automated

Results 301 - 325 of 619Sort Results By: Published Date | Title | Company Name
Published By: Riverbed DE     Published Date: Oct 16, 2017
What is the key benefit of SD-WAN? To provide seamless access to digital services for end-users. But IT is more distributed, fragmentary, and dynamic than ever, with hybrid apps, hybrid networks, and remote and mobile users everywhere. Hardware-bound legacy networks can never fulfill the promise of seamless access. Taming the chaos of today’s IT requires a new approach to networking. This is the promise of software-defined wide area networks (SD-WAN)—the ability to use plain-language business policies to automate and orchestrate all the components of digital access. Read this white paper to learn how SD-WAN lets you: • Manage centrally from a cloud console with a comprehensive view of your connectivity fabric that spans and unifies datacenter/cloud apps, branch/mobile users, and enterprise/cloud networks. • Orchestrate globally using business policy-based automation to define quality of service and access privileges for all apps/users. • Deploy locally with zero touch via automated
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Riverbed DE
Published By: Interactive Intelligence     Published Date: Apr 23, 2014
Today, business process automation isn’t just about efficiency, it’s about operating a business for your customers. To ensure a positive customer experience, a process must trigger an automated action, and automation must then manage the experience across multiple channels, personalize the customer’s interaction, and predict the best next actions. Read more, from Chris Thalassinos, Mahnaz Meshkati, and Frank Chiu of Communications Intelligence Group, and Brad Herrington of Interactive Intelligence.
Tags : 
interactive intelligence, business process automation, multichannel technology, customer experience, contact center, contact solution, it management, business process management, call center management, call center software, telecom
    
Interactive Intelligence
Published By: GFI Software     Published Date: Apr 05, 2011
GFI LANguard provides a complete network security overview with minimal administrative effort. Why use GFI LANguard? Download this free trial to experience the benefits!
Tags : 
gfi software, languard, free trial, network security scanner, vulnerability management tool, network auditing, automated patching, network security, auditing, patch management, vulnerability management
    
GFI Software
Published By: Red Hat     Published Date: Dec 15, 2017
The pace and scale of digital business innovation is increasing. Organizations are trying to optimize resources, speed development, and adapt faster to market changes. However, this places an extra burden on IT operations teams, who are now asked to move faster, yet manage increasingly complex IT environments. Automation can help. Read this e-book to learn more.
Tags : 
    
Red Hat
Published By: Stratus Technologies     Published Date: Dec 01, 2008
Certainly server virtualization offers an elegant way to minimize planned downtime during routine software and hardware maintenance, or scheduled upgrades. But that addresses only part of the availability story.
Tags : 
stratus technology, server virtualization, virtual machine, automated software, data centers, enterprise applications, data management, risk management, data protection
    
Stratus Technologies
Published By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : 
identity management, iam, access management, iam, risk management, identity theft, hackers, fraud, identity, idology, authentication
    
IDology
Published By: Cisco     Published Date: Jan 29, 2009
Small business telephone systems are available in a variety of configurations, offering an ever-growing range of features and benefits. The most advanced small business telephone systems today run on Internet Protocol (IP) networks—the same network many small businesses use to connect employees, devices and information resources.
Tags : 
cisco, small business phone systems, ip networks, internet protocol, videoconferencing, unified messaging, mobile softphones, automated attendant, paging and intercom, crm, mobile computing, smart phones, wireless phones, customer relationship management, video conferencing
    
Cisco
Published By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire provides IT organizations with enhanced file integrity monitoring, configuration assessment and log management that automates continuous PCI compliance.
Tags : 
tripwire, pci compliance, file integrity monitoring, configuration assessment, log management, malware, security, event management, security management, configuration management
    
Tripwire, Inc
Published By: Tripwire, Inc     Published Date: Mar 10, 2010
Unlike others, Tripwire solutions identify the events that matter most-those that pose the real security risks or take you out of compliance. And they help you discover those events immediately, while you can still contain the damage.
Tags : 
tripwire, pci compliance, business continuity, log, event management, it security, compliance automation, log center, pci dss, compliance, internet security, business process automation
    
Tripwire, Inc
Published By: Microsoft Dynamics CRM     Published Date: Mar 02, 2010
While the new generation of self-service applications for the Web and IVR is excellent, successful self-service programs will depend on giving customers choices and striking the right balance.
Tags : 
microsoft dynamics crm, contact call center, self-service application, ivr, interactive voice response, customer service interaction, live agent support, automated self-service, automation, business process automation, call center management, call center software, customer interaction service, customer relationship management, customer satisfaction, customer service, electronic design automation
    
Microsoft Dynamics CRM
Published By: Savvis     Published Date: Jul 07, 2010
This paper describes the Symphony VPDC enterprise-grade infrastructure service that provides true high availability enterprise IT environments, supporting development to production, with automated provisioning of servers, network, storage, software and security.
Tags : 
savvis, virtual private data center, cloud computing, virtualization, vpdc, hosting management service, storage virtualization, server virtualization, data center design and management, colocation and web hosting
    
Savvis
Published By: IBM Software     Published Date: Aug 04, 2010
Implementing source code vulnerability testing in the software development life cycle. Finding and fixing security issues early is an application project can help reduce development costs while improving software quality. Source code security tools implemented and used across the software development life cycle are known to provide such results.
Tags : 
ibm ouncelab, software development life cycle, automated source code, security testing, security management, business process automation, product lifecycle management, software testing, web development
    
IBM Software
Published By: SAS     Published Date: Aug 03, 2016
Tax fraud is already prevalent, and fraudsters are more sophisticated and automated than ever. To get ahead of the game in detecting fraud and protecting revenue, tax agencies need to leverage more advanced and predictive analytics. Legacy processes, systems, and attitudes need not stand in the way. To explore the challenges, opportunities, and value of tax fraud analytics, IIA spoke with Deborah Pianko, a Government Fraud Solutions Architect within the SAS Security Intelligence practice.
Tags : 
finance, tax fraud, security, protecting revenue, opportunities, analytics, small business
    
SAS
Published By: EMC Corporation     Published Date: Jun 14, 2013
This document describes the top 5 simple benefits of EMC VNX. Download this White Paper for more information.
Tags : 
automated storage, optimization, storage space, increase bandwidth, data warehouse solution, technology, security, networking, it management, storage, data management, business technology
    
EMC Corporation
Published By: Skybot Software     Published Date: Apr 06, 2011
This paper discusses automating your computer operations. It provides a brief history of automation, discusses five key benefits, and introduces obstacles you need to overcome them for successful automated computer operations.
Tags : 
skybot software, automated operation, productivity, performance, application performance management, business process automation
    
Skybot Software
Published By: IBM Corporation     Published Date: Jun 28, 2011
Merkur conducted an extensive selection process for service management solutions, evaluating technologies to provide proof-of-concept demonstrations. Following its rigorous review, Merkur selected IBM Tivoli Asset Management for IT and IBM Tivoli Service Desk to automate and integrate IT asset management and incident, problem, change, inventory, SLA and knowledge management processes.
Tags : 
tivoli, merkur, sla, inventory, services management, ibm, service management, tivoli, automation, it asset management, service request management, infrastructure, itil, electronic design automation
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 30, 2011
IBM Tivoli Application Dependency Discovery Manager supports the alignment of IT and business with robust and automated application mapping and discovery that helps organizations understand the impact of change and meet compliance needs with detailed reporting and auditing.
Tags : 
energy management, tivoli, disaster prevention, infrastructure, bms, building management system, ecosystem, opc, power and cost savings, energy optimization, backup and recovery, compliance
    
IBM Corporation
Published By: TeamQuest     Published Date: Jul 11, 2014
In this whitepaper you will learn about the following: • Analytics and today’s optimization challenges • What REALLY matters • Desired state and results • Methodology and ideation examples – Business and service aligned – Automated and predictive IT analytics • Recommendations Download to learn more!
Tags : 
mobile app, optimizing it, automated and predictive it analytics, it management, knowledge management, enterprise applications
    
TeamQuest
Published By: IBM     Published Date: Oct 01, 2012
Read this data sheet to learn more about configurations optimized for small businesses, application servers, and transactional and database systems.
Tags : 
automated deployment, automated management, smbs, it solutions, server hardware, storage management, storage virtualization, server virtualization, total cost of ownership, business technology
    
IBM
Published By: IBM     Published Date: Oct 01, 2012
IBM Power Systems provide a comprehensive approach designed to protect the continuity and availability of business-critical applications and services. Deploying integrated disaster recovery allows companies to deliver new services faster, with higher
Tags : 
disaster recovery, backup and recovery, ibm power systems, automated virtualization management, virtualization, downtime, mission-critical applications, servers, storage virtualization, business technology
    
IBM
Published By: IBM     Published Date: Nov 09, 2012
Many of the latest initiatives in the IT world are focused around aligning IT resources more closely with business users and solution needs. In this white paper, learn to make better business decisions with flexible, automated business rules.
Tags : 
operations decision management, it infrastructure, data management, automated business rules, automated business events, it management, business technology
    
IBM
Published By: IBM     Published Date: Feb 20, 2013
This paper reviews the processes involved in a company’s extended financial close process, the problems associated with a manual effort, and the benefits of using an integrated and automated single-platform solution for Financial Close Management.
Tags : 
fcm, financial close management, finance, close, extended cycle, end of cycle, consolidated, application integration, application performance management, best practices, business activity monitoring, business intelligence, business management, business metrics, business process automation, business process management
    
IBM
Published By: Esker     Published Date: Jan 06, 2014
Business performance depends on how well a company manages its internal processes. Companies with effective business process management in place are able to analyze key performance indicators to monitor efficiency of day-to-day activities and employees against operational targets.
Tags : 
esker, automation, sales order processing, order-to-cash, erp systems, automated sales, streamlining, order processing, deliverware solution, automation solutions, sales order workflow, automation benefits, implementation, change management, integration, inbound customer orders, business process automation, customer satisfaction, productivity, software compliance
    
Esker
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Search the Library

Add Research

Get your company's research in the hands of targeted business professionals.