reach

Results 126 - 150 of 1523Sort Results By: Published Date | Title | Company Name

Enforce a Zero Trust Security Model in Today's Hostile Environment

Published By: Akamai Technologies     Published Date: Jun 14, 2018
Companies are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new workflows, security has not kept pace, and cyber criminals are becoming more sophisticated. This white paper describes a security paradigm for today’s hostile environment: zero trust.
Tags : 
behavioral analytics, logging analytics, zero trust security model, security, cyber criminals, security breach
    
Akamai Technologies

Transform Your Datacenter, Preparing for Windows Server 2003 RT End of Support

Published By: Dell     Published Date: Oct 24, 2014
The end of support for Windows Server 2003/R2 could signal the beginning of a new stage in your organization’s evolution, and taking advantage of the Microsoft datacenter transformation vision can help you reach that next stage.
Tags : 
infrastructure security, migration process, datacenter transformation, server support
    
Dell

Data Security: Protecting the Endpoint

Published By: Dell     Published Date: May 04, 2015
This infographic includes results from a 2015 survey conducted exclusively for CBS Interactive and illustrates: • The top-ranked security threats of 2014 • The percentage of companies adopting mobile security technology • The most popular data protection methods • What to look for in a comprehensive data protection solution
Tags : 
security breach, data security, privacy, phishing
    
Dell

Unlocking Mobile Application Performance

Published By: Akamai Technologies     Published Date: Aug 17, 2017
As mobile device usage has skyrocketed in recent years, mobile applications have emerged as the key engagement channel for businesses to connect with their most loyal and most valuable customers. Mobile app usage represents more than 85% of total mobile device time, and users now spend more time with apps than they do with television. But while app usage has increased more than 60% over the last two years, the number of apps each user actively engages with has remained fairly steady, at around 27 per month. This means users have a limited appetite for additional apps – but are heavily engaged with the ones they use. So while the mobile web gives businesses broad reach, mobile apps offer a robust link to their best customers. Users who value the company enough to go through the trouble of downloading and installing the app are a brand’s most engaged audience and loyal fan base.
Tags : 
mobile performance, mobile app, customer engagement, channeling
    
Akamai Technologies

7 Critical Considerations for Choosing a Cloud Security Provider

Published By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : 
cloud security, scale, data center, ddos
    
Akamai Technologies

Using AI for Better Self-Service

Published By: Zendesk Ltd     Published Date: Sep 11, 2018
Customers have caught on that support interactions are getting better. When they reach out, they’ve come to expect an instant response that says “we’re here for you”. When they want information, it’s expected to be accurate, up-to-date, and easily accessible. Essentially, they come to expect efficiency during support interactions. As a result, businesses are becoming more cognizant of their self- service offerings. Customers want to be left feeling empowered; it’s even better when they can do so on their own. Self-service saves time for agents, cuts down on organizational costs, and leaves the customer with a positive outlook of a brand. This eBook delves into how AI can enhance your customer self-service offerings with automatically-generated knowledge bases, content cues for your service agents, and chatbots.
Tags : 
customer service, customer experience, artificial intelligence, chatbots, self-service
    
Zendesk Ltd

A Practical Executive's Guide to Data Loss Prevention

Published By: Websense     Published Date: Jan 25, 2013
In this whitepaper, we provide guidance and clarity to help you implement a DLP control that is practical, efficient, and effective. Learn about 4 key topics of data breaches, potential vendors, 9 step framework and other best practices.
Tags : 
websense, data loss prevention, executive guide, data loss, practical guide, 4 topics, potential vendors, it management
    
Websense

3 Essential Components for a Strong End User Security Experience

Published By: Dell     Published Date: Feb 02, 2015
Security breaches are expensive, costing U.S. businesses an average of $3.5 million per incident, which doesn’t include brand damage or other intangibles. Unfortunately, breaches are highly likely to happen, with 87% of organizations experiencing a breach in the past 12 months. Data, whether it’s intellectual property or personal data, needs to be protected. Dell Data Protection solutions provide encryption, malware protection, and authentication for Dell and non-Dell products, to equip businesses with a complete, easy-to-manage, end-user security solution.
Tags : 
dell, windows 8 pro, security, breaches, encryption, cost, compliance, malware
    
Dell

Is DNS Your Security Achilles Heel?

Published By: Akamai Technologies     Published Date: Aug 11, 2017
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies

Advanced, Targeted Threats: What do They Mean for Your Bottom Line?

Published By: Akamai Technologies     Published Date: Aug 11, 2017
Examine the business impact of malware, ransomware, and phishing, as well as the cost of the average data breach. Given the significant economic impact of these threats, understanding your financial exposure and employing a layered defense simply makes sense.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies

How to Break through the Automation Ceiling. And Get your Business using RPA at Scale

Published By: Automation Anywhere     Published Date: Jul 16, 2019
Learn why companies aren’t currently embracing RPA at scale and understand how to tackle different scaling challenges, from reaching the ceiling of a small Proof of Concept to keeping your people and RPA strategies aligned. Find out how scale was successfully achieved for some of Automation Anywhere’s customers, including Bancolombia.
Tags : 
    
Automation Anywhere

Transform Your SAP Deployment with Managed Cloud Services

Published By: IBM APAC     Published Date: Jun 21, 2019
Moving major, business-supporting applications to the cloud can be a challenge for a variety of reasons. You may have concerns about the physical migration of data, as data loss or business disruption stemming from a migration issue would be a disaster for the business. Security is another typical concern, as a data breach of your most sensitive applications—like SAP or Oracle— could prove highly damaging. Akin to security, data sovereignty is an issue for many businesses. Stringent compliance laws in some jurisdictions are dictating data “residency”; and in the cloud, it is not always clear where the data is housed. Among managed cloud service users, 68% state that using such services helps them to better manage resource allocation and make SAP and Oracle costs more predictable. In this paper, we will look at common concerns over deploying and optimally managing business-critical, legacy applications in the cloud. We consider the benefits of managed cloud services, and how your
Tags : 
    
IBM APAC

Video Collaboration: Expanding the Reach of Education

Published By: Polycom     Published Date: Sep 04, 2012
Video collaboration expands the reach of education and is essential to improving student achievement and preparing them for the global economy.
Tags : 
video collaboration, videoconferencing, education, mobile video communication, video conferencing
    
Polycom

10 Key Considerations for a Successful Online Video Strategy

Published By: Akamai Technologies     Published Date: May 08, 2017
We are coming to expect quality video in all our digital experiences – from online shopping to on the job training. However, as video technology has become more ubiquitous, it has also become more complex. To deliver a quality experience to users, regardless of their device and connectivity, you need a holistic video strategy. We’ve tapped into our experience to present the top issues you must address to ensure a successful online video strategy. Download now to learn more!
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
Akamai Technologies

The Smarter Way to Manage Data

Published By: Oracle EMEA     Published Date: Apr 15, 2019
Oracle Autonomous Data Warehouse Cloud is more than just a new way to store and analyze data; it’s a whole new approach to getting more value from your data. Market leaders in every industry depend on analytics to reach new customers, streamline business processes, and gain a competitive edge. Data warehouses remain at the heart of these business intelligence (BI) initiatives, but traditional data-warehouse projects are complex undertakings that take months or even years to deliver results. Relying on a cloud provider accelerates the process of provisioning data-warehouse infrastructure, but in most cases database administrators (DBAs) still have to install and manage the database platform, then work with the line-of-business leaders to build the data model and analytics. Once the warehouse is deployed—either on premises or in the cloud—they face an endless cycle of tuning, securing, scaling, and maintaining these analytic assets. Oracle has a better way. Download this whitepaper to f
Tags : 
    
Oracle EMEA

Entrust Datacard 2016 SSL/TLS Certificates

Published By: Entrust Datacard     Published Date: Mar 24, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions.
Tags : 
    
Entrust Datacard

Real-world Attack Case Study: Misuse of Keys and Certificates Bypass Critical Security Controls

Published By: Venafi     Published Date: Aug 10, 2015
This paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches.
Tags : 
attacks, cyberattacks, protect certificates, how to remediate breaches, security, security applications, access control, anti spam
    
Venafi

When Trust Online Breaks, Businesses Lose Customers

Published By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institute’s 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection, security network, networking, software development
    
Venafi

Trusted Identities: A Tool in Your European GDPR Compliance Toolbox

Published By: Entrust Datacard     Published Date: Jun 09, 2017
How are you balancing strong security and the customer experience? The European Union’s General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their users’ data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, there’s a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the user’s expectations, and without jeopardizing the trust that is so important between them and you.
Tags : 
    
Entrust Datacard

eMarketer Social Ads Spend Forecast through 2014

Published By: Adobe     Published Date: Nov 07, 2013
Worldwide social network ad spending is expected to reach nearly $9 billion in 2013, a 33% increase over 2012. While Facebook will maintain a significant share of the 2013 total ($5.48 billion), that leaves $3.5 billion to be spent on fast-rising Twitter, Chinese social networks, social games, LinkedIn and other sites.
Tags : 
adobe, emarketer, worldwide social network ad spending, advertising spending, ad spending, incorporated ad spending, social networks, ad revenues
    
Adobe

REACHING 5 GENERATIONS OF CONNECTED CONSUMERS

Published By: Cordial     Published Date: Jul 29, 2015
Along with the opportunities this new connected world brings is a challenge marketers have never faced before: five active generations that are dramatically shaping connected-consumer buying and behavior.
Tags : 
    
Cordial

Free Forrester Research Report: Three Technical Innovations Will Ignite Zero Trust

Published By: VMware     Published Date: Oct 05, 2015
Unless you’ve already deployed a Zero Trust network, your network security is broken. That’s the bad news. The good news? New ways of implementing a previously hardware-intensive and costly concept called micro-segmentation now put Zero Trust within your organization’s reach. Learn about these breakthrough developments in this Forrester Research report that is yours free, courtesy of VMware and Carahsoft®. Download your free copy now.
Tags : 
vmware, zero trust, forrester research, network security, network security solution, micro segmentation, carahsoft, security
    
VMware

VMware NSX® Micro-segmentation Solution Overview

Published By: VMware     Published Date: Oct 05, 2015
Most data center security emphasizes strong perimeter defense to keep threats on the outside. But this model is ineffective against today’s new types of threats, which may be borne by east-west traffic inside your data center. Some of these intrusions may lurk for days, weeks, or months to discover and exploit vulnerabilities. An existing concept called micro-segmentation is the solution. But until now, it was hardware-intensive and costly. In this solution overview, you’ll learn why micro-segmentation is now within your organization’s reach. Get your free copy now.
Tags : 
vmware, data center security, data center, micro segmentation, micro segmentation solution, security, data protection, database security
    
VMware

FREE Book: Micro-segmentation For Dummies®

Published By: VMware     Published Date: Oct 05, 2015
To be fair, if you don’t know or understand the data center architecture strategy called micro-segmentation, you aren’t a “dummy.” But it could mean you are missing a highly cost-effective opportunity to implement best-in-class data center security called the “Zero Trust” network. This special “For Dummies” edition explains micro-segmentation, how it enables Zero Trust, and why it is now within your organization’s reach. Download your free copy of this book now.
Tags : 
zero trust network, micro segmentation, data architecture strategy, vmware, data center, data center security, security, data protection
    
VMware

FREE Business Case White Paper: VMware NSX® Network Virtualization and Security

Published By: VMware     Published Date: Oct 05, 2015
Undoubtedly you are aware of network virtualization, but perhaps you’ve yet to hear a compelling case for it. If the extended network capabilities and simplified management enabled by network virtualization aren’t compelling enough reasons, data center security should be. To manage today’s coordinated and persistent security threats, which often come from within, data centers need to implement “Zero Trust” networking. Virtualization puts it within your reach. Discover why — download this free business case white paper now.
Tags : 
vmware, network virtualization, data center, data security, vmware nsx, zero trust, zero trust network, networking
    
VMware
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.