ap trends

Results 351 - 375 of 523Sort Results By: Published Date | Title | Company Name

The 5 Next Big Things in Mobile Security (Italian)

Published By: VMware     Published Date: Feb 24, 2017
Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. Whether using a corporate-owned or employee-owned device, employees access corporate data, email, and more from their mobile devices. These user actions require businesses to implement a mobile strategy with strong security policies. This flipbook covers the five next big trends in mobile security.
Tags : 
    
VMware

Protect Legacy Applications without Touching Your Apps with Okta and Palo Alto Networks

Published By: OKTA     Published Date: Oct 23, 2017
Most organizations have a dirty little secret: they are relying on user and password-based authentication to protect sensitive internal applications. With 81% of data breaches involving weak or stolen credentials1, applications that use single-factor authentication are an easy target for attack. Unfortunately, updating internal cloud applications—as well as legacy and custom applications—to support multi-factor authentication can be an IT headache for many organizations. Okta and Palo Alto Networks have collaborated to make rolling out multi-factor authentication a snap. Join Daniel Lu, Product Marketing Manager at Okta and Kasey Cross, Sr. Product Marketing Manager at Palo Alto Networks, to learn: >The latest trends in credential-based attacks >Why every sensitive cloud application needs multi-factor authentication >How to enforce network-level multi-factor authentication without touching your apps using Palo Alto Networks and Okta
Tags : 
    
OKTA

Developer Report: Top Social Media and HTML5 Considerations for Mobile App Success

Published By: Appcelerator     Published Date: Jun 20, 2012
Find out about two of the hottest topics surrounding mobile app development right now-social media and HTML5. Educate yourself on the backend of mobile app strategy and use your knowledge to stay in front of the competition.
Tags : 
html5, social media, mobile app, development, backend, strategy, competition, trends
    
Appcelerator

Cylance Proactively Prevents Security Threats

Published By: BlackBerry Cylance     Published Date: Aug 22, 2018
According to Forrester, traditional approaches to endpoint security have become outdated and less effective as cyberthreats have increased in both number and complexity. To battle the ever-increasing threats, security professionals are now turning to new endpoint security technologies to either augment or replace their failing antimalware solutions. Below are the key trends in endpoint security, and the strategies that companies are using to address them.
Tags : 
cylance, proactively, security, threats, cyberthreats, cylance
    
BlackBerry Cylance

BlackBerry Cylance 2019 Threat Report

Published By: BlackBerry Cylance     Published Date: Apr 26, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continue to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance

Industry Insider: Best Social Media Among Fast Food Chains

Published By: Sysomos     Published Date: Oct 24, 2012
The fast food business is worth more than $200 billion. This report digs into social media conversations to discover who's winning the burger wars. Includes social media ratings for Burger King, McDonald's, KFC, and Taco Bell.
Tags : 
sysomos, heartbeat, map, social media monitoring tools, business intelligence, analysis, analytics, dashboard
    
Sysomos

The future of energy and utilities: An IBM point of view

Published By: IBM     Published Date: Jul 27, 2015
Read this white paper for insight into the trends and factors driving the future of energy and utilities, and the resulting implications for the industry.
Tags : 
insights, trends, business models, iot, internet of things, situational awareness, big data cloud computing, viable substitutes
    
IBM

The future of energy and utilities: An IBM point of view

Published By: IBM     Published Date: Oct 09, 2015
Read this white paper for insight into the trends and factors driving the future of energy and utilities, and the resulting implications for the industry.
Tags : 
ibm, energy, utilities, trend, prediction, it management, research
    
IBM

Developing a Business Case for Data Center Transformation Through ITIL Best Practices & Automation

Published By: Evergreen Systems, Inc.     Published Date: Dec 16, 2008
This comprehensive white paper applies automation and ITIL best practices to the data center and reviews current industry trends, server automation energy usage issues and a variety of optimization strategies for data center improvement.  The effects of virtualization are explored in-depth.  Includes detailed sections on increasing operational efficiency using workflow analysis, automating and optimizing server change management, reducing infrastructure complexity and developing security, disaster recovery and business continuity procedures.  Step by step instructions for developing metrics and a business case to justify data center and server automation are included.
Tags : 
evergreen system, data center automation, data center automation manager, network automation, server automation, server virtualization, itil, data center optimization
    
Evergreen Systems, Inc.

Maximizing Smartphone Value: Standardize and Simplify

Published By: BlackBerry     Published Date: Mar 23, 2010
Mobility is the future of business; more business is conducted in real time and between geographically dispersed situations than ever before. Also, mobility ties closely into important collaboration trends including the increasing use of social networking tools such as Facebook, LinkedIn and Twitter. The smartphone- a symbol of an increasingly mobile and interconnected population-is a familiar piece of technology for most employees.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange
    
BlackBerry

The Top 5 Consumer-Driven Trends in Retail

Published By: Bazaarvoice     Published Date: Aug 01, 2014
To compete in the new environment of always connected, highly informed consumers, retailers need to leverage five trends to realize higher conversions and larger transaction sizes. Find out how you can apply these 5 trends to your business.
Tags : 
bazaarvoice, consumer, retail, trends, connected, conversions
    
Bazaarvoice

What You Need to Know Now About Next-Gen Data Protection & Recovery Architecture

Published By: Arcserve     Published Date: Apr 22, 2015
We’ll walk you through the driving forces behind these rapidly evolving data protection architectures, the trends you’ll want to be keeping an eye on, what we should all demand of next generation architectures, and the state of the current market landscape.
Tags : 
network architecture, security, backup, disaster recovery, data loss, application security, cloud computing, data center design and management
    
Arcserve

Video Brief: Data Protection Appliances

Published By: Arcserve     Published Date: May 29, 2015
Find out what you need to know about data protection appliances in this video brief by the Enterprise Strategy Group’s Sr. Data Protection Analyst, Jason Buffington. In this short video he’ll analyze: -Various types of data protection appliances -Market trends regarding appliance adoption -What data protection specialists expect from appliances -How Arcserve has evolved to solve the issues of today’s complex organizations Watch this video brief today!
Tags : 
data protection appliances, appliance adoption, arcserve, security, it management, knowledge management, data management
    
Arcserve

What You Need to Know Now About Next-Gen Data Protection & Recovery Architecture

Published By: Arcserve     Published Date: Jul 15, 2015
We’ll walk you through the driving forces behind these rapidly evolving data protection architectures, the trends you’ll want to be keeping an eye on, what we should all demand of next generation architectures, and the state of the current market landscape.
Tags : 
    
Arcserve

Big Data: Harnessing a Game-Changing Asset

Published By: SAS     Published Date: Mar 01, 2012
This paper shows the results of the survey, as well as trends and expert opinions focusing on why some top organizations are able to successfully extract insight from "big data."
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics
    
SAS

Q&A Demystifying Cloud Security

Published By: GoToAssist     Published Date: Oct 05, 2011
It used to be that having your head in the clouds was pejorative. Not anymore. Today, almost everyone wants to be in the cloud. But skepticism about cloud security is leaving a few folks stuck on the ground. This white paper explores key cloud security questions addressed during the 2010 Forrester Security Forum, including private versus public clouds, security standards and cloud services trends.
Tags : 
citrix, technology, cloud computing, data protection, security, standards, application security, security management
    
GoToAssist

Understanding Web Application Security: Defending the Enterprise's New Porous Perimeter

Published By: Akamai     Published Date: Jul 01, 2011
This white paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection, and then explores how a Web application firewall solution can overcome these challenges.
Tags : 
akamai, web application security, security extension, firewall solution, cyber crime, xss, ddos, sql injection
    
Akamai

The Evolution of Payables: How AP Invoice Automation Is Changing the Game

Published By: Esker     Published Date: Jun 29, 2015
Download the IFO’s new white paper, The Evolution of Payables, for an in-depth examination of the latest AP trends, and their impact on your financial operations.
Tags : 
automation, cloud computing, mobile, analytics, visibility
    
Esker

Social Media Analytics: Making consumer insights actionable

Published By: IBM     Published Date: Apr 29, 2014
Social media is reshaping the relationships that customers have with products, services and brands. Read this white paper to learn how the right combination of technologies can help you understand emerging consumer trends and increase the ROI of your marketing campaigns.
Tags : 
ibm, retail, social media, social media analytics, consumer insights, customer relationships, roi, business technology
    
IBM

Forrester - Top Unified Communication Trends For Midsize Businesses

Published By: Cisco     Published Date: Sep 07, 2016
This white paper displays the top unified communications trends for midsize businesses.
Tags : 
    
Cisco

2016 Midyear Security Report

Published By: Cisco     Published Date: Sep 08, 2016
This white paper updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : 
    
Cisco

Webroot 2015 Threat Brief

Published By: Webroot Inc     Published Date: Aug 27, 2015
In the past year, Webroot encountered tens of millions of instances of malware and potentially unwanted applications (PUAs), monitored billions of IP addresses and URLs, analyzed millions of new and updated mobile apps for malicious behavior, and studied major malware trends based on data from millions of endpoints. This report contains insights, analysis, and information on how collective threat intelligence can protect organizations from sophisticated attacks.
Tags : 
malware, unwanted applications, malicious behavior, threat intelligence, security
    
Webroot Inc

DDoS Threat Landscape Report

Published By: Incapsula     Published Date: Jul 11, 2014
DDDoS attacks are bigger, smarter and more dangerous than ever. Incapsula's research shows that almost 33% of Network (Layer 3&4) DDoS attacks exceeded 20 Gbps. At the same time, DDoS botnets used to wage Application (Layer 7) attacks are up by 240% compared to 2013. This report details our findings and insights into the latest DDoS attack trends.
Tags : 
threat, landscape, report, intelligent traffic, filtering, solutions, technology, ddos bots
    
Incapsula

Six Ways IT Leaders will be Trusted Advisors and Lead Drive Business Transformation

Published By: Polycom     Published Date: Feb 25, 2015
Becoming a strategic trusted advisor and leading business transformation are some of the ways to ensure that IT leaders will become increasingly relevant and contribute to the work of corporate executive boards.
Tags : 
business, video, conference, multicultural, meetings, communication, cio, digital
    
Polycom

Brandwatch Report: Social Insights on the Luxury Fashion Industry

Published By: Brandwatch     Published Date: Dec 01, 2015
Luxury fashion brands have been slow to adapt to the emergence of social media, and have suffered from a series of missed opportunities that range across product development, marketing and sales departments. Download this Brandwatch report to learn how social media presents these brands with valuable opportunities to understand their audience and which brands are setting the trends on social platforms.
Tags : 
social media, social intelligence, social media monitoring, social listening, social insights, luxury, luxury fashion, fashion
    
Brandwatch
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.