Category Archives: Security

The next line of defense—How new security leverages virtualization to counter sophisticated threats

When it comes to securing systems and data, the bad guys are constantly upping their games — finding new ways to infiltrate businesses and users. Those who protect systems from these cascading threats must be ever vigilant for new technical … Continue reading

Posted in application transformation, big data, Bitdefender, Citrix, Cloud computing, Cyber security, data analysis, data center, DevOps, Enterprise architect, enterprise architecture, Enterprise transformation, Government, Identity, risk assessment, Security, Virtualization | Tagged , , , , , , , , , , , , | Leave a comment

Awesome Procurement —Survey shows how business networks fuel innovation and business transformation

The next BriefingsDirect digital business insights interview explores the successful habits, practices, and culture that define highly effective procurement organizations. We’ll uncover unique new research that identifies and measures how innovative companies have optimized their practices to overcome the many … Continue reading

Posted in Ariba, artificial intelligence, big data, Business intelligence, Business networks, Cloud computing, CRM, data analysis, Enterprise transformation, ERP, Information management, machine learning, Networked economy, procurement, SAP, SAP Ariba, Security, Spot buying | Tagged , , , , , , , , , , , | Leave a comment

Experts define new ways to manage supply chain risk in a digital economy

The next BriefingsDirect digital business thought leadership panel discussion explores new ways that companies can gain improved visibility, analytics, and predictive responses to better manage supply chain risk in the digital economy. The panel examines how companies such as Nielsen … Continue reading

Posted in Ariba, big data, Cloud computing, Cyber security, ERP, Identity, Internet of Things, machine learning, Networked economy, procurement, risk assessment, SAP, SAP Ariba, Security, Spot buying | Tagged , , , , , , , , , , , , , | Leave a comment

How SAP Ariba became a first-mover as Blockchain comes to B2B procurement

The next BriefingsDirect digital business thought leadership panel discussion examines the major opportunity from bringing Blockchain technology to business-to-business (B2B) procurement and supply chain management. We will now explore how Blockchain’s unique capabilities can provide comprehensive visibility across global supply … Continue reading

Posted in Ariba, artificial intelligence, Business networks, Cloud computing, Cyber security, enterprise architecture, Enterprise transformation, ERP, Identity, Internet of Things, machine learning, Networked economy, procurement, SAP, SAP Ariba, Security, Spot buying | Tagged , , , , , , , , , , , | Leave a comment

Inside story of building a global security operations center for cyber defense

The next BriefingsDirect inside story examination of security best practices focuses on the building of a global security operations center (SOC) for cyber defense. Learn here how Zayo Group in Boulder, Colorado built a state-of-the-art SOC as it expanded its … Continue reading

Posted in big data, Cloud computing, Cyber security, data analysis, data center, Enterprise architect, Hewlett Packard Enterprise, managed services, risk assessment, Security | Tagged , , , , , , , , , | Leave a comment

Swift and massive data classification advances score a win for better securing sensitive information

The next BriefingsDirect Voice of the Customer digital transformation case study explores how — in an era when cybersecurity attacks are on the rise and enterprises and governments are increasingly vulnerable — new data intelligence capabilities are being brought to … Continue reading

Posted in big data, data analysis, Hewlett Packard Enterprise, Security | Tagged , , , , , , , | Leave a comment

Cybersecurity crosses the chasm: How IT now looks to the cloud for best security

The next BriefingsDirect cybersecurity innovation and transformation panel discussion explores how cloud security is rapidly advancing, and how enterprises can begin to innovate and prevail over digital disruption by increasingly using cloud-defined security. We’ll examine how a secure content collaboration … Continue reading

Posted in Cloud computing, HP, Security | Tagged , , , , , , , , | Leave a comment