Display search results for ** instead (50 products)

Showing 21-30 of 50

Each new technology—such as Network Functions Virtualization (NFV), Centralized Radio Access Network (C-RAN) and the emerging fronthaul network—risks creating more instances of telecom’s most persistent hurdle: operational silos. One company focusing on the challenge of providing end-to-end visibility in next-generation networks, and thus aim...

USD 3,000.00

USD 2,250.00 save 25 %

When considering the need for identity and access management (IAM) solutions, security comes first to mind, as it should. However, when deciding when, how, and with whom to invest in any identity-based software solutions, and how to justify the investment to the accounting department, there is another compelling consideration; one that has been the...

USD 3,000.00

USD 2,250.00 save 25 %

The day of reckoning is fast approaching. On May 25, 2018, the General Data Protection Regulation (GDPR) will go into effect. The European Union (EU) regulation, known as (EU) 2016/679, provides data protection and privacy for all individuals in the EU. GDPR is a law covering all EU member countries, which includes enforcement with fines and/or san...

USD 3,000.00

USD 2,250.00 save 25 %

Many companies seeking to optimize cost in their support operations “offshored” their helpdesks over the past decade. Yet, the backlash over poor customer experiences, many rooted in language barriers, has caused many firms to bring their support operations back “onshore,” with native English speakers manning the phones. This still, however...

USD 3,000.00

USD 2,250.00 save 25 %

The automated, programmatic generation of telephone calls, “robocalls,” is an increasing threat that targets both fixed-line and mobile network customers. Robocall misuse is escalating despite control measures enacted by regulatory edicts, apps for mobile devices designed to filter such calls, and consumer complaints. In 2017, robocall complain...

USD 3,000.00

USD 2,250.00 save 25 %

The data management industry has made rapid advancements in storing massive amounts of data—but if it does not also give users the ability to perform data preparation at scale, the analytic insights their organizations are thirsting for will fail to materialize. What organizations need is to equip their business users with self-service data prep...

USD 3,000.00

USD 2,250.00 save 25 %

Cloud centers (like all data centers) are subject to infrastructure failures. In 2017, most major cloud service providers suffered hours-long outages in some of their services and regions—including AWS, Azure, IBM, Google, Microsoft, and Apple. Enterprises that “click to buy” on-demand cloud services without closely examining the terms and co...

USD 3,000.00

USD 2,250.00 save 25 %

In this insight, Stratecast catalogs the trending maturation of deception as a valuable cybersecurity technology, and its growing market demand. From there, we turn our attention to what Stratecast believes will be the next chapter in deception: incorporation into managed security service providers’ (MSSPs) service offerings.

USD 3,000.00

USD 2,250.00 save 25 %

Taking a practical approach to AI simplifies the decision to implement AI capabilities; but it also ensures that AI-enabled tools will deliver value upon implementation, rather than requiring a protracted period of training and customization. Sales engagement, in particular, will generate immediate returns on investment as tuned AI functionality co...

USD 3,000.00

USD 2,250.00 save 25 %

In this paper, we look at the two dominant approaches available for businesses to virtualize branch network functions, and software-define the branch. As can be deduced from the partial list of questions stated above, there is no single answer for all enterprises. The choice will depend on the current state of the WAN infrastructure; the business s...

USD 3,000.00

USD 2,250.00 save 25 %

Showing 21-30 of 50