aps data

Results 101 - 125 of 147Sort Results By: Published Date | Title | Company Name

SSH attacks are giving APTs unauthorized privileged access

Published By: Venafi     Published Date: Jul 27, 2015
Read the solution brief to close SSH security gaps and protect your business.
Tags : 
ssh security gaps, business protection, cybersecurity, cryptographic security, data protection, security controls, ssh key usage, ssh keys management
    
Venafi

Creating an Effective Mobile Security Strategy

Published By: CDW     Published Date: Mar 27, 2015
Many, if not most, organizations today are grappling with the challenge of a growing mobile technology environment. Mobility can deliver many key benefits: improved collaboration among workers, enhanced customer service, easier access to corporate information from many locations and increased productivity—to name a few. But the proliferation of mobile devices and applications also comes with its share of challenges, perhaps none more important than ensuring the security of the devices themselves as well as the data they contain and the enterprise networks they access.
Tags : 
mobile, security, strategy, application, enterprise, network, data, wireless
    
CDW

Stop Unauthorized Privileged Access

Published By: Venafi     Published Date: Mar 26, 2015
Lax SSH security and management can lead to significant gaps in security controls. Cybercriminals target these gaps to gain full access to sensitive, regulated, and valuable systems and data. Read the solution brief, Stop Unauthorized Privileged Access, to close these SSH security gaps and protect your business: • Learn about the top SSH vulnerabilities • Discover how to reduce risk of SSH key misuse • Develop a strategy to manage and secure SSH keys
Tags : 
ssh security, ssh management, security controls, ssh vulnerabilities
    
Venafi

Cloud and Data Center Security: Secure Virtual, Cloud, Physical, and Hybrid Environments Easily

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security, networking, it management
    
CDW-Trend Micro

Beyond Relational: Reimagine Your Data with Enterprise NoSQL

Published By: MarkLogic     Published Date: Mar 13, 2015
Big Data has been in the spotlight recently, as businesses seek to leverage their untapped information resources and win big on the promise of big data. However, the problem with big data initiatives are that organizations try using existing information management practices and legacy relational database technologies, which often collapse under the sheer weight of the data. In this paper, MarkLogic explains how a new approach is needed to handle the volume, velocity, and variety of big data because the current relational model that has been the status quo is not working. Learn about the NoSQL paradigm shift, and why NoSQL is gaining significant market traction because it solves the fundamental challenges of big data, achieving better performance, scalability, and flexibility. Learn how MarkLogic’s customers are reimagining their data to: - Make the world more secure - Provide access to valuable information - Create new revenue streams - Gain insights to increase market share - Reduce b
Tags : 
enterprise, nosql, relational, databases, data storage, management system, application, scalable
    
MarkLogic

From Physical Security to Video Intelligence

Published By: Cisco     Published Date: Jan 21, 2015
Guido Jouret makes the case for surveillance that is no longer about a defensive security posture, but an offensive business imperative. Customers want to analyze the data they're collecting from these IP-enabled systems, from heat maps to the tracking of their customers to tighter integration between physical security infrastructure and other data center applications. The time has never been better.
Tags : 
cisco, surveillance, ip-enabled, devices, data, integration, iot, business
    
Cisco

Sans Healthcare

Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management, security
    
Qualys

Going Global: Programmatic Audience Development Around the World

Published By: Quantcast     Published Date: Jan 07, 2015
This white paper, published in partnership with the Interactive Advertising Bureau, will explore and present a snapshot of how publishers, marketers and technologists are “going global” in their practice of programmatic audience development across each of 12 markets. Conclusions are derived through a combination of survey and interview data— encompassing feedback from more than 200 executive-level leaders in the Americas, Europe, Africa, Asia, Australia and the Middle East.
Tags : 
programmatic audience development, marketing solutions, global marketing, audience culture, global branding
    
Quantcast

Maps, Mechanics & Morals When Launching Your Data Governance Initiative

Published By: SAS     Published Date: Mar 14, 2014
Jill Dyche and SpectraDynamo explains the importance of understanding how to manage data and issues regarding data categorization, retrieval and quality.
Tags : 
sas, data categorization, retrieval and quality, spectradynamo, telemetry data, data governance program, data management, data quality
    
SAS

What's the Big Deal about Big SQL?

Published By: IBM     Published Date: Mar 05, 2014
If you specialize in relational database management technology, you’ve probably heard a lot about “big data” and the open source Apache Hadoop project. Perhaps you’ve also heard about IBM’s new Big SQL technology, which enables IBM® InfoSphere® BigInsights™ users to query Hadoop data using industry-standard SQL. Curious? This paper introduces you to Big SQL, answering many of the common questions that relational database management system (DBMS) users have about this IBM technology.
Tags : 
ibm, big data, ibm big sql, sql, database management, database management technology, software, tables
    
IBM

Enterprise file-sharing on mobile devices: from foe to friend

Published By: Nativeflow     Published Date: Feb 25, 2014
Are your company’s employees using Sharepoint, Dropbox for Business or other enterprise cloud file-sharing services? Do your users want to use standard market aps to view and edit shared files on the go? Are you concerned about preventing enterprise data leakage from mobile devices? Download the datasheet to learn about approaches that address these challenges so that your enterprise can use these services while ensuring enterprise data is protected.
Tags : 
enterprise file-sharing, mobile devices, sharepoint, dropbox, cloud file-sharing, standard market app, datasheet, file leakage
    
Nativeflow

We Used to Schedule Repairs, Now We Predict Them

Published By: IBM     Published Date: Feb 10, 2014
Predictive maintenance taps into the sets of structured and unstructured data that organizations already have available.
Tags : 
ibm, business analytics, operational analytics, predictive maintenance, predictive analytics, data analysis, efficiency, roi
    
IBM

The elixHR™ Platform: Connect Your People with Information for Business Results, Quickly and Easily

Published By: SumTotal Systems     Published Date: Oct 10, 2013
If you’re like everyone else in HR today, you’re probably thinking about how your organisation can handle data better. Maybe your executives want the power to make data-driven decisions from comprehensive workforce analytics. Perhaps you’d like to streamline the efficiency of your HR operation or put more actionable information in the hands of your line managers and employees. With the elixHR Platform, you can integrate your HR data and processes so your people can access information quickly and easily, and make better decisions. You can also lower your operational costs because you can increase efficiency and eliminate the need to replace HR systems that you already have in place.
Tags : 
sumtotal, sumtotal elixhr, sumtotal elixhr platform, elixhr, human resources, hr data, hr processes, hr systems
    
SumTotal Systems

How DDoS Detection and Mitigation can Fight Advanced Targeted Attacks

Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor

Manage Your Data at the VM Level With Unmatched Ease and Simplicity.

Published By: Tintri     Published Date: Jun 04, 2013
Powerful VM and application acceleration with Tintri
Tags : 
replication, cloning, snapshots, data management, vm-aware storage, tintri, virtualization, storage virtualization
    
Tintri

The Secret to Accelerating Your ERP Upgrade

Published By: Delphix     Published Date: Feb 28, 2013
This paper by analyst firm ESG describes the key challenges in ERP upgrade projects, and maps specific database virtualization functions to each challenge.
Tags : 
erp, enterprise resource planning, database virtualization, data management, virtualization
    
Delphix

100G Networking Is Here, But Where’s the Visibility?

Published By: Endace     Published Date: Dec 28, 2012
Your company is a voracious consumer of bandwidth - perhaps a very large enterprise, a research lab, or a service or content provider of some description. Running on ultra high speed data links may blind you from seeing real issues arising.
Tags : 
endace, 100g, networking, bandwidth, speed traffic, data management, business technology, data center
    
Endace

Free Paper: Five Ways Workforce Planners Can Support Data-Driven Decisions

Published By: Success Factors     Published Date: Aug 10, 2012
Will the people you need for your future workforce be there? This complimentary SuccessFactors white paper shows how to shorten the journey to data-driven decision-making about talent. Download it today.
Tags : 
successfactors, sap, best practices, workforce planning, data-driven decisions, workforce analytics, data mining, predictive modeling
    
Success Factors

Social Intelligence: Next-generation Social Media Monitoring

Published By: Gleanster     Published Date: Nov 10, 2011
This Gleansight benchmark report is based on the experiences of 387 companies and includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape with descriptions, rankings and analysis of 39 solution providers. Social intelligence is being increasingly used today to describe the next rung on the evolutionary ladder of listening to and acting upon consumer conversation on the social web. That rung maps to a number of technology innovations. Chief among them are improved capabilities around analyzing and integrating all sources of voice-of-the-customer data to generate more actionable insights. Social intelligence also speaks to an emerging corporate mindset regarding the strategic importance of social data and the need to better capitalize upon it. This Gleansight benchmark report reveals how Top Performers are achieving success when it comes to the incessant quest to extract customer insights and take actions that ultimately translate into revenue growth, cost reduction, risk reduction and relationship enhancement.
Tags : 
social intelligence, marketing, social media, gleanster
    
Gleanster

Lab Validation Report: IBM Real-time Compression

Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This ESG Lab report examines an innovative high speed data compression appliance from IBM.
Tags : 
ibm uk, real-time compression, compression, nas, storage efficiency, deduplication, netapp, n series
    
Ogilvy - IBM UK

Economic Impact of IBM's Real-Time Compression

Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
Read how Real-time Compression can impact your environment in the ESG Lab Validation Report.
Tags : 
ibm uk, real-time compression, compression, nas, storage efficiency, deduplication, netapp, n series
    
Ogilvy - IBM UK

Managing Servers and Storage Together Through the vSphere Client

Published By: Dell Storage     Published Date: Apr 21, 2011
The Dell Compellent vSphere Plug-In currently under development will enable data center administrators to manage many aspects of Dell Compellent Fluid Data storage directly through the VMware vSphere client. This demo video shows how to leverage the integration to provision and map storage volumes for VMFS datastores, create storage profiles for automated tiering and continuous snapshots, and recover datastores to virtually any point in time - all through a single interface. (4 min)
Tags : 
dell compellent, server, storage, vmware vsphere, integration, compellent vsphere plug-in, fluid data storage, storage area networks
    
Dell Storage

Data Loss Prevention: Keep Sensitive Data-In-Motion Safe

Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Whether your data loss is accidental or malicious, you need to gain insight into the magnitude of your data loss problem, identify security gaps, and develop a proactive approach to stop data loss before it happens.
Tags : 
watchguard xcs, data loss protection, data loss prevention, data breach, content analysis, contextual analysis, dlp solution, network security appliance
    
WatchGuard Technologies

Improving Procurement Efficiency by "Supplier Information Management"

Published By: Zynapse     Published Date: Feb 02, 2011
A worldwide leader in Spend Management Software solutions: Zycus. Recognized as one of the Top 3 Global Market Leaders in Spend Management Domain by leading analysts and Industry observers
Tags : 
zynapse, erp projects, unspsc, data information, procurement, information management, data management, governance
    
Zynapse

A Financial Professionals unique guide to "Supplier Information Management"

Published By: Zynapse     Published Date: Nov 08, 2010
A worldwide leader inSpend Management Software solutions: Zycus. Recognized as one of the Top 3 Global Market Leadersin Spend Management Domain by leading analysts and Industry observers
Tags : 
zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management
    
Zynapse
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.