enterprises

Results 1 - 25 of 1467Sort Results By: Published Date | Title | Company Name

A Deep Dive into Ransomware's Evolution

Published By: CrowdStrike     Published Date: Feb 01, 2017
Once a “consumer-only” problem, Ransomware now has an established business case for profitability, and that’s driving criminals to expand their operations and hunt for more lucrative prey. As a result, commercial enterprises and other large organizations are increasingly in the crosshairs. Consider these facts: ? Ransomware attacks doubled in 2015 ? The number of new ransomware variants increased 17% in Q1 2016 ? The FBI estimates that ransomware will net criminals $1 billion in 2016 This white paper dives into the inner workings of ransomware, its perpetrators and how they are evolving to maximize profits. You’ll also learn how companies are fighting back, and review best practices for protecting your organization from becoming another victim of electronic extortion.
Tags : 
    
CrowdStrike

Compliance Guide: Ensure Social Media Compliance Across Your Organization

Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Customers now expect the same level of service on social media from financial firms, insurance providers, and other regulated enterprises as they receive from technology and retail companies. But without the right compliance controls in place, your organization could violate customer privacy rules and other regulatory guidelines. Are you taking the right steps to ensure compliance?
Tags : 
compliance, social media, social media management, enterprise, hootsuite
    
uberVU via HootSuite

Enterprise Agile Delivery: Modern ALM for Confident Software Delivery

Published By: Panaya     Published Date: May 31, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: › Strategiaclly align feature releases and backlogs with your overall business strategy › Identify and prioritize dev and test activities with visibility into project waves and portfolios › Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks › Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
    
Panaya

How to Survive a Data Breach

Published By: CheckMarx     Published Date: Jun 07, 2019
Data breaches continuing to make the headlines and enterprises are no longer questioning "if" a breach will occur, but "when." With the organization's data assets and reputation at stake, having a breach response plan in place is becoming increasingly important. Join security thought leaders and experts for an interactive Q&A to learn more about: - Today’s cybersecurity threat landscape - The true costs of a breach - Preventing breaches: Key factors to consider - Why early breach detection is critical - How to develop an effective incident response plan and get C-Suite buy-in - How to keep your company secure in 2019"
Tags : 
    
CheckMarx

The 4th Industrial Revolution: Opportunity and Imperative

Published By: Dassault Systčmes     Published Date: Aug 08, 2017
Business leaders today face the challenge of moving their enterprises to the next level, that of digital business transformation and revolution — coupling digital technologies with organizational, operationaland business model innovation to create new ways of operating and growing the business. The "4th Industrial Revolution" enables enterprises to drive changes in their business models and ecosystems, leveraging digital competences and facilitating accelerated revenue and profit growth going forward.
Tags : 
industrial, business leaders, enterprises, digital technologies, organizational, dassault, revenue, profit
    
Dassault Systčmes

The State of Mobile Security Maturity

Published By: IBM     Published Date: Jan 07, 2016
In this study, we set to explore, with the help of ISMG, how enterprises view mobile security risks, what capabilities they are currently deploying vis-a`-vis the four pillars of the framework and what their short-to- medium-term plans are to extend these capabilities.
Tags : 
ibm, security, maturity, mobile, wireless, business technology
    
IBM

"A Closer Look at Isolation: Hype or Next Gen Security"

Published By: Menlo Security     Published Date: Jun 05, 2018
"Despite deploying multiple security layers to defend against cyberattacks, enterprises continue to be infected by web malware and have credentials stolen via phishing. Why is this? Here’s a 40 minute webinar featuring a representative of a leading insurance company - providing the customer perspective, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, to answer this. Together, they discuss: * The shortcomings of today’s reactive security philosophy * Why the web continues to present a risk to businesses * The benefits of embracing Isolation * How organizations should rethink their security strategy moving forward"
Tags : 
    
Menlo Security

"Your Pad or Mine?" Enabling Secure Personal and Mobile Device Use On Your Network

Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout

10 Best Practices for URL Filtering for Large Enterprises.

Published By: McAfee     Published Date: Aug 14, 2014
URL filtering is a must for enterprise policy management. While the process is not difficult to implement, you can make it even easier and more effective by adhering to 10 best practices for URL filtering.
Tags : 
url filter, firewall url, web filtering, website blocking, white listing, next generation firewall, ngfw, ngfw features, security, enterprise applications
    
McAfee

10 Enterprise Analytics Trends to Watch in 2019

Published By: MicroStrategy     Published Date: Jan 23, 2019
By 2025, the total amount of data produced will grow to 175 zettabytes, according to IDC’s Data Age 2025 Report. How will enterprises evolve over the next year to manage and make the most of this unprecedented growth? Download 10 Enterprise Analytics Trends to Watch in 2019 to learn how leading organizations will win with embedded and augmented analytics, HyperIntelligence, collaboration, enterprise AI strategies, and more. This eBook details the transformational technologies data-driven organizations will need to leverage to get and stay ahead in 2019 and beyond, with contributions from thought leaders, including: Mike Gualtieri of Forrester Research Ray Wang and Doug Henschen of Constellation Research Mark Smith and David Menninger of Ventana Research Chandana Gopal of IDC Ronald van Loon, and more. Is your organization ready for the data-driven future? Read 10 Enterprise Analytics Trends to Watch in 2019 today to find out.
Tags : 
    
MicroStrategy

10 Enterprise Analytics Trends to Watch in 2019

Published By: MicroStrategy     Published Date: Apr 11, 2019
By 2025, the total amount of data produced will grow to 175 zettabytes, according to IDC’s Data Age 2025 Report. How will enterprises evolve over the next year to manage and make the most of this unprecedented growth? Download 10 Enterprise Analytics Trends to Watch in 2019 to learn how leading organizations will win with embedded and augmented analytics, HyperIntelligence, collaboration, enterprise AI strategies, and more. This eBook details the transformational technologies data-driven organizations will need to leverage to get and stay ahead in 2019 and beyond, with contributions from thought leaders, including: Mike Gualtieri of Forrester Research Ray Wang and Doug Henschen of Constellation Research Mark Smith and David Menninger of Ventana Research Chandana Gopal of IDC Ronald van Loon, and more. Is your organization ready for the data-driven future? Read 10 Enterprise Analytics Trends to Watch in 2019 today to find out.
Tags : 
    
MicroStrategy

10 Mistakes when Buying a Business Phone System

Published By: Wheelhouse Enterprises     Published Date: Jul 02, 2010
Phone systems are a critical part of any business infrastructure. While phone system buyers read the buyers guides, research the different brands, and create elaborate RFPs, there is no substitute for learning from other phone system buyers' mistakes. Here is a list of 10 regrettable mistakes businesses have made when buying a phone systems.
Tags : 
wheelhouse, voip, business phone, sip, ecommerce, business infrastructure, communication, telephony, infrastructure, ip telephony, mobile workers, enterprise software, voice over ip, collaboration
    
Wheelhouse Enterprises

10 reasons why you need to move to HP Converged Infrastructure now

Published By: HP and Intel ®     Published Date: May 27, 2014
The technology industry is constantly changing. Usually, it evolves along a progression of somewhat predictable lines. But every 20 years or so, a sea change shakes its very foundation. Tried-and-true practices that underpinned the previous model may no longer apply. It happened, for example when our industry transitioned from the mainframe to a client/server model. That change required a rethinking of the IT model from top to bottom. Download to learn more!
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
    
HP and Intel ®

10 reasons why you need to move to HP Converged Infrastructure now

Published By: HP     Published Date: May 27, 2014
The technology industry is constantly changing. Usually, it evolves along a progression of somewhat predictable lines. But every 20 years or so, a sea change shakes its very foundation. Tried-and-true practices that underpinned the previous model may no longer apply. It happened, for example when our industry transitioned from the mainframe to a client/server model. That change required a rethinking of the IT model from top to bottom. Download to learn more!
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
    
HP

10 Steps to Success with Public Cloud Adoption

Published By: Rackspace     Published Date: Mar 26, 2019
For enterprises migrating to the cloud, the technology shift they face would be their most significant of the decade – and the journey will require a lot more from them than following a few best practices. The success of their first cloud project hinges on having the right experience, tools and processes to execute the move, in a rethinking of their culture and operation from different technology perspective. Hence, they would find the 10 steps outlined in this e-book to be a valuable reference, in helping them align thoughts and approaches for cloud adoption success.
Tags : 
    
Rackspace

10 Steps to Web Security

Published By: Clearswift     Published Date: Jun 09, 2008
This short guide summarizes ten steps to web security. Do them all, and you'll be better protected than 98% of enterprises out there. But the target never stands still. More than the steps listed here, it's important to focus on the principles behind the steps, including: policy, vigilance, simplification, automation and transparency.
Tags : 
clearswift, web security, internet security, security
    
Clearswift

10 Tips for Cloud Migration

Published By: AppDynamics     Published Date: Sep 21, 2017
Technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
    
AppDynamics

10 Tips for Enterprise Cloud Migration

Published By: AppDynamics     Published Date: Nov 02, 2017
Technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
    
AppDynamics

10 Tips for enterprise cloud migration

Published By: AppDynamics     Published Date: Dec 08, 2017
This Whitepaper looks into the technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
    
AppDynamics

10 Tips for enterprise cloud migration

Published By: AppDynamics     Published Date: Dec 08, 2017
This Whitepaper looks into the technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
    
AppDynamics

10 Tips for Selecting the Best Digital Signature Solution

Published By: ARX (Algorithmic Research)     Published Date: Feb 14, 2008
As the traditional “paper-based” world gives way to digital documentation and transactions, enterprises are demanding innovative solutions for digitally signing and authenticating such documents, files, and forms with iron-clad protection against forgery. Solutions must guarantee non-repudiation and promise the same level of security and trust that exists with conventional documentation. At the same time, such a solution should be simple to use, easy to deploy and offer a rapid ROI.
Tags : 
digital signature, electronic signature, digital signatures, electronic signatures, digital signature, arx, algorithmic research, pki, public key, authentication, document management, secure content management
    
ARX (Algorithmic Research)

10 Ways to Save with Google Cloud Platform and Rackspace

Published By: Rackspace     Published Date: Apr 17, 2018
Controlling cloud costs is a leading challenge for enterprises at each stage of their cloud journey. Fortunately, companies utilizing a public cloud can benefit from the strategic partnership between Google and Rackspace. Google Cloud Platform is a state-of-the-art, cost-friendly public cloud, and Google has selected Rackspace as its first managed services provider for GCP, based on Rackspace’s vast cloud expertise and dedication to a fanatical customer experience. With Managed GCP by Rackspace, companies can maximize their cost savings on Google Cloud while also saving on hiring, training and retaining top talent to operate their cloud operations. In this post we will focus on the ten most significant cost-saving opportunities.
Tags : 
    
Rackspace

16 Ways to Protect Your Cloud from Ransomware

Published By: Evident.io     Published Date: Sep 13, 2017
For enterprises that use the cloud, ensuring protection starts with understanding the layers that make up the components of the cloud stack. Paying attention to each layer and addressing their unique security needs, will only bolster your enterprise’s environment. With “16 Ways to Protect Your Cloud from Ransomware,” you’ll learn about the layers that make up the cloud stack and in turn, increase your enterprise's resistance to ransomware.
Tags : 
    
Evident.io

20 Questions for CIOs on Hybrid Clouds

Published By: Viavi Solutions     Published Date: Mar 21, 2016
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users—from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
viavi solutions, hybrid clouds, networking, it management, wireless, enterprise applications, data management
    
Viavi Solutions

20 Questions For CIOs On Hybrid Clouds

Published By: Viavi Solutions     Published Date: Apr 14, 2017
At Viavi Solutions® we’ve had the benefit of observing a number of hybrid cloud deployments up close. All sectors of IT users from small to large enterprises, governmental groups, and even cloud service providers (CSPs) who themselves have begun to offer managed cloud services from third-party platforms—touch the hybrid cloud environment. CIOs, especially, face new challenges in deploying or expanding their enterprise presence in the cloud. This white paper examines four critical areas—migration, security, costs, and visibility—where CIOs can make major differences in the successful execution of hybrid cloud strategies. We’ve listed 20 fundamental questions CIOs can discuss with both their internal deployment groups and their external CSP/system integrator in preparation for a migration to or an expansion of hybrid cloud services.
Tags : 
cloud privacy, cloud security, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Viavi Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.