hi def

Results 126 - 150 of 1109Sort Results By: Published Date | Title | Company Name

Balancing Security Investments - The Challenge of the Modern UK Enterprise

Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017

Becoming a Managed Security Service Provider: Why a layered approach to security is essential

Published By: LogicNow     Published Date: Mar 10, 2016
Focusing your managed services business on cybersecurity creates several opportunities to increase margins; most significantly, by implementing layers of security at client sites you can reduce costly security-related issues. In this whitepaper we highlight the reasons why an effective cyberdefense strategy should involve multiple layers of technology and detail why customer disruption is a revenue killer in world of the managed service provider (MSP).
Tags : 
managed services, cyber security, logicnow, cyberdefense, security, best practices, business activity monitoring, risk management
    
LogicNow

Becoming a Social Business - Social Business Enterprise Strategy Accelerator

Published By: IBM     Published Date: Sep 30, 2013
A transformation is taking place in how people interact and how relationships form and develop and this is changing the way we socialise, the way we work and the way we engage with our customers. The new normal is that customers are leading the conversations that define your brand, competitors are crowd-sourcing ideas to bring new offerings to market and employees are using social media in all facets of their lives, including work. This shift in technology and human behaviour presents an opportunity for organisations to improve everything from reinventing customer relationships to how work gets done. A Social Business embraces networks of people to create business value and activates networks of people that apply relevant content and expertise to improve and accelerate core and ad hoc processes, delivering unprecedented return for the time invested.
Tags : 
ibm, ibm global business services, social media, social business, networking, enterprise applications, business technology
    
IBM

Becoming a Social Business: Social Media Strategy Accelerator

Published By: IBM     Published Date: Jul 07, 2014
A transformation is taking place in how people interact and how relationships form and develop and this is changing the way we socialise, the way we work and the way we engage with our customers. The new normal is that customers are leading the conversations that define your brand, competitors are crowd-sourcing ideas to bring new offerings to market and employees are using social media in all facets of their lives, including work. This shift in technology and human behaviour presents an opportunity for organisations to improve everything from reinventing customer relationships to how work gets done. A Social Business embraces networks of people to create business value and activates networks of people that apply relevant content and expertise to improve and accelerate core and ad hoc processes, delivering unprecedented return for the time invested.
Tags : 
ibm, social business, smarter workforce, social media, interact, technology, customer relationships, business technology
    
IBM

Bedside Software-Defined Networking and the Evolution of Healthcare IT

Published By: Avaya     Published Date: Jun 15, 2016
Solving critical healthcare IT challenges with software-defined networkingDigitization is changing healthcare forever as organizations look to deliver better quality services, improve patient safety and provide the highest levels of security. Healthcare IT leaders should look to leverage a software-defined network. Read the latest from ZK Research to learn more.
Tags : 
healthcare, information technology, networking, security, access control, authentication, network security appliance, productivity
    
Avaya

Beer brewing gets smart with the Internet of Things

Published By: Dassault Systemes SolidWorks Corp.     Published Date: Mar 27, 2018
The Internet of Things (IoT) has paved the way for a number of innovations that rely on connectivity between devices and the internet. Now, this interconnectivity is impacting the beer brewing process, providing brewers with a consistent, reliable, data-driven experience — and serving customers with a tasty, better brew. This article discusses how the IoT and smart, connected brewing appliances are redefining the industry landscape one beer at a time.
Tags : 
beer, brewing, internet, things, iot, optimization
    
Dassault Systemes SolidWorks Corp.

Beginner’s Guide to Ransomware Prevention & Detection

Published By: AlienVault     Published Date: Oct 20, 2017
If you haven’t had first-hand experience with ransomware in the past, chances are you’ve heard of one of the many ransomware attacks that have recently caught worldwide attention. According to a June 2016 survey from Osterman Research, nearly one in two participants indicated that their organization suffered at least one ransomware attack in the last year. In this whitepaper, we’ll cover ransomware basics and provide best practices for ransomware prevention and detection. You’ll learn: • What ransomware is, how it works, and who the attackers are • 10 best practices you can employ now to detect and prevent ransomware • How you can quickly detect ransomware and other threats with AlienVault USM Download this whitepaper now to learn more about ransomware, best practices for defense, and how AlienVault USM helps you detect ransomware quickly with a unified approach to security.
Tags : 
    
AlienVault

Best Practices for Building an Online eLibrary

Published By: Integration New Media     Published Date: Apr 01, 2008
Librarians looking to build electronic libraries face numerous challenges. This new white paper by Integration New Media provides a summary of best practices for building an eLibrary. From defining your audience and content requirements, through to choosing a technology solution that makes sense for your use cases, this paper will provide a strong checklist of items to consider. The paper also looks at the three types of users and the key elements of designing the user experience for your eLibrary.
Tags : 
inm, integration new media, online library, elibrary, best practices, web development, web services, web service management
    
Integration New Media

Best Practices for Oversubscription of CPU, Memory and Storage in vSphere Virtual Environments

Published By: Dell     Published Date: Aug 16, 2013
"Virtualization has changed the data center dynamic from static to fluid. While workloads used to be confined to the hardware on which they were installed, workloads today flow from host to host based on administrator-defined rules, as well as in reaction to changes in the host environment. The fluidic nature of the new data center has brought challenges to resource allocation; find out how your organization can stay ahead of the curve. Read the White Paper"
Tags : 
best practices, cpu, memory, storage, vsphere, virtual, storage management, database security, virtualization, infrastructure
    
Dell

Best Practices for Using Second- and Third-Party Data

Published By: Adobe     Published Date: Sep 23, 2019
Learn best practices for taking inventory of first-party data, and using second- and third-party data to fulfill programmatic campaigns and achieve digital marketing goals. • Define your team’s goals for customer data. • Take inventory of your first-party data. • Explore use cases for second- and third-party data. • Finding the best data providers. • Combine your first, second, and third-party data. • Case Study: MGM drives programmatic campaign results with third-party data. Business struggle to gain a holistic customer view — the skills to identify actionable insights from multichannel data are in short supply. If they could gain a holistic view of customer attributes and behaviors, they could make sure they get the right content at the right time.
Tags : 
    
Adobe

Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance

Published By: AirDefense     Published Date: Apr 24, 2007
This white paper will explore what security challenges wireless networks present, suggest best practices to ensure Wireless LAN security, and demonstrate how AirDefense Enterprise, a Wireless Intrusion Detection and Prevention System, can help you define, monitor and enforce your wireless security policy.
Tags : 
best practices, sox, sarbanes-oxley, sarbanes oxley, sarbox, compliance, wireless security, wlan, wlan security, ids, intrusion prevention, intrusion detection, security policy, wireless security policy, airdefense, security policies, sarbanes oxley compliance
    
AirDefense

Best Practices Guide for Premium Differentials and Surcharges

Published By: Alere Wellbeing     Published Date: Sep 26, 2011
Alere Wellbeing evaluation and client feedback have shown that incentives are a successful part of a comprehensive tobacco control strategy. This brief defines what premium differentials and surcharges are and provides best practices from our clients.
Tags : 
alere, tobacco control strategy, free & clear evaluation, premium differential, surcharge, tobacco cessation program, quit for life program®, productivity, roi
    
Alere Wellbeing

Best Practices In B2B Program Effectiveness

Published By: Bulldog Solutions     Published Date: May 20, 2013
This executive overview focuses on one of these drivers--program effectiveness--defined by leading marketers as programs that drive a high level of conversion and prospect engagement throughout the buyer's journey. in this executive overview, we'll take a look at the current buyer landscape, and then at five five best practice areas that need to be optimized in order for your programs to reach their full potential.
Tags : 
program effectiveness, b2b, b2b buyers, message alignment, buyer insights, audience acquisition, performance monitoring, campaign, campaign effectiveness
    
Bulldog Solutions

Best Practices to Grow Your Business

Published By: Salesforce     Published Date: Dec 02, 2015
When Salesforce CEO Marc Benioff co-founded the cloud computing company back in 1999, one of the first things he did was define his management process. As he shares in his book Beyond the Cloud, Benioff wanted to put into words what his focus was and then clearly communicate it to the rest of the business. The result was the V2MOM (pronounced “V2 mom”), an acronym that stands for vision, values, methods, obstacles, and measures. Benioff says this system has helped keep everyone at the fast-growing company on the same page over the years. Below are the basic steps of Benioff’s V2MOM system. You can use them to start defining your management process.
Tags : 
    
Salesforce

Better High Performance Computing through IBM’s Software Defined Infrastructure

Published By: IBM     Published Date: Nov 07, 2016
Is your software defined infrastructure (SDI) for high performance computing (HPC) and big data analytics meeting the needs of your growing business? Would you like to know how to justify the switching cost from unsupported open source software to a commercial grade SDI that ensures your resources are more effectively used cutting down time to market? This webcast will give you an overview of the true costs of building out and managing a HPC or Big Data environment and how commercial grade SDI software from IBM can provide a significant return on investment.
Tags : 
ibm, platform computing, software defined infrastructure, enterprise applications, business technology
    
IBM

Better Test Data = Better Applications

Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
Companies struggle to find the right test data when testing applications which leads to bottlenecks, defects and constant delays. There is a better way and we want to show you how: Join us for this webcast to learn: - How Test Data Manager finds, builds, protects and delivers test data fast! - How to get your testing teams moving towards self sufficiency with test data Get your questions answered. Come away happy! Recorded Aug 20 2018 60 mins Presented by Prashant Pandey, CA Technologies
Tags : 
    
CA Technologies EMEA

Better Test Data = Better Applications

Published By: CA Technologies EMEA     Published Date: Sep 10, 2018
Companies struggle to find the right test data when testing applications which leads to bottlenecks, defects and constant delays. There is a better way and we want to show you how: Join us for this webcast to learn: - How Test Data Manager finds, builds, protects and delivers test data fast! - How to get your testing teams moving towards self sufficiency with test data Get your questions answered. Come away happy! Recorded Aug 20 2018 60 mins Presented by Prashant Pandey, CA Technologies
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA

Beyond Application Visibility and Control: What an NGFW Must Be

Published By: Cisco     Published Date: Jul 08, 2016
Modern networks and their components are constantly evolving and traditional next-generation firewalls are not able to provide the level of protection organizations require. In this paper you will learn: • Why typical next-generation firewalls that focus primarily on application visibility and control offer an incomplete approach to threat defense • What organizations need to defeat advanced threats in a resource-constrained environment • What benefits you can gain with the Cisco Firepower™ Next-Generation Firewall (NGFW), the industry’s first fully integrated, threat-focused NGFW
Tags : 
    
Cisco

Beyond Prevention: Cisco’s Next Generation Endpoint Security

Published By: Cisco     Published Date: Dec 19, 2016
Today’s threat landscape has forced us, once again, to evolve how we think about and deliver effective security to protect endpoints (PCs, Macs, Linux, mobile devices, etc). Malware today is either on an endpoint or it’s headed there. Advanced malware is dynamic, can compromise environments from an array of attack vectors, take endless form factors, launch attacks over time, and can quickly exfiltrate data from endpoints. Such malware, including polymorphic and environmentally aware malware, is very good at masking itself and evading traditional security tools, which can lead to a breach. As a result, it’s no longer a question of “if” malware can penetrate defenses and get onto endpoints, it’s a question of “when”.
Tags : 
    
Cisco

Beyond the Next Generation: Putting Advanced Network Security To Work

Published By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : 
data security, ibm, converged network security, security risk, networking, security, it management, knowledge management, data management
    
IBM

Big Data Integration and Analytics for Cyber Security

Published By: Teradata     Published Date: Jul 07, 2015
As cyber security challenges continue to grow, new threats are expanding exponentially and with greater sophistication—rendering conventional cyber security defense tactics insufficient. Today’s cyber threats require predictive, multifaceted strategies for analyzing and gaining powerful insights into solutions for mitigating, and putting an end to, the havoc they wreak.
Tags : 
    
Teradata

Big Data vs. Real-Time Data

Published By: Datastax     Published Date: Aug 23, 2017
About 10 years ago big data was quickly becoming the next big thing. It surged in popularity, swooning into the tech world's collective consciousness and spawning endless start-ups, thought pieces, and investment funding, and big data's rise in the startup world does not seem to be slowing down. But something's been happening lately: big data projects have been failing, or have been sitting on a shelf somewhere and not delivering on their promises. Why? To answer this question, we need to look at big data's defining characteristic - or make that characteristics, plural - or what is commonly known as 'the 3Vs": volume, variety and velocity.
Tags : 
datastax, big data, funding
    
Datastax

Big Data: Unlocking Strategic Dimensions

Published By: Dell EMC     Published Date: Oct 08, 2015
In this article, learn how Dell working with Intel® helps IT leaders overcome the challenges of IT and business alignment, resource constraints and siloed environments through a comprehensive big data portfolio based on choice and flexibility, redefined economics and connected intelligence.
Tags : 
    
Dell EMC

Blockchain for mobility services

Published By: IBM     Published Date: Apr 18, 2018
Driving changes Car-sharing, ride-sharing and ride-hailing aren’t new. Uber and other personal mobility services have redefined how people move from place to place. And now these services are beginning to redefine traditional car ownership itself. As people move from one vehicle to another, their personal information and preferences need to follow them, so the car they use feels like their own. Blockchain is defined as a shared, immutable ledger, and it can address many of the challenges that new types of personal mobility present.
Tags : 
ibm, blockchain, mobility
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.