multi point

Results 76 - 100 of 120Sort Results By: Published Date | Title | Company Name

Busting the Myth of the Malware Silver Bullet - French

Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee

Busting the Myth of the Malware Silver Bullet - German

Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee

Busting the Myth of the Malware Silver Bullet - Japanese

Published By: McAfee     Published Date: Mar 31, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why Intel Security takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, malware protection, malware detection, correction technologies, security, cyberthreats, cyberthreat detection
    
McAfee

Building the Smarter Warehouse: Warehousing 2020

Published By: Zebra Technologies     Published Date: Aug 09, 2018
The exponential growth of omnichannel shopping and ever-burgeoning demand for faster merchandise deliveries is redefining the supply chain’s distribution of consumer products goods. A seminal shift in how shoppers increasingly buy via multiple touch points — online from desktop computers, mobile devices and in-store — has created the need for the “smarter” warehouse to serve today’s connected consumer. As retailers look to merge their brick-and-mortar and online operations to cut costs and boost efficiency, warehouse management systems must keep pace. For this report, Zebra Technologies analyzed the state of the warehousing marketplace among firms in the US and Canada with at least $15 million in annual revenues. The online survey asked IT and operations personnel in the manufacturing, retail, transportation and wholesale market segments to share their insights and business plans over the next five years, in light of a rapidly changing industry.
Tags : 
fulfillment, vision, study, technology, manufacturer
    
Zebra Technologies

5 Steps for Reducing Downtime

Published By: Marathon Technologies     Published Date: Sep 18, 2009
Many businesses struggle to guarantee application and data availability for Windows applications. They may protect the application from one type of outage (like a disk failure) while ignoring other risks. Or they can end up deploying multiple point solutions to handle different aspects of availability, increasing overall cost and complexity.
Tags : 
marathon, downtime, everrun, server, failure, outage, windows, sql
    
Marathon Technologies

Proven VPN WAN—Technology Design Guide

Published By: Cisco Systems     Published Date: Dec 23, 2013
Does your WAN provide sufficient performance and reliability for your remote-site users? In this guide, discover how to design a full-service network with secure, encrypted communications using Cisco Dynamic Multipoint VPN technology. Download Design Guide
Tags : 
vpn, wan, cisco, cisco validated designs, cvds, remote-site user performance, full-service network, encrypted communications
    
Cisco Systems

Grow Your IoT Security Business by Investing in Real-Time Discovery, Visibility and Control

Published By: Great Bay Software     Published Date: Jan 04, 2018
By 2020 Gartner estimates the proliferation of IoT with a market installed base of 20.4 billion endpoint devices, comprised of both "smart" and "dumb" devices, each leveraging multiple communication types. As each of these devices can become a target entry point for hackers, endpoint and network visibility is a top concern for CISOs responsible for security and risk management.
Tags : 
iot, iot security, iot endpoint security, gartner
    
Great Bay Software

Endpoint Protection - Multilayer Security from Intel and McAfee

Published By: HP & Intel     Published Date: Sep 18, 2012
McAfee and Intel create a multilayer endpoint protection against malware, helping protect business PCs against intrusions from security breaches
Tags : 
intel, security, cloud computing, malware, data protection, database security
    
HP & Intel

VolitionRx Takes on Cybersecurity

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
VolitionRx Limited is a multi-national company which develops new ways to detect cancer. Their ideal product needed to be reliable, efficient, and easily manageable for their modestly-sized IT department. Additionally, the solution had to be readily deployable to their operations in four separate countries. According to Daniel Halter, Group IT Manager at Volition, traditional antivirus vendors were “offering the same old solution only slightly jazzier. The model they were offering, although new, was and is the same thing that has been around for a while.” Daniel also stated that Volition had little time to determine which vendors are “selling the truth and which ones are selling the dreams.” Seeking an ideal match, Daniel reached out to Khipu Networks for their security recommendation. Khipu Networks suggested CylancePROTECT®, Cylance’s artificial intelligence endpoint security product. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
volitionrx, cyber, security, data
    
BlackBerry Cylance

Ransomware Prevention Is Possible: Fighting Today’s Extortive Threats

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
While advanced persistent threats and malware still plague some victims, it is ransomware that is still gaining real traction in today’s cybersecurity landscape. The EternalBlue flaw that took over the news in May 2017 rose to popularity as a result of its inclusion in the data leaked by The Shadow Brokers. Utilized in multiple attacks alongside the also-released DoublePulsar exploit, including the installation of cryptocurrency miner Adylkuzz, the exploits are just the tip of the cyberwarfare tools The Shadow Brokers are claiming to have in their arsenal. The latest EternalBlue and DoublePulsar based attacks, delivering the WannaCry Ransomware, have so far been hugely damaging to healthcare organizations while also impacting over 200,000 endpoints in 150 countries. WannaCry-WanaCryptor 2.0 was coupled with the EternalBlue exploit, allowing it to automatically propagate itself to vulnerable machines across the Internet. While not technically advanced, the use of EternalBlue and DoubleP
Tags : 
ransomware, threats, cyber, security, data
    
BlackBerry Cylance

Emerging Opportunities in B2B e-Commerce-Part Two: How to Capitalize on B2B

Published By: Rainmaker Systems Inc.     Published Date: Jan 13, 2012
In B2B e-commerce the mechanics are complex, requiring frequent iterative adjustments as technical specifications, end-user goals, and multiple stakeholders participate in the process. B2B e-commerce does not advance in a straight line, but as a web of inter-connected decision points.
Tags : 
rainmaker, marketing, b2b, e-commerce, crm, end-user goals, customer experience
    
Rainmaker Systems Inc.

Self-Tuning Disk Drives Eliminate Performance Bottlenecks and Heighten ROI

Published By: Diskeeper Corporation     Published Date: Jun 08, 2007
The size of today’s hard drives boggles the mind. Coupled with this surge in disk capacity is an explosion in file sizes. And multi-MB PowerPoints, MP3s and PDFs litter the hard drive. The problem is that drive I/O speed has not kept up the pace. As a result, it has developed into a serious bottleneck in system performance.
Tags : 
defrag, defragment, defragmentation, pc performance, disk performance, system performance, pc maintenance, diskeeper
    
Diskeeper Corporation

Forrester Predictions 2014: Marketing Leaders

Published By: Adobe     Published Date: May 15, 2014
Adobe strives to help marketers not only collect and analyze data, but to turn data into relevant actions that reach customers in personal ways. Forrester has gathered the trends of big data and rich data to give you a sense of how they'll be used differently in 2014.
Tags : 
adobe, forrester, customer insights, big data, social media, mobile marketing, cross channel marketing, multi-touchpoint
    
Adobe

A Smarter Way to Integrate with SharePoint

Published By: K2     Published Date: Jan 07, 2016
We’re experiencing a data explosion. By 2020 the data we create and copy annually will reach 44 trillion gigabytes.1 As this data disseminates into the workplace, companies add hardware and software systems to store, protect and manage it all. While data can help solve business problems, data is most helpful when it reaches those who can use it. Companies need to build Microsoft SharePoint apps that integrate with other line-of-business (LOB) systems so users can take full advantage of this data explosion. But the reality of creating apps that integrate data across organizational systems presents an intimidating challenge. To integrate multiple isolated data sources into an application that transforms data into useful information requires technical expertise, coding and ongoing maintenance. Integration also raises security and governance concerns. So it’s no surprise that only 47 percent of SharePoint users have connected their SharePoint apps with other systems.2 As a result, nearly
Tags : 
microsoft sharepoint, data integration, security, sharepoint solutions, networking, it management, knowledge management
    
K2

How to Integrate Microsoft Lync (And Skype for Business) and Non-Lync Video Experiences

Published By: Polycom     Published Date: Sep 15, 2015
A true integrated video collaboration solution should be able to connect disparate environments and provide a high quality and simple experience for users. Such a unified solution, when integrated into an intuitive, foolproof workflow for multipoint video collaboration, has the potential to transform the culture of video collaboration and realize highly leveraged end-to end group collaboration.
Tags : 
byod, collaboration, communicaitons, conferencing, enterprise, lync, microsoft, polycom
    
Polycom

Forrester Market Overview: Digital Customer Experience Delivery Platforms

Published By: IBM     Published Date: Jul 07, 2014
Forrester states that businesses today struggle to understand and leverage the tools necessary to create and manage unified, multichannel Digital Customer Experiences across multiple touchpoints including, web and mobile experiences for customer transactions and mobile applications. Read this report to understand how IBM's Digital Experience software is delivering solutions for the emerging Digital Customer Experience platform and integrating best-of-breed components into software offerings that manage multiple facets of the Digital Customer Experience.
Tags : 
ibm, forrester, digital, customer experience, platforms, integration, business technology
    
IBM

The Business Value of Integrating the Contact Center Within Your Omni-Channel Strategy

Published By: IBM     Published Date: Oct 06, 2014
This Aberdeen ebook outlines the business value and best practices of integrating the contact center with omni-channel programs in order to deliver a seamless customer experience across multiple touch-points.
Tags : 
omni-channel strategy, contact center integration, customer experience
    
IBM

From Transactions to Relationships: Connecting with the Transitioning Shopper

Published By: IBM     Published Date: Aug 06, 2014
While the store remains the cornerstone of the shopping experience, our survey of more than 26,000 customers across a range of grocery and non-grocery retail categories, reveals that today’s empowered consumers are increasingly comfortable purchasing through multiple retail channels. The much discussed trend of "Showrooming," threatens to fragment hard-earned customer loyalty. Retailers can convert the threat to opportunity by making their customers "sticky" through a seamless omni-channel approach that provides consistency, convenience and a superior shopping experience across every consumer touch point.
Tags : 
ibm, retail, transactions, relationships, shopper, store, retail channels
    
IBM

Next-Generation AIX and i5/OS Disaster Recovery and Availability Technologies

Published By: Vision Solutions     Published Date: Jun 10, 2009
Journaling? RAID? Vaulting? Mirroring? High availability? Know your data protection and recovery options! Download this information-packed 29-page report that reviews the spectrum of IBM i (i5/OS) and AIX resilience and recovery technologies and best practices choices, including the latest, next-generation solutions.
Tags : 
aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i
    
Vision Solutions

The Benefits of AIX Data Replication in HACMP Clusters

Published By: Vision Solutions     Published Date: Jun 10, 2009
For IT departments looking to bring their AIX environments up to the next step in data protection, IBM’s PowerHA (HACMP) connects multiple servers to shared storage via clustering. This offers automatic recovery of applications and system resources if a failure occurs with the primary server.
Tags : 
aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i
    
Vision Solutions

Drive Down Your Costs Through Security Consolidation

Published By: SonicWall     Published Date: Sep 10, 2009
Hear real-world examples of how companies like yours consolidated their security to lower their total cost of ownership, optimized existing resources, increased their security and dramatically improved productivity!
Tags : 
sonicwall, free pcmagcast webinar, unified threat management, a different, efficient, costly bandwith, consolidating multiple solutions, run bandwidth on your web 2.0 apps
    
SonicWall

How to Influence CPG Shoppers Everywhere They Buy

Published By: Bazaarvoice     Published Date: Jul 12, 2011
Consumer use multiple touchpoints to engage with your brand before they buy. Leading CPG brands share how to be a part of the conversation.
Tags : 
bazaarvoice, consumer packaged goods, cpg, social media, customer-centric, social commerce, brand loyalty, multi-channel marketing
    
Bazaarvoice

Lift, Loyalty: Personalized Product Recommendations

Published By: IBM     Published Date: Oct 15, 2013
Engaging customers with personalized recommendations across multiple marketing touchpoints
Tags : 
personalized product recommendation, product recommendation, relevant shoppers, loyal customers, personalization, engaging experience, capabilities for recommendations, monitor
    
IBM

TechWiseTV:802.11ac Wave 2:Are You ready

Published By: Cisco     Published Date: Apr 10, 2015
Your users are ready for multigigabit wireless. The real question is: Is your network? Don’t miss this opportunity to get a first-hand look at the solutions you’ll need to achieve data rates that make it easier for your people to share, stay informed, and make smart decisions. • Join hosts Robb, Jimmy Ray, and networking experts as they dive deep into the technical details of delivering exponentially faster 802.11ac Wave 2 access through the current Cat5 cable you already have. • Hear all about Cisco’s founding membership and participation in the NBASE-T Alliance, the team that’s driving the standardization of 2.5 Gb/s and 5 Gb/s Ethernet speeds in campus access. • Discover the access point and switch technology you’ll need to ensure that your wired access layer does not become a stumbling block for your continued mobile growth.
Tags : 
cisco, techwise, routers, wan, productivity, performance, 802.11ac, wireless
    
Cisco
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.