bre

Results 51 - 75 of 1976Sort Results By: Published Date | Title | Company Name

Voici trois mesures simples qui vous aideront à protéger votre entreprise contre les cyberattaques.

Published By: Dell SB     Published Date: Aug 27, 2019
Bon nombre de propriétaires de PME pensent que cela n’arrive qu’aux autres et que leur entreprise est trop petite pour être la cible de piratages, d’attaques par rançongiciel et d’autres types de cybercriminalité. D’autres sont conscients de l’importance de la cybersécurité, mais estiment qu’ils n’ont pas les ressources nécessaires pour en faire une priorité. Ce sont là quelques-unes des raisons pour lesquelles pas moins de 90 % des PME n’ont pas établi de système de protection pour leurs données ou celles de leurs clients.
Tags : 
    
Dell SB

Accelerating Business Transaction with Effortless Authentication

Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard

A Practical Three-Step Plan To Make Healthcare Cybersecurity Stronger

Published By: QTS     Published Date: Nov 04, 2016
Healthcare accounts for 21% of all cybersecurity breaches, making it the most affected business sector in the U.S. economy. Ongoing attacks are predicted to cost providers $305 billion in lifetime revenue over the next few years. Download this white paper to learn how to make healthcare cybersecurity stronger.
Tags : 
healthcare, cyber security, data security, security
    
QTS

Anwendungssicherheit und -performance

Published By: Akamai Technologies     Published Date: May 24, 2017
Webanwendungs- und DDoS-Angriffe lassen sich nicht vorhersehen und treffen Unternehmen ohne Vorwarnung. Für die meisten DDoS-Angriffe (Distributed Denial of Service) ist nicht viel Know-how erforderlich. Angreifer können günstig Ressourcen mieten, die auf entsprechenden Seiten leicht zu finden sind. Trotz des geringen Preises führen DDoS-Angriffe zu vielen Problemen: • Betriebsunterbrechung • Verlust vertraulicher Daten • Niedrigere Nutzerproduktivität • Rufschädigung • Beeinträchtigung von Partnerschaften und Kundenbeziehungen • Umsatzverlust Je nach Branche können sich so schnell Schäden von Zehntausenden US-Dollar ergeben – in einigen Fällen geht der Schaden sogar in die Millionen. Nur 2 % der Unternehmen gaben an, ihre Webanwendungen seien in den vergangenen 12 Monaten nicht Opfer eines Angriffs geworden. Bei 98 % war das Gegenteil der Fall.
Tags : 
    
Akamai Technologies

Cisco NGFW Stands Above the Competition

Published By: Cisco     Published Date: Jan 02, 2019
The network is the foundation of robust security, and the critical network security element is the firewall. For that reason, Cisco has been committed to delivering a next-generation firewall that can stop threats at the edge and focus on security efficacy. Those efforts are paying off in substantial momentum, and market observers are taking note. Cisco has been named a leader in the 2018 Gartner Magic Quadrant for Enterprise Network Firewalls. Beginning with our world-class threat-intelligence organization, Talos - the Cisco NGFW stands out from the competition. It goes beyond prevention and gives visibility into potentially malicious file activity across users, hosts, networks, and infrastructure. It saves you time and enables automation using our integrated architecture. No other firewall vendor have the strength and breadth of networking and security capabilities that Cisco offers. Learn More about it by downloading Gartner’s 2018 Magic Quadrant for Enterprise Network Firewalls.
Tags : 
security, enterprise network, firewall, cisco, gartner, magic quadrant
    
Cisco

Neem het zekere voor het onzekere

Published By: Lenovo UK     Published Date: Nov 09, 2018
Met één laptop die elke minuut wordt gestolen, hoe breng je de veiligheidsdreiging in evenwicht met de stijgende behoefte aan mobiliteit van medewerkers en verbeterde productiviteit? Met ThinkPad, aangedreven door Intel® Core™ i7 vPro™ processors, profiteert u van Lenovo's 360-benadering van beveiliging. Plus de duurzaamheid om uw gebruikers in elke fase van hun werkdag in beweging te houden en productief te houden. Meer informatie in onze infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, het Intel logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, het Intel Inside logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside en Intel Optane zijn handelsmerken van Intel Corporation of zijn dochterondernemingen in de Verenigde Staten en/of andere landen.
Tags : 
    
Lenovo UK

HOW DOES INVESTING IN SECURITY IMPACT BUSINESS GROWTH?

Published By: Lenovo UK     Published Date: Sep 10, 2019
Do you know where you’re most at risk? In the race to get ahead of competitors and digitally transform the business, new threats emerge. With ThinkShield by Lenovo you have one truly customisable, comprehensive solution that protects your business end-to-end. As the average cost of a data breach is over $4 million, discover how investing in security impacts business growth. Download infographic >
Tags : 
    
Lenovo UK

HOW DOES ONE INNOCENT EMPLOYEE MISTAKE BRING DOWN A WHOLE COMPANY

Published By: Lenovo UK     Published Date: Sep 10, 2019
Do you know where you’re most at risk? In the race to get ahead of competitors and digitally transform the business, new threats emerge. With ThinkShield by Lenovo you have one truly customisable, comprehensive solution that protects your business end-to-end. With 48% of breaches caused by human error2, find out how you can protect your business against employee mistakes. Download our infoguide > 2 Kaspersky: “Small Business IT Security Practical Guide.” https://go.kaspersky.com/rs/802-IJN-240/images/Small_Business_Practical_Guide.pdf?aliId=466030355 p[Note: s is missing from Kaspersky on source information on infoguide]
Tags : 
    
Lenovo UK

¿CÓMO AFECTA INVERTIR EN SEGURIDAD AL CRECIMIENTO DE TU NEGOCIO?

Published By: Lenovo UK     Published Date: Sep 10, 2019
¿Sabes por dónde corres más peligro? En la carrera por adelantarte a la competencia y transformar digitalmente tu empresa, surgen nuevas amenazas. Con ThinkShield de Lenovo tienes una solución completa y totalmente personalizable que protege tu negocio de forma integral. El coste medio de una filtración de datos es de más de 4 millones de dólares. Descubre cómo afecta a tu crecimiento invertir en seguridad. Descarga la infografía >
Tags : 
    
Lenovo UK

HOE KAN EEN ONSCHULDIGE FOUT VAN ÉÉN WERKNEMER LEIDEN TOT DE ONDERGANG VAN EEN HEEL BEDRIJF?

Published By: Lenovo UK     Published Date: Sep 10, 2019
Weet je wanneer je het meeste risico loopt? In de race om je concurrenten voor te blijven bij de digitale bedrijfstransformatie doemen nieuwe gevaren op. Met ThinkShield van Lenovo beschik je over een totaaloplossing die je geheel kunt aanpassen aan de beveiligingsvereisten van jouw bedrijf. 48% van inbreuken wordt veroorzaakt door menselijke fouten2. Ontdek hoe je je bedrijf kunt beschermen tegen fouten van medewerkers. Download onze infogids > 2 Kaspersky: “Small Business IT Security Practical Guide.” https://go.kaspersky.com/rs/802-IJN-240/images/Small_Business_Practical_Guide.pdf?aliId=466030355 p[Opmerking: s ontbreekt in Kaspersky in brongegevens over infogids]
Tags : 
    
Lenovo UK

HPE InfoSight: Artificial Intelligence for your Hybrid Cloud World

Published By: Hewlett Packard Enterprise     Published Date: Jan 31, 2019
Managing infrastructure has always brought frustration, headaches, and wasted time. That’s because IT professionals have to spend their days, nights, and weekends dealing with problems and manually tuning their infrastructure. Traditional monitoring and support are too far removed from infrastructure, resulting in an endless cycle of break-fix-tune-repeat. Infrastructure powered by artificial intelligence, however, can overcome the limitations of humans and traditional tools. This white paper explores how HPE InfoSight with its recommendation engine paves the path for an autonomous data center your Hybrid Cloud World.
Tags : 
    
Hewlett Packard Enterprise

How to prevent identity fraud with location intelligence

Published By: HERE Technologies     Published Date: May 24, 2019
How secure is your company’s network? The rising frequency of employee network access is fast becoming one of the most prevalent and unmanaged risks to the protection of critical enterprise data. When coupled with increasingly sophisticated cyber-attacks, the possibility of a security breach of enterprise networks becomes more likely. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing identity fraud. Discover the latest facts and statistics. Learn more about the use-case of location verification when logging into your company’s network. Download the infographic from HERE Technologies.
Tags : 
technology, mapping, location data
    
HERE Technologies

Cisco Umbrella + Cloudlock

Published By: Cisco EMEA     Published Date: Nov 13, 2017
In the not so distant past, the way we worked looked very different. Most work was done in an office, on desktops that were always connected to the corporate network. The applications and infrastructure that we used sat behind a firewall. Branch offices would backhaul traffic to headquarters, so they would get the same security protection. The focus from a security perspective was to secure the network perimeter. Today, that picture has changed a great deal.
Tags : 
malware, ransomware, compromised accounts, malicious insiders, visibility, coverage, data breaches, compliance
    
Cisco EMEA

Cisco Umbrella at a glance

Published By: Cisco EMEA     Published Date: Nov 13, 2017
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate owned laptops accessing the internet from other networks. More cloud apps, mean that users don’t need to be on the corporate network to get work done. And more branch offices connecting directly to the internet.
Tags : 
visibility, protection, deployment, management, platform, integration, cloud, infrastructure
    
Cisco EMEA

Cisco Umbrella Package Comparison

Published By: Cisco EMEA     Published Date: Nov 13, 2017
Entry-level package options For organizations looking for protection with more basic functionality, we have three additional Umbrella packages designed for entry-level use cases.
Tags : 
performance, protection, enforcement, visibility, management, platform package exclusive
    
Cisco EMEA

Data Breaches: Protect Your Organization with an Incident Response Program

Published By: Cisco EMEA     Published Date: Mar 05, 2018
The operation of your organization depends, at least in part, on its data. You can avoid fines and remediation costs, protect your organization’s reputation and employee morale, and maintain business continuity by building a capability to detect and respond to incidents effectively. The simplicity of the incident response process can be misleading. We recommend tabletop exercises as an important step in pressure-testing your program.
Tags : 
human resources, cisco, employees, data, analysis
    
Cisco EMEA

Cisco 2018 Annual Cybersecuity Report

Published By: Cisco EMEA     Published Date: Jun 01, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses and evade detection. The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
Tags : 
    
Cisco EMEA

Maximizing the value of your communications investment

Published By: Spectrum Enterprise     Published Date: May 28, 2019
Technology is meant to make our lives easier and more efficient. When it’s done right, it can accelerate and transform the way individuals and businesses operate. So, when it comes to something as essential as communications, the technology can make or break your organization’s productivity. In today’s fast-paced business environment, you can’t afford to miss a call. And communications technologies have expanded to include collaboration tools, as well as basic and advanced voice functions, like ‘on-the-fly’ call routing. Add to that the growing need for anywhere, anytime access to voice and collaboration tools and you end up with the perfect storm of complexity and lost productivity – just the opposite of what you were aiming for.
Tags : 
    
Spectrum Enterprise

Fiber Internet Access from Spectrum Enterprise

Published By: Spectrum Enterprise     Published Date: Aug 29, 2019
Clients are benefiting from a rapidly evolving fiber Internet landscape and the associated competition among providers. Choosing the right vendor from among the many vying for your business requires careful consideration of how each operates. Take into account, for example, expertise and experience, breadth of services and support and investment in infrastructure.
Tags : 
    
Spectrum Enterprise

The PCI Compliance Guide For Ecommerce

Published By: BigCommerce     Published Date: Oct 16, 2018
Whether your company has been selling online for 20 minutes or 20 years, you are undoubtedly familiar with the PCI DSS (Payment Card Industry Data Security Standard). It requires merchants to create security management policies and procedures for safeguarding customers’ payment data. Originally created by Visa, MasterCard, Discover, and American Express in 2004, the PCI DSS has evolved over the years to ensure online sellers have the systems and processes in place to prevent a data breach.
Tags : 
    
BigCommerce

Future Proof Your Tech Stack with Seamless Integrations

Published By: Box     Published Date: Jun 22, 2018
• Content is among an organization's most critical assets. It flows through every aspect of a company, from people to systems to processes. But as teams grow and the breadth of their content expands, these valuable assets get fragmented across the different tools they use. • What if you had a secure, open platform that connects all your tools in the cloud, allowing you to pull together best-of-breed technologies that fit your unique business needs? These native integrations keep teams happy and give IT full visibility and control, while boosting productivity and collaboration across the entire organization. • Download our ebook to see how Cloud Content Management from Box provides you with a central and secure content layer that unites all of your apps with seamless, native integrations. In it, you'll learn about our most popular integrations — like Microsoft Office 365, Okta, Slack and Salesforce — and how Box helps you future-proof your tech stack while also providing a unified exp
Tags : 
    
Box

To Better Meet Business Needs, IT Looks

Published By: SAP     Published Date: Nov 18, 2015
This survey shows how SAP S/4HANA was designed to break the limitations of the past by simplifying IT with massive simplification and innovation.
Tags : 
it simplification, it managers, complexity, simplicity, benefits of simplification, how to reduce it complexity, sap, sap s/4hana
    
SAP

SAP S/4HANA: a reimagined suite for reimagined business

Published By: SAP     Published Date: Nov 24, 2015
This video shows how with SAP S/4HANA, the next generation business suite, you can break the limitations of the past.
Tags : 
sap, sap s/4hana, digital, network, connect to real-time information, real-time, sap platform, network architecture
    
SAP

Online Gaming Customer Response Survey

Published By: Akamai Technologies     Published Date: May 08, 2017
The Games industry is growing at break-neck speed, surpassing growth rates of the Entertainment industry as a whole. Many Games industry players are joining the race to win-over the coveted online games audience. Developing new games that not only draw in audiences, but also keep them engaged is an on-going challenge. Recently we solicited feedback from more than 150 Akamai global games customers to gain industry insights into the challenges and opportunities their faced with each day. We would like to share their responses with you.
Tags : 
akamai, gaming, audience engagement, game industry, customer feedback
    
Akamai Technologies

Évaluation de la rentabilité du stockage flash : guide pratique des décideurs informatiques

Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Si votre entreprise ne déroge pas à la règle, vous êtes aux prises avec différents défis liés au stockage de données. Dans une enquête annuelle de Frost & Sullivan menée auprès de décideurs informatiques, la croissance du stockage a été répertoriée parmi les défis majeurs des centres de données au cours des cinq dernières années2 . Étant donné que les entreprises collectent, répliquent et stockent un nombre toujours croissant de données, la simple acquisition d'une capacité de stockage suffisante constitue un problème.
Tags : 
    
Hewlett Packard Enterprise
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.