dom

Results 251 - 275 of 711Sort Results By: Published Date | Title | Company Name

Enterprise Data Security: The Basics Of User Behavior Analytics

Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies

Enterprise Data Security: The Basics of User Behavior Analytics

Published By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
    
CA Technologies

Enterprise Data Security: The Basics of User Behavior Analytics

Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies

Entrust Certificate Services: SSL Digital Certificates, Discovery & Management

Published By: Entrust Datacard     Published Date: May 15, 2014
Entrust Certificate Services provide one of the industry’s most comprehensive offerings of digital certificates and related services, tools and solutions. Whether it's a basic SSL certificate, more advanced EV multi-domain SSL certificates, or specialty certificates for secure email, code-signing or Adobe PDFs, Entrust offers a comprehensive portfolio of today's most-used digital certificates. And all are supported by Entrust's world-class service.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
    
Entrust Datacard

Entrust Certificate Services: SSL Digital Certificates, Discovery & Management

Published By: Entrust Datacard     Published Date: Jul 21, 2014
Entrust Certificate Services provide one of the industry’s most comprehensive offerings of digital certificates and related services, tools and solutions.
Tags : 
ssl, digital certifications, discovery, management, solutions, ev multi-domain, security
    
Entrust Datacard

Entrust Private SSL Certificates: Enabling Continued Use of Non-Registered Domain Names

Published By: Entrust Datacard     Published Date: May 15, 2014
The use of non-fully qualified domain name (FQDN) certificates is being deprecated by November 1, 2015. Existing certificates containing non-FQDN names will be revoked by all public CAs by October 1, 2016. Entrust provides a straightforward option that allows the continued use of non-registered names by deploying cost-effective Entrust Private SSL Certificates.
Tags : 
entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud
    
Entrust Datacard

Entrust Private SSL Certificates: Enabling Continued Use of Non-Registered Domain Names

Published By: Entrust Datacard     Published Date: Jul 21, 2014
The use of non-fully qualified domain name (FQDN) certificates is being deprecated by November 1, 2015.
Tags : 
ssl certifications, fqdn, non-registered names
    
Entrust Datacard

Equinix Customer Case Study- FreedomPay

Published By: Equinix EMEA     Published Date: Mar 21, 2019
FreedomPay, a leader in global digital commerce solutions, wanted to expand its global presence in the United Kingdom and Asia Pacific while reinforcing business infrastructure, expanding storage to the cloud and providing a more security shopping experience. The company leveraged an Interconnection Oriented Architecture™ (IOA®) strategy on Platform Equinix along with other design and deployment partners to achieve its goals and realize $1 million saving in CAPEX and OPEX costs. To find out more, download this case study today.
Tags : 
    
Equinix EMEA

ESET Monthly Threat Report for the United Kingdom: December 2009

Published By: ESET     Published Date: Jan 08, 2010
This report provides a report of the Top Computer Threats in the United Kingdom.
Tags : 
eset, monthly threat report, top computer threat, security, anti spam, anti spyware, anti virus, internet security
    
ESET

ESG: Why CIOs Should Look to Data Deduplication

Published By: EMC Backup & Recovery Solutions     Published Date: Aug 04, 2009
Data deduplication is one of a few standout technologies where the CIO can make an investment which is easy to rationalize and brings a fast payback. This paper explains why data deduplication should be on every CIO's project short list in 2009.
Tags : 
emc, data domain, efficiency, disaster recovery, robo, backup, recovery, idc
    
EMC Backup & Recovery Solutions

Establishing Confidence in PDN Simulation

Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor
    
Mentor Graphics

Ethernet Gains World Domination by Being Better, Faster, and Cheaper than Other Network ProtocolsG

Published By: Comcast Business     Published Date: Mar 24, 2015
Ethernet fills a number of roles in the enterprise – far more than you might initially expect. This overview helps you understand the many ways in which the networking protocol is used in business, where it makes the most impact, and the effect CIOs should expect from upcoming innovations.
Tags : 
ethernet, network protocol, lan, enterprise intranet, wide area ethernet, data center, networking, it management
    
Comcast Business

Ethernet Gains World Domination By Being Better, Faster, and Cheaper Than Other Networks Protocols

Published By: Comcast Business     Published Date: Oct 17, 2013
Ethernet Gains World Domination By Being Better, Faster, and Cheaper Than Other Networks Protocols
Tags : 
comcast, ethernet primer, enterprise intranet, production lan, networking
    
Comcast Business

Everything You Always Wanted to Know About Security at the Edge, But Were Afraid to Ask

Published By: Akamai Technologies     Published Date: Mar 19, 2019
Whether you're focused on public-facing websites or your company's assets and users, as someone who cares about digital security, your life is dominated by these trends that characterize the state of all things security in 2019: Attacks are growing, evolving, and becoming more sophisticated. And the types of attacks we see are proliferating. How do you protect your crown jewels when the castle has no walls? The answer is at the edge. When you deploy security at the edge, you are protecting your changing assets closer to the attack itself and moving digital experiences closer to users. In essence, you're deploying a single pane of glass, an extension of your infrastructure, that sits between you - your users, your digital experiences - and the always-changing nature of today's digital environment.
Tags : 
    
Akamai Technologies

Everything You Need to Know to Change E-Commerce Platforms

Published By: ChannelAdvisor     Published Date: Nov 29, 2017
"True e-commerce success hinges on how well you can connect to customers, grow sales and optimize operations across multiple channels. Unfortunately, not all e-commerce platforms are equally effective at streamlining these processes. If your current e-commerce platform is failing to follow through with the tools and support you need to dominate the competition, it may be time to make a move. Thankfully, the process of moving to a new software platform is much easier than you might think. Complete the self-assessments in this eBook to see if you’re ready to make the switch today."
Tags : 
ecommerce, retail, ecomerce software, ecommerce platform, marketplace
    
ChannelAdvisor

Everything You Need to Know to Change E-Commerce Platforms

Published By: ChannelAdvisor     Published Date: Jul 20, 2018
"True e-commerce success hinges on how well you can connect to customers, grow sales and optimize operations across multiple channels. Unfortunately, not all e-commerce platforms are equally effective at streamlining these processes. If your current e-commerce platform is failing to follow through with the tools and support you need to dominate the competition, it may be time to make a move. Thankfully, the process of moving to a new software platform is much easier than you might think. Complete the self-assessments in this eBook to see if you’re ready to make the switch today. "
Tags : 
    
ChannelAdvisor

Everything You Need to Know to Change E-Commerce Software

Published By: ChannelAdvisor     Published Date: Apr 23, 2019
There are a lot of reasons to consider moving to a new e-commerce software platform. If your current e-commerce software is failing to follow through with the tools and support you need to dominate the competition, it may be time to make a move. Thankfully, the process of switching to new software is much easier than you might think.
Tags : 
    
ChannelAdvisor

Exceed Customer Demands and Add Revenue Streams with Hosted Exchange 2010

Published By: Verio     Published Date: Jul 06, 2011
This white paper explains how the Microsoft 2010 enables Solution Providers and VARs to better serve their clients.
Tags : 
hosted exchange 2010, hosted exchange, verio, saas, software as service, managed services, website hosting, web site hosting
    
Verio

Executive's Guide to Sales Enablement: 3 Stages

Published By: Brainshark     Published Date: Nov 05, 2013
How are you helping to drive revenue? Sales enablement involves collaboration from every part of the organization. This E-book takes an inside look at how today's organizations can impove sales productivity - and put an end to "random acts of sales support."
Tags : 
sales enablement, sales training, sales productivity, sales effectiveness, sales revenue, sales costs, product marketing, content marketing
    
Brainshark

Exhange 2007 - Migration Alternatives

Published By: Alt-N Technologies     Published Date: Sep 26, 2008
Email has become today's most mission-critical communication channel. Each and every day, 800 million business users worldwide use email during the course of their work day and about 80 percent of a company's intellectual property passes though its email server. Email is a vital component of both internal communication between employees and external communication with customers and business partners. It has become such an integral part of normal day-to-day business operations that most companies simply cannot function without it: when email stops, your ability to conduct business also stops.
Tags : 
alt-n technologies, email, exchange server, mdaemon, smtp, pop, imap, syncml
    
Alt-N Technologies

Écrans Dell pour votre entreprise

Published By: Dell DnCP     Published Date: Mar 06, 2019
À l’avenir, dans le monde professionnel, il sera de plus en plus question d’offrir des expériences de qualité supérieure à la fois aux employés et aux clients. Mettre à disposition des effectifs une meilleure technologie, notamment des écrans adaptés, est l’une des façons d’améliorer ces experiences. Nous offrons un large éventail d’écrans adaptés aux besoins et aux budgets métiers variables. Quel que soit votre domaine d’activité, Dell vous aidera à être plus productif.
Tags : 
    
Dell DnCP

Êtes-vous prêt pour le RGPD de l’UE ?

Published By: CA Technologies EMEA     Published Date: Oct 23, 2017
C’est l’un des changements majeurs de ces 20 dernières années au niveau de la protection de la vie privée dans le domaine numérique. Le Règlement général de l’UE sur la protection des données (RGPD) introduira, en mai 2018, des amendes d’un montant pouvant atteindre jusqu’à 20 millions d’euros en cas de non-conformité.
Tags : 
rgpd, gdpr, conformité, compliance, data testing, test data management, ca test data manager
    
CA Technologies EMEA

F-RAM vs. BBSRAM: Functional and System Design Comparisons

Published By: Ramtron     Published Date: Nov 11, 2009
Today's technological innovation demands high performance coupled with low environmental impact. These dual requirements are driving components of the semiconductor industry which informs many global businesses and consumer lives.
Tags : 
f-ram, bbsram, random access memory, ram, novram, ecopack, electronics, semiconductor
    
Ramtron

F5 and Data Domain Partner to Curb Storage Costs

Published By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 and Data Domain have joined their respective solutions, forming a partnership designed to assist customers in deploying and realizing the benefits of tiered storage. By combining F5’s tiered storage policy engine with Data Domain deduplication storage systems, mutual customers can realize the benefits of deploying tiered storage and, importantly, see dramatic reductions in the costs of storage.
Tags : 
data domain, curb storage costs, file servers, tiered storage, deduplication storage systems, storage, storage management, data deduplication
    
F5 Networks Inc

Faster and More Effective Long-Term Retention of Data: Taking a Single-System Approach

Published By: EMC Corporation     Published Date: Nov 08, 2011
Read this whitepaper to learn about solutions like the EMC Data Domain Archiver and how it addresses many challenges organizations are struggling with
Tags : 
retention, data retention, long-term, data domain archiver, backup, archive, recovery, solutions
    
EMC Corporation
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.