APIs) and screen-scraping.
Tags : 
    
CA Technologies EMEA
Published By: Hitachi Vantara     Published Date: May 10, 2018
The banking industry is being pressured by two new forces simultaneously: an increasingly stringent regulatory environment that requires new levels of data governance, and a shift to digital business processes that introduces new, nimble competitors and empowers customers in new ways. This E-Book is intended to provide information and insights on how banking executives involved in digital transformation can successfully navigate in this new and quickly evolving landscape.
Tags : 
    
Hitachi Vantara
Published By: ParAccel     Published Date: Dec 16, 2010
This solution brief explains how Fidelity Information Services (FIS) executives realized that they needed an analytics database solution that could keep up with additional fraud complexity as well as much larger sets of data to improve detection rates.
Tags : 
paraccel, analytic database, financial fraud analytics, fidelity information services, business analytics, analytical applications, information management
    
ParAccel
Published By: Riverbed     Published Date: Feb 26, 2015
To increase agility while lowering costs, IT organizations are using virtualization and cloud-based infrastructure services to consolidate and reduce the number of physical servers and data centers across the enterprise. IDC estimates that, by 2015, more than 20 percent of the information running through servers will do so on virtualized systems. This percentage increases along with the size of the company, with some larger organizations using 100 percent virtualized systems. IDC predicts that, over the next decade, the amount of information managed by enterprise data centers will grow by a factor of 50.
Tags : 
increase agility, virtualization, infrastructure, the cloud, cloud based, consolidation, it management, cloud computing
    
Riverbed
Published By: NaviSite     Published Date: Sep 02, 2014
This white paper will deliver data that provides valuable information based on real compute scenarios to assist buyers of cloud services in understanding how their workloads might perform and what costs are associated with those environments across multiple cloud computing platforms BEFORE they invest in the selection of a cloud computing provider.
Tags : 
choosing a cloud provider, how to choose a cloud vendor, navisite, wireless, enterprise applications, cloud computing, infrastructure
    
NaviSite
Published By: HP     Published Date: Jul 29, 2008
The data residing on your storage systems and media, data-at-rest, presents serious security concerns. Regulations and various mandates around the world are putting the burden on companies and government entities to protect the private information they store. Increasingly, companies are being required to publicly disclose breaches that put individuals private data at risk, be it a customer, employee, shareholder, partner, or other stakeholder.
Tags : 
data security, database security, securing data, customer data, consumer data, pci, cardholder data, mission critical, storage management
    
HP
Published By: Pivotal CRM     Published Date: Dec 21, 2007
In this paper, learn how with the right CRM solution, information workers can increase productivity, improve customer service, and boost collaboration, while the business simplifies complex processes, increases sales, and reduces costs.
Tags : 
information worker, crm, microsoft, office, customer relationship management, user adoption, information management, data management, information overload, productivity, integration, pivotal, pivotal crm, quinstreet, application integration
    
Pivotal CRM
Published By: Entrust Datacard     Published Date: Jul 21, 2014
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes.
Tags : 
defending, enterprise, data security, protection, private identity, information transactions, trust, authentication, identity assurance, security
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication, standards, layered, authentication, education, malware, threats, mobile, data, security, integration, deployment, certificates, identity, network security, wireless security
    
Entrust Datacard
Published By: TriGeo Network Security     Published Date: Oct 03, 2008
Simply deploying a security solution cannot guarantee meeting every Payment Card Industry (PCI) requirement in full. This whitepaper discusses the challenges of PCI compliance and how security information and event management (SIEM) provides the data visibility, log management, end-point security and active response needed to demonstrate and meet each of the 12 PCI compliance requirements.
Tags : 
trigeo network security, payment card industry (pci), data security standard (dss), networking, security, network security, security management
    
TriGeo Network Security
Published By: VMware/Intel Server Refresh and Cost Savings     Published Date: Jan 27, 2009
Frustrated by the costs of maintain ever larger data centers-or building new ones-many companies are exploring virtualization. Virtualization lets your IT staff turn your data center into an internal cloud of computing resources controlled by a single virtual data center operating system (VDC-OS).
Tags : 
vmware, virtualization, server virtualization, data center, fc san, fibre, networkattached storage, nas, nic, high availability, vmware consolidated backup, vcb, vdc os, tco, total cost of ownership, vstorage, distributed power management, dpm, management information systems, mis
    
VMware/Intel Server Refresh and Cost Savings
Published By: VMware/Intel Server Refresh and Cost Savings     Published Date: Oct 23, 2007
Today's use of virtualization technology allows IT professionals to automatically manage the resources of the physical server to efficiently support multiple operating systems, each supporting different applications. This IDC Technology Assessment presents IDC's view of how virtualization technologies are impacting and will continue to impact operating environments and the operating environment market near- and long-term.
Tags : 
vmware, operating environments, virtualization, x86, server virtualization, data center, fc san, fibre, networkattached storage, nas, nic, high availability, vmware consolidated backup, vcb, vdc os, tco, total cost of ownership, vstorage, distributed power management, dpm
    
VMware/Intel Server Refresh and Cost Savings
Published By: VMware/Intel Server Refresh and Cost Savings     Published Date: Feb 16, 2007
VMware virtualization enables customers to reduce their server TCO and quickly delivers signification ROI. This paper describes commonly used TCO models and looks at several case studies that apply TCO models to virtualization projects. Learn more.
Tags : 
vmware, virtualization, tco, cpu, it infrastructure, server virtualization, data center, fc san, fibre, networkattached storage, nas, nic, high availability, vmware consolidated backup, vcb, vdc os, tco, total cost of ownership, vstorage, distributed power management
    
VMware/Intel Server Refresh and Cost Savings
Published By: ParAccel     Published Date: Nov 15, 2010
This solution brief explains how Fidelity Information Services (FIS) executives realized that they needed an analytics database solution that could keep up with additional fraud complexity as well as much larger sets of data to improve detection rates.
Tags : 
paraccel, analytic database, financial fraud analytics, fidelity information services, business analytics, analytical applications, information management
    
ParAccel
Published By: Citrix Systems     Published Date: Nov 23, 2015
Citrix NetScaler is helping prepare enterprises for today’s network challenges while supporting modern virtual, cloud, mobile, social and big data environments. For more information on ADCs, and the cutting edge benefits of NetScaler, read the Network World QuickPulse report, "Take a Load Off Your Data Center"
Tags : 
citrix, data center, netscaler, adc, networks, networking, storage, data management
    
Citrix Systems
Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data, access, it organization, security, protection, network, access, control, nac, interoperability, 802.1x standards, control, options
    
ForeScout
Published By: CDW     Published Date: Nov 13, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection.
Tags : 
cdw, data, identity security, it security, enterprise information technology, network breaches
    
CDW
Published By: CDW     Published Date: Nov 13, 2012
WAN optimization techniques tweak bandwidth for better network performance and more.
Tags : 
cdw, wan, wan optimizers, data compression, information caching, bandwidth
    
CDW
Published By: CDW     Published Date: Jun 10, 2013
It’s critical to understand how a defense-in-depth strategy can protect the most precious information asset: data.
Tags : 
cdw, enterprise encryption, defense-in-depth, sensitive data, security posture, encryption of information, compliance, security posture, security
    
CDW
Published By: CDW     Published Date: Oct 10, 2013
A team approach and careful consideration of operational and security issues will pave the way for effective guidance. The drivers are many, but big draws include the potential for greater productivity — giving people anywhere, anytime access to information via devices they’re comfortable with.
Tags : 
mobile device policy, mobile data policy, mobility goals, byod, user profile, device security, mobile applications, app availability, device liability, technology vendors, mdm, sarbanes oxley, sensitive data, mobile data, mobile information, vpn, virtual private networks, wireless, access control, mobile application security
    
CDW
Published By: McAfee     Published Date: Feb 06, 2013
This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.
Tags : 
big data, big security data, mcafee siem, intrusion detection systems, security monitoring, application security, encryption, security management, best practices, business analytics, business intelligence, data integration, data mining, data quality
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets.
Tags : 
big data analytics, gartner, big data, big security data, advanced targeted attacks, advanced persistent threats, atas, context aware security intelligence, threat intelligence, siem, access control, application security, authentication, disaster recovery, encryption, best practices, business intelligence, data integration
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Read about the top five issues McAfee customers face with security information and event management (SIEM) and see corresponding use cases and customer case studies.
Tags : 
big security data, siem, mcafee global threat intelligence, mcafee gti, mcafee risk advisor, security connected, application security, authentication, disaster recovery, encryption, application integration, business intelligence
    
McAfee
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory