cio

Results 351 - 375 of 1409Sort Results By: Published Date | Title | Company Name

CSO - Cloud Security and Myths and Strategies Uncovered

Published By: VMware, Inc     Published Date: Dec 05, 2013
This executive level paper highlights trends and findings from CIO’s 2011 Global Cloud Computing Adoption survey as it relates to Security and Compliance in the virtualized datacenter. Featured content includes debunked myths of securing cloud environments, how the secure cloud is a key business enabler for the CSO, as well as strategies for how to get started building a secure cloud initiative. Please download the white paper for more information.
Tags : 
vmware, global cloud computing adoption, security and compliance, virtualized datacenter, securing cloud environments, secure cloud initiative, networking, it management
    
VMware, Inc

Cuadrante mágico de CRM para centros de interacción con los clientes de Gartner 2018

Published By: Zendesk     Published Date: Dec 10, 2018
En el mercado global de software de atención al cliente, Zendesk nuevamente se destaca como líder en el Cuadrante mágico de CRM para centros de interacción con los clientes de Gartner 2018. Cada año, la firma Gartner lleva a cabo un análisis exhaustivo de los proveedores de servicio de atención al cliente y las aplicaciones de soporte. Creemos que el informe Cuadrante mágico de CRM para centros de interacción con los clientes de Gartner proporciona información valiosa para los líderes empresariales interesados en soluciones tecnológicas diseñadas para interactuar con sus clientes. Una vez más, Zendesk se destaca en el cuadrante de líderes del informe de 2018, algo que, para nosotros, refleja el éxito de nuestros 125.000 clientes, como Airbnb, Tesco y la Universidad de Tennessee. Solo el último año hemos conquistado varios avances importantes, como el lanzamiento de funciones de autoservicio impulsadas por tecnología de IA, hecho que nos ha permitido proyectar ingresos de más de $500 mi
Tags : 
    
Zendesk

Cuando un pago en Tiempo Real NO es un pago en Tiempo Real

Published By: FICO EMEA     Published Date: Sep 12, 2019
Hay una proliferación de métodos de pago que nos proporcionan formas más rápidas de hacer y recibir pagos, pero todos no son iguales. Entender las diferencias y características únicas de los diferentes tipos de pagos "rápidos" es crítico para los equipos encargados de velar por el fraude en las transacciones. Descargue nuestro whitepaper para entender: • Las diferencias entre las transacciones en tiempo real, los monederos electrónicos y los pagos de persona a persona • Las implicaciones que las transacciones “rápidas” tienen sobre el fraude • Cómo planificar su estrategia Anti-fraude en las transacciones en tiempo real
Tags : 
transacciones tiempo real, pagos en tiempo real, fraude, anti fraude, antifraude, blanqueo capitales, pagos p2p
    
FICO EMEA

Cuatro razones por las que un sistema de gestión de almacenes aporta un mayor ROI

Published By: Infor     Published Date: Mar 07, 2017
El objetivo de las operaciones de un almacén es dar una respuesta perfecta los pedidos: entregar exactamente lo que un cliente pide, a tiempo y con una eficiencia óptima. El módulo de almacenes de una solución de planificación de recursos empresariales (ERP – Enterprise Resources Management) puede ayudar a los almacenes más pequeños. Pero los módulos de gestión de almacenes de los ERP tienen limitaciones y, en el caso de empresas con operaciones más complejas, puede ser más inteligente optar por las capacidades adicionales de un sistema de gestión de almacenes avanzado (WMS, Warehouse Management System).
Tags : 
    
Infor

Cuándo y por qué sustituir su plataforma de comercio electrónico

Published By: SAP SME     Published Date: Aug 13, 2015
¿Cómo puede saber si ha llegado el momento de cambiar de plataforma? Lea el documento informativo y aumente su ROI. No pierda más y comience a capturar todas las oportunidades de ingresos disponibles.
Tags : 
omnicomercio, plataforma, sistema de comercio, e-commerce, comercio electrónico, ventas en línea, tienda online, ventas móviles
    
SAP SME

Customer Centricity and the CIO

Published By: KPMG     Published Date: Jun 10, 2019
Technology plays a pivotal role in delivering the customer experience. Explore the forces moving CX to the top of the IT agenda. Read this report to discover: • how technology can help deliver what customers want • four areas where the CIO can make the biggest impact • priority actions for driving the CX agenda forward.
Tags : 
    
KPMG

Cut through the Noise of Cloud Computing

Published By: BMC ESM     Published Date: Sep 15, 2009
Many CIOs are looking to implement the power of Cloud computing, but they don't know where to begin. How do you take full advantage of this technology and implement the correct strategy for your environment? What services should you offer via the Cloud? Read the paper, "Cloud Computing In Perspective," by BMC Software Chief Technology Officer Kia Behnia.
Tags : 
bmc esm, cio, cloud computing in perspective, itil, cloud computing environments, public, private, hybrid
    
BMC ESM

Cyber AI Response: Threat Report 2019

Published By: Darktrace     Published Date: Apr 02, 2019
This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks. While all threat scenarios were distinct, some fast-moving and others slow and stealthy, in all cases the subtle indicators of suspicious activity were only detectable using Darktrace AI, which learns what is normal for the business environment and autonomously responds to attacks – before damage is done.
Tags : 
    
Darktrace

Cyber Resilience for Email Technical Deep Dive E-Book

Published By: Mimecast     Published Date: Apr 10, 2019
Email. It’s the number-one business application used by organizations. It’s also the number-one method used to execute cyberattacks, enabling malware delivery, phishing, impersonations, and the spread of threats that are already internal to your organization. In fact, 91 percent of all cyberattacks start with an email. And your organization can’t function for long without email. How many hours of email downtime can your organization comfortably live with? If email isn’t accessible due to an adverse incident like malicious intent, human error or technical failure, your organization would likely suffer. The only way to get ahead of cybercriminals and to holistically protect your business is to adopt a new approach to email security. You need a multidimensional approach that brings together threat protection, adaptability, durability and recoverability in a single cloud-based service. You need to enable these four dimensions to truly provide cyber resilience for your email.
Tags : 
    
Mimecast

Cybercrime’s Most Wanted: Guide to Protection

Published By: Juniper Networks     Published Date: Jul 31, 2019
Cybercrime has rapidly evolved, and not for the better. What began in the 1990s as innocent pranks designed to uncover holes in Windows servers and other platforms soon led to hacker Kevin Mitnick causing millions of dollars in malicious damages, landing him in prison for half a decade and raising the awareness of cybersecurity enough to jump-start a multimillion-dollar antivirus industry. Then came the script kiddies, unskilled hackers who used malicious code written by others to wreak havoc, often just for bragging rights. If only that were still the case.
Tags : 
application management, application performance, network infrastructure, network management, network security
    
Juniper Networks

Darktrace Antigena: The Future of AI-Powered Autonomous Response

Published By: Darktrace     Published Date: Apr 02, 2019
The current era in cyber security is characterized by three fundamental challenges: the complexity of the enterprise network and connected infrastructure, the speed of newage attacks, and the strain of overwhelmed incident responders. In many ways, the expansion of networks and continual adoption of new technologies - from cloud services to the Internet of Things - has expanded the attack surface and introduced new entry-points through which attackers can gain a foothold. This, combined with the ready availability of exploit kits on the Dark Web, has led to the ‘vicious circle of the SOC’, where incident responders are so busy fire-fighting that they rarely have time to implement the critical patches that would prevent the problem at source. As security teams struggle to keep up with the rising volume of routine attacks, a new generation of cyberthreat has also emerged, characterized in large part by fast-moving threats that make an impact well before humans have time to respond. Thes
Tags : 
    
Darktrace

Data and Analytics to Combat the Opioid Epidemic

Published By: SAS     Published Date: Aug 03, 2016
On an average day, 78 Americans die from opioid overdose. Last year’s total was almost 30,000 deaths, roughly two-thirds involving prescription opioids (including Percocet, Vicodin, Hydrocodone, Oxycodone, Oxycontin), the rest involving heroin. The United States, with about 5 percent of the global population, consumes 80 percent of the prescription opioids. The problem affects people of all backgrounds and across the socioeconomic spectrum; the Center for Disease Control (CDC) has officially declared it an epidemic.
Tags : 
best practices, data, technology, analytics, business analytics, business intelligence, business management, business technology
    
SAS

Data Center Choices in the Year 2011

Published By: Enroute Networks     Published Date: Mar 23, 2011
A look at the data center choices available in today's business climate.
Tags : 
data center, cloud computing, cio, real estate assets, virtualization, infrastructure, design and facilities, power and cooling
    
Enroute Networks

Data Growth Challenges Demand Proactive Data Management

Published By: IBM     Published Date: Aug 30, 2010
Proactive Data Management Controls Data Growth. To take control, organizations must begin with the conscious decision not to let data growth proceed unexamined.
Tags : 
ibm, data growth, data management, database development, data integration, data mining, data quality, data warehousing
    
IBM

Data Leakage Landscape: Where Data Leaks & How Next Generation Tools Apply

Published By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
    
Utimaco

Data Loss Prevention: Keep Sensitive Data-In-Motion Safe

Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Whether your data loss is accidental or malicious, you need to gain insight into the magnitude of your data loss problem, identify security gaps, and develop a proactive approach to stop data loss before it happens.
Tags : 
watchguard xcs, data loss protection, data loss prevention, data breach, content analysis, contextual analysis, dlp solution, network security appliance
    
WatchGuard Technologies

Data Protection Solutions at Midsize Organizations

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp
    
Trend Micro, Inc.

Data Webinar: Leveraging Kubernetes

Published By: AWS     Published Date: Aug 26, 2019
Empower your developers and drive productivity by leveraging Kubernetes. Carmen Puccio, Principal Solutions Architect, Amazaon Web Services, Inc. Michael Gerstenhaber, Director of Product, Datadog Jon Moter, Senior Principal Engineer, Zendesk
Tags : 
    
AWS

Datacenter Care IDC whitepaper

Published By: HPE Intel     Published Date: Mar 15, 2016
As more enterprises adopt technologies such as cloud, mobile, and analytics to help achieve strategic competitive advantage, CIOs and IT managers must support business-critical processes at a very high level across the enterprise. At the same time, IT organizations must manage complex hybrid IT infrastructures that include both cloud and on-premises technologies from multiple vendors and support providers. IDC believes that to tackle these challenges, IT organizations should look to support providers for comprehensive offerings to help optimize IT operations and improve the efficiency of IT service delivery. In addition, IDC recommends that IT organizations looking to manage rapid change in today’s IT landscape consider support providers with a record of innovative support services and a focus on advanced technology in support delivery.
Tags : 
    
HPE Intel

Deep Packet Inspection for Threat Analysis

Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity

Deep Packet Inspection for Threat Analysis Advisory

Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity

Defeating Advanced Persistent Threat Malware

Published By: Infoblox     Published Date: Sep 04, 2013
Press headlines are filled by reports of malware attacks. Malware attacks, once the reserve of amateurs largely for amusement, are now launched by a number of entities. Today, a malware attack can literally come from anywhere in the world and can impact even the largest organization.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox

DEFEND IT. An Overview of Defense in Depth

Published By: CDW     Published Date: Jun 10, 2013
Securing your network requires more than just new hardware and software. It’s abouta change in your organization’s culture to a more security-conscious environment. Your staff needs strong and diverse passwords.
Tags : 
cdw, external threats, malware, defense, internal threats, security
    
CDW

Defending Against Insider Threats in the “Snowden Era”

Published By: CA Technologies     Published Date: Jan 06, 2014
Why should organizations take insider threats seriously? Because the stakes have never been higher, especially given the value enterprises place on intellectual capital and trade secrets.
Tags : 
mediacom, insider threats, substantial threats, bladley manning, edward snowden, malicious insiders, exploited insiders, sensitive information
    
CA Technologies

Definitive Guide to Branch Transformation (ESP)

Published By: Zscaler     Published Date: Jun 20, 2019
Descubren gracias a este guía como redirigir de manera óptima el tráfico de sus subsidiarias, para permitir un acceso directo a Internet y a sus aplicaciones cloud. Disminuyan sus costes, obtengan una visión completa sobre sus flujos y mejoren la experiencia de sus usuarios tras securizar sus oficinas remotas.
Tags : 
    
Zscaler
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.