"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

services

Results 1 - 25 of 3284Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Cisco is committed to leading the collaboration revolution— both today and tomorrow. The role of technology in themarket place is to support and inspire big ideas and innovation. Digital transformation is going to continue to drive new ways of working, and Cisco will remain a driving force, with a vision that extends beyond in-house innovations—because the best ideas can come from anywhere.
Tags : 
file sharing, team engagement, cisco spark board, hybrid media, services, work optimization, developers
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
Cisco designs and sells broad lines of products, provides services, and delivers integrated solutions to develop and connect networks around the world, building the internet. As a global market leader in our industry, we help our customers connect, digitize, and thrive. Together, we change the way the world works, lives, plays and learns.
Tags : 
ransomware, threat landscape, operations, risks, enforcement, defend, firewalls, network
    
Cisco EMEA Tier 3 ABM
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 15, 2017
A new Harvard Business Review Analytic Services global study of more than 300 midsize to large enterprises finds that many executives believe current collaboration tools fall short on supporting the depth, pace, and style of teamwork now required to keep up with today’s most important business imperatives.
Tags : 
collaboration, collaboration tools, harvard business review, team work, teams
    
Cisco EMEA Tier 3 ABM
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
To better understand how companies are finding the unique, hybrid cloud architectures that best meet their needs, we interviewed executives at companies that had reduced or changed their use of managed or cloud IaaS or that chose to avoid the public cloud in the first place. These companies include retail, social media, healthcare, financial services, and public sector companies. Some of these companies were born in the cloud while others transitioned from traditional IT infrastructures. Company sizes ranged from 300 employees to more than 300,000.
Tags : 
it infrastructure, operations professionals, digital experience, time to resolution, cloud, iaas
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
The Cloud, once a radical idea in IT, is now mainstream. Whether it’s email, backup or file sharing, most consumers probably use a cloud service or two. Similarly, most IT professionals are familiar with cloud service providers such as Amazon, Google and Microsoft Azure, and many companies have moved at least some of their information technology processes into the cloud. In fact, the cloud has become so popular it’s easy to assume that running IT applications on-premises is not cost competitive with a cloud based service. In this report Evaluator Group will test the validity of that assumption with a TCO (Total Cost of Ownership) model analyzing a hyperconverged appliance solution from HPE and a comparable cloud service from Amazon Web Services (AWS).
Tags : 
infrastructure, cost competitive, cloud, hyper converged, amazon web services, total cost of ownership, tco
    
Hewlett Packard Enterprise
Published By: Schneider Electric     Published Date: Jan 02, 2018
If not, you are increasing the risk for costly, unplanned downtime. However, despite the importance of having a reliable flow of electricity, over half of building owners rely on reactive maintenance programs to care for their equipment. This means they wait until equipment fails completely before initiating corrective action, which is typically 3-4 times more costly than taking preventive measures. A good first step to go from being reactive to proactive is having a power system assessment performed. While often deemed expensive or unnecessary, the truth is power system assessments reveal opportunities to modernize, imiprove performance and help protect employees. To learn more, download our checklist, ""Ten Ways a Power System Assessment Can Save You Money"
Tags : 
electrical engineering services, electrical reliability, electrical risk assessment, power system assessment, risk assessment, mps assessment
    
Schneider Electric
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Finding a strategic partnership with a trusted security expert that can assist you in all the aspects of information security is vital. SecureWorks is a market leader in security that can close the security gap in organisations by evaluating security maturity across an enterprise, help define security strategies and implement and manage security program plans. We are a true strategic partner that can help a CISO embed security at all levels of the organisation.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisation’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017
Published By: Carbonite     Published Date: Oct 12, 2017
I&O leaders responsible for storage must rethink their backup procedures to realize cost savings and improve backup infrastructure resource utilization. Cloud services can help your infrastructure modernization initiative, as they alleviate the burden on the data center backup infrastructure. Asset by Gartner
Tags : 
backup, recovery, cloud services, infrastructure, data center
    
Carbonite
Published By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
    
Cisco
Published By: Oracle Dyn     Published Date: Dec 06, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle Dyn
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Today’s network edge is increasingly taking on a critical role in connecting users to the digital content and web services that they need to reach. This is driving a new approach to load balancing that starts at the edge. Powered by DNS, edge-based global load balancing (GLB) steers user traffic to destination endpoints based on IT-defined policies. GLB works independently or in concert with site-based, or on premises, load balancing technologies in a “federated” system. This approach applies load balancing and traffic steering policies at each layer from the user edge to the host—whether virtual or physical—where the request is actually served.
Tags : 
geo-zoning, path, optimization, resource, asset, balancing, virtual, resource
    
Oracle Dyn
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Nous avons tous vécu cette expérience. Nous nous habituons tellement à la manière dont les choses se font que nous ne remettons pas souvent en cause les raisons pour lesquelles nous les faisons
Tags : 
api, application programming interface, psd2, open banking, json, github, api gateway, apim
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Découvrons comment les premiers adeptes de ces technologies ont su gérer avec succès les API pour générer de la croissance.
Tags : 
api, application programming interface, psd2, open banking, json, github, api gateway, apim
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Banques, gestionnaires de patrimoines, établissements de crédit et autres institutions financières. Tous constatent d’importants changements, conséquence d’une évolution de la demande et du nouvel arsenal réglementaire. Ces entreprises sont tenues de revoir leurs priorités, leurs processus et leurs produits, avant de jeter les bases de leur future réussite. La solution ? Les logiciels.
Tags : 
api, application programming interface, psd2, open banking, json, github, api gateway, apim
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
L’économie des applications oblige les entreprises à se transformer. Pour saisir de nouvelles opportunités de croissance, elles s’ouvrent sur l’extérieur et partagent des données et applications sélectionnées avec des développeurs, des partenaires, des appareils mobiles, le Cloud et l’Internet des objets. Cette transformation contribue à redonner de la valeur aux données héritées : dans l’économie des applications, une organisation qui parvient à exploiter ces données d’une nouvelle manière pourra faire émerger de nouvelles opportunités de revenus.
Tags : 
api, application programming interface, psd2, open banking, json, github, api gateway, apim
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Les API ne sont pas une technologie nouvelle, mais dans le monde numérique actuel, elles occupent une place croissante et deviennent essentielles pour chacune des facettes de l’entreprise. Dans ce contexte, il est logique que de plus en plus d’entreprises cherchent à gérer efficacement ces API. Mais à quoi ressemble une solution efficace de gestion des API ?
Tags : 
api, application programming interface, psd2, open banking, json, github, api gateway, apim
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
CA Live API Creator vous fournit les trois éléments nécessaires à chaque prototype d’application : • Base de données • Logique métier • Interface utilisateur Base de données : la vôtre ou la nôtre Vous pouvez utiliser votre base de données existante ou une base de données créée pour vous dans le Cloud par CA Live API Creator. Quoi qu’il en soit, vous êtes rapidement opérationnel.
Tags : 
api, application programming interface, psd2, open banking, json, github, api gateway, apim
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
Aujourd’hui, le numérique est omniprésent : Cloud, appareils mobiles, réseaux sociaux et Internet des objets modifient notre manière de travailler et de nous divertir.
Tags : 
api, application programming interface, psd2, open banking, json, github, api gateway, apim
    
CA Technologies EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory