cio

Results 476 - 500 of 1305Sort Results By: Published Date | Title | Company Name

30 minutes to a more secure enterprise

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
Today’s security appliances and agents must wait until malware reaches the perimeter or endpoint before they can detect or prevent it. OpenDNS arrests attacks earlier in the kill chain. Enforcing security at the DNS layer prevents a malicious IP connection from ever being established or a malicious file from ever being downloaded. This same DNS layer of network security can contain malware and any compromised system from exfiltrating data. Command & control (C2) callbacks to the attacker’s botnet infrastructure are blocked over any port or protocol. Unlike appliances, the cloud service protects devices both on and off the corporate network. Unlike agents, the DNS layer protects every device connected to the network — even IoT. It is the easiest and fastest layer of security to deploy everywhere.
Tags : 
    
Cisco Umbrella EMEA

The Keys to Digital Innovation for CIOs

Published By: Workday APAC     Published Date: May 08, 2019
"Technology today is shaking up the way we work. To help IT leaders navigate the best path forward, we created a digital magazine called CIO Perspectives. Read it for insights and guidance from leaders and visionaries on how to break free from day-to-day tasks and gain a greater perspective. Check it out now."
Tags : 
    
Workday APAC

Three Use Cases for Deception Technology in Financial Services

Published By: Illusive Networks     Published Date: Apr 10, 2019
APTs can be particularly harmful to financial service organizations, raising the need for early detection of malicious intruders. This white paper describes three use cases that illustrate how Illusive’s technology provides a nimble, easy-to-manage solution that guards the integrity of SWIFT services, defends legacy, custom, or “untouchable” applications and systems, and helps manage cyber risk during periods of disruptive business change.
Tags : 
cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, financial services, advanced threat protection, apt, targeted attacks, network security, enterprise security
    
Illusive Networks

Stopping the Attackers You Trust: A deception-based approach to insider threats

Published By: Illusive Networks     Published Date: Apr 10, 2019
Though insider threats are not new, the challenge to get ahead of them has not lessened over the past decade. In this paper you’ll find insights on why detecting and deterring malicious lateral movement is an essential part of an insider threat program, how you can monitor for unauthorized access without eroding employee trust, and how you can expedite the investigation of potential malicious insider activity.
Tags : 
emerging threats, insider threats, malicious insiders, cyber security, deception technology, endpoint security, cyber security, threat management, threat protection, illusive networks, endpoint protection, lateral movement, enterprise security
    
Illusive Networks

Using Deception To Protect Dynamic Business Infrastructure

Published By: Illusive Networks     Published Date: Apr 10, 2019
During periods of rapid growth, your business is especially vulnerable to cyberattacks from both malicious insiders, and external threat actors. Extended periods of IT change and consolidation can open seemingly minor security gaps that can quickly become gaping holes attackers will exploit. This quick read will enrich your internal dialog about how to prepare for elevated risk of high-impact cyberattacks.
Tags : 
m&a, mergers and acquisitions, business infrastructure, external threats, cyber attacks, vulnerability management, business it, it security, network security, cyber risk, deception technology, endpoint security, illusive networks, lateral movement, enterprise security
    
Illusive Networks

Use Cases for Attack Surface Manager

Published By: Illusive Networks     Published Date: Apr 10, 2019
Attack Surface Manager (ASM) gives security teams unprecedented power to easily implement a cyber hygiene program to harden their networks against malicious lateral movement of cyberattackers. This paper provides an overview of common ways that Illusive's customers are using Attack Surface Manager, including fortifying PAM/PIM solutions, detecting insider threats and malicious insider activity, and providing powerful, automated Red Team functions.
Tags : 
attack surface, cyber hygiene, vulnerability management, vulnerabilities, network vulnerability, threat management, vulnerability assessment, network security, privileged access management, identity access management, pam/pim solutions, illusive networks
    
Illusive Networks

Managing the Risk of Post-Breach or “Resident” Attacks: A Ponemon Institute Study

Published By: Illusive Networks     Published Date: Apr 10, 2019
How well-equipped is your organization to stop malicious attackers once they’re inside your network? According to this study of over 600 IT security professionals, almost two-thirds of respondents lack efficient capabilities to detect and investigate “stealth” attackers before serious damage occurs. Download the report to learn the primary obstacles to better threat detection and incident response, how well organizations are hardening their environments against lateral movement, and how cybersecurity budgets are changing to address the reality that attackers will get in.
Tags : 
risk management, it security, ponemon institute, ponemon, cybersecurity, research report, cyber attack, data breach, apt, targeted attacks, threat management, cyber crime, cyber risk, illusive networks
    
Illusive Networks

Three IT Imperatives for a CIO-led Enterprise transformation

Published By: ServiceNow     Published Date: Mar 27, 2014
This paper provides CIOs and IT leaders with an insight into three IT imperatives that IT executives used to re-position IT and transform the enterprise.
Tags : 
enterprise transformation, consolidation, self service, automation, visibility, it innovation, enterprise applications, productivity, project management, service management, research
    
ServiceNow

BR WebSite Security Threat Report

Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security
    
Symantec

MX WebSite Security Threat Report

Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security, research
    
Symantec

JD WebSite Security Threat Report

Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security, research
    
Symantec

PL WebSite Security Threat Report

Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security, research
    
Symantec

NL WebSite Security Threat Report

Published By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security threat report, emerging security trends, malicious activity, essential security, security, research
    
Symantec

Effective Hybrid Cloud — Adapting and Scaling to Meet Changing Business Needs

Published By: F5     Published Date: May 12, 2016
This white paper examines what CIOs have to consider when embarking on their hybrid cloud journey.
Tags : 
hybrid cloud, cloud, cloud computing, public cloud, hybrid, virtualization, infrastructure
    
F5

Digital transformation in manufacturing: The CIO’s approach

Published By: Infor     Published Date: Mar 03, 2017
Analysts and industry experts agree: Digital disruption in manufacturing is on the horizon. Technologies like the Internet of Things, dynamic enterprise management, global supply chain visibility, and machine learning are already changing the way manufacturers produce goods and interact with customers. Further changes will continue to intensify issues and reveal opportunities.
Tags : 
cio, finance, digital, manufacturing, enterprise, enterprise applications
    
Infor

Guía de software para fabricación

Published By: Infor     Published Date: Mar 07, 2017
En 2015, la mayoría de los fabricantes obtuvieron unos modestos niveles de rentabilidad debido a los bajos precios de los productos básicos y a la inflación salarial. Este entorno dio lugar a que se empezara a considerar el rol que las nuevas tecnologías ”disruptivas” podrían tener en las empresas manufactureras y posibles estrategias de inversión.
Tags : 
software, manufacturing software
    
Infor

Cuatro razones por las que un sistema de gestión de almacenes aporta un mayor ROI

Published By: Infor     Published Date: Mar 07, 2017
El objetivo de las operaciones de un almacén es dar una respuesta perfecta los pedidos: entregar exactamente lo que un cliente pide, a tiempo y con una eficiencia óptima. El módulo de almacenes de una solución de planificación de recursos empresariales (ERP – Enterprise Resources Management) puede ayudar a los almacenes más pequeños. Pero los módulos de gestión de almacenes de los ERP tienen limitaciones y, en el caso de empresas con operaciones más complejas, puede ser más inteligente optar por las capacidades adicionales de un sistema de gestión de almacenes avanzado (WMS, Warehouse Management System).
Tags : 
    
Infor

La colaboración social en la empresa, fomenta una buena planificación de ventas y operaciones

Published By: Infor     Published Date: Mar 07, 2017
Como responsable de ventas y operaciones, usted tiene importantes responsabilidades, tales como establecer prioridades, planificar e implementar estrategias de la cadena de suministro, impulsar mejoras y, al mismo tiempo, adaptarse rápidamente a los requisitos cambiantes del mercado y de los clientes, y ajustar esos cambios en la demanda y en la oferta, y todo sin olvidar los resultados financieros.
Tags : 
    
Infor

Ventajas y desventajas de modificar su solución ERP

Published By: Infor     Published Date: Jun 13, 2017
Las modificaciones suelen crear polémica entre muchos profesionales del sector informático de la fabricación. El término "estándar" también tiene connotaciones muy diversas, ya que se suele asociar con las antiguas soluciones genéricas para empresas que ofrecían funcionalidades rudimentarias con el pretexto de que su aplicación era muy simple.
Tags : 
    
Infor

Plan de 5 puntos para seleccionar con éxito su ERP

Published By: Infor     Published Date: Jun 13, 2017
Por qué necesita un nuevo ERP: identificar los agentes impulsores de su negocio. En estos tiempos, disponer de un ERP es una necesidad, no un lujo. Usted precisa de un sistema que le ayude en las operaciones y gestión de su negocio, ¿pero qué más necesita que haga?
Tags : 
    
Infor

How to Ensure You're Not Part of the Next Botnet

Published By: Sophos     Published Date: Mar 30, 2017
With an estimated 500,000 'Internet of Things' devices using default security credentials it's little wonder that the recent Mirai botnet's DDoS attack was able to cause such widespread disruption. But it isn't just the average home-user that's at risk. Organizations like yours are being targeted with bespoke malware in order to compromise your network and add your servers and devices to malicious botnets. This paper explains why these attacks are so successful, how a typical infection takes place and what security systems your organization should have in place to defend against botnet proliferation.
Tags : 
web protection, email protection, web application firewall, intrusion protection, sandboxing, threat protection
    
Sophos

How to Stay Protected Against Ransomware

Published By: Sophos     Published Date: Mar 30, 2017
Ransomware threats like Cryptowall, TeslaCrypt, and Locky are on the rise, targeting organizations of all sizes. This paper explains how these attacks work, and why a large number of new infections continue to surface despite existing protective measures. It also provides practical short- and long-term steps that organizations should take to protect against them.
Tags : 
security solutions, ransomware, security technologies, protection technologies, malicious email, it security, server protection
    
Sophos

10 Things Your CIO Should Know About DevOps

Published By: AppDynamics     Published Date: Apr 11, 2017
This white paper reveals the top 10 practices around DevOps your CIO and team need to know about to adopt the best model for success.
Tags : 
devops, infrastructure, cio, it management
    
AppDynamics

Ransomware is Costing Companies Millions: Could it Cost you Your Job?

Published By: Zscaler     Published Date: May 15, 2019
Cloud sandboxing protection is as essential to security as keys are to encryption. Preventing CIOs and CISOs from having to make excuses when it comes to APTs, zero-days, and ransomware.
Tags : 
    
Zscaler

The Definitive Guide to Networking for Office 365

Published By: Zscaler     Published Date: May 15, 2019
Is it possible to implement an Office 365-ready network, at scale, without a proof-of-concept (PoC)? Your CIO has tapped you to lead the effort to move to Office 365. Realizing it’s a great opportunity and distinction in your career, you reply with, “Sure, I’ll make sure it is a total success!” and then note that a PoC will not be needed.
Tags : 
    
Zscaler
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.