romi

Results 176 - 200 of 745Sort Results By: Published Date | Title | Company Name

Network-based threat detection

Published By: Vectra Networks     Published Date: Aug 03, 2015
Organizations invest heavily to block advanced attacks, on both endpoints and networks. Despite all this investment, devices continue to be compromised in increasing numbers and high-profile breaches continue unabated. Something doesn’t add up. It comes down to psychology: security practitioners want to believe the latest shiny widget for preventing compromise will finally work and stop the pain.
Tags : 
data, security, threats, protection, advanced threat, ips, ids, firewall, antivirus, business continuity, intrusion detection, intrusion prevention, security management, vulnerability management
    
Vectra Networks

5 Things You Need to Know About Team Collaboration

Published By: Mitel     Published Date: Mar 30, 2017
The ways teams collaborate has fundamentally changed in the last few years. There are seemingly endless tools, apps and software that claim to transform the collaboration experience. Some do more to make good on that promise than others—and you can’t forget to account for the context for how they fit into your organization’s overall IT mix and processes. Given all this change, here are a few important things to know about team collaboration and the tools associated with it to help you get the most of collaboration for your company.
Tags : 
byod, cloud-based, applications, collaboration software, networking
    
Mitel

OpenID Connect 1.0 for Enterprise

Published By: Ping Identity     Published Date: Feb 12, 2016
In order to meet the challenges presented by the use of mobile apps and cloud services in the enterprise, a new generation of identity protocols has been developed. OpenID Connect 1.0 uses the same building blocks as the modern application architectures and APIs it secures—REST and JSON. This allows it to profile and extend OAuth 2.0 to add an identity layer—creating a singular, cohesive framework that promises to secure APIs, mobile native applications and browser applications. This paper introduces OpenID Connect (Connect), detailing its features and its application in enterprise use cases.
Tags : 
    
Ping Identity

Five Industry Trends in Learning

Published By: SilkRoad Technology     Published Date: Feb 24, 2016
For decades, learning in a corporate environment consisted of a day or a week of classroom-based training. However, technological advances delivered on the promise of a more complex learning protocol with automated, virtual, and experiential elements. At Connections 2014, SilkRoad’s annual user conference, a panel of learning professionals convened to discuss five major learning themes this year, including integration, mobility, engagement, compliance, and analytics.
Tags : 
silkroad, human resources, industry trend, learning
    
SilkRoad Technology

3 Ways EFSS Enables Secure Content Collaboration for the Modern Mobile Workforce

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
workforce, security, task automation, content security, employee collaboration
    
Citrix ShareFile

The Rise of Remote Work

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
54% of UK office workers spend some of their time working away from the office, but how do you make sure they’re able to interact with clients and each other? You can’t afford to miss a beat. Download this e-Book for 5 tips to collaborate with your clients from anywhere, including how to: Use the cloud without compromising security Make client meetings feel more personal Customize your mobile alerts to ensure they’re helpful
Tags : 
remote work, client interaction, collaboration, cloud security, personalization
    
Citrix ShareFile

3 Ways EFSS Enables Secure Content Collaboration for the Modern Mobile Workforce

Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
data security, mobility, content collaboration, security efficiency, productivity
    
Citrix ShareFile

SecureWorks Threat Intelligence Executive Report

Published By: Secureworks     Published Date: Oct 04, 2017
The SecureWorks® Counter Threat Unit™ (CTU) research team analyzes security threats and helps organizations protect their systems. During May and June 2017, CTU™ researchers identified lessons learned and observed notable developments in threat behaviors, the global threat landscape, and security trends: • The global WCry and NotPetya campaigns reinforced the need for a layered approach to security. • Attacks used obfuscated malicious files and scripts to bypass filtering and deliver malware. • A Chinese threat group has had repeated success using compromised websites to attack targeted organizations. • Threat actors have been stealing intellectual property from Japanese enterprises.
Tags : 
    
Secureworks

Five Simple Strategies For Securing API's

Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
APIs represent a great opportunity for the enterprise to integrate applications quickly and easily. But APIs can be a double-edged sword: promising agility, while at the same time increasing risk. But if an organization can address API security as an architectural challenge long before any development takes place, it can reap the rewards of this technological breakthrough safely and securely.
Tags : 
api, application programming interface, psd2, open banking, json, github
    
CA Technologies EMEA

Continuous Testing for Continuous Delivery: What Does it Mean in Practice?

Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Take an idea from design to deployment at pace— without compromising quality—using an end-to-end, continuous delivery ecosystem that’s capable of driving rigorous testing from the desired user functionality.
Tags : 
continuous testing, delivery ecosystem, gui testing, mttr, ca technologies, technology optimization, sdlc, testing effort, service virtualisation
    
CA Technologies EMEA

Test Data Management

Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Continuous Delivery has become somewhat of a buzzword in the software development world. As such, numerous vendors promise that they can make it a reality, offering their tools as a remedy to the traditional causes of project delays and failure. They suggest that by adopting them, organizations can continually innovate and deliver quality software on time, and within budget.
Tags : 
data management, data system, enterprise management, continuous testing, testing effort, service virtualisation, delivery ecosystem
    
CA Technologies EMEA

Wasabi Hot Cloud Storage revolutionizes access to your archived content

Published By: Wasabi     Published Date: Nov 13, 2018
In this case study, read about how one major broadcaster discovered a whole new solution for accessing their archived content and saved a lot of money in the process. Needing on-demand access to archived promotional content this broadcaster was using both on-premise storage and off-promise tape storage with disappointing results. Seeking an alternative they looked to the cloud and Amazon S3. But before they could pull the trigger their media management company Acembly introduced them to Wasabi. It was a game changer. Wasabi’s Hot Cloud Storage is 80% cheaper and 6x the speed of even Amazon’s fastest offering. Plus, there’s free unlimited egress which is crucial for companies with unpredictable content needs. Download the case study to see how Wasabi’s revolutionary cloud storage technology is changing the possibilities for broadcasters and how they access their content.
Tags : 
    
Wasabi

Building a High-Speed SOC

Published By: Carbon Black     Published Date: Apr 10, 2018
With breaches today often going undetected for months or years, many organizations must now accept the very real possibility that intruders have already compromised their systems, regardless of the organization’s security posture. Today, compromises are measured in minutes and the speed of response is measured in days. Enterprises the world over are realizing that to close the gap, they need to evolve their security operations from being a largely reactive unit (waiting for alerts that indicate a threat) to being proactively on the hunt for new attacks that have evaded detection. When an incident does occur, the speed of your response will dictate the extent to which you can minimize the impact. In the case of a malicious attack, it takes on average over 7 months to identify a breach, and nearly two and a half additional months to contain the incident. Every second counts, and while the clock is ticking, the cost of the breach is rapidly increasing as well. Breaches that take over 3
Tags : 
    
Carbon Black

The Essential Guide to Continuous Testing

Published By: Sauce Labs     Published Date: Jun 04, 2018
No matter the industry, every company is now in the business of developing applications and online experiences. To keep up with the competition, you need to stand out in all of the digital noise. For your app to succeed, it is critical that it delight your customers with a flawless experience, regardless of what device they use to access it. New features and updates need to be delivered quickly and frequently, but without compromising quality. While development practices have dramatically changed to meet the high speed demands of today’s digital economy, testing has often been left behind as an afterthought. However, this attitude is changing as organizations discover the power of positive experience, and the business impacts of negative reviews. Businesses of all sizes are moving towards Continuous Testing practices and as a result are seeing accelerated software delivery cycles, high quality digital experiences across all platforms, and most importantly happy and loyal customers. T
Tags : 
    
Sauce Labs

The Journey to SAP Agility – Transitioning Tips to SAP S/4HANA

Published By: Panaya     Published Date: May 31, 2018
When it comes to investing in ERP systems, improving the efficiency and responsiveness of business processes is a top concern for SAP customers. However, among IT professionals, safe delivery is of higher priority than ERP digitalization or starting an IT agility transformation. With SAP S/4HANA, this no longer needs to be a compromise. When moving to SAP S/4HANA, IT professionals need to implement not only the technical upgrade of SAP S/4HANA but also the required customizations, which necessitate an intensive amount of business collaboration and software delivery. And for that to happen, IT needs an enterprise agile delivery solution to gather and implement the business requirements to SAP S/4HANA as quickly as possible without business disruption. Read this white paper to discover how you can transition to SAP S/4HANA and achieve true enterprise agile delivery — a new standard to deliver changes to your SAP environment. Topics include: › Sync business and IT to ensure your ERP solu
Tags : 
    
Panaya

How to Ensure You're Not Part of the Next Botnet

Published By: Sophos     Published Date: Mar 30, 2017
With an estimated 500,000 'Internet of Things' devices using default security credentials it's little wonder that the recent Mirai botnet's DDoS attack was able to cause such widespread disruption. But it isn't just the average home-user that's at risk. Organizations like yours are being targeted with bespoke malware in order to compromise your network and add your servers and devices to malicious botnets. This paper explains why these attacks are so successful, how a typical infection takes place and what security systems your organization should have in place to defend against botnet proliferation.
Tags : 
web protection, email protection, web application firewall, intrusion protection, sandboxing, threat protection
    
Sophos

Advanced Persistent Threats: Detection, Protection and Prevention

Published By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : 
network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection, it security
    
Sophos

AI, Analytics and The Future of Your Enterprise

Published By: Pure Storage     Published Date: Oct 09, 2018
Everybody’s talking about big data. Huge promises have been made about its role in driving enterprises forward. But few organizations are realizing its true benefits.
Tags : 
    
Pure Storage

Essential takeaways about the geology of top shale plays in the U.S.

Published By: Drillinginfo     Published Date: Nov 17, 2015
For this edition of the DI expert series, we’ve prepared some remarkable technical insights regarding the geology of the top plays and emerging formations in the U.S. From comparing the efficiency of Wolfcamp production intervals with the Cline Shale in West Texas, to providing spatial distribution analyses and production trends for the Canyon Granite Wash in the Anadarko, our experts evaluated the complexities of prolific oil and gas regions and outlined essential takeaways. We also examined the sweet spots of the Mississippi Lime play, and offer insights regarding optimal target of penetration for this highly porous, commercially developed region. Lastly, we explored the geology of the world-renowned Eagle Ford Shale Play in the Gulf Coast Basin and provided observations regarding the influence of stress on this prominent play.
Tags : 
geology, shale, play, technical, insight, formations, efficiency, distribution, analyses, production, trends, oil, gas, takeaways
    
Drillinginfo

FÜNF SCHWERPUNKTBEREICHE ZUR REDUZIERUNG DER CYBER DWELL TIME

Published By: Forcepoint     Published Date: Apr 20, 2016
Je länger sich Angreifer in Ihren Netzwerk aufhalten, desto mehr laterale Bewegung ist möglich - und desto größer ist auch das Risiko eines Datendiebstahls. Ein realistischer Ansatz für Datensicherheit und eine Reduzierung der Verweildauer in Ihrem Netzwerk konzentriert sich weniger darauf, eine mögliche Datenkompromittierung zu vermeiden, sondern sorgt vielmehr dafür, dass Daten niemals aus Ihrem Netzwerk herausgeschleust werden können.
Tags : 
cyber security, security application, security, cybersecurity, data prevention, anti spam, anti spyware, anti virus, application security, email security, internet security, intrusion detection, intrusion prevention
    
Forcepoint

Prévention Contre le Vol de Données : Protégez-vous Tout en Innovant

Published By: Forcepoint     Published Date: Apr 20, 2016
En 2014, les fuites de données ont compromis plus de 700 millions de dossiers, engendrant des pertes financières estimées à au moins 400 millions $, et la fréquence des incidents liés à la sécurité est passée à 66 pour cent. Mais ne laissez pas la crainte étouffer votre croissance. Le rapport sur la prévention contre le vol de données se penche principalement sur la manière de vous protéger lorsque vous innovez, mais selon une perspective plus large en termes de portée et plus intelligente dans l’application.
Tags : 
security, data theft prevention, data security, security application, anti spam, anti spyware, anti virus, application security, internet security, intrusion detection, security policies
    
Forcepoint

Verhinderung von Datendiebstahl: Bleiben Sie sicher - und innovativ!

Published By: Forcepoint     Published Date: May 16, 2016
2014 wurden mehr als 700 Millionen Datensätze durch Verletzungen der Datenintegrität kompromittiert. Die finanziellen Verluste werden auf mindestens 400 Mio. USD geschätzt. Gleichzeitig stieg die Anzahl der Sicherheitsvorfälle um 66 Prozent. Lassen Sie nicht zu, dass Ihr Wachstum durch Angst gebremst wird. Der Bericht "Verhinderung von Datendiebstahl" konzentriert sich darauf, wie Sie aus breiterer, intelligenterer Anwendungssicht sicher bleiben, während Sie Innovationen vorantreiben.
Tags : 
security, data theft prevention, data security, security application, anti spam, anti spyware, anti virus, application security, intrusion detection, security policies
    
Forcepoint

Don't let bad data compromise your intelligence

Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
As the information age matures, data has become the most powerful resource enterprises have at their disposal. Businesses have embraced digital transformation, often staking their reputations on insights extracted from collected data. While decision-makers hone in on hot topics like AI and the potential of data to drive businesses into the future, many underestimate the pitfalls of poor data governance. If business decision-makers can’t trust the data within their organization, how can stakeholders and customers know they are in good hands? Information that is not correctly distributed, or abandoned within an IT silo, can prove harmful to the integrity of business decisions.
Tags : 
    
Group M_IBM Q2'19

Ovum—On the Radar: Fugue Offers Infrastructure Deployment and Automation in the Cloud

Published By: Fugue     Published Date: Mar 27, 2017
Check out this report to see why Ovum recommends Fugue’s solution to help developers generate applications that can exploit cloud capabilities and deliver on the promise of the cloud.
Tags : 
cloud management, cloud infrastructure management, cloud operating systems, cloud, cloud infrastructure, cloud computing, cloud adoption, cloud migration, devops, aws, amazon web services, cloud operations, cloud ops, continuous delivery, continuous integration, ci/cd, cicd, cloud automation, serverless, lambda
    
Fugue
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.