romi

Results 51 - 75 of 781Sort Results By: Published Date | Title | Company Name

How to Streamline Security and DLP Policy Management with McAfee

Published By: AWS     Published Date: Oct 07, 2019
Application owners and DevOps teams want to build in AWS without compromising security, but often lack the tools to keep sensitive data secure. During Pacific Dental’s move to Amazon Web Services (AWS), the company sought to enhance and operationalize its security measures to match the speed and scale of the cloud, using a cloud access security broker (CASB) to proactively address misconfiguration and risk to their data. Register for our webinar to learn how Pacific Dental leveraged McAfee’s CASB solution, McAfee MVISION Cloud, to address these challenges and fulfill their security responsibility.
Tags : 
    
AWS

Automate Your Cloud Compliance Journey in 6 Steps

Published By: AWS     Published Date: Oct 07, 2019
Securing cloud environments is different from securing traditional data centers and endpoints. The dynamic nature of the cloud requires continuous assessment and automation to avoid misconfigurations, compromises, and breaches. It can also be difficult to gain complete visibility across dynamic and rapidly changing cloud environments — limiting your ability to enforce security at scale. On top of these challenges, cloud governance is critical to maintain compliance with regulatory requirements and security policies as they evolve. Because cloud deployments are not just implemented once and left untouched, organizations need to consider how to integrate security into their CI/CD pipeline and software development lifecycle. Implementing a security solution that addresses cloud challenges requires deep security and cloud expertise that organizations often do not have. Once in the cloud, organizations manage and create environments via automation, adapt their workloads to changes by automa
Tags : 
    
AWS

Increase application security and availability with Imperva

Published By: AWS     Published Date: Oct 07, 2019
Imperva, an APN Security Competency Partner, can help protect your application workloads on AWS with the Imperva SaaS Web Application Security platform. The Imperva high-capacity network of globally distributed security services protects websites against all types of DDoS threats, including networklevel Layer 3 and Layer 4 volumetric attacks—such as synchronized (SYN) floods and User Datagram Protocol (UDP) floods—and Layer 7 application-level attacks (including the OWASP Top 10 threats) that attempt to compromise application resources. Harnessing real data about current threats from a global customer base, both the Web Application Firewall (WAF) and DDoS protection, incorporate an advanced client classification system that blocks malicious traffic without interfering with legitimate users. Enterprises can easily create custom security rules in the GUI to enforce their specific security policy. In addition, this versatile solution supports hybrid environments, allowing you to manage th
Tags : 
    
AWS

How to Streamline Security and DLP Policy Management with McAfee

Published By: AWS     Published Date: Oct 09, 2019
Application owners and DevOps teams want to build in AWS without compromising security, but often lack the tools to keep sensitive data secure. During Pacific Dental’s move to Amazon Web Services (AWS), the company sought to enhance and operationalize its security measures to match the speed and scale of the cloud, using a cloud access security broker (CASB) to proactively address misconfiguration and risk to their data.
Tags : 
    
AWS

The 5 Keys to Optimizing Your Co-Op or MDF Advertising Program

Published By: Balihoo     Published Date: Apr 29, 2010
As a product manufacturer reaching your customers through a reseller network, you know it's critical to coordinate and leverage marketing activities with them. More than ever your marketing budgets are under scrutiny, while at the same time there's ever-growing pressure to achieve sales goals. Download this whitepaper to learn the 5 Keys to Optimizing your Co-op or MDF Advertising Program and seamlessly translate your national strategies into local execution.
Tags : 
balihoo, marketing, co op marketing, integrated marketing, romi, marketing automation
    
Balihoo

Phishing: Top Email Threats and Trends

Published By: Barracuda     Published Date: May 29, 2019
Spear phishing is a threat that’s constantly evolving as cybercriminals find new ways to avoid detection. This report takes an in-depth look at the three most prevalent types of attacks: brand impersonation, business email compromise, and blackmail.
Tags : 
    
Barracuda

See what Forrester Research is saying about enterprise email security

Published By: Barracuda     Published Date: Oct 14, 2019
In its guide for buyers considering email-security solutions—a detailed analysis of products and services—Forrester’s evaluation gave Barracuda the highest score possible in the cloud integration, deployment options and support and customer success criteria. Get full report and see all the details for yourself, including innovative solutions for email authentication and incident response and for preventing account takeover, business email compromise (BEC) and spear-phishing. Claim your complimentary copy right now!
Tags : 
    
Barracuda

Developing Inclusive Leaders

Published By: BetterUp     Published Date: Aug 14, 2018
"Company cultures that value and celebrate diverse perspectives not only support, engage and advance underrepresented groups, but also benefit by making better decisions and achieving broader innovation. We believe inclusion is a hallmark of strong leadership and should be a core skill for all leaders. Download our paper to learn: - Why most diversity and inclusion programs fall short on their promises - How to developing skills for inclusive workplace with BetterUp coaching - How BetterUp unlocks the potential of emerging leaders with career coaching to build leadership behaviors at scale"
Tags : 
human resource technology
    
BetterUp

Developing Inclusive Leaders

Published By: BetterUp     Published Date: Dec 05, 2018
Company cultures that value and celebrate diverse perspectives not only support, engage and advance underrepresented groups, but also benefit by making better decisions and achieving broader innovation. We believe inclusion is a hallmark of strong leadership and should be a core skill for all leaders. Download our paper to learn: - Why most diversity and inclusion programs fall short on their promises - How to develop skills for inclusive workplace with BetterUp coaching - How BetterUp unlocks the potential of emerging leaders with career coaching to build leadership behaviors at scale
Tags : 
    
BetterUp

Seven Best Practices for Managing Software Intellectual Property in an Open Source World

Published By: Black Duck Software     Published Date: Oct 01, 2009
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source, intellectual property, business intelligence, business management, database development
    
Black Duck Software

Securing Docker: What You Need to Know

Published By: Black Duck Software     Published Date: Feb 17, 2016
Container technologies like Docker promise to transform the way enterprises develop, deploy, and manage critical applications. However, containers are no panacea. The same challenges around deploying and managing applications in native environments and virtual machines also affect container deployments.
Tags : 
blackduck, docker, container deployments, docker containers, application management, container security, it management, knowledge management, enterprise applications
    
Black Duck Software

The Promise of Mobile Unified Communications

Published By: BlackBerry     Published Date: Jul 17, 2008
Mobile unified communications allows organizations to provide employees with the ability to collaborate and communicate efficiently, as well as access information on-demand. An exclusive Computerworld online survey offers insight into how companies can develop cost-effective strategies for implementing or improving mobile applications and foster an efficient workplace.
Tags : 
blackberry, unified communications, rim, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones
    
BlackBerry

Embracing Employee-Acquired Smartphones without Compromising Security

Published By: BlackBerry     Published Date: Mar 12, 2010
Individually acquired smartphones - those devices that employees purchase outright or get reimbursed for by the organization - are on the rise.
Tags : 
blackberry, smartphones, wireless, pda, enterprise servers, it management, budget, mobility, software costs, mobile computing, mobile data systems, mobile workers, smart phones, wireless communications, wireless hardware, wireless infrastructure, wireless phones, wireless security
    
BlackBerry

Whitepaper: File Sharing Without Fear

Published By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industry’s aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
    
Blackberry

Cylance 2017 Threat Report

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance

Check Yourself Before You "Rec" Yourself

Published By: BlackLine     Published Date: Aug 06, 2018
When did reconciliations become a living nightmare? Demanding deadlines. Strict requirements for review and supporting documentation. Endless piles of reconciliations to approve?that were due yesterday. Reconciliations are one of the most labor-intensive, yet critical controls processes within any organisation. Even the smallest mistake can compromise the integrity of your balance sheet and create discrepancies in your financial close. There is a simpler way to perform your reconciliation process that allows you to focus on analysis, risk mitigation, and exception handling. Join us for this webinar to find out what this is. You will learn how to: Automate daily reconciliations for continuous control and validation Gain better visibility into the quality, accuracy, and timeliness of a reconciliation Develop a seamless and streamlined workflow for preparation, approval, and review
Tags : 
    
BlackLine

Titan 3000: No Compromise for Unstructured Data

Published By: BlueArc Corporation     Published Date: Mar 31, 2008
The Titan 3000 family of high performance network storage hardware from BlueArc is yet another example of the company's innovative abilities, with enhanced and eye-popping capacity and performance specifications matched to its strong, familiar—and growing—feature and management capabilities. With perfect timing, it looks as if this product is a good match for emerging market needs.
Tags : 
tiered storage, storage, hardware, storage hardware, appliance, titan, titan 3000, bluearc, storage management, data replication
    
BlueArc Corporation

Database Security and Regulatory Compliance within the Pharmaceutical Industry

Published By: BMC Control M     Published Date: Apr 01, 2009
Listen in as Sentrigo interviews Dr. Charles Popper, who discusses specific data integrity and security requirements for the pharma sector. Dr. Popper will address how to enforce the proper balance of information sharing and database protection, without compromising high-quality research.
Tags : 
platforms, data management, linux, sap, windows, service oriented architecture, sla, international computing
    
BMC Control M

Delivering on Promise of Digital Transformation

Published By: BMC Software     Published Date: Oct 23, 2014
Rapid shifts in the ways that technology and information are consumed and delivered— through cloud computing, big data, social networking, and smart devices—are transforming how companies compete. IT is at the center of the fray, working with business leaders to develop and execute a digital transformation strategy that capitalizes on these major new technologies. In order to lead this transformation, IT executives must focus on three areas: collaborating with business leaders to build a strategic vision, modernizing technology infrastructure, and rebuilding IT organizations to execute against new digital business goals.
Tags : 
saas, cloud, itsm, integrating itsm, itsm integration, saas integration, networking, it management, data center
    
BMC Software

Wiegand Security Compromised

Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
At the Defcon security conference on August 2007, a hacker and Defcon staffer who goes by the name Zac Franken, showed how a small homemade device he calls "Gecko", which can perform a hack on the type of access card readers used on office doors throughout the country.
Tags : 
security, security management, access control, identity management, iam, authentication, wiegand, tracking, workforce, workforce management, employee management, borer, access control, wiegand, security, borer, borer data systems, hacker, defcon, zac franken
    
Borer Data Systems Ltd.

Why Customers Choose Box Over Dropbox for Business

Published By: Box     Published Date: Nov 24, 2015
The adoption of enterprise content collaboration solutions has exploded as individuals sought ways to easily access, manage, and collaborate on content. Accordingly, businesses want to leverage those easy-to-use solutions but can’t compromise when it comes to enterprise-grade administrative control, security, and business insights.
Tags : 
box, dropbox, business, productivity, collaboration, content, enterprise, knowledge management, enterprise applications, data management, business technology
    
Box

how intelligent cloud content management is fulfilling the original Promise of ECM

Published By: Box     Published Date: Nov 06, 2019
The value proposition of ECM is in transition. The promise of 1990s-architected ECM suites — to standardize all your content on a single ECM solution — failed to materialize. The complexity and inflexibility of these heterogeneous platforms never solved the original challenge of managing ungoverned and fragmented content stores — and make them increasingly unviable for today’s business needs. To find out more download this whitepaper today.
Tags : 
    
Box

How intelligent cloud content management is fulfilling the original Promise of ecm

Published By: Box     Published Date: Nov 07, 2019
The value proposition of ECM is in transition. The promise of 1990s-architected ECM suites — to standardize all your content on a single ECM solution — failed to materialize. The complexity and inflexibility of these heterogeneous platforms never solved the original challenge of managing ungoverned and fragmented content stores — and make them increasingly unviable for today’s business needs. To find out more download this whitepaper today.
Tags : 
    
Box

Five Simple Strategies for Securing APIs

Published By: CA Technologies     Published Date: Jan 09, 2015
This paper provides an overview of new APIs risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
apis, risks of apis, apis can increase organization's risks, api security, access control, anti spam, application security, disaster recovery, intrusion detection, security management, data integration, data protection
    
CA Technologies

Combatting Fraud: A Report by CA Technologies and PYMNTS.com

Published By: CA Technologies     Published Date: Jul 13, 2015
It’s not exactly breaking news that cardholder security is front and center of the payments ecosystem “to do” list. And, with that, the search for a solution that keeps cardholder data secure without compromising the consumer experience at checkout. Nowhere is this more important than online, where the incidences of fraud are increasing, and it becomes harder to authenticate the user.
Tags : 
3d secure, ca technologies, mobile, data management
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.