cio

Results 101 - 125 of 1307Sort Results By: Published Date | Title | Company Name

Advancing Business Value Through Virtualization: Quantitative and Qualitative insights

Published By: HP and Intel ®     Published Date: May 02, 2013
This paper summarizes and evaluates the prevalence and efficacy of data center virtualization deployments, as well as the hardware that supports them. The conclusions drawn from this report are based on analysis of both quantitative market research and two qualitative interviews with a CIO and CTO in healthcare and finance, respectively. Each customer, referred to ESG by Hewlett-Packard (HP), had extensive experience deploying both server and desktop virtualization. The goal of the study was to determine the IT and business drivers to adoption of virtualization technologies, the expected and realized benefits, ensuing infrastructure decisions, future outlook of the data center, and best practices for deployment.
Tags : 
    
HP and Intel ®

Advancing to Bot Management and Security Credential Stuffing Becomes Top Concern

Published By: Akamai Technologies     Published Date: Aug 22, 2018
Malicious botnets present multiple challenges to enterprises — some threaten security, and others merely impact performance or web analytics. A growing concern in the bot environment is the practice of credential stuffing, which capitalizes on both a bot’s ability to automate repeat attempts and the growing number of online accounts held by a single user. As bot technologies have evolved, so have their methods of evading detection. This report explains how the credential stuffing exploit challenges typical bot management strategies, and calls for a more comprehensive approach.
Tags : 
management, bot, security, credential, akamai
    
Akamai Technologies

Agulha em um palheiro de dados: o surgimento do Big Security Data

Published By: McAfee     Published Date: Nov 07, 2014
Segundo o relatório “Agulha em um palheiro de dados” (Needle in a Datastack), as empresas estão vulneráveis a violações de segurança porque não são capazes de analisar ou armazenar adequadamente o Big Data. Esses volumes cada vez maiores de eventos, bem como de dados sobre ativos, ameaças, usuários e outros dados relevantes, criaram um grande desafio para as equipes de segurança em relação ao Big Data. Para solucionar esse desafio, as empresas abandonaram as arquiteturas tradicionais de gerenciamento de dados para adotar sistemas dedicados ao gerenciamento de dados de segurança na era das APTs (ameaças persistentes avançadas).
Tags : 
siem, big security data, segurança do big data, informações de segurança, ameaças avançadas, ameaças persistentes avançadas, apt, inteligência de segurança
    
McAfee

Ahorre tiempo y ahorre dinero

Published By: Dell PC Lifecycle     Published Date: Feb 20, 2018
La gestión tradicional del ciclo de vida del PC es un proceso ineficiente y costoso para el negocio tanto en términos de tiempo como de dinero. La solución de PC como servicio (PCaaS) de Dell EMC transforma el enfoque de la infraestructura de TI que aplica la empresa. La solución PCaaS franquea el acceso a nuestra reconocida cartera de dispositivos cliente. Hemos buscado el hardware idóneo para cubrir las necesidades específicas de cada uno de los perfiles. Obtenga más información sobre las soluciones Dell con tecnología Intel®.
Tags : 
ahorre, tiempo, dinero, dell
    
Dell PC Lifecycle

AI Momentum, Maturity and Models for Success

Published By: SAS     Published Date: Apr 10, 2019
Durante bastante tiempo, la Inteligencia Artificial ha tenido un atractivo para mejorar los procesos, aumentar la productividad y generar impactos de primera y última generación en las organizaciones. Los avances en datos y analítica han permitido a los primeros en adoptar la IA a nivel mundial en todas las industrias a crecer más allá de los experimentos y los éxitos rápidos, así como a proporcionar ejemplos de éxito con esta tecnología.
Tags : 
    
SAS

Analysis of a Multi-Stage Document Attack

Published By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
    
Menlo Security

Analyst Report: From Reactive to Predictive: 5 Steps to Transform your IT Organization with AI

Published By: Splunk     Published Date: Dec 11, 2018
Predictive IT is a powerful new approach that uses machine learning and artificial intelligence (AI) to predict incidents before they impact customers and end users. By using AI and predictive analytics, IT organizations are able to deliver seamless customer experiences that meet changing customer behavior and business demands. Discover the critical steps required to build your IT strategy, and learn how to harness predictive analytics to reduce operational inefficiencies and improve digital experiences. Download this executive brief from CIO to learn: 5 steps to an effective predictive IT strategy Where AI can help, and where it can’t How to drive revenue and exceptional customer experiences with predictive analytics
Tags : 
predictive it, predictive it tools, predictive analytics for it, big data and predictive analytics
    
Splunk

Android en Logística y Servicios de Envío

Published By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar elegir el dispositivo incorrecto para su aplicación. Para saber más sobre cada consideración, descargue nuestro documento técnico. El documente provee razones convincentes para elegir los dispositivos de nivel empresarial en lugar de dispositivos de nivel de consumidor, incluyendo: • Las principales comparaciones de rendimiento de escaneo • La importancia de la gestión de energía y los accesorios correctos • La importancia de la conectividad y por qué no todos los dispositivos son iguales
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55
    
Zebra Technologies

Android en Manufactura

Published By: Zebra Technologies     Published Date: Oct 04, 2017
Como evitar elegir el dispositivo incorrecto para su aplicación. Para saber más sobre cada consideración, descargue nuestro documento técnico. El documente provee razones convincentes para elegir los dispositivos de nivel empresarial en lugar de dispositivos de nivel de consumidor, incluyendo: • Las principales comparaciones de rendimiento de escaneo • La importancia de la gestión de energía y los accesorios correctos • La importancia de la conectividad y por qué no todos los dispositivos son iguales
Tags : 
mobile technologies, machine to machine communication, automation increase, accurate data capture, team collaboration, tc56, mc67, tc55
    
Zebra Technologies

Android for Work: 8 Security Considerations

Published By: MobileIron     Published Date: Apr 13, 2015
Enterprises around the world have been searching for a way to securely enable Android™ devices for work, but have shied away from the platform due to ongoing security and fragmentation concerns. Delayed or non-existent Android security patches, malicious app store activity, and other security gaps have led organizations to distrust the platform, particularly those in industries with tight security and compliance requirements. This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
    
MobileIron

Android for Work: 8 Security Considerations

Published By: MobileIron     Published Date: May 12, 2015
This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
android for work, mobileiron, fragmentation, malicious app store activity, security gaps, compliance, lollipop
    
MobileIron

Answers to Your Mobile Device Data Protection Questions

Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Trend Micro, Inc.

Anticipating the Unknowns: Chief Information Security Officer (CISO) Benchmark Study

Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA

Anticipating the Unknowns: Chief Information Security Officer (CISO) Benchmark Study

Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA

Anulando ataques sigilosos con visibilidad, amplia y profunda en sistemas de protección y respuesta

Published By: McAfee     Published Date: Sep 04, 2014
El tipo más amenazante de ataque cibernético es invisible. El riesgo para las empresas es real según lo evidenciado por los recientes ataques de alto nivel. Las organizaciones necesitan controles de seguridad por capas que funcionen en conjunto para detectar la presencia y las acciones de hackers y malwares furtivos.
Tags : 
ataques furtivos, malware, sistema de prevención de intrusiones, siem, controle de seguridad en capas
    
McAfee

API360: El modelo completo de estrategia de API para la empresa

Published By: CA Technologies EMEA     Published Date: May 24, 2018
El crecimiento de su empresa es una prioridad continua. Además, a medida que la economía de las aplicaciones sigue creciendo, es probable que busque iniciativas de negocio digital para fomentar gran parte de dicho crecimiento. Algunos de los objetivos más prometedores de dicha estrategia son los siguientes: • Ofrecimiento de experiencias digitales superiores para consumidores a través de dispositivos móviles • Expansión de los flujos de mercados e ingresos a través de varios canales• Conexión de empleados y partners con los datos de la empresa en cualquier lugar y en todo momento • Lanzamiento de servicios nuevos innovadores en el Internet de las cosas (IoT)
Tags : 
    
CA Technologies EMEA

APIs: The New Marketing Platform

Published By: Google Apigee APAC     Published Date: Jun 10, 2019
Five things every CMO should know about APIs. APIs power the digital marketing channels and the applications we use today. They are a window to your company’s digital assets, exposing them so that developers and partners can build mobile apps and become an extension of your innovation engine. APIs are the technology that brings the CIO and the CMO together. In this ebook, see how a strong partnership between the CIO and CMO, centered around the customer, is essential to the success of today’s API-powered digital businesses. What’s inside? APIs open opportunities for new distribution channels APIs connect businesses and enable growth with partners and developers APIs are the foundation for data exchange in digital ecosystems APIs create more customer value with existing business assets Fill out the form to get the ebook and receive a copy via email.
Tags : 
    
Google Apigee APAC

Aplicación de recuperación con pérdida nula de datos (Zero Data Loss Recovery Appliance) de Oracle

Published By: Oracle     Published Date: Mar 09, 2017
En este estudio, IDC trata el tema de las dificultades inherentes asociadas a los planes tradicionales de copia de seguridad de los datos y la dinámica cambiante de las estrategias de protección de datos.
Tags : 
    
Oracle

Application Security and Performance

Published By: Akamai Technologies     Published Date: Aug 17, 2017
Web application and DDoS attacks hit enterprises without warning or reason. The attacks can expose confidential data and website resources to malicious uses, reduce performance, and render sites unavailable. Responsible organizations proactively block web attacks to protect their reputations, site availability, site performance, and confidential data.
Tags : 
application, security, performance, web attacks, data security
    
Akamai Technologies

Aprende cómo el marketing moderno puede ayudarte a proporcionar una mejor experiencia

Published By: Oracle     Published Date: Apr 16, 2018
La tecnología es el futuro, pero esto no repercute en el cliente si no va acompañado de una experiencia excepcional. Hoy, el éxito del marketing no depende de tratar a los clientes y potenciales como nombres en una base de datos, sino como individuos con preferencias, opiniones y deseos. Conoce las principales formas de utilizar la tecnología para comprender mejor a tus clientes.
Tags : 
aprende, marketing, moderno, puede, ayudarte, proporcionar, mejor, experiencia
    
Oracle

Aproveche el valor de su capital de datos para impulsar el éxito del negocio

Published By: Dell EMC Storage     Published Date: Aug 15, 2019
La era digital ha dado pie a la proliferación de los datos que potencian a las empresas modernas. Cuando se aprovechan correctamente, las organizaciones ven el potencial de los datos para impulsar mejores resultados en todos los aspectos del negocio El uso de datos para soportar diferentes flujos de trabajo, el análisis y las actividades transforman la TI en un capital de datos, un recurso digital que impulsará valor del negocio. La medida en que una empresa alinea su organización con respecto a esta mentalidad de capital de datos, ya sea en la manera en que usan los datos y la manera en que se invierte en la tecnología de datos, puede tener un impacto duradero en el éxito de la empresa. En febrero de 2019, Dell EMC e Intel encargaron a Forrester Consulting un análisis que evaluara si la capacidad de aprovechar y aplicar el análisis y los datos en cada oportunidad se está convirtiendo rápidamente en un requisito previo para el éxito. Para probarlo, Forrester llevó a cabo una encuesta g
Tags : 
    
Dell EMC Storage

Archiving and SAP Environments: For Business, IT, and Regulatory Requirements

Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap
    
ASG Software Solutions

Are Your DNS Servers as Secure and Available as the Rest of Your Network?

Published By: Infoblox     Published Date: Nov 07, 2013
According to the Ponemon Institute, the annual cost of malware breaches averaged $8.4 million. Read this white paper to gain insights into critical information to safeguard against DNS security threats and disrupt malware communications to your DNS servers.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox

Argumento comercial a favor de Cisco SDN para WAN

Published By: Cisco     Published Date: Jan 04, 2016
Las redes definidas por software (SDN) en la WAN permiten reducir los costes gracias al aumento de la eficacia operativa, una mayor velocidad a la hora de crear servicios, y servicios de redes diferenciados y personalizados.
Tags : 
cisco, virtualization, sdn, wan, cloud, networking, it management, wireless
    
Cisco

Argyle Webcast: Unlocking the Power of AI and Machine Learning in Financial Services

Published By: Oracle     Published Date: Mar 22, 2019
Argyle CIO Webcasts, in partnership with Oracle, brings together top IT executives for an innovative, discussion-based webcast exploring the promises and perils of transformational technologies on the financial services industry.
Tags : 
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.