hi def

Results 351 - 375 of 1111Sort Results By: Published Date | Title | Company Name

Fending off APTs from all fronts

Published By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar for a discussion on: • Advanced threats and their potential points of entry • Why Advanced Targeted Attacks will continue to confound organizations with even the best defenses • Methods, practices, and technologies to help quickly detect and respond to these advanced attacks
Tags : 
advanced threats, advanced targeted attacks, security, cybersecurity, it management, knowledge management, data management
    
ThreatTrack Security

File Fragmentation, SANs, NAS and RAID

Published By: Diskeeper Corporation     Published Date: Jun 08, 2007
This document will explain the behavior and benefit of implementing Diskeeper defragmentation software with intricate modern hardware technologies such as RAID, NAS and SANs. SANs, NAS devices, corporate servers, and even high end workstations and multimedia-centric desktops characteristically implement multiple physical disk drives in some form of fault tolerant disk striping (RAID).
Tags : 
san, sans, storage, raid, network attached storage, nas, storage management, defrag, defragment, defragmentation, fault tolerance, diskeeper, diskkeeper, disk keeper, storage area networks
    
Diskeeper Corporation

Finance Redefined Workday Global Finance Leader Survey

Published By: Workday     Published Date: Sep 13, 2018
Are you a finance leader looking to get on track with digitization? With insight from over 650 global finance leaders, this report examines the top priorities for financial transformation and provides a valuable road map for successfully redefining the finance function. Download the report now.
Tags : 
    
Workday

Finance Redefined Workday Global Finance Leader Survey

Published By: Workday     Published Date: Sep 13, 2018
Are you a finance leader looking to get on track with digitization? With insight from over 650 global finance leaders, this report examines the top priorities for financial transformation and provides a valuable road map for successfully redefining the finance function. Download the report now.
Tags : 
    
Workday

Finance Redefined Workday Global Finance Leader Survey

Published By: Workday     Published Date: Sep 14, 2018
Are you a finance leader looking to get on track with digitization? With insight from over 650 global finance leaders, this report examines the top priorities for financial transformation and provides a valuable road map for successfully redefining the finance function. Download the report now.
Tags : 
    
Workday

Financial Services Attack Economy

Published By: Akamai Technologies     Published Date: Sep 03, 2019
The attacks and tools being used against financial services organizations are part of a complex ecosystem. This may seem like an obvious statement at first glance. When you read most industry reports, they tend to focus on a single aspect of the whole ecosystem, as if it were unrelated to other types of attacks. To be honest, we’ve been just as guilty of having a myopic view of attack traffic as anyone else. We wanted to do something different for this report. Instead of looking at a single type of attack, we stepped back to look at attacks against banks, credit unions, trading companies, and other organizations that make up financial services as a whole. Most defenders only see a very small segment of the overall traffic, whether they’re the target or the vendor supplying defensive tools. The breadth of Akamai’s products and our visibility into a significant portion of Internet traffic allows us to research multiple stages of the attack economy.
Tags : 
    
Akamai Technologies

Finding Advanced Threats Before They Strike: A Review of Damballa Failsafe Threat Protection

Published By: Damballa     Published Date: Oct 03, 2014
In this paper, the SANS Institute reviews how Damballa Failsafe can be the last line of defense to alert you when devices have been compromised. • Eight detection engines produce fidelity in True Positives • Risk engines priorities response to infections that matter most
Tags : 
damballa, advanced threats, failsafe, true positives, risk engines, infections, security
    
Damballa

Firewall Buyer's Guide: The Definitive Guide for Evaluating Enterprise Network Firewalls

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Even with more advanced features and supposed higher throughput than ever before, firewalls are not able to keep up with modern demands or advanced threats. Users are more distributed than ever, and so is data. Threats are changing rapidly, and traditional defense mechanisms that rely on layered security do not work.
Tags : 
palo alto, enterprise network firewall, custom applications, traffic classification
    
Palo Alto Networks

First Principles for Network Defenders: A Unified Theory for Security Practiioners

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Great thinkers like Aristotle, Descartes and Elon Musk have said that, in order to solve really hard problems, you have to get back to first principles. First principles in a designated problem space are so fundamental as to be self-evident; so true that no expert in the field can argue against them. They are atomic. Experts use them like building blocks to derive everything else that is worth knowing in the problem domain. In this paper, I propose that the first principle for all network defenders is to prevent high-risk material impact to the organization.
Tags : 
palo alto, network defenders, security practitioners, security
    
Palo Alto Networks

Five Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware AirWatch     Published Date: Feb 21, 2017
This paper provides guidance for selecting and purchasing a digital workspace solution to enable your totally mobile workforce. Five buying decision considerations that directly impact the success of your mobile workspace strategy are discussed in detail. Download this whitepaper to access recommendations for the most critical specifications to help you in defining an effective digital workspace strategy for your environment.
Tags : 
    
VMware AirWatch

Five Important Buying Criteria to Enable a Totally Mobile Workforce

Published By: VMware Citrix     Published Date: Jan 23, 2018
This paper provides guidance for selecting and purchasing a virtual workspace solution to enable your totally mobile workforce. Five buying decision considerations that directly impact the success of your mobile workspace strategy are discussed in detail. Recommendations for the most critical specifications are given to help you in defining an effective virtual workspace strategy for your environment. The intended audience for this paper is enterprises seeking to empower a completely mobile workforce while enabling IT administrators to manage and secure their rapidly changing networks. IT decision-makers and lineof- business leaders alike will find the insights presented helpful for executing a mobile conversion strategy.
Tags : 
buying criteria, mobile, workforce, work solutions, vmware
    
VMware Citrix

Five Keys to Marketing Analytics Excellence

Published By: SAS     Published Date: Nov 04, 2015
How does marketing compare to a game of pool? Sometimes you hit a good shot – 9 ball corner pocket – like when you’ve marketed a product and your customer purchases it. But sometimes your shot misses, and you knock in your opponent’s ball. You could even knock your ball into the pocket, but mistakenly knock your opponent’s ball into a different pocket at the same time. Of course, you can’t predict everything in a game of pool – or in marketing. A campaign may reveal a weakness that sends customers scuttling to a competitor. A new product can cannibalize an existing product line. Customers could leave one of your legacy product lines to consume one of your newly launched products – perhaps causing you to lose some revenue. But unlike pool, it’s hard to observe and measure with the naked eye what’s happening in marketing. The way to improve your chances of success is to build a solid measurement plan that lets you define and measure diagnostic metrics.
Tags : 
sas, marketing analytics, data driven decision making, consumer behavior, marketing mix, networking, data management, business technology, data center
    
SAS

Five Myths of Cloud Computing

Published By: Sponsored by HP and Intel ®     Published Date: Nov 15, 2012
The IT industry has a habit of latching onto buzzwords and applying them everywhere. "Cloud" is no exception.So,to understand cloud computing, let's ground the conversation in some definitions.
Tags : 
intel, myth of cloud computing, amazon, salesforce, yahoo, mircrosoft, cloud computing myths, business technology
    
Sponsored by HP and Intel ®

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Published By: Cisco     Published Date: Aug 24, 2015
Download this white paper to see why securing the data center requires a solution that can: -Provide visibility and control over custom data center applications -Handle asymmetric traffic flows and application transactions between devices and data centers -Adapt as data centers evolve: to virtualization, software-defined networking (SDN), network functions virtualization (NFV), Cisco -Application-Centric Infrastructures (ACIs) and beyond -Address the entire attack continuum: before, during, and after an attack -Integrate with security deployed across the entire network -Support geograpically dispersed inter-DC traffic and deployments, including private, public and cloud environments
Tags : 
data center security, traditional security, functionality, virtualization, visibility, sdn, nfv, acis, networking, security, it management
    
Cisco

Five Steps to Better People Analytics

Published By: Workday     Published Date: Mar 02, 2018
Artificial intelligence (AI) and machine learning are redefining business analytics. But for HR, use cases can be much more complex. Learn five key steps to build a strong foundation for answering HCM questions today and position yourself to use AI in HR going forward.
Tags : 
artificial intelligence, hcm, five steps
    
Workday

Five Steps to Better People Analytics

Published By: Workday     Published Date: Oct 11, 2018
Artificial intelligence (AI) and machine learning are redefining business analytics. But for HR, use cases can be much more complex. Learn five key steps to build a strong foundation for answering HCM questions today and position yourself to use AI in HR going forward.
Tags : 
    
Workday

Five Steps to Better People Analytics

Published By: Workday     Published Date: Jan 09, 2019
Artificial intelligence (AI) and machine learning are redefining business analytics. But for HR, use cases can be much more complex. Learn five key steps to build a strong foundation for answering HCM questions today and position yourself to use AI in HR going forward.
Tags : 
    
Workday

Five Tips to Prepare Your Storage Environment for Higher-Quality Video

Published By: Quantum     Published Date: Mar 16, 2017
The increasing availability of 4K/ultra-high-definition (UHD) TVs, computer displays, and cameras is driving the adoption of new, higher-quality video specifications for video production. To create more immersive, engaging experiences, video producers are capturing and generating content with greater resolution, frame rates, dynamic range, color depth, and color gamut.
Tags : 
    
Quantum

Focus Experts Guide to IT Security: Unified Threat Management

Published By: Focus     Published Date: Feb 09, 2011
Discover the primary vendor solutions and decision factors that must be considered when selecting a Unified Threat Management product to provide network defense.
Tags : 
network security, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention
    
Focus

Forbes Paper - Intelligent Automation: How AI and Automation Are Changing the Way Work Gets Done

Published By: Group M_IBM Q119     Published Date: Mar 05, 2019
For years, executives have been automating for efficiency, freeing workers from repetitive tasks, streamlining the back office and looking for cost savings. Now, they are exploring intelligent automation to establish thinking processes—processes that communicate realtime insights to employees, customers and partners across an expanding ecosystem. The ability to add intelligence to automation opens a new universe of possibilities that will have a profound impact on the way organizations operate and the way work gets done. More than anything else, intelligent automation will be a defining factor for the future workforce.
Tags : 
    
Group M_IBM Q119

Forrester E-Discovery Interview: Preparing for Tomorrow’s Archive

Published By: Mimecast     Published Date: Oct 11, 2018
e-Discovery remains a top driver for investment in archiving technologies. The need to reduce legal cost and risk is growing. But meeting e-discovery and compliance demands quickly and defensibly is difficult for most organizations. This short Q & A, “Preparing for Tomorrow’s Archive?” features Forrester’s Principal Analyst, Cheryl McKinnon and will help you understand the key features you should look for when planning your litigation readiness strategy.
Tags : 
    
Mimecast

Forrester Paper: Welcome To The Era of Digital Intelligence

Published By: Teradata     Published Date: Jun 12, 2013
Because subpar analytics put customer relationships at risk, Forrester is redefining the modern practice of web analytics as "digital intelligence." This new approach to analytics brings a set of expanded requirements and calls on firms to consider their technology frameworks, organizational structures, metrics, and optimization practices.
Tags : 
web analytics, data driven marketing, digital intelligence
    
Teradata

Foundation for Open Cloud Infrastructure

Published By: Oracle APAC     Published Date: May 24, 2018
Enterprises are rapidly embracing cloud services to speed innovation and drive cost savings. The most innovative IT organizations in these enterprises are shifting to software-defined “virtual data centers” that connect, aggregate, and configure public and private computing resources in unprecedented ways. These IT organizations use open private cloud infrastructure within a corporate data center or at a hosting site (managed cloud services) in conjunction with public cloud services to meet all their business requirements.
Tags : 
    
Oracle APAC

Four Steps to Effectively Protecting Your Organization from Phishing Attacks

Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.