hi def

Results 126 - 150 of 1099Sort Results By: Published Date | Title | Company Name

Ensuring Business Continuity with a Multi-Layered AV Defense

Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment, application security, business continuity, email security, ssl
    
Blue Coat Systems

Failure to Protect Keys and Certificates Undermines Critical Security Controls

Published By: Venafi     Published Date: Mar 26, 2015
Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
keys, certificates, security controls, apt, advances persistent threat, cryptographic keys, cybercriminals, cyber attacks
    
Venafi

Making a DDoS Protection Plan: 8 Best Practices

Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies

Retail Financial Services Need to Keep Pace with Customer Savvy

Published By: Pega     Published Date: May 24, 2016
Organizations operating in the retail financial services sector – banks and insurers – need to work smart and fast to keep pace with the increasing demands of their customers. We may have a 24/7 love affair with our smartphones but it is clear that in the future we will be sharing information and making payments via fitbands, cars, TVs and white goods, as the Internet of Things fuses the physical and digital worlds. For incumbent banks and insurers, the challenge will be to leverage the possibilities of this new hyper-connected world to embed themselves in their customers’ daily lives. They need to change the way operate, which includes how they market, engage and communicate with their customer base. This will be a key defense against the growing ranks of digital newcomers seeking to disrupt and dislodge incumbents through an array of innovative and smart new offers. However, too many are moving too slowly, either from an excess of caution or complacency. This report should serve as a
Tags : 
    
Pega

INDUSTRY 4.0: Are You Ready?

Published By: FusionOps     Published Date: Jun 27, 2016
The term Industry 4.0 presupposes the passing of three major shifts in how businesses approached manufacturing throughout modern history, tracing its roots as far back as the 19th century: Industry 1.0: The Industrial Revolution redefines human limitations by harnessing the power of water and steam. Industry 2.0: Electricity pushes people and machines even further as manufacturing grows in scale and scope. Industry 3.0: The modern computer opens the door for automation
Tags : 
    
FusionOps

A Blueprint for Optimizing IT Infrastructure and Operations

Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
"This blueprint, based on HPE Pointnext experts’ real-world experience, is a “How To” guide that captures the business and technology challenges driving software defined infrastructure (SDI) and provides actionable steps for overcoming them. Gain tips to transition to hybrid IT and take advantage of software-defined architectures for agile development and self-serve IT.
Tags : 
    
Hewlett Packard Enterprise

Anatomy of a Cyber Attack The Lifecycle of a Security Breach

Published By: Oracle Linux     Published Date: Oct 24, 2018
Security is everyone’s job today, from consumers, to system administrators, to executives. If you are doing business, you need to elevate the priority of security across your organization and data center. Over the years, cybercriminals have gotten more advanced and better funded. They are entire teams of highly trained hackers, and they have built it into a very profitable business. Cybercrime is big business. In many cases, states have built their own cyberattack teams. These teams are no less important to their state strategies than their army or navy. And just like these cyber-attack teams are prepared to attack anyone, you too must be prepared to defend against anyone. Whether you know it or not, you are in a cyber war. You need to be prepared.
Tags : 
    
Oracle Linux

Making the Right Decision - Build or Buy DPI?

Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity

Foundation for Open Cloud Infrastructure

Published By: Oracle APAC     Published Date: May 24, 2018
Enterprises are rapidly embracing cloud services to speed innovation and drive cost savings. The most innovative IT organizations in these enterprises are shifting to software-defined “virtual data centers” that connect, aggregate, and configure public and private computing resources in unprecedented ways. These IT organizations use open private cloud infrastructure within a corporate data center or at a hosting site (managed cloud services) in conjunction with public cloud services to meet all their business requirements.
Tags : 
    
Oracle APAC

RUNNING ONLINE SERVICES AT RIOT: PART III

Published By: Juniper Networks     Published Date: Oct 25, 2017
Hey all, this is David Press and Doug Lardo, two engineers working on improving the data center networking that enables online services at Riot. This article is the third part in a series on exactly that topic, which begins with an overview from Jonathan of a platform we called rCluster. This time we’ll be discussing our approach to Software Defined Networking (SDN), how we integrate SDN with Docker, and the new infrastructure paradigms that this combination has unlocked for us. If you’re curious about how SDN can transform infrastructure, how to empower developers to obtain and secure networking resources via an API, or how to get out of purchasing larger and larger specialized networking appliances, this article is for you.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks

Next Generation Secure Web Gateway: The Cornerstone of Your Security Architecture

Published By: Symantec     Published Date: Jul 09, 2017
This paper provides a brief recap of the functionality provided by web proxies, why proxy architecture is still a vital building block for a comprehensive web defense, and how web proxies can work with other solutions such as next-gen firewall (NGFW) to deepen the organization’s defenses against advanced web-based threats.
Tags : 
cybercrime, swg, secure web gateway, firewall, security., threat and vulnerability management
    
Symantec

Federal Telepresence: Dispelling the Myths

Published By: LifeSize, a division of Logitech     Published Date: Aug 25, 2011
The top five myths of federal telepresence, along with the truth
Tags : 
lifesize, video conferencing, multimedia presentation, productivity, high definition
    
LifeSize, a division of Logitech

Managing a Mobile Workforce: Growth of Telework

Published By: LifeSize, a division of Logitech     Published Date: Aug 25, 2011
This briefing from the Government Business Council (GBC) describes the growth of telework and how agencies can identify key indicators for success...
Tags : 
lifesize, video conferencing, multimedia presentation, productivity, high definition
    
LifeSize, a division of Logitech

Top 10 Questions US Federal Government Agencies Should Ask Before Purchasing Video Conferencing

Published By: LifeSize, a division of Logitech     Published Date: Aug 25, 2011
Learn more about how LifeSize is changing the game in the video space and what government agencies should be looking for when purchasing video confere
Tags : 
lifesize, video conferencing, multimedia presentation, productivity, high definition
    
LifeSize, a division of Logitech

A GameChanger - Transformation Through Technology - The Value of Video Conferencing

Published By: LifeSize, a division of Logitech     Published Date: Aug 25, 2011
This survey shows that technology has evolved in such a way that telework centers' function can translate to work station in employee's homes.
Tags : 
lifesize, video conferencing, multimedia presentation, productivity, high definition
    
LifeSize, a division of Logitech

Meaningful Use Guide for Radiology

Published By: Merge Healthcare     Published Date: Feb 11, 2012
This free "how to" guide will help you comply with the new law and earn your share of the $1.5 billion available incentives!! Download your FREE copy of the definitive guide for radiologists NOW!
Tags : 
merge, merge healthcare, radiology, radiologist, incentives, diagnostic, cdi, eligibility
    
Merge Healthcare

IDC Report: Architecting a Flexible Strategy for Securing Enterprise BYOD

Published By: ForeScout     Published Date: Mar 26, 2014
The report presents a tiered service approach to enterprise mobile security while exploring how NAC and MDM as complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures. The report also examines ForeScout's mobile security offering and presents relevant use cases.
Tags : 
forescout, cyberedge, cyberthreat, it security, byod, nac, mdm, reduce security
    
ForeScout

Network Troubleshooting - Cascade Helps Identify Issues In Seconds And Fix Them In Minutes

Published By: Riverbed     Published Date: Jul 17, 2013
This guide includes a demonstration on how you can accelerate troubleshooting, gain end-to-end visibility, and solve intermittent performance problems without having to recreate them; a detailed case study that shows how a large-scale federal government and defense consultant solved a months-long problem in just 15 minutes; and an on-demand webinar that introduces you to Cascade Shark and Cascade Pilot.
Tags : 
network, troubleshooting, speed of thought, performance, network, bandwidth management, infrastructure, local area networking
    
Riverbed

2016 EMEA & APAC Ethics & Compliance Whistleblowing Hotline Benchmark Report

Published By: NAVEX Global     Published Date: Oct 18, 2016
This report is an excellent starting point for organisations committed to benchmarking and improving programme effectiveness. To leverage more advanced benchmarks, NAVEX Global offers custom benchmarking options as part of our Integrity DiagnosticsTM and Integrity MetricsTM report service. These services allow you to get apples-to-apples benchmarking for your organisation based on your industry, company size, or other defining factors.
Tags : 
    
NAVEX Global

Types of Prefabricated Modular Data Centers

Published By: Schneider Electric     Published Date: Oct 17, 2016
This paper proposes standard terminology for categorizing the types of prefabricated modular data centers, defines and compares their key attributes, and provides a framework for choosing the best approach(es) based on business requirements.
Tags : 
    
Schneider Electric

Tipi di Data Center modulari prefabbricati

Published By: Schneider Electric     Published Date: Oct 17, 2016
Questo white paper propone una terminologia standard per classificare i tipi di Data Center modulari prefabbricati, ne definisce e confronta le principali caratteristiche e fornisce una metodologia per adottare gli approcci più adatti in base ai requisiti
Tags : 
    
Schneider Electric

The Hitchhiker's Guide to the Software-Defined Data Center

Published By: Avaya     Published Date: Jan 20, 2015
The Hitchhiker's Guide to the Software-Defined Data Center is a Z K Research paper aiming to provide you with the necessary information to make an informed choice on choosing the right SDDC solution provider for your business.
Tags : 
software defined data center, sddc, a guide to sddc, sddc solution providers, the network requirements of an sddc, avaya sddc solutions, data management, business management
    
Avaya

The Hitchhiker's Guide to the Software-Defined Data Center

Published By: Avaya     Published Date: Jan 28, 2015
The Hitchhiker's Guide to the Software-Defined Data Center is a Z K Research paper aiming to provide you with the necessary information to make an informed choice on choosing the right SDDC solution provider for your business.
Tags : 
software defined data center, sddc, a guide to sddc, sddc solution providers, the network requirements of an sddc, avaya sddc solutions, business management, data center design and management
    
Avaya

Redefine Windows 10 Management

Published By: VMware AirWatch     Published Date: Jun 13, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
best practices, business optimization, business management, enterprise management, business intelligence, business process automation
    
VMware AirWatch

Redefine Windows 10 Management - ITALY

Published By: VMware AirWatch     Published Date: Jul 21, 2016
Windows 10, a mobile and cloud-ready operating system (OS), is poised to significantly impact on organizations' end user computing (EUC) strategy, with a unified platform for building apps and extending the organization's core processes to end users using any Windows 10-powered device. However, enterprise-wide execution of this business mobility vision comes with its own set of challenges. Read this white paper to learn how a unified endpoint management solution can enable organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enablers.
Tags : 
technology, windows, data, cloud, mobile, cloud computing, applications, enterprise
    
VMware AirWatch
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.