aps data

Results 126 - 137 of 137Sort Results By: Published Date | Title | Company Name

10 Reasons your RADIUS Server Needs a Refresh

Published By: Identity Engines     Published Date: Mar 24, 2008
For over a decade now, RADIUS servers have been a mainstay of dial-up and VPN access control. The rather inconspicuous RADIUS server, perhaps better known as that beige, general-purpose PC collecting dust in the corner of your data center, has proved sufficient for performing basic duties like validating passwords and granting network access.
Tags : 
radius, servers, idengines, id engines, identity engines, vpn, access control, auditing
    
Identity Engines

Managing Servers and Storage Together Through the vSphere Client

Published By: Dell Storage     Published Date: Apr 21, 2011
The Dell Compellent vSphere Plug-In currently under development will enable data center administrators to manage many aspects of Dell Compellent Fluid Data storage directly through the VMware vSphere client. This demo video shows how to leverage the integration to provision and map storage volumes for VMFS datastores, create storage profiles for automated tiering and continuous snapshots, and recover datastores to virtually any point in time - all through a single interface. (4 min)
Tags : 
dell compellent, server, storage, vmware vsphere, integration, compellent vsphere plug-in, fluid data storage, storage area networks
    
Dell Storage

How DDoS Detection and Mitigation can Fight Advanced Targeted Attacks

Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor

Is Outdated Software Preventing Retail Business Growth?

Published By: Epicor     Published Date: Sep 20, 2018
Does your current software give your business the visibility and flexibility you need to be responsive and competitive, or is outdated software negatively impacting business growth and excellent service? The retail world is becoming more complex. eCommerce has grown in the U.S.—from $42 billion to $236 billion in the last decade*—and lifestyle shopping is raising customer expectations. Having the right retail management software solution—one that can keep up with your business needs and the increasing pace of technology—is critical. Given the recent advancements in technology—and higher customer expectations—perhaps it’s time to ask if your retail management software is up to the task of nurturing and managing your growth over the coming decade. Epicor has been a part of successful retail businesses for years. Here are some risks you may face from using outdated software: 1. Excessive labor costs and hiring gaps 2. Operational inefficiencies 3. Insufficient data and insights 4. Dimi
Tags : 
retail store software, retail sales software, retail saas, p o s, point of sale, epicor eagle, benefits of epicor eagle, benefits of retail pos
    
Epicor

Is Outdated Software Preventing Retail Business Growth?

Published By: Epicor     Published Date: Sep 20, 2018
Does your current software give your business the visibility and flexibility you need to be responsive and competitive, or is outdated software negatively impacting business growth and excellent service? The retail world is becoming more complex. eCommerce has grown in the U.S.—from $42 billion to $236 billion in the last decade*—and lifestyle shopping is raising customer expectations. Having the right retail management software solution—one that can keep up with your business needs and the increasing pace of technology—is critical. Given the recent advancements in technology—and higher customer expectations—perhaps it’s time to ask if your retail management software is up to the task of nurturing and managing your growth over the coming decade. Epicor has been a part of successful retail businesses for years. Here are some risks you may face from using outdated software: 1. Excessive labor costs and hiring gaps 2. Operational inefficiencies 3. Insufficient data and insights 4. Dimi
Tags : 
retail store software, retail sales software, retail saas, business retail software, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas
    
Epicor

Putting Digital at the Heart of Your Business: A 7 Step Approach to Digital Transformation

Published By: JBoss Developer     Published Date: Oct 21, 2016
Rather than simply enhancing and supporting traditional methods, the use of digital technologies should enable brand new types of innovation and creativity. However, most of us have grown up with rigid, legacy technology-based business systems—process-oriented and mostly built around predictable, repeatable steps. If this sounds familiar, your business model may now be under threat from “digital Darwinism”—a tipping point caused by digital technologies and downstream market effects. Or perhaps nimbler, lower cost-base competitors are about to overtake you with a more innovative approach, better use of data or smarter use of technology. In this climate, “business as usual” is certainly no longer good enough.
Tags : 
digital transformation, api, security, ebusiness, cloud, mobile computing, enterprise software
    
JBoss Developer

Make Faster and More Precise Decisions in a Real-Time World

Published By: AWS     Published Date: May 18, 2018
We’ve become a world of instant information. We carry mobile devices that answer questions in seconds and we track our morning runs from screens on our wrists. News spreads immediately across our social feeds, and traffic alerts direct us away from road closures. As consumers, we have come to expect answers now, in real time. Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data
Tags : 
    
AWS

Finding the Path to Security in the Big Data Landscape

Published By: IBM     Published Date: Oct 16, 2017
This white paper examines how some of the ways organizations use big data make their infrastructures vulnerable to attack. It presents recommended best practices organizations can adopt to help make their infrastructures and operations more secure. And it discusses how adding advanced security software solutions from IBM to their big-data environment can fill gaps that big-data platforms by themselves do not address. It describes how IBM® Security Guardium®, an end-to- end solution for regulatory compliance and comprehensive data security, supports entitlement reporting; user-access and activity monitoring; advanced risk analytics and real-time threat detection analytics; alerting, blocking, encryption and other data protection capabilities, as well as automated compliance workflows and reporting capabilities, to stop threats.
Tags : 
security, big data, ibm, data protection
    
IBM

Forbes Insights: The Age of Brand, Agency & Customer Collaboration

Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
In a new study by Forbes Insights and sponsored by Oracle Marketing Cloud, 60% of brand and agency executives say their roles and responsibilities have changed significantly over the past two years. As a result, both groups are reengineering their internal organizations and forging new ways of working with their respective agency or brand counterparts. At the same time, the research found that technology is ingrained in marketing operations and, perhaps most significantly of all, agency and brand stakeholders are challenging themselves to analyze and apply consumer data in more sophisticated ways. Some are even hiring data scientists and others outside of the traditional marketing discipline to help in these efforts.
Tags : 
    
Oracle Marketing Cloud

The Age of Brand, Agency & Customer Collaboration

Published By: Oracle OMC     Published Date: Nov 30, 2017
In a new study by Forbes Insights and sponsored by Oracle Marketing Cloud, 60% of brand and agency executives say their roles and responsibilities have changed significantly over the past two years. As a result, both groups are reengineering their internal organizations and forging new ways of working with their respective agency or brand counterparts. At the same time, the research found that technology is ingrained in marketing operations and, perhaps most significantly of all, agency and brand stakeholders are challenging themselves to analyze and apply consumer data in more sophisticated ways. Some are even hiring data scientists and others outside of the traditional marketing discipline to help in these efforts.
Tags : 
    
Oracle OMC

Vulnerability Decoder Encapsulation

Published By: Veracode     Published Date: Jun 26, 2019
Applications become vulnerable to an encapsulation attack when they fail to differentiate data or functionality within components. Without clearly defined boundaries between control spheres, bad code can creep across components and attackers can gain unauthorized access to data and functions.
Tags : 
    
Veracode

SiteIQ and the Art of Empowerment

Published By: RMS     Published Date: Jul 18, 2019
When evaluating single risks, underwriters and coverholders typically have to request exposure analytics from their portfolio managers and brokers, or gather their own supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones, through to lookups on Google Maps. But all this takes valuable time, requires multiple user licenses and can generate information that is inconsistent with the underlying modeling data at the portfolio level.
Tags : 
    
RMS
Start   Previous    1 2 3 4 5 6     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.