cement

Results 426 - 450 of 524Sort Results By: Published Date | Title | Company Name

2010 Threat Predictions

Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments, vulnerability management, web application security, anti spam, anti spyware, anti virus, application security, identity management, internet security, policy based management, security management, security policies, web service security
    
McAfee

Astaro Outperforms Cisco as an Integrated Security Solution at Devine Millimet

Published By: Astaro     Published Date: Aug 10, 2009
The Cisco PIX firewall appliance at Devine Millimet, Attorneys at Law, needed replacement.
Tags : 
astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine millimet, failover, ssl, vpn, intrusion, web filtering, anti-malware, security, anti spyware, intrusion detection, intrusion prevention
    
Astaro

Why the City of Lake Wales (Florida) Selected Astaro Security Gateway over Cisco-Pix

Published By: Astaro     Published Date: Aug 10, 2009
Previously, the network at the City of Lake Wales didn't possess any firewalls, intrusion protection or web filtering solutions. As a result the network, which is spread out to multiple locations (including law enforcement), was left wide open to security breaches and caused system performance problems as users unwittingly picked up spyware and malware.
Tags : 
astaro, security, gateway, cisco pix, web filtering, intrusion protection, firewall, firewalls, network, spyware, malware, astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine lake wales, failover
    
Astaro

Retain Top Talent - Here's How

Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
There is no time like the present to come up with an improved strategy for employee retention and development. It is critical for you as supervisors and managers to engage employees effectively if you don’t want your top talent to look for opportunities elsewhere to grow in their careers. Help your employees do their best work by removing obstacles, recognizing valuable contributions and promoting creative approaches to career advancement. Take action to retain employees: authorize them to make decisions; initiate conversations about performance, be transparent; and provide guidance during times of change or uncertainty.
Tags : 
employee, retention, development, talent
    
Cornerstone OnDemand

Empowering the Digital Marketer With Big Data Visualization

Published By: SAS     Published Date: Sep 30, 2014
In this paper – which is based on a webinar hosted by the Direct Marketing Association (DMA) and sponsored by SAS – we will take a look at how these technological advancements can enable you to become more predictive and prescriptive in your digital and integrated marketing efforts.
Tags : 
sas, direct marketing association, integrated marketing efforts, digital marketing efforts, networking, business technology
    
SAS

3 Steps to Integrating Social Media into your Sponsorship Offerings

Published By: Spredfast, Inc.     Published Date: Jun 24, 2014
Sponsorships can be more than a logo placement. In fact, they should be. Don’t just put a sponsor’s logo in your ads (and vice versa). Instead, give interested brands a way to really grab the audience’s attention. Still need proof social is the way to go? We’ll give you 1,700 reasons. That’s the number of banner ads consumers get served every month. On top of that, people are (over) exposed to more than 16,000 commercials annually – and struggle to recall any. It’s not an exaggeration to say consumer attention is fragmented. So how can you ensure the packages you sell create affinity between brands and the consumers they desperately covet? By giving everyone a chance to connect with each other. After all, your audience is probably already talking about your event on Facebook, Twitter and Instagram. Download here to learn more!
Tags : 
spredfast, social media, sponsorship, banner ads, earned media
    
Spredfast, Inc.

L’histoire Vraie De La Publicité En Temps Réel

Published By: Quantcast     Published Date: Feb 13, 2015
Programmatique, RTA, RTB – Qu’est ce que cela signifie? À l’heure actuelle, l’arrivée au quotidien de nouveaux acronymes et de nouvelles technologies peut rendre l’écosystème technologique vraiment compliqué. Ce guide est conçu pour vous aider à mieux saisir l’état actuel de l’écosystème technologique de la publicité digitale. Il présente également les étapes qui ont conduit le secteur à son avancement actuel et explique en termes simples les aspects technologiques et techniques de notre activité.
Tags : 
l’écosystème technologique, programmatique, rta, rtb
    
Quantcast

Integrated Network Security Architecture: Threat-Focused Next-Generation Firewall

Published By: Cisco     Published Date: Jan 15, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, security, it management
    
Cisco

Riverbed Advances Visibility into Virtual Data Centers

Published By: Riverbed     Published Date: Jul 15, 2014
In January 2012, Riverbed® Technology announced version 9.5 of its Cascade® network performance management solution, which included a number of major enhancements. Collectively, the new capabilities are designed to improve visibility into the health and activity of applications and services traversing networks from the branch to the data center.
Tags : 
advnace, visibility, virtual data centers, technology, solution, management, storage virtualization, server virtualization, data center design and management, virtualization
    
Riverbed

HP StoreOnce:  Boldly Go Where No Deduplication Has Gone Before

Published By: HP     Published Date: Jun 05, 2014
Fast-growing data and widespread virtualization have ratcheted up data protection challenges no matter what the size of your business. This paper will describe the challenges of data protection, why deduplication is critical to meeting the challenges, how HP is achieving its vision of federated dedupe with StoreOnce – and what HP’s StoreOnce VSA announcement and achievement means to backup services providers, enterprises with remote or branch offices and small and medium businesses as well.
Tags : 
hewlett packard, data, backup, . data protections, recovery, deduplication, storeonce, it management, data management
    
HP

Maximizing Data Security with Whitewater Cloud Storage Gateways

Published By: Riverbed     Published Date: Sep 05, 2014
Information is becoming the currency of the 21st century, and organizations of all sizes are creating more information than ever before. Frequently, organizations struggle with how best to balance storage requirements with available budgets. The benefits of greater storage capacity are clear: better change management and roll-back, easier archival and discovery, reliable backup and recovery. But to continually grow on-site capacity requires unsustainable investment and introduces unnecessary risk. Prominent cloud service providers present an appealing alternative with their vast amounts of storage, offering low cost, high availability, and built-in redundancy. Riverbed’s Whitewater® family of cloud storage gateways is a drop-in replacement for existing tape- and diskbased backup targets, cuts backup costs 30-50% compared to tape and disk, and provides effective DR capability with minimal effort.
Tags : 
data security, cloud storage, gateways, requirements, archival, discovery, management, storage, data management
    
Riverbed

Gain Real-time email competitive intelligence with this video

Published By: eDataSource     Published Date: Apr 07, 2015
Watch this short webinar today and see for yourself how you can gain access to email competitive data, real-time inbox placement and improve your email campaign performance.
Tags : 
inbox placement, email marketing, email marketing roi, real time email marketing
    
eDataSource

Get Real-time Email Competitive Data on 50,000 Brands

Published By: eDataSource     Published Date: Jan 08, 2016
The google search tool for e-mail marketing campaigns.
Tags : 
inbox placement, email marketing, email marketing roi, real time email marketing, it management, knowledge management, business technology
    
eDataSource

The Definite Guide to Predictive Marketing

Published By: Sailthru     Published Date: Jul 01, 2015
The ability to know the next action of an individual customer is gold, quite literally, as this knowledge translates directly into revenue. True predictive intelligence has arrived, and it’s one of the most incredibly exciting advancements in modern marketing. With good reason given that for many brands as much as 95% of future revenue comes from a mere 5% of customers! But with any major advancement, messaging landmines threaten a marketer’s ability to identify the technologies that can actually deliver on the predictive promise.
Tags : 
ecommerce, publishing, data science, predictive marketing, customer experience, personalization, marketing, strategy, technology
    
Sailthru

The Future of Energy and Utilities

Published By: IBM     Published Date: Nov 05, 2015
Making predictions in the utility industry can be perilous. History is filled with missed or prematurely exuberant pronouncements of the future of utilities and energy. Notwithstanding the peril, some clear utility trends are emerging on the horizon. Learn how today!
Tags : 
ibm, energy, utilities predictability, business intelligence, energy data, utilities data, business activity monitoring, information management, project management, service management, business technology
    
IBM

Redundancy Model by RagingWire

Published By: RagingWire Data Centers     Published Date: Oct 22, 2016
This paper presents RagingWire’s distributed redundancy model which is an enhancement of shared and dedicated infrastructure models.
Tags : 
ragingwire, data center, colocation, power, energy, storage, infrastructure, server hardware, blade servers, storage virtualization, power and cooling, colocation and web hosting
    
RagingWire Data Centers

Lenovo Enables Solutions For The New HPC

Published By: Inside HPC Media LLC     Published Date: Sep 24, 2019
The 2019 version of High Performance Computing (HPC) has changed considerably from previous years’. Most notably, advancements in Artificial Intelligence (AI) has given rise to data-centric applications in machine learning. Machine learning often relies on HPC technologies, particularly in the early training phase, and in many cases, machine learning initiatives share infrastructure, budgets, and personnel with established HPC installations. A 2018 Intersect360 Research study found that the majority of experienced HPC users had also embarked on machine learning applications, usually overlapping HPC and AI.
Tags : 
    
Inside HPC Media LLC

Always-On SSL : protégez les internautes tout au long de leur session

Published By: Thawte     Published Date: Oct 05, 2015
L’heure est à la sécurisation intégrale de votre site. Face à des attaques de plus en plus fréquentes et faciles à exécuter, les internautes sont plus que jamais attentifs à la capacité des sites à sécuriser leurs données confidentielles. Pour les entreprises intraitables sur les questions de réputation et de protection de leurs clients, Always-On SSL s’impose comme une priorité absolue. Sa mission : protéger les internautes tout au long de leur parcours sur votre site – des recherches aux achats, en passant par le partage d’informations. Pour en savoir plus sur ce dispositif de renforcement de la protection en ligne, téléchargez notre nouveau guide de référence.
Tags : 
always on ssl, online protection, confidential data, user experience, customer protection, security
    
Thawte

How to Calculate the ROI of Google Apps Backup

Published By: Backupify     Published Date: Jul 15, 2013
Backing up onsite data is considered a “best practice.” The same should apply to backing up your Google Apps data. This paper will help you determine the ROI of choosing a backup service by helping you understand the replacement costs associated with your SaaS data.
Tags : 
roi, google apps, backup solution, saas data
    
Backupify

Beginner's Guide to SSL Certificates

Published By: Symantec Corporation     Published Date: Oct 03, 2013
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer but it also protects people who visit your home, place of business, or website. It is important to understand the potential risks and then make sure you are fully protected against them. In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options. For a glossary of terms, please see “Tech Talk Made Simple” at the end of this document.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation

IDS Evaluation Guide

Published By: AlienVault     Published Date: Mar 30, 2016
An Intrusion Detection System (IDS) is an essential tool in every security practitioner’s arsenal. Intrusion Detection Systems are designed to gather and analyze information from networks and hosts to detect malicious activity both before and after a security breach. In this guide, you will learn about the critical components of host and network IDS, requirements to evaluate IDS solutions, as well as how AlienVault Unified Security Management (USM) meets those requirements. Topics covered to help you evaluate IDS solutions include: • An overview of network and host-based IDS • Signature-based vs. anomaly-based systems • Throughput of IDS solutions • Protocol analysis • Aggregation capabilities • Integration capabilities • Contextual enhancement Download your version now to learn what capabilities you should consider when evaluating IDS solutions.
Tags : 
    
AlienVault

The New B2B Marketing Playbook

Published By: Madison Logic     Published Date: Oct 30, 2013
Learn how the world of B2B marketing has evolved in recent years and why it is important to create a new marketing strategy for customer relationship management in order to keep up.
Tags : 
b2b, marketing, b2b marketing, marketing strategy, customer relationship management, crm, lead nurturing, display, lead targeting, branding, seo, contextual ad placement, data
    
Madison Logic

3 Steps for Bullet-Proof Wireless LAN Security & Management

Published By: AirDefense     Published Date: Apr 24, 2007
This paper outlines the specific elements of wireless LAN security (perimeter control, access control, date protection, and monitoring) and WLAN management (configuration, fault diagnostics, network usage, and policy enforcement). Reader will gain a keen understanding of how to effectively lockdown a wireless LAN and manage it for peak performance.
Tags : 
wireless security, wlan, wlans, wlan security, wireless lan, access control, wireless access control, data protection, monitoring, wlan management, security policies, airdefense
    
AirDefense

How Does Your Marketing Fit in the Customer Lifecycle?

Published By: eROI     Published Date: Jan 23, 2007
Your customers are the most important aspect in your business - without them, you have nothing. eROI offers communication advice that can help you to maximize customer satisfaction and loyalty. Topics discussed include loyalty offers, low activity offers, surveys, and more.
Tags : 
lead generation, email marketing, newsletter design, loyalty and retention, content personalization, re-engagement, re-enticement, low activity
    
eROI

SSL VPN Checklist

Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Checklist details important capabilities to consider when evaluating and comparing SSL VPN vendors and their technology solutions. Enterprise requirements are organized into six broad categories: application-level experience and support, security enforcement, flexible policy management and administration, ease of use, leadership and vision, and financial strength and reputation.
Tags : 
virtual private network, ssl vpn, ssl, vpn, ssl vpn requirements, vpn requirements, system requirements, policy management, security management, secure remote access, aventail, security, access control, internet security, network security appliance
    
Aventail
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.