romi

Results 751 - 775 of 778Sort Results By: Published Date | Title | Company Name

What Works in B2B Marketing: Proven Tactics for 2011

Published By: GoToWebinar     Published Date: Apr 06, 2011
Watch this on-demand webinar to hear Matthew Grant delve into the findings of MarketingProfs' latest original research, revealing which marketing tactics deliver results and which show the most promise for 2011.
Tags : 
lead generation, brand awareness, social media, online marketing, b2b marketing, matthew grant, citrix webinar
    
GoToWebinar

What’s New in the Windows 10 Security Log

Published By: LogRhythm     Published Date: Aug 08, 2016
Among the countless changes in Windows 10 Microsoft has provided IT organizations more visibility into auditable actions on Windows 10 machines and the resulting events in the Security Log. Understanding these enhancements is important because we need every edge we can get to detect endpoint intrusions. Threat actors use a sophisticated mix of phishing, social engineering, and malware to attempt to compromise any user within an organization. A seemingly benign order request sent to a salesperson or a benefits summary to someone in HR can contain attachments infected with malware. Once such payloads are in, the goal is to determine how to leverage current users and other accounts on the compromised machine to access valuable and sensitive data, as well as how to spread out within the organization and repeat the process.
Tags : 
microsoft, security, best practices, data, business analytics, business management, business technology
    
LogRhythm

What’s next for hyper-converged infrastructure: 5 powerful HCI use cases for 2019 and beyond

Published By: VMware     Published Date: Oct 12, 2018
Since Hyper Converged Infrastructure (HCI) emerged as a breakthrough technology, it has continued to gain taction as it has truly delivered on its promise. It has helped organizations optimize resources, reduce complexity, lower costs, increase agility and accelerate development cycles, as well as provide a seamless path to hybrid cloud. These are just a few of the key benefits causing IT leaders pay close attention to HCI and look at ways to use it to power key initiatives such as digital transformation. As IT leaders continue to embrace HCI and the market is expected to grow at a compound annual rate of 42% through 2023, the future is happening now. Submit the form to read our latest whitepaper and discover 5 powerful HCI case studies around Business critical applications, Hybrid Cloud/Multicloud, Disaster recovery, Edge computing, Container and App Development.
Tags : 
    
VMware

When Minutes Count: How experts fight advanced threats with real-time SIEM

Published By: McAfee     Published Date: Nov 20, 2014
A survey commissioned by Intel Security and conducted by Evalueserve, in conjunction with the report, suggests that a majority of companies lack confidence in their ability to detect targeted attacks in a timely manner. Even companies best prepared to handle targeted attacks are taking the time to investigate high volumes of events. Key findings include 78% of those able to detect attacks in minutes had a proactive, real-time SIEM solution.
Tags : 
siem, incident response, ir capabilities, threat intelligence, indicators of attack, indicators of compromise, foundstone, ioas, iocs, evalueserve, real-time siem, security
    
McAfee

Whitepaper: File Sharing Without Fear

Published By: Blackberry     Published Date: Jul 12, 2019
Law firms have received two dramatic wake-up calls about the vital importance of data security in the last two years. First, there was the leak of 11.5 million documents from offshore law firm Mossack Fonseca, known as the Panama Papers, which became public in 2016.1 Then came the massive cyberattack on prominent global law firm DLA Piper in the summer of 2017.2 As we will explore, despite the industry’s aversion to media coverage of such attacks, less-visible breaches involving the legal profession are being reported worldwide in ever-increasing numbers.
Tags : 
    
Blackberry

Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security

Published By: CrowdStrike     Published Date: Aug 01, 2017
Download this white paper to learn:?The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence?How fileless attacks exploit trusted systems —the types of processes compromised, the specific exploit tactics used to gain a foothold, and more?Why traditional technologies fail to protect against fileless attacks and what you can do to better defend your organization against them
Tags : 
    
CrowdStrike

Who Needs Malware? How Adversaries Use Fileless Attacks to Evade Your Security

Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks will be subsiding anytime soon. Read this white paper to get the important information you need to successfully defend your company against stealthy fileless attacks. Download this white paper to learn: • The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence • How fileless attacks exploit trusted systems — the types of processe
Tags : 
    
CrowdStrike

Why A Workstation?

Published By: PC Mall     Published Date: Jan 31, 2012
While PCs deliver excellent value, versatility, and stability, workstations deliver ultimate performance, uncompromised reliability, and wide-ranging scalability, from entry-level up to extreme power users.
Tags : 
data management, data center
    
PC Mall

Why Chatbots Need Knowledge Management

Published By: MindTouch     Published Date: Mar 08, 2019
Successful chatbot deployments depend on knowledge management. The numbers are eye-opening. If recent trends hold, chatbots promise to factor prominently in any organization’s mix of self-service channels—at least any organization that prioritizes the customer experience. This infographic takes you through the numbers, quickly revealing how crucial KM is to successful chatbot deployments.
Tags : 
    
MindTouch

Why choose NetScaler over F5

Published By: Citrix Systems     Published Date: Nov 10, 2014
Today’s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce costs and datacenter sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security, data management
    
Citrix Systems

Why Customers Choose Box Over Dropbox for Business

Published By: Box     Published Date: Nov 24, 2015
The adoption of enterprise content collaboration solutions has exploded as individuals sought ways to easily access, manage, and collaborate on content. Accordingly, businesses want to leverage those easy-to-use solutions but can’t compromise when it comes to enterprise-grade administrative control, security, and business insights.
Tags : 
box, dropbox, business, productivity, collaboration, content, enterprise, knowledge management, enterprise applications, data management, business technology
    
Box

Why Manufacturers Cannot Forgo English Language Training

Published By: Rosetta Stone     Published Date: Apr 03, 2018
Manufacturing is a prominent pillar of American growth and prosperity. According to the National Association of Manufacturers, every $1 invested in the manufacturing sector returned $1.81 to the economy in 2015.
Tags : 
    
Rosetta Stone

Why Taking a Unified Approach Is Essential to Hybrid Cloud Security

Published By: Juniper Networks     Published Date: Aug 10, 2017
The dramatic growth of hybrid cloud deployments is creating new challenges for security professionals that can no longer be addressed with legacy technologies, policies and processes. As applications and data move fluidly between multiple clouds private, public and hybrid—organizations must take a unified approach to security that incorporates a range of products working hand in glove to reduce risk and protect the business.
Tags : 
cloud, malware protection, compromised files, threat intelligence, security director, virtual firewall, atp, srx, vsrx
    
Juniper Networks

Why the Future of Cloud is Open

Published By: Red Hat     Published Date: Dec 15, 2017
Choosing how to build an open hybrid cloud is perhaps the most strategic decision IT leaders will make this decade. It’s a choice that will determine their organization's competitiveness, flexibility, and IT economics for the next ten years. That's because, if done right, a cloud delivers strategic advantages to the business by redirecting resources from lights-on to innovation. But only an open hybrid cloud delivers on the full strategic business value and promise of cloud computing.
Tags : 
    
Red Hat

Why Today's Digital Teams Need a New Class of Collaboration Tools and Solutions

Published By: Cisco Wireless     Published Date: Apr 14, 2017
Teamwork: In today’s workplace, it’s the new normal. Organizations of nearly all sizes and industries find that activating high-performance teams can deliver dramatic results. These teams, unlike those of the recent past, prominently include people from outside the organization, such as contractors, suppliers, and consultants as well as colleagues in disparate locations. Read this Harvard Business Review study to learn how your organization can respond to todays collaboration challenges: Integrating workers who might be telecommuting or working flexible hours. Reacting to new business drivers such as speed to market, mobility, and globalization. Present collaboration tools that fall short on supporting the depth, pace, and style of teamwork now required to remain competitive.
Tags : 
    
Cisco Wireless

Why Your Next Generation Firewall Protection Isn't Enough

Published By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection, security
    
Webroot Inc

Wiegand Security Compromised

Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
At the Defcon security conference on August 2007, a hacker and Defcon staffer who goes by the name Zac Franken, showed how a small homemade device he calls "Gecko", which can perform a hack on the type of access card readers used on office doors throughout the country.
Tags : 
security, security management, access control, identity management, iam, authentication, wiegand, tracking, workforce, workforce management, employee management, borer, access control, wiegand, security, borer, borer data systems, hacker, defcon, zac franken
    
Borer Data Systems Ltd.

Winning With Superior Customer Experiences

Published By: Adobe     Published Date: Oct 10, 2019
The customer experience is changing. Personalized engagement is now king. And as your business scales up and grows, this begins to present several promising opportunities
Tags : 
    
Adobe

With Data Breaches on the Rise, HP Point of Sale Systems Offer Protection

Published By: HP Inc.     Published Date: Sep 11, 2018
A point of sale system is unlike any other piece of technology employed by businesses. It is a sophisticated computer system that manages sensitive customer data in a public space, often accessible by a large number of employees, in addition to customers or anyone else in the area. Because of this, it’s a unique target for compromised data. Plus, it’s mission-critical nature means compromised systems can bring a business to a halt, resulting in lost business. It is estimated that organizations have a one-in-four chance of experiencing a data breach1. Within the business space, it’s estimated that 89 percent of retail data breaches were targeted at point of sale systems, according to the 2018 Verizon Data Breach Report2. At HP, data integrity is of utmost importance, and we have prioritized advanced security in our technology at every step of the design process.
Tags : 
    
HP Inc.

Work/Life Balance: Maintaining an Engaged Workforce

Published By: Epicor HCM     Published Date: Mar 24, 2011
There are several ways to provide employees with opportunities to balance their personal and professional lives without compromising your organization's productivity. In fact, helping employees find a work/life balance can increase productivity.
Tags : 
work/life balance, fulfillment, hcm, workforce management, productivity, sass
    
Epicor HCM

WP Location Based Services (Us Pilot Only)

Published By: Cisco     Published Date: Apr 10, 2015
Location-based services (LBS) show promise as a budding customer-centric mobility solution in some early adopting verticals such as retail, hospitality, and large public venues. Such services enable businesses to better understand their customer base through analytics as well as offer targeted, context-based communications including promotions and remote assistance. This IDC white paper explores the burgeoning LBS market, highlighting custom research conducted by IDC in March and April 2014; surveys were fielded to both IT and line-of-business (LOB) decision makers in select verticals and market segments. In this white paper, IDC analyzes the data and explores the attitudes surrounding LBS adoption in the context of broader technology trends.
Tags : 
cisco, lbs, it technology, wifi, analytics, wireless networks, mobile computing, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless service providers, wlan
    
Cisco

x-diagram: CLOUD – WITHOUT COMPROMISE

Published By: Oracle     Published Date: Mar 11, 2013
This x-diagram illustrates how Oracle Human Capital Management in the cloud is the transformational tool that helps HR bring value back to the organization.
Tags : 
human capital management, talent management, workforce management, oracle, human resources
    
Oracle

You Can’t Have Cybersecurity Success Without Effective Endpoint Management

Published By: IBM     Published Date: Jun 05, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises.
Tags : 
    
IBM

You Can’t Have Cybersecurity Success Without Effective Endpoint Management

Published By: IBM     Published Date: Jun 06, 2018
There is one certainty with cybersecurity and that is nothing is certain. Take for example the role the endpoint plays in keeping an enterprise secure. While many cybersecurity professionals are relatively certain that endpoints are locked down and security policies are being enforced, the simple fact of the matter is that endpoints prove to be the root of most compromises. Research
Tags : 
    
IBM

Your business is at risk from a spear-phishing attack. See how it will take place – step by step.

Published By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management, knowledge management, data management
    
Mimecast
Start   Previous    18 19 20 21 22 23 24 25 26 27 28 29 30 31 32    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.