romi

Results 151 - 175 of 746Sort Results By: Published Date | Title | Company Name

Security at the Speed of Your Network

Published By: Gigamon     Published Date: Mar 26, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon

Security at the Speed of Your Network

Published By: Gigamon     Published Date: Jun 10, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now. 
Tags : 
    
Gigamon

Phishing: Top Email Threats and Trends

Published By: Barracuda     Published Date: May 29, 2019
Spear phishing is a threat that’s constantly evolving as cybercriminals find new ways to avoid detection. This report takes an in-depth look at the three most prevalent types of attacks: brand impersonation, business email compromise, and blackmail.
Tags : 
    
Barracuda

2019 Annual IBM X-Force Threat Intelligence Index.

Published By: IBM APAC     Published Date: Mar 06, 2019
The 2019 IBM X-Force Threat Intelligence Index looks back at the threats, tactics, and trends that emerged in 2018 based on insights from IBM X-Force Security Research Team. Deriving data and insights from security clients, incident response services and penetration testing engagements, the IBM X-Force Threat Intelligence Index 2019 report outlines the most prominent threats and provides key insights into various industries, attack tactics, and major vulnerabilities that emerged during the year.
Tags : 
    
IBM APAC

The Guide to Advertising Accountability

Published By: Oracle Marketing Cloud     Published Date: Oct 05, 2017
Accountability in marketing means one thing: Can you deliver on what you promised? The good news is that using a data management platform and data-driven marketing can help you improve accountability—especially when it comes to revenue. Because the more you know about your prospects, the more precisely you can market to them at the moment they’re ready to buy. Get this guide to see how revenue accountability can help you cut marketing costs by reducing waste and dramatically improving your ROI.
Tags : 
    
Oracle Marketing Cloud

Argyle ABM Survey

Published By: Oracle Marketing Cloud     Published Date: Oct 06, 2017
A recent Argyle survey found that nearly 60% of marketing organizations currently use some form of Account-Based Marketing (ABM), while 28% plan to use it in the near future. This shows the rising importance of ABM in the marketing mix. However, ABM does have its challenges. Almost 30% of the same respondents claimed that maintaining personalized, but consistent interactions with prospects was the most prominent challenge in ABM. For more insight on how marketing executives are optimizing ABM, download this survey.
Tags : 
    
Oracle Marketing Cloud

Top Trends Driving The Need For Unified Cloud Management

Published By: VMWare EMEA     Published Date: Oct 23, 2017
Digitalization has spurred new opportunities for how business gets done. With the emergence of big data and mobility, enterprises see the promise of making employees more productive and keeping customers more engaged. And they recognize that efficient, prompt application development and delivery are instrumental for taking advantage of these new opportunities. In this unforgiving era of digitalization, you need to be first to market if you want to flourish.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA

Considerations for the Next Phase of Hyperconverged Infrastructure

Published By: Cisco     Published Date: Dec 27, 2017
Hyperconvergence has been receiving a tremendous amount of attention because it represents the next step in the evolution of IT resource delivery. This technology takes the idea of integrating compute, storage and networking that started with converged systems design and has improved on those architectures by adding deeper levels of abstraction and automation. Hyperconverged infrastructure (HCI) vendors promise simplified operation and the ability to quickly and easily expand capacity by deploying and launching additional modules; simplicity has been the key selling point for the HCI pioneers. As HCI ventures even deeper into the enterprise and cloud environments, the architectures will need to become more efficient, agile and adaptable to help IT professionals shoulder the burden of rapidly growing data sets and workloads. This report discusses the benefits of HCI and the enhancements that must be made to expand HCI deeper into the mainstream enterprise datacenter.
Tags : 
    
Cisco

Cisco 2017 Midyear Cybersecurity Report

Published By: Cisco     Published Date: Dec 27, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption.
Tags : 
    
Cisco

AI Analytics and the Future of Your Enterprise

Published By: Pure Storage     Published Date: Apr 18, 2018
Everybody’s talking about big data. Huge promises have been made about its role in driving enterprises forward. But few organizations are realizing its true benefits. For those able to put data to good use, there’s much to be excited about. Data is transforming not only businesses, but entire industries, and the world as we know it. Today organizations are harnessing big data to do things like transform healthcare, provide eyesight for the visually impaired, and bringing us closer to autonomous cars
Tags : 
    
Pure Storage

The survivor’s guide to building an Office 365 network

Published By: Zscaler     Published Date: Oct 30, 2018
A Microsoft Office 365 deployment can be daunting. From a fast user experience, to a cost-cutting productivity platform, your users and CIO are expecting amazing things from Office 365. While it’s your job to deliver on the promise, you’re not going to get very far unless your network has been properly set up for the experience. To learn more about how Zscaler can enable your Office 365 deployment with a fast user experience, download this whitepaper today!
Tags : 
    
Zscaler

Don’t Overlook Email When Planning for GDPR Compliance

Published By: Mimecast     Published Date: Nov 28, 2017
Does your organization have a plan for complying with the European Union’s General Data Protection Regulation (GDPR)? If email isn’t a part of that plan, you could face significant challenges, including severe financial penalties. Download now to get the facts about: • Why you can’t compromise when it comes to protection of email data • The challenges presented by Subject Area Requests • How noncompliance could cost your organization more than just money
Tags : 
gdpr, email compliance, data protection, compliance
    
Mimecast

The State of Email Security

Published By: Mimecast     Published Date: Aug 16, 2018
Email. You use it constantly. And it’s the number-one application to keep your organization functioning, lines of communication flowing, and productivity seamless. Organizations need email to stay up-and running all the time. After all, it’s supposed to just work, right? This is where trouble often sets in. Cybercriminals use email constantly, too. It’s the number-one vector used to initiate attacks like malware delivery (think ransomware), impersonations and phishing attacks. In fact, almost 90% of organizations* have seen the volume of phishing attacks either rise or stay the same over the past 12 months. Internal threats have also been on the rise: Most organizations have encountered internal threats driven by careless employees (88%), compromised accounts (80%) or malicious insiders (70%) over the last year.
Tags : 
    
Mimecast

On-Demand Webinar: Threats on the Inside

Published By: Mimecast     Published Date: Jan 17, 2019
Two-thirds of all internally generated email sent is from employees communicating within an organization*. Yet most IT organizations only focus on inbound email when it comes to protecting against cyber-attacks. In doing so, they ignore the serious risks posed by internal and outbound emails and the actions of two at risk groups of users - the compromised and careless employee. Mimecast Internal Email Protect extends the security capabilities of Targeted Threat Protection to provide advanced inside-the-perimeter defenses. Watch this on-demand webinar where Mimecast’s Chief Trust Officer, Marc French, and Cyber Security Strategist, Bob Adams discuss: The top things to do to optimize your Targeted Threat Protection implementation and prepare for addressing the threats on the inside. The multiple ways internal email threats start, and why human error nearly always plays a role. The scale and impact of attacks that spread via internal email. How to extend your current protection with Mim
Tags : 
    
Mimecast

IBM DB2 for SAP: A No-Compromise Transactional and Analytic Database Platform

Published By: IBM     Published Date: Jul 05, 2016
This white paper is written for SAP customers evaluating their infrastructure choices, discussing database technology evolution and options available.
Tags : 
ibm, always on business, analytics, database, database platform, sap, blu, db2
    
IBM

The Future Services Sector: Connected Services for Continuous Delivery

Published By: SAP     Published Date: Nov 22, 2017
The digital transformation (DX) of industries is well under way — a transformation that is enabled by the Internet of Things (IoT). The IoT allows organizations to reinvent existing industry processes, augment how they engage with their customers, and accelerate the speed at which they deliver their products and services. This white paper looks at how these digital strategies facilitated by the IoT are reshaping those industry segments that are both asset rich and focused on services rather than products. The paper then explores IoT scenarios that hold great promise and how companies are approaching investment to optimize business outcomes.
Tags : 
digital transformation, industries, iot, internet of things, customers, products, services, companies
    
SAP

Three Golden Rules For Safe And Sound Endpoints

Published By: IBM     Published Date: Apr 24, 2017
Cybercrime is more sophisticated and dangerous than ever before, and the scope of newly emerging threats is unprecedented. At the same time, the growing number and diversity of endpoints in the enterprise is expanding the network edge to the point of disappearing. Both these trends will continue with ongoing bring your-own-device (BYOD) initiatives and explode with the emerging Internet of Things (IoT).
Tags : 
cyber crime, security compromise, software management, information security, it management
    
IBM

Guard Your Organization's Data With Intelligent IBM Encryption

Published By: IBM     Published Date: Jul 26, 2017
Data—dynamic, in demand and distributed—is challenging to secure. But you need to protect sensitive data, whether it’s stored on premises, off-site, or in big-data, private- or hybrid-cloud environments. Protecting sensitive data can take many forms, but nearly any organization needs to keep its data accessible, protect data from loss or compromise, and comply with a raft of regulations and mandates. These can include the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the European Union (EU) General Data Protection Regulation (GDPR). Even in the cloud, where you may have less immediate control, you must still control your sensitive data—and compliance mandates still apply.
Tags : 
data, security, encryption, cloud environments, data regulation
    
IBM

Lenovo + Nutanix Hyperconverged Infrastructure eBook Guide for the Enterprise

Published By: Lenovo - APAC     Published Date: Oct 11, 2018
Business expectations and demands on the data center are increasing and the impact on today’s data centers is staggering. Organisations that can move quickly to leverage these new opportunities will find themselves in an advantageous position relative to their competitors. But time is NOT on your side! If your IT team often feel that they’re always in catch-up mode because it is difficult to quantify IT contributions, it is time to understand the benefit of hyperconverged infrastructure. Download this premium guide to understand how HCI can • Provide the resilience, scalability and performance to run all your applications without compromise. • Design the data center as a fluid resource that can immediately adapt to the evolving needs of the business. • Enable agility with scale-out architecture that eliminates the need to rip and replace for seamless growth and scale.
Tags : 
    
Lenovo - APAC

Virtualization Best Practices Guide

Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Virtualization promises to boost efficiency and cut costs, making it an important element in your IT department’s efforts to do more with less. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk.
Tags : 
virtualization, cyberthreats, security software, security solutions, security, it management, knowledge management, business intelligence
    
Kaspersky Lab

Build Your IT Security Case

Published By: Kaspersky Lab     Published Date: Oct 30, 2014
The importance of IT security to a business has never been greater. But often, investments are shelved or cutbacks are made. This can result in businesses unknowingly making compromises regarding their IT security. In this latest whitepaper from Kaspersky Lab, you’ll find useful facts, examples and business case arguments to help you get buy-in and commitment from your business.
Tags : 
it security, it security investments, cyber threats, malware detection, security, it management, knowledge management, best practices
    
Kaspersky Lab

Flash Storage for Dummies

Published By: NetApp     Published Date: Sep 24, 2013
"Flash technology is becoming more prominent in the storage industry. Offering superior speed and reliability when compared to traditional hard disk drives – flash storage is a flexible and increasingly cost-effective technology that can be used to optimize enterprise storage environments. This ebook explores the many uses and benefits of flash storage technology in the enterprise. Check it out to discover and learn all you need to: * Optimize storage performance * Leverage server flash as storage cache * Reduce the footprint of your storage infrastructure in the data center "
Tags : 
flash technology, storage industry, superior speed, cost effective, cloud, optimization, storage cache, data center
    
NetApp

Advanced Network Protection with McAfee Next Generation Firewall

Published By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee

The new science of threat detection

Published By: Vectra Networks     Published Date: Aug 03, 2015
Protect prominent securities.
Tags : 
firewall, intrusion detection, intrusion prevention, ips, ids, advanced persistent threat, apt, identity management
    
Vectra Networks

Network-based threat detection

Published By: Vectra Networks     Published Date: Aug 03, 2015
Organizations invest heavily to block advanced attacks, on both endpoints and networks. Despite all this investment, devices continue to be compromised in increasing numbers and high-profile breaches continue unabated. Something doesn’t add up. It comes down to psychology: security practitioners want to believe the latest shiny widget for preventing compromise will finally work and stop the pain.
Tags : 
data, security, threats, protection, advanced threat, ips, ids, firewall
    
Vectra Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.