post

Results 101 - 125 of 463Sort Results By: Published Date | Title | Company Name
Published By: Splunk     Published Date: Aug 21, 2018
SIEM (security information and event management) software offers a lot of promise, but legacy SIEMs simply can't keep up with the rate and sophistication of today's cyberattacks. Organizations today require access to analytics-driven SIEMs that combine a big data platform that is optimized for machine data with advanced analytics, threat detection, monitoring tools, incident response tools and multiple forms of threat intelligence. Download your complimentary copy of “The Six Essential Capabilities of an Analytics-Driven SIEM” and learn how to dramatically improve your security posture, advanced threat detection and incident response.
Tags : 
    
Splunk
Published By: Gigamon     Published Date: Dec 13, 2018
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now. 
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
CyberEdge Group’s sixth annual Cyberthreat Defense Report reveals how IT security professionals perceive the security posture of their organizations, the challenges they face in establishing effective cyberthreat defenses, and the plans they have to overcome those challenges. Read on to learn about some of the key findings from this year’s report.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 11, 2019
CyberEdge Group’s sixth annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a survey of 1,200 IT security decision makers and practitioners conducted in November 2018, the report delivers countless insights IT security teams can use to better understand how their perceptions, priorities, and security postures stack up against those of their peers. Notable Findings ? Cyberthreat trifecta. Of 11 categories of cyberthreats, malware is the greatest concern for responding organizations, followed closely by phishing and ransomware (see Figure 1). ? Healthy security budgets. The average security budget is increasing 4.9% in 2019 and represents 12.5% of an organization’s overall budget for IT. ? Threat hunting obstacle. The top inhibitor to achieving effective threat-hunting capabilities is the difficulty organizations are having implementing or integrating related tools. ? Security’s mos
Tags : 
    
Gigamon
Published By: IBM APAC     Published Date: Mar 06, 2019
A cyber resilient enterprise is one that can prevent, detect, contain and recover from a myriad of serious threats against data, applications and IT infrastructure. The Ponemon Institute and IBM surveyed more than 2,848 IT and IT security professionals from around the world and released the findings of the third annual study on the importance of cyber resilience for a strong security posture.
Tags : 
    
IBM APAC
Published By: Juniper Networks     Published Date: Sep 26, 2019
"This Ovum white paper is sponsored by Juniper Networks. It reveals that organisations need to update and upgrade their cybersecurity postures to defend themselves against today's threats. More than 80% of organisations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. Over the past two years, there has been a global infestation of ransomware attacks, which have wrought destruction across a growing number of businesses. Crypto-jacking, attacks on critical infrastructure, and data exfiltration are now commonly affecting businesses and consumers alike. The financial impact of these attacks is increasing rapidly and has already cost some organisations hundreds o
Tags : 
    
Juniper Networks
Published By: Workday DACH     Published Date: Jul 05, 2019
"Eine Aktualisierung Ihres ERP-Systems kann in diesen Zeiten des disruptiven Wandels für Ihr Unternehmen überlebenswichtig sein. Diese Gartner-Studie bietet praktische Tipps für IT-Führungskräfte, die mit dem hohen Innovationstempo Schritt halten wollen, beispielsweise durch Definition von ERP-Strategiezielen und Einsatz von KI mit Mehrwert für das Unternehmen. Jetzt lesen."
Tags : 
belegschafts technologie, digitale strategie
    
Workday DACH
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jan 31, 2019
LTI built a transaction monitoring cognitive data lake to facilitate AML transaction monitoring across post trade transactions for a leading global bank, which resulted in reduction of human errors by 30% and TAT improvement by 50%. Download Complete Case Study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Mar 28, 2019
Leading medical devices company were facing business continuity post acquisition, thereby increasing maintenance costs accordingly. LTI proposed to implement Oracle Fusion Cloud which helped in faster and minimal requirement of technical manpower. Download complete case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Fujitsu     Published Date: Feb 26, 2018
Communities rely on their local policemen and policewomen to keep them safe, protect their property and preserve the peace. But few citizens really understand the dangers that officers face every day, especially patrolling and answering calls in vehicles or on foot. While their training provides them with tactics and procedures, situations and individuals are unpredictable. From accidents to health emergencies, domestic violence to theft and assaults, police must perform in high-stress, volatile environments and make the right decisions in seconds. And in today’s digital world, everything they do may be recorded and posted online. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
public, safety, mobile, solutions, police, fujitsu
    
Fujitsu
Published By: RelayHealth     Published Date: Apr 01, 2013
Statements can be a great opportunity to improve the patient experience and expedite collections, or they can lead to frustrated patients, lower self-pay revenue and increased bad debt. As pioneers of the healthcare industry’s patient-friendly initiative nearly 10 years ago, RelayHealth continues to research and innovate. Its most recent patient focus group provided input on how statement design impacts their satisfaction with the hospital, post-discharge experience and willingness to pay. Learn the critical components to creating patient statements that get results and help compel patients to pay: Download the 10 Keys to Creating Engaging Patient Statements today.
Tags : 
statements, patient statements, healthcare, collection, patient experience
    
RelayHealth
Published By: RelayHealth     Published Date: Apr 01, 2013
Many hospitals are implementing patient engagement strategies to help improve care outcomes and engaging financially with patients can also yield significant benefits for patients and providers. Financial patient engagement includes educating and communicating with patients at every point in the revenue cycle – pre-service, point of service and post-service – to facilitate higher collections and help improve patient satisfaction. Because these points in the revenue cycle stretch across many departments such as patient access, financial services, call centers and third-party collection agencies, a single, integrated solution that connects all parties involved and provides comprehensive data is critical.
Tags : 
healthcare, patient engagement, financial, collection, revenue, revenue cycle management, patient satisfaction
    
RelayHealth
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Ransomware is the fastest growing malware threat today. Utilize these security best practices and risk mitigation strategies to improve your overall security posture. Discover how to: • Reduce risk of ransomware • Get immediate protection against attacks • Prevent malware from spreading laterally To find out how to keep your business protected, we recommend Ransomware Defense For Dummies.
Tags : 
    
Cisco Umbrella EMEA
Published By: IBM     Published Date: Sep 06, 2018
General Data Protection Regulation (GDPR) represents a paradigm shift in the way companies across the globe must approach protecting personal data. As of May 2018, EU data subjects now have greater autonomy than ever before over how their personal information is collected, stored and shared – and the repercussions for companies that fail to comply will be significant. At the heart of the matter lies Data Security and Protection. Protect the personal data, and you are well on your way to tackling many of the challenges the GDPR presents. But this is no easy task – before you protect your data, you must understand it, and even once you’ve achieved these goals, continually re-evaluate your data privacy and protection posture to adapt to changes in this dynamic environment.
Tags : 
    
IBM
Published By: ADP     Published Date: Oct 05, 2012
In this whitepaper, ADP provides valuable insight into the past, present and future status of the economic market with regard to the specific concerns of midsized business owners today versus four years ago.
Tags : 
economy, economics, smb, midsized business owners, business concerns, compliance, government regulations, human capital management
    
ADP
Published By: ADP     Published Date: Oct 10, 2012
In this whitepaper, ADP provides valuable insight into the past, present and future status of the economic market with regard to the specific concerns of midsized business owners today versus four years ago.
Tags : 
economy, economics, smb, midsized business owners, business concerns, compliance, government regulations, human capital management
    
ADP
Published By: MarkLogic     Published Date: May 16, 2017
Getting data from today’s television and film production and post-production workflows may seem like you’re moving through molasses. Mired in manual processes, attempting to manage and automate data during the creation stage of your content’s lifecycle can sometimes feel like a losing battle as the demands of creatives constantly move forward. Hear Lulu Zezza, Physical Production Executive for New Regency Productions, Matt Turner, Media & Entertainment CTO, MarkLogic, and Guy Finley, Executive Director, Media & Entertainment Strategic Alliance (MESA) as they discuss: o Metadata’s value and its evolution, beyond delivery and experiences, to harnessing critical production data o Results of taking a new approach to bring this data together with context and meaning that impacts other business unit roles o How the New Regency team created a software driven production data hub that is enabling creatives to work seamlessly on the project, in a comfortable UI/UX driven environment, with e
Tags : 
    
MarkLogic
Published By: Vectra Networks     Published Date: Aug 03, 2015
The data in this report is based on metadata from Vectra customers and prospects who opted to share detection metrics from their production network environments.
Tags : 
post intrusion report, metadata, network threats, network security management, it security, botnet monetization, data exfiltration, security management, best practices, advanced persistent threat, apt, ids, ips, malware, security insight, threat landscape, application security, hacker detection, internet security, intrusion detection
    
Vectra Networks
Published By: Rackspace     Published Date: Apr 17, 2018
Controlling cloud costs is a leading challenge for enterprises at each stage of their cloud journey. Fortunately, companies utilizing a public cloud can benefit from the strategic partnership between Google and Rackspace. Google Cloud Platform is a state-of-the-art, cost-friendly public cloud, and Google has selected Rackspace as its first managed services provider for GCP, based on Rackspace’s vast cloud expertise and dedication to a fanatical customer experience. With Managed GCP by Rackspace, companies can maximize their cost savings on Google Cloud while also saving on hiring, training and retaining top talent to operate their cloud operations. In this post we will focus on the ten most significant cost-saving opportunities.
Tags : 
    
Rackspace
Published By: Determine (Selectica)     Published Date: Sep 13, 2016
Something odd happened during Selectica’s roll-up strategy. Usually when a technology vendor acquires a number of providers at relatively low valuations, its focus tends to be on financially engineering the various SaaS, maintenance, upsell and other income schemes from the assets. But in Selectica’s case, the acquired became the basis of the company, in a manner in which the sum of the assets became an entirely different equation that it likely even bargained for before getting into the activity in the first place. But sometimes the uncertainty of post-merger integrations can lead to an outcome that benefits all parties involved (including customers) in ways that would be difficult to have imagined going into the process.
Tags : 
    
Determine (Selectica)
Published By: Secureworks     Published Date: Oct 04, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organization’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
    
Secureworks
Published By: Lookout     Published Date: Sep 25, 2017
“We don’t have a BYOD programme.” This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they aren’t actually subject to cyber-threats from mobile devices because, simply, they don’t currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.