reach

Results 201 - 225 of 1526Sort Results By: Published Date | Title | Company Name

How to Retain and Build Loyalty with Millennials

Published By: Salesforce Commerce Cloud     Published Date: Sep 13, 2016
What makes millennial customers loyal? Reaching millennials isn’t your biggest retail challenge, it’s retaining them. 38% of businesses say they’re agile enough for millennials. How do you compare? Find out by downloading our latest research paper.
Tags : 
demandware, social, millennials, impressions, social media, social influence
    
Salesforce Commerce Cloud

How to Accelerate Your AWS Cloud Journey to Reach Cloud Maturity

Published By: CloudHealth by VMware     Published Date: Apr 15, 2019
Organisations moving to AWS seek improved performance, increased innovation, and a faster time to market—but the road to cloud maturity, and ultimately cloud success, proves both challenging and expensive. Learn to accelerate your AWS cloud journey with: A checklist for determining if you have clear visibility into your AWS environment Expert tips for developing proper cloud security best practices Real examples of financial, performance, and security management policies for automating your cloud ecosystem Looking to optimise your AWS cloud infrastructure? Use this eBook to regain control over your visibility and cost management, security and compliance, and governance and automation.
Tags : 
    
CloudHealth by VMware

5 Signs Your Business Has Reached The Limits of MYOB

Published By: Netsuite     Published Date: Dec 08, 2016
'Read how switching from MYOB has helped Aussie businesses like Atlassian rapidly grow by 200%
Tags : 
erp, cloud computing, it infrastructure management
    
Netsuite

Enterprise Data Security: The Basics of User Behavior Analytics

Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies

Privileged User Governance - A Key to Effective Breach Protection

Published By: CA Technologies     Published Date: Sep 25, 2017
Managing privileged users is a continuous and critical process. First, you must discover where your admin accounts are and eliminate improper privileges and orphan accounts. Next, you must enforce your least-privilege policies for these users and eliminate shared accounts—this is called privileged access management (PAM). Lastly, you must govern privileged access to avoid entitlement creep and to ensure that each user still needs any elevated privileges that they have. If any one of these essential capabilities are weak or missing, your overall risk of breach or insider threat rises significantly.
Tags : 
integration, developers, open enterprise, api, business, ca technologies
    
CA Technologies

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Published By: CA Technologies     Published Date: Sep 25, 2017
Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers are using a wider range of more sophisticated methods to infiltrate vulnerable systems. And although news of external breaches often dominates headlines, organizations must also be able to defend against insider threats.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies

Protect Your Data the Way Banks Protect Your Money

Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies

Finding Rehab Success: Key Benefits of Partnership

Published By: Kindred Hospital Rehabilitation Services     Published Date: Apr 10, 2019
Many healthcare providers are seeking support from dedicated rehabilitation partners. Receiving support from a third-party team of rehab experts enables healthcare providers to reach the highest levels of performance in this niche and highly-regulated space. While the landscape has never been as challenging, there is also great opportunity. When identifying a rehabilitation partner, there are five key qualities that indicate long-term success. This article outlines how rehab partners can support healthcare providers, the key qualities to look for in a partner and the top questions to ask a potential partner.
Tags : 
    
Kindred Hospital Rehabilitation Services

Source Data for Network Security Investigations

Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies

The Network Never Lies

Published By: IBM APAC     Published Date: Aug 22, 2017
Sometimes the best clues to a security breach aren’t found in the contents of the files that are traversing your network. Instead, they’re found in the details of the network metadata. An unusually large data transfer associated with simple web-browsing traffic can indicate the injection of malware. Also, an examination of any changes in an attached file’s entropy can reveal encryption or compression activities that can indicate the addition of embedded malware.
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM APAC

How Malware and Bots Steal Your Data

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd

The Next Wave of Bot-Driven Brute Force Attacks

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed breach world.
Tags : 
    
F5 Networks Singapore Pte Ltd

Five Ways All-Flash Storage Fuels It Transformation

Published By: DellEMC and Intel®     Published Date: Jul 05, 2017
Now is the time to make the move to All-Flash. With the right combination of performance, price and density options, our broad portfolio puts flash within reach for any size organization, making 2016 The Year of the All-Flash Data Center. Reduce storage costs and complexity with reliable, low-latency performance — discover how Dell EMC All-Flash storage solutions powered by Intel® can modernize your data center today. Intel Inside®. Powerful Productivity Outside. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®

Five Ways All-Flash Storage Fuels It Transformation

Published By: DellEMC and Intel®     Published Date: Oct 18, 2017
Now is the time to make the move to All-Flash. With the right combination of performance, price and density options, our broad portfolio puts flash within reach for any size organization, making 2016 The Year of the All-Flash Data Center. Reduce storage costs and complexity with reliable, low-latency performance — discover how Dell EMC All-Flash storage solutions powered by Intel® can modernize your data center today. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logotyp, intel atom, intel atom inside
    
DellEMC and  Intel®

Five Ways All-Flash Storage Fuels It Transformation

Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Now is the time to make the move to All-Flash. With the right combination of performance, price and density options, our broad portfolio puts flash within reach for any size organization, making 2016 The Year of the All-Flash Data Center. Reduce storage costs and complexity with reliable, low-latency performance — discover how Dell EMC All-Flash storage solutions powered by Intel® can modernize your data center today. Intel Inside®. Powerful Productivity Outside. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®

Five Ways All-Flash Storage Fuels It Transformation

Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Now is the time to make the move to All-Flash. With the right combination of performance, price and density options, our broad portfolio puts flash within reach for any size organization, making 2016 The Year of the All-Flash Data Center. Reduce storage costs and complexity with reliable, low-latency performance — discover how Dell EMC All-Flash storage solutions powered by Intel® can modernize your data center today. Intel Inside®. Para una productividad extraordinaria. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi e Xeon Inside são marcas comerciais da Intel Corporation ou de suas subsidiárias nos EUA e / ou em outros países
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®

Five Ways All-Flash Storage Fuels It Transformation

Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
Now is the time to make the move to All-Flash. With the right combination of performance, price and density options, our broad portfolio puts flash within reach for any size organization, making 2016 The Year of the All-Flash Data Center. Reduce storage costs and complexity with reliable, low-latency performance — discover how Dell EMC All-Flash storage solutions powered by Intel® can modernize your data center today. Intel Inside®. Bättre produktivitet pa utsidan. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel®

FIVE WAYS ALL-FLASH STORAGE FUELS IT TRANSFORMATION

Published By: DellEMC and Intel     Published Date: Sep 26, 2017
With the right combination of performance, price and density options, our broad portfolio puts flash within reach for any size organization, making 2016 The Year of the All-Flash Data Center. Reduce storage costs and complexity with reliable, low-latency performance —discover how Dell EMC All-Flash storage solutions powered by Intel® can modernize your data center today. Learn more about Dell EMC enterprise solutions in collaboration with Intel®.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside
    
DellEMC and  Intel

Engineering Unplugged: A Discussion With Pure Storage’s Brian Gold on Big Data Analytics for Apache

Published By: Pure Storage     Published Date: Apr 10, 2019
Pure Storage, a pioneer in block-based flash arrays, has developed a technology called FlashBlade, designed specifically for file and object storage environments. With FlashBlade, IT teams now have a simple-to-manage shared storage solution that delivers the performance and capacity needed to bring Spark deployments on premise. To help gain a deeper understanding of the storage challenges related to Spark and how FlashBlade addresses them, Brian Gold of Pure Storage sat down with veteran technology journalist Al Perlman of TechTarget for a far-reaching discussion on Spark trends and opportunities.
Tags : 
    
Pure Storage

Interxion meets the demands of the digital economy with tailored solutions from Schneider Electric

Published By: Schneider Electric     Published Date: Jun 05, 2019
Data centers are evolving. They are much more than the data storage facilities of the past—they are gateways to emerging markets and platforms from which businesses can expand their reach through greater connectivity. These evolutions require the deployment of secured IT platforms capable of supporting and treating a huge amount of data generated in real time. Learn how Interxion partnered with Schneider Electric to meet the needs of its customers and stay relevant in the rapidly evolving colocation market.
Tags : 
customer insight,  colocation business,  schneider electric
    
Schneider Electric

Simi Valley Hospital: Now Collecting 1.5% of Net Revenue on the Front End

Published By: MedeAnalytics     Published Date: Mar 09, 2012
Through the implementation of integrated, comprehensive workflow technlogy,Simi Valley Hospital has been able to reach 135% of point-of-service cash collections goal. Read to learn more about Simi Valley Hospital's success in achieving front-end process improvements.
Tags : 
healthcare, point of service, cash collections, pai, patient access, patient access intelligence
    
MedeAnalytics

Networks that know: Security

Published By: Juniper Networks     Published Date: Oct 28, 2014
To understand why an open, scalable network architecture is essential for enhanced IT security in the cloud era, get our eBook. Read how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.
Tags : 
cloud, data protection, security, security breaches, safe virtual environment, risk, network security
    
Juniper Networks

ReachLocal Keeps its Focus on the Client Experience with New Relic

Published By: New Relic     Published Date: Oct 16, 2015
Manage performance and improve the client experience for more than 90 legacy and new applications.
Tags : 
    
New Relic

How APT 18 Bypassed Security Controls

Published By: Venafi     Published Date: Jul 27, 2015
See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.
Tags : 
security controls, key misuse, certificate misuse, security management, breach prevention, risk reduction, blind spots, exfiltrating data
    
Venafi

In-depth Review of APT Attack Methods

Published By: Venafi     Published Date: Jul 27, 2015
To learn how, Raxis reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today.
Tags : 
cybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks, it security, cryptographic keys, digital certificates
    
Venafi
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.