hi def

Results 276 - 300 of 1099Sort Results By: Published Date | Title | Company Name

On-Demand Webinar: Threats on the Inside

Published By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
    
Mimecast

Perimeter-only IT security is over

Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
The increase in mobile devices and cloud applications has changed everything, from where we work, to how we communicate, collaborate, and store information. A new approach to security is needed. The cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply how business is done. The availability of mobile devices and cloud services has redefined how and where people work. Applications and servers are moving to the cloud faster than ever to take advantage of cost savings, scalability, and accessibility. The age of perimeter-only security is over. Find out more today about how Cisco can help.
Tags : 
    
Cisco Umbrella EMEA

White paper: Why a DNS layer matters - 30 minutes to a more secure enterprise

Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Why Cisco Umbrella is the simplest decision you can make to improve your company’s security. You have to make some serious security decisions when you’re an IT leader. That’s because both the volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses alone are no longer adequate. More effective blocking of attackers is particularly important because under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, firewalls, and sandboxing alone. Umbrella is a proven service provider whose security services are completely nondisruptive. Download this whitepaper to find out more.
Tags : 
    
Cisco Umbrella EMEA

Ransomware Defense For Dummies

Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
The rise of ransomware over the past few years is an ever-growing problem that has quickly become an extremely lucrative criminal enterprise. Targeted organizations often believe that paying the ransom is the most cost-effective way to get their data back — and, unfortunately, this may also be the reality. The problem is that every single business that pays to recover their files is directly funding the development of the next generation of ransomware. As a result, ransomware is evolving at an alarming rate with new and more sophisticated variants. This makes defending your organization's data against ransomware more critical than ever. But where do you start? Lots of questions come to mind. We've got the answers.
Tags : 
    
Cisco Umbrella EMEA

30 Minutes to a more secure enterprise

Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Why Cisco Umbrella is the simplest decision you can make to improve your company’s security. You have to make some serious security decisions when you’re an IT leader. That’s because both the volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses alone are no longer adequate. More efective blocking of attackers is particularly important because under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, frewalls, and sandboxing alone. A mere 30 minutes from now, any business can be more secure than it was before. That’s the simple reality of DNS-layer security.
Tags : 
    
Cisco Umbrella EMEA

Guide: Designing and operating supply chains for a digital world

Published By: KPMG     Published Date: Jun 10, 2019
Whether you want to optimise existing processes or transform entire operations, find practical advice on building digital solutions into your supply chain. Read this guide to find out • why defining your performance ambition must be the first step • how to draw up a digital roadmap • how deploying digital solutions will impact your workforce • what partners you will need to realise your vision • practical examples from real companies.
Tags : 
    
KPMG

Seven ways to reduce waste and accelerate software delivery

Published By: IBM     Published Date: Dec 29, 2015
This paper will explore best practices for identifying and eliminating seven types of waste: Waiting, handoffs and task switching, motion, extra processes, extra features, partially completed work and defects.
Tags : 
ibm, software delivery, task switching, eliminate waste, defect, software development, it management
    
IBM

Consideration for the Cloud: The process every Enterprise should think through

Published By: Rackspace     Published Date: Jan 09, 2012
This whitepaper discusses the IT challenges enterprises face and how the Cloud can help overcome those challenges. It then defines different Cloud configurations and provides guidance on enterprise decision-making regarding Cloud applications and platforms.
Tags : 
rackspace, technology, cloud computing, enterprise applications, data center, application integration, application performance management, enterprise resource planning
    
Rackspace

The IoT Imperative in Public Services: Government and Healthcare

Published By: SAP     Published Date: Nov 22, 2017
To keep up with sweeping global economic and societal changes, public services organizations are undergoing significant technology-driven transformation. Aging populations, rapid urbanization, political instability, concerns about sustainability and resiliency, and changing worker and resident expectations are driving public services organizations to radically improve operations and service delivery. At the core of this transformation is the ability to collect and process vast amounts of data to help to improve outcomes and services. One way to generate this data is through the Internet of Things (IoT) — which IDC defines as a network of networks of uniquely identifiable endpoints or “things” that communicate without human interaction using IP connectivity. The IoT is a transformational technology that can reshape the public sector, enabling improved outcomes and new services such as remote patient monitoring, advanced traffic solutions and predictive policing.
Tags : 
global, economic, societal, technology, driven, transformation, political
    
SAP

The IoT Imperative for Discrete Manufacturers: Automotive, Aerospace and Defense

Published By: SAP     Published Date: Nov 22, 2017
In today’s market, discrete manufacturers must stay focused on traditional objectives — increasing uptime and throughput in the plant and closely managing costs throughout their operations. At the same time, they must also create and offer more integrated products and services and even new business models to enhance the customer experience. These new offerings incorporate increasing amounts of technology — including Internet of Things. Indeed, by 2018, nearly one-third of industry leaders will be disrupted by competitors that are digitally-enabled. For manufacturers, this IDC white paper examines the current and future Internet of Things (IoT) imperative for the following discrete manufacturing industries: automotive, aerospace and defense, high tech, and industrial machinery. We highlight IoT-enabled scenarios — those possible both now and in an Industry 4.0 future with smart manufacturing.
Tags : 
market, traditional objectives, uptime, plant, managing, costs, operations, offerings
    
SAP

Delivering Success in Public Infrastructure Projects

Published By: Oracle     Published Date: Nov 03, 2016
This paper explains how EPPM helps you define the future, how you will deliver, and how you will make decisions to best serve the needs of effective project management at every step of the way.
Tags : 
    
Oracle

Hyperconverged Infrastructure 101: How to Get Started

Published By: VMware     Published Date: Jun 21, 2019
Prime your business for growth with a software-defined approach. The current business-enterprise climate demands robust connectivity and delivery in services. As IT executives continue to invest in integrated infrastructure, companies that remain committed to hardware-centric infrastructure are being left behind and subsequently are exposing their enterprises to risk and loss. Liabilities include time wastage and financial costs in the management and maintenance of legacy infrastructure, creating a deficit in executives’ energy when it comes to innovation and future planning. VMware’s Hyperconverged Infrastructure (HCI) is a malleable, sophisticated solution which facilitates the vital transition from physical to virtualized storage solutions. HCI is the foundation for the Software-Defined Data Center (SDDC) destined for leading enterprise operations.
Tags : 
    
VMware

Why Organizations are Moving from Traditional Architecture Hyper-Converged

Published By: VMware     Published Date: Jun 28, 2019
With the benefits quickly stacking up, it’s easy to understand why Gartner stated HCI (Hyper-Converged Infrastructure) as one of the hottest trends in data centre infrastructure. HCI is intended to reduce infrastructure complexity and cost, whilst enhancing scalability, agility and operational efficiency. This consolidated infrastructure enables organizations to leverage the software layer by using low cost commodity hardware, while reducing concerns around vendor lock-in, to form a seamless software- defined IT infrastructure environment well suited to today’s IT challenges. Simple to use and manage, without specialists and more cost-effective than most traditional solutions, it’s easy to understand why more organisations are making the move from traditional architecture to Hyper-Converged Infrastructure. Submit the form to view the infograph to discover the benefits and whether this solution is right for you.
Tags : 
    
VMware

The data center impact of cloud, analytics, mobile, social and security

Published By: IBM     Published Date: Jun 16, 2015
An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.
Tags : 
enterprise infrastructure, big data, mobility, data center, it infrastructure, it security technologies, virtualizing infrastructure, converging technologies
    
IBM

Can We Say Next-Gen Yet? State Of Endpoint Security - SANS Report

Published By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM

Combatting Advanced Threats With Endpoint Security Intelligence

Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM

IBM i2 Enterprise Insight Analysis for Cyber Intelligence

Published By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Today’s cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM® i2® Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : 
ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
    
IBM

Digital Remote Monitoring: How it changes data center operations and maintenance

Published By: Schneider Electric     Published Date: Apr 20, 2018
This paper explains how seven trends are defining monitoring service requirements and how this will lead to improvements in data center operations and maintenance.
Tags : 
digital remote monitoring, big data, machine learning, data center
    
Schneider Electric

Converged Infrastructure and Storage with ScaleIO

Published By: EMC Corporation     Published Date: Oct 01, 2014
With ScaleIO you can easily deploy a flexible, scalable and high performance software defined Server SAN - delivering elastic, converged storage to your business on a ‘pay as you grow’ model. This converged infrastructure delivers hyper scalability and increased performance levels whilst reducing storage TCO.
Tags : 
storage, scalable performance software, converged storage, elastic storage, increase storage performance, storage tco
    
EMC Corporation

2011 Mid-Year Security Report

Published By: Blue Coat Systems     Published Date: Jul 07, 2011
This report examines the interactions of malware ecosystems, including user behavior, malware hosting sites and delivery networks and offers effective strategies to build better defenses.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
Blue Coat Systems

Five Steps to Better People Analytics

Published By: Workday     Published Date: Mar 02, 2018
Artificial intelligence (AI) and machine learning are redefining business analytics. But for HR, use cases can be much more complex. Learn five key steps to build a strong foundation for answering HCM questions today and position yourself to use AI in HR going forward.
Tags : 
artificial intelligence, hcm, five steps
    
Workday

Best Practices In B2B Program Effectiveness

Published By: Bulldog Solutions     Published Date: May 20, 2013
This executive overview focuses on one of these drivers--program effectiveness--defined by leading marketers as programs that drive a high level of conversion and prospect engagement throughout the buyer's journey. in this executive overview, we'll take a look at the current buyer landscape, and then at five five best practice areas that need to be optimized in order for your programs to reach their full potential.
Tags : 
program effectiveness, b2b, b2b buyers, message alignment, buyer insights, audience acquisition, performance monitoring, campaign
    
Bulldog Solutions

Solving the Information Security Crisis in Higher Education

Published By: McAfee     Published Date: Dec 04, 2014
The attacks continue. The breaches occur. Penalties are assessed. While most universities manage to keep pace with the latest digital trends, they have been far less timely when it comes defending their networks and sensitive data against the latest targeted attacks and threats. This lack of protection is evident as recent headlines expose costly data breaches of student records and research, state and federal compliance violations, and a raft of other privacy and security issues that put students, alumni, staff, and the institutions themselves at considerable risk.
Tags : 
mcafee, security crisis, higher education, breaches, digital trend, privacy, security issues, sensitive data
    
McAfee

Duqu threat actor: The sequel

Published By: Vectra Networks     Published Date: Aug 03, 2015
Recently, Kasperky Labs disclosed that it was the victim of a sophisticated cyber attack, which they have named Duqu 2.0. The team at Kaspersky Labs has published a detailed analysis of Duqu 2.0 and it’s definitely worth a read.
Tags : 
cyber attack, protection, security, network, business continuity, compliance, firewalls, productivity
    
Vectra Networks

Five Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware AirWatch     Published Date: Feb 21, 2017
This paper provides guidance for selecting and purchasing a digital workspace solution to enable your totally mobile workforce. Five buying decision considerations that directly impact the success of your mobile workspace strategy are discussed in detail. Download this whitepaper to access recommendations for the most critical specifications to help you in defining an effective digital workspace strategy for your environment.
Tags : 
    
VMware AirWatch
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.