hi def

Results 1101 - 1110 of 1110Sort Results By: Published Date | Title | Company Name

Your business is at risk from a spear-phishing attack. See how it will take place – step by step.

Published By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management
    
Mimecast

Your business is at risk from a spear-phishing attack. See how it will take place – step by step.

Published By: Mimecast     Published Date: Aug 19, 2015
A spear-phishing attack could bring your company to its knees – today. For all you know, you may already be under attack. That could result in a data breach that lands your company in the glare of the news cameras – and in hot water with your customers, partners and investors.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management
    
Mimecast

Your Complete Guide to Modern EPM

Published By: Oracle     Published Date: Sep 25, 2019
Research shows that legacy ERP 1.0 systems were not designed for usability and insight. More than three quarters of business leaders say their current ERP system doesn’t meet their requirements, let alone future plans 1. These systems lack modern best-practice capabilities needed to compete and grow. To enable today’s data-driven organization, the very foundation from which you are operating needs to be re-established; it needs to be “modernized”. Oracle’s goal is to help you navigate your own journey to modernization by sharing the knowledge we’ve gained working with many thousands of customers using both legacy and modern ERP systems. To that end, we’ve crafted this handbook outlining the fundamental characteristics that define modern ERP.
Tags : 
    
Oracle

Your Complete Guide to Modern Finance

Published By: Oracle     Published Date: Jul 31, 2017
For finance organizations, the challenge of keeping up with systemic change should be viewed as an opportunity to boldly leverage disruption rather than hunkering down in fear. Businesses that accept this challenge embrace new and leading technologies, standardize on best practices and invest in the next generation of financial software and their employees. This guide provides a clear path to modern finance that is well defined and ready to support your company’s success.
Tags : 
    
Oracle

Your Guide to Modernizing the Marketing Organization

Published By: SAS     Published Date: Apr 25, 2017
Are you a marketing leader on the path to modernizing your marketing organization? Are you a marketing analyst championing analytical transformation in your campaigns? If you answered yes to either question, this e-book is for you. It offers a practical account of how to create a new marketing culture that adds value through data and analytics. You’ll meet marketing leaders from Comerica, Lenovo, RCI, SAS and Visa – and read how they’re implementing analytics, redefining marketing strategies and transforming their cultures. By sharing their perspectives, we hope to provide a new set of best practices to guide your analytical transformation – and to help you reinvent your marketing organization for the digital age.
Tags : 
    
SAS

You’ve Been Breached – Now What? How to Respond to a Worst-Case Scenario

Published By: CrowdStrike     Published Date: May 10, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: • How to collect and preserve data after a breach so that critical forensic information can be retrieved • What sort of in
Tags : 
    
CrowdStrike

You’ve Been Breached – Now What? How to Respond to a Worst-Case Scenario

Published By: CrowdStrike     Published Date: Nov 28, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: How to collect and preserve data after a breach so that critical forensic information can be retrieved What sort of int
Tags : 
    
CrowdStrike

Zero Trust with John Kindervag

Published By: NetIQ     Published Date: Jul 27, 2011
In this on-demand webinar, John Kindervag, Senior Analyst at Forrester Research, defines "zero-trust architecture," outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture."
Tags : 
zero trust, netiq, advanced threats, apt prevention, cybercrime, incident response, network analysis and visibility, network forensics
    
NetIQ

ZK Research: Cisco’s Branch Infrastructure Powers the Hybrid WAN

Published By: Cisco     Published Date: Feb 23, 2016
Shifting from a software defined networking model is the first component of a hybrid WAN. See how a hybrid WAN is ideally suited for mobility and cloud models in the whitepaper from ZK Research. Read this design guide for detailed insights into how an Intelligent WAN can improve the way your branch network operates, from headquarters to your most remote location.
Tags : 
netwroking models, business practices, cloud models, networking, mobile computing, wireless communications, best practices, productivity
    
Cisco

ZK Research: Intent-Based Data Centers

Published By: Apstra     Published Date: Feb 21, 2019
The enterprise data center has undergone several major shifts since the introduction of computing as a business resource. Data centers have evolved from mainframes to client/server to virtual servers, and then to being “software defned,” and fnally to their current state of disaggregation. Today, we sit on the precipice of the next major data center transition—the evolution to an intent-based data center (IBDC) (Exhibit 1). Each transition saw the cost of computing decrease and the importance of the network increase, and each enabled organizations to boost the efciency of their data center operations and improve asset utilization—ultimately leading to a better experience for users
Tags : 
ibn, ibdc, data center infrastructure
    
Apstra
Start   Previous    31 32 33 34 35 36 37 38 39 40 41 42 43 44 45     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.