rios

Results 51 - 75 of 263Sort Results By: Published Date | Title | Company Name

An Engaging Employee Experience

Published By: Cornerstone OnDemand     Published Date: Feb 07, 2017
Are your employees truly connected to—and engaged with—your business? In a perfect world, every employee is committed to your organization’s goals, is ready to go above and beyond in daily activities, and actively collaborates with other team members. Yet when it comes to employee engagement, there’s a big gap between perfect world scenarios—and the reality.
Tags : 
    
Cornerstone OnDemand

A SANS Product Review: See the results of the SANS evaluation of the CrowdStrike Falcon® platform

Published By: CrowdStrike     Published Date: Aug 01, 2017
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShellattacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn:?Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more?The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model ?How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent attacks
Tags : 
    
CrowdStrike

A SANS Product Review: The results of the SANS evaluation of the CrowdStrike Falcon® platform

Published By: CrowdStrike     Published Date: Nov 28, 2018
You won’t want to miss this report, “A New Era in Endpoint Protection: A SANS Product Review of CrowdStrike Falcon Endpoint Protection,” where SANS reveals the results of their evaluation of the CrowdStrike Falcon® platform. To conduct their evaluation, SANS security analysts ran Falcon through a wide range of increasingly complex attack scenarios. The exploits they used to evaluate CrowdStrike included phishing, credential dumping/lateral movement, unknown malware, PowerShell attacks and more. The report shows that CrowdStrike Falcon was able to detect and prevent every attack to which SANS subjected it. Read this SANS report to learn: • Details on Falcon’s efficacy in preventing a wide range of attacks: Ransomware, lateral movement, PowerShell-based, and more • The power of the CrowdStrike Threat Graph™ and the benefits of its crowdsourced intelligence model • How CrowdStrike’s ability to capture detailed forensic information on attempted and thwarted attacks, allows you to prevent
Tags : 
    
CrowdStrike

Making the Business Case for Threat Intelligence

Published By: Cyveillance     Published Date: Oct 20, 2015
In this white paper, we examine what we consider to be three necessary steps when making a business case for threat intelligence for your organization. Companies must define what they need and why they need it, align security needs and business objectives, and finally, develop an effective plan. We then offer two example scenarios of how businesses can put these steps together and created a solid justification for threat intelligence.
Tags : 
cyveillance, threat intelligence, security, security professionals, it management, it security
    
Cyveillance

Cyber AI Response: Threat Report 2019

Published By: Darktrace     Published Date: Apr 02, 2019
This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks. While all threat scenarios were distinct, some fast-moving and others slow and stealthy, in all cases the subtle indicators of suspicious activity were only detectable using Darktrace AI, which learns what is normal for the business environment and autonomously responds to attacks – before damage is done.
Tags : 
    
Darktrace

The Need for Disk Encryption and Advanced Password Protection in Healthcare

Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc

Advancing the Data Agenda: Roles and Responsibilities in the Data Quality Trenches

Published By: DataFlux     Published Date: Jan 07, 2011
This white paper, the first in a sequence, addresses the question, "who, specifically, are those right groups and right people?" on several different levels. It also highlights underlying principles that, properly applied, lead to solid answers to the "who" questions for a wide variety of scenarios.
Tags : 
dataflux, data agenda, data quality, governance, analytics, measurement and reporting, automation, test and measurement, business analytics, business process automation, analytical applications, data warehousing
    
DataFlux

3 Ways That Hybrid Cloud for DBMS Will Drive Your Data Management Strategy

Published By: Datastax     Published Date: Oct 21, 2019
The majority of enterprises using cloud will be living in a hybrid deployment world for the foreseeable future. Data and analytics leaders must understand the risks and benefits in using the primary scenarios for hybrid cloud DBMS, and how they align with core use cases and architectures. Read this Gartner report to learn more about how you can evolve your data management strategy to reflect the latest trends and technologies.
Tags : 
    
Datastax

El valor comercial de la modernización de la infraestructura con sistemas infraestructura con sistem

Published By: Dell EMC & Intel     Published Date: Aug 03, 2018
IDC realizó entrevistas en organizaciones que habían implementado las soluciones hiperconvergentes Dell EMC VxRail y VxRack con tecnología del procesador Intel® Xeon® Platinum para facilitar la expansión de sus operaciones de TI y de negocio. Los participantes en el estudio informan que las soluciones de infraestructura hiperconvergente de Dell EMC facilitan la innovación en sus organizaciones distribuidas, ya que constituye una base rentable, ágil y de alto rendimiento para la infraestructura de TI. El resultado es que dichas organizaciones están logrando, en cinco años, un retorno del 619 % de la inversión en soluciones de infraestructura hiperconvergente de Dell EMC, cuyo valor calcula IDC en US$150,776 por cada 100 usuarios al año, lo que equivale a un período de amortización de seis meses.
Tags : 
    
Dell EMC & Intel

Optimización del ciclo de vida de los PC

Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
La tecnología del hardware no dura para siempre. Tiene un ciclo de vida, un comienzo y un final medibles con respecto a su productividad y valor. El departamento de TI se encarga de optimizar el ciclo del ciclo de vida de los PC e impulsar al mismo tiempo avances estratégicos para la organización. Sin embargo, lidiar con el coste alto y la complejidad que impone la gestión de los PC deja poco tiempo para la innovación. Ofrecemos opciones de financiación flexibles que ayudan a garantizar que el departamento de TI siempre tenga todo lo que necesita y cuando lo necesita para que los usuarios finales nunca tengan que interrumpir su trabajo por problemas de este tipo. Obtenga más información acerca de las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell EMC EMEA

The PC Lifecycle Continuum: From Control to Transformation

Published By: Dell EMC EMEA     Published Date: Mar 29, 2019
Mientras las diversas organizaciones buscan implementar estrategias impulsadas por los datos, el ordenador personal en todas sus variantes sigue siendo la herramienta de productividad clave para el personal. Los líderes de TI deben orientar la gestión de los PC durante todo su ciclo de vida para que los usuarios trabajen de la manera más eficaz. En la actualidad, los líderes de TI abordan el ciclo de vida de los PC en un ciclo continuo, desde el control hasta la transformación. El control está orientado hacia la optimización, mientras que la transformación se centra en el impacto de la tecnología en el negocio. Descargue este documento técnico para obtener más información acerca de las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell EMC EMEA

Productividad en el lugar de trabajo

Published By: Dell EMEA     Published Date: Sep 09, 2019
En cuanto a durabilidad, nadie iguala a Dell. Nuestras máquinas no solo tienen las características de seguridad, las prestaciones y la capacidad de gestión que inspiran la confianza de los departamentos informáticos, sino que además están diseñadas para ciclos de vida largos, lo que reduce la generación de residuos y los costes del reciclaje. No es de extrañar que duren tanto. Ese es el pasado. ¿Pero qué pasa con las funciones innovadoras? El 2 en 1 Latitude 7400 utiliza el nuevo ExpressSign-in de Dell para detectar la presencia de los usuarios, activar el sistema en aproximadamente un segundo y realizar un escaneo de reconocimiento facial que permite iniciar sesión con Windows Hello. Los usuarios pueden simplemente sentarse en su escritorio y empezar a trabajar, sin tener que pulsar Control+Alt+Supr ni presionar el botón de encendido. De hecho, es el primer PC del mundo que usa un sensor de proximidad con Intel® Context Sensing Technology. Cuando los usuarios se aparten para hacer un
Tags : 
    
Dell EMEA

2012 Threatscape Report - Dell SecureWorks Counter Threat Unit Research Team

Published By: Dell SecureWorks     Published Date: May 28, 2013
Examining threats over an extended period of time reveals current trends as well as clues about the future direction of attacker activity.
Tags : 
software vulnerabilities, global-scale threats, distributed denial of service attacks, advanced persistent threats, mobile threats, threat scenarios, attack trends, future attacks, security
    
Dell SecureWorks

Active Directory Recovery: What it Is, What it Isn't

Published By: Dell Software     Published Date: Oct 01, 2012
Are you prepared for common Active Directory failure scenarios? Are you counting on the Recycle Bin, only to find what you need isn’t there? Learn what you can and can’t do with AD native tools, and how the right third-party tools can automate recovery and put you back in control.
Tags : 
native active directory, delegation, desktop management, ad native tools
    
Dell Software

OVUM Case Study: Adoption of Dell Boomi AtomSphere iPaaS by Novartis

Published By: Dell Software     Published Date: Apr 29, 2015
Learn how multinational pharmaceutical company, Novartis, was able to achieve greater agility, faster time to value, and lower total-cost-of-ownership (TCO) by consolidating and retiring its traditional middleware solutions and moving to cloud and mobile integration scenarios.
Tags : 
ipaas, greater agility, faster time to value, total-cost-of-ownership, traditional middleware solutions, cloud and mobile integration, enterprise applications
    
Dell Software

Validating scale-out storage performance for block and file I/O

Published By: Dell Storage     Published Date: Apr 17, 2012
A scale-out storage architecture helps organizations deal with demands for growing data capacity and access. Dell engineers put DellT EqualLogicT scale-out storage through its paces to demonstrate its scalability in both file and block I/O scenarios.
Tags : 
storage
    
Dell Storage

The Rise of the Enterprise Container Platform

Published By: Docker     Published Date: Feb 21, 2019
The container revolution is under way today as companies seek to move faster and build digital assets to support growth. IDC forecasts that there will be over 1.8 billion enterprise container instances deployed by 2021. Container platforms will be key to managing the ever-expanding diversity of IT environments (multiple operating systems, hypervisors, private clouds, and public clouds). While containers are the perfect vehicle to underpin cloud-native, microservices applications, containers are also well suited to many existing applications. These applications can reap immediate benefits from being modernized and prepare for possible refactoring over time. To successfully leverage containers in these diverse scenarios and do it at scale, enterprises will need a robust, integrated, and holistic container platform.
Tags : 
migrate applications, containerization, application development, digital transformation, microservices, modernization, cloud computing, hybrid cloud, application security
    
Docker

Critical Capabilities for Enterprise Endpoint Backup

Published By: Druva     Published Date: Jan 04, 2016
Endpoint backup has gone beyond simple backup/restore to a broader end-user data protection solution reducing various risks and increasing user productivity. This research helps I&O leaders evaluate enterprise endpoint backup solutions in two scenarios: cloud deployment and on-premises deployment.
Tags : 
enterprise, endpoints, backup, vendor comparison, cloud, on premise, disaster recovery, vulnerability management
    
Druva

The B2B Marketer's Guide to the World of Programmatic Advertising

Published By: Dun & Bradstreet     Published Date: Feb 16, 2016
By 2017, 83% of all online advertising will be purchased programmatically, according to eMarketer. Don’t left behind. Download this informative eBook to learn why you should be investing in programmatic right now. Whether you're a beginner with a basic curiosity, or you have already executed a programmatic ad buy but you want to learn more, you'll discover exactly what programmatic is, why you need it, and how it works. Ultimately, you'll discover why Programmatic Matters. You’ll learn: • The key players in the programmatic ecosystem and how to work with them to execute a successful campaign • Why data is the key ingredient of programmatic • How to leverage targeting to your advantage
Tags : 
    
Dun & Bradstreet

Programmatic Matters

Published By: Dun & Bradstreet     Published Date: Jun 08, 2016
THE B2B MARKETERS GUIDE TO THE WORLD OF PROGRAMMATIC ADVERTISING While some in the B2B world are quickly jumping on the programmatic advertising bandwagon, many more don’t know the first thing about it or what the benefits are. That’s probably why you’re checking out this nifty little guide right now. Whether you’re a beginner with a basic curiosity about programmatic, or you have already executed a programmatic ad buy but want to learn more, you’ve come to the right place. After skimming through the pages of this book, you’ll learn exactly what programmatic is, why you need it, how it works, and why there’s no looking back when planning you’re next great ad campaign. You’ll discover exactly why Programmatic Matters.
Tags : 
    
Dun & Bradstreet

For Safety’s Sake: the importance of risk analysis

Published By: Eaton     Published Date: Jul 12, 2019
Working on energized equipment is one of the more dangerous scenarios technicians face in the field. As a result, there’s been a concerted industry effort to improve the understanding of electrical shock and arc flash hazards. I believe one of the most important standards in this safety push is the restructured language within the 2018 edition of the National Fire Protection Agency’s (NFPA’s) 70E “Standard for Electrical Safety in the Workplace.” In the past, the standard addressed electrical hazards and risks holistically when considering energized electrical work. But today’s latest guidelines now identify hazards and risks independently and include recommendations for a thorough risk analysis that considers the hazard, the planned work task and potential human error. Together, the changes result in a clearer understanding of energized work and help reduce electrical incidents.
Tags : 
    
Eaton

Cloud 2.0 - Catch the Next Wave with a Hybrid Multi Cloud Strategy

Published By: Equinix APAC     Published Date: May 22, 2019
According to IDC, almost half of IT spending will be cloud-based in 2018, reaching 60% of all IT infrastructure and 60-70% of all software, services and technology spending by 2020. Today’s top-performing organizations are benefiting from hybrid and multi cloud scenarios. Industry thought leaders share their perspectives and insights on how enterprises across the region are reshaping their cloud strategies to stay ahead. • Industry Trends - William Lee, Research Director at IDC • Industry Best Practices - Alex Wehle, Cloud Infrastructure Lead, Microsoft • End User Perspective - T C Chao, Senior Manager, Ricoh • Industry Insights - Tejaswini Tilak, Sr. Director, APAC, Equinix Watch the webinar broadcast and a copy of the latest IDC cloud research report in addition.
Tags : 
    
Equinix APAC

CINCO CRITERIOS DE EVALUACIÓN QUE AYUDAN TOMAR LA DECISIÓN DE COMPRA ADECUADA

Published By: Extreme Networks     Published Date: Feb 20, 2015
Este documento expone cinco criterios clave que cualquier organización que se esté planteando desplegar o evolucionar su red inalámbrica debería tener en cuenta si pretende tomar una decisión de compra acertada.
Tags : 
soluciones wireless, byod, wi-fi, infraestructura, it management, wireless, knowledge management, enterprise applications
    
Extreme Networks

eBOOK SANIDAD - CÓMO CONVERTIR LA RED DEL HOSPITAL EN UN ACTIVO DE NEGOCIO ESTRATÉGICO

Published By: Extreme Networks     Published Date: Feb 14, 2017
En este documento, se describen casos de uso concretos de cómo una solución de análisis de red e inteligencia de negocio ayuda a gestionar eficientemente las operaciones de TI de hospitales y centros sanitarios
Tags : 
    
Extreme Networks

EDUCACION-IOT PARA CAMPUS UNIVERSITARIOS

Published By: Extreme Networks     Published Date: Feb 14, 2017
Cada vez hay más dispositivos y sistemas autónomos que utilizan la red compo infraestructura de comunicación. Este fenómeno, conocido como “Internet of Things” es hoy día omnipresente en cualquier entorno, desde edificios inteligentes a hospitales. Las universidades y centros educativos no son ajenos a este fenómeno. En este documento se analiza la problemática concreta que IoT plantea a este tipo de entornos y la forma de darle respuesta
Tags : 
    
Extreme Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.