dom

Results 326 - 350 of 711Sort Results By: Published Date | Title | Company Name

How Application Security Provider, Veracode, Boosted Cloud Visibility and Compliance

Published By: AWS     Published Date: Oct 07, 2019
Poor visibility into cloud deployments makes it difficult for organizations to enforce security and compliance across their cloud environment. Check Point CloudGuard Dome9 on Amazon Web Services (AWS) can help you gain deeper visibility of your traffic and configurations with automated assessments that strengthen your security posture and help you fulfill your part of the Shared Responsibility Model. Join the upcoming webinar with Check Point, Veracode, and AWS. Learn how Veracode improved their security posture using Check Point CloudGuard Dome9 on AWS.
Tags : 
    
AWS

How Application Security Provider, Veracode, Boosted Cloud Visibility and Compliance

Published By: AWS     Published Date: Oct 09, 2019
Poor visibility into cloud deployments makes it difficult for organizations to enforce security and compliance across their cloud environment. Check Point CloudGuard Dome9 on Amazon Web Services (AWS) can help you gain deeper visibility of your traffic and configurations with automated assessments that strengthen your security posture and help you fulfill your part of the Shared Responsibility Model. Join the upcoming webinar with Check Point, Veracode, and AWS. Learn how Veracode improved their security posture using Check Point CloudGuard Dome9 on AWS.
Tags : 
    
AWS

How can you prepare for the workplace of the future?

Published By: ADP     Published Date: Oct 25, 2017
The evolution of employment is moving toward greater freedom and collaboration as well as opportunities for meaningful work.
Tags : 
    
ADP

How Centrify Enforces Compliance and Security Best Practices on AWS with Dome9

Published By: AWS     Published Date: Oct 30, 2018
Centrify – a leading cybersecurity company – needed to establish and maintain active security over its applications running on AWS, as it rapidly scaled up. The Centrify DevOps team implemented Dome9 Arc to visualize and assess its security posture, actively enforce security and compliance policies, and automatically remediate misconfigurations on AWS.
Tags : 
centrify, compliance, security, aws, dome9
    
AWS

How Extended Validation SSL Brings Confidence to Online Sales and Transactions

Published By: Symantec     Published Date: Apr 09, 2012
Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
Symantec

How Fandom Cultivated Collaboration to Ignite Tech Recruiting

Published By: Codility     Published Date: Dec 08, 2017
When Fandom initially implemented Codility, the engineering staff half-heartedly attended trainings and didn’t fully buy in to using the platform. The recruiting team, early in its inception, hadn’t built rapport with hiring managers yet either.
Tags : 
    
Codility

How Georgia Dome's Stadium-Grade Wi-Fi Supports the Ultimate BYOD Project

Published By: CDW     Published Date: Oct 10, 2013
The Georgia Dome deployed a Wi-Fi network that lets fans browse the web on smartphones, view replays and communicate via social media.
Tags : 
georgia dome, dome stadium, wireless crowd, wireless users, wifi support, update to wifi, wireless connectivity, peak usage
    
CDW

How much progress have we made towards the paper-free office?

Published By: Box     Published Date: Jun 22, 2018
• There are many opportunities for businesses to introduce the concept of paper-free or less intensive paper processes to their organizations. AIIM 2016 Industry Watch research found that “58% of respondents described their inbound handling of content as ad-hoc”. This is not surprising given paper is still fairly dominant in many businesses due to human desire to keep paper in hand for reading, note taking, and still today, signatures. • In this study we take a look the challenges businesses face in relation to: o Digital Transformation of their business operations o Capturing and managing multi-channel inbound content, including paper o Steps taken to automate the information capture process o Use of analytics to enhance the identification and classification of capture information o A look ahead at the next 5 years to understand where businesses are focusing their efforts and funding
Tags : 
    
Box

How OpenStack gives TeamSourcing confidence

Published By: Rackspace     Published Date: Jan 19, 2016
TeamSourcing is a global company based in Ecuador that has become one of the leading providers of mobile content and services in Latin America. When CEO Armando Coronel founded TeamSourcing in 2002, its 5-person team was focused principally on the Ecuadorian market. Since then, TeamSourcing has grown to a team of nearly 60, and its reputation for world-class products and services has helped it expand throughout the region. TeamSourcing now does business in 10 Latin American countries, working with mobile operators in Ecuador, Peru, Chile, Guatemala, Honduras, Panama, Mexico, El Salvador, the Dominican Republic, and Colombia.
Tags : 
rackspace, openstack, teamsourcing, mobile, it management, data center
    
Rackspace

How Securing Recursive DNS Proactively Protects Your Network

Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies

How Securing Recursive DNS Proactively Protects Your Network

Published By: Akamai Technologies     Published Date: Dec 11, 2018
Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). But this Internet protocol doesn’t have to be a vulnerability.
Tags : 
    
Akamai Technologies

How Spreadsheets Are Messing With Your Bottom Line

Published By: Domo     Published Date: Dec 18, 2015
Domo brings data from any system, spreadsheet or application into a single real-time platform. Decision makers can access the data they need, when they need it, without having to wait on any reports. And it completely transforms the way you manage business.
Tags : 
domo, spreadsheet, system, application, platform, data, software development, business technology
    
Domo

How the Cloud Has Changed Email Archiving Forever

Published By: Mimecast     Published Date: Apr 18, 2017
"With over 112 billion emails sent and received on a daily basis, email continues to be the dominant form of business communication. Organizations must formulate a strategy for not just storing email but meeting compliance requirements, responding to litigation requests and providing instant access to these important conservations. While this has traditionally been accomplished with on-premises technology, the cloud has transformed archiving by delivering new capabilities at lower costs. Read the whitepaper for key takeaways: - The emergence of email archiving as a business requirement - The challenges associated with traditional on-premises solutions - How the cloud has changed email archiving - How organizations can benefit from it"
Tags : 
email archiving, cloud, cloud based infrastructure, cyber security, cloud security
    
Mimecast

How to Catch a Tax Cheat

Published By: SAS     Published Date: Mar 06, 2018
Tax evasion is the largest economic crime in the world (in terms of monetary loss), costing trillions of dollars to governments around the globe. A 2011 study by The Tax Justice Network estimates that on a global scale, total tax evasion is in excess of US$3.1 trillion, or about 5.1% of world GDP.1 And that’s just the known tax evasion and noncompliance; it doesn’t include the underground economy and cash businesses. The per-capita figure is similar in Canada, representing about $45 billion a year. The European Union loses an estimated €200 billion in value-added tax alone, not including corporate or excise taxes. Tax evasion represents 4 to 5 percent of gross domestic product in Sweden and Japan.
Tags : 
    
SAS

How to disappoint your HIPAA auditors and gain the respect of your board of directors

Published By: DataMotion     Published Date: Oct 01, 2008
With HIPAA audits now randomized, you must be prepared for them every day. And with state regulations requiring compliance-breach reporting, you must become your own auditor. HIPAA is the Health Insurance Portability and Accountability Act, the 1996 federal regulation that mandated health-data privacy.This regulation requires compliance by all insurers and health care providers, including physician’s offices, hospitals, health plans, employers, public health authorities, life insurers, clearinghouses, billing agencies, information systems vendors, service organizations, and universities.But that’s not all.
Tags : 
certifiedmail technology, act's privacy rule, health insurance portability, accountability act, security, it management, data management, firewalls
    
DataMotion

How to Engage the Emotions of Your Buyers

Published By: Tyco Integrated Security     Published Date: Sep 10, 2015
Analytics inform, but the gut is what executives rely upon most when making decisions, according to a new study conducted by the FORTUNE Knowledge Group and gyro. While conventional wisdom would indicate that “hard” elements, such as details around cost, quality and efficiency, are more compelling to decision-makers, this new research shows that the opposite is true. When asked to share their feelings about what really drives their purchase decisions, senior executives revealed that “soft” factors, including company culture, reputation and level of trust, were what they primarily relied on to help them make decisions.
Tags : 
    
Tyco Integrated Security

How to Get the Most ouf of DNS in an Active Directory Environment

Published By: Infoblox     Published Date: Sep 09, 2014
By enhancing DNS services provided to Active Directory (AD), IT organizations see immediate benefits in performance, speed, and accuracy of data across DNS and AD. Read this white paper to learn how to transform your Microsoft environment today.
Tags : 
infoblox_dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns
    
Infoblox

How to Get the Right Protection Storage for Backup and Archive Systems

Published By: CDW     Published Date: Sep 10, 2014
Learn how to improve your data domain systems by getting the right protection storage for both your backup and archive systems.
Tags : 
protection, storage, architecture, massive growth, integrated, data
    
CDW

How to Hire and Work With a PPC Agency

Published By: Hanapin Marketing     Published Date: Jun 03, 2013
Whether you’re hiring a new digital marketing agency or looking to improve your current agency relationship, Hanapin Marketing’s longstanding expertise and reputation as the agency that other agencies turn to can provide you with invaluable knowledge. In this guide to building a healthy agency relationship, Hanapin provides best practices and long-established wisdom about what your agency relationship should look like—including what your agency should be doing, and just as importantly, what you can do to help your agency.
Tags : 
ppc, agency, ppc agency, search marketing agency, ppc management company, ppc manager, hire an agency, agency relationship
    
Hanapin Marketing

How to keep your employees happy with their company PCs (without losing control of your IT)

Published By: Toshiba     Published Date: Jun 06, 2012
Your staff will be more content if they can install their choice of software. Here's how to give them that freedom while keeping control.
Tags : 
toshiba, mfp, printers, copiers, printers, employees, laptops, it management
    
Toshiba

How to Leverage a Big Data Model in the Network Monitoring Domain

Published By: VSS Monitoring     Published Date: Aug 01, 2014
Learn how to leverage a big data model in the network monitoring domain and see how IT is shifting away from the long-term viability of the existing network monitoring model.
Tags : 
networking, big data, network monitoring, optimization, data center, monitoring
    
VSS Monitoring

How to manage mCommerce fraud. A framework for fraud managers.

Published By: CyberSource EMEA     Published Date: Jun 28, 2018
Mobile devices are everywhere. 95% of UK millennials now use smartphones1; and it’s estimated that across the globe, nearly a billion more people now use mobile phones today than did five years ago.2 Mobile commerce will continue to grow as smartphones continue to be adopted. For example, forecasts for Europe’s EU 5 (France, Germany, Italy, Spain and the United Kingdom) show mCommerce will account for 43.8% of eCommerce sales by 2020, compared to 32.9% in 2016.3 As fraud teams determine which orders to accept or reject, fraud managers are key to providing a seamless mobile checkout experience. But they also need to protect their business from fraud – and from the damage it can cause to bottom line, customer experience and brand.
Tags : 
    
CyberSource EMEA

How to Slay the Dragon of Enterprise Work eBook

Published By: Workfront     Published Date: Jun 25, 2014
Work chaos comes in many forms: random input processes, disconnected activities, poor visibility into work and more. Read this eBook: "How to Slay the Dragon of Enterprise Work" and learn how slaying the work chaos dragon will help you simplify your processes, connect team members, save time and money, and more. Get the eBook today.
Tags : 
at task, work chaos, solutions, input processes, poor visibility, resources, knowledge management, enterprise applications
    
Workfront

How to Survive the Talent Shortage in Healthcare

Published By: Bright Horizons     Published Date: Jun 23, 2017
Big changes are coming to the healthcare industry. Nurses and doctors are retiring at a record pace, just as more women than ever are entering medical school. The shift will result in hospital workforces that will be younger and predominantly female, resulting in greater risk for conflicts between work and families. Download our eBook to learn how dependent care programs help top healthcare providers around the country avoid costly absences and support critical talent goals.
Tags : 
healthcare recruiting, retention, doctors, nurses, clinicians, dependent care, back-up care, child care
    
Bright Horizons

How to Use Projects to Master Asset Management

Published By: IFS     Published Date: Aug 11, 2011
Why project management functionality tightly integrated with Asset Lifecycle Management (ALM) tools is essential to executives of asset-intensive industries.
Tags : 
ifs, project-based software solutions, asset lifecycle management, alm, dom, enterprise software, product lifecycle management, project management
    
IFS
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.