post

Results 126 - 150 of 462Sort Results By: Published Date | Title | Company Name
Published By: Secureworks     Published Date: Oct 04, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organizations security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
    
Secureworks
Published By: Lookout     Published Date: Sep 25, 2017
We dont have a BYOD programme. This statement, referencing mobile device usage in the workplace, is a refrain often heard in European organisations that are tasked with securing the privacy of highly confidential data and personally identifiable information, and managing employee authorisation and access to that data. However, businesses often believe that they arent actually subject to cyber-threats from mobile devices because, simply, they dont currently allow personal mobile devices to access their networks. Ultimately, this posture puts data at risk because every company has a BYOD policy whether they like it or not.
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 11, 2018
There are three key statements enterprises must hear in order to move forward in protecting corporate resources from leakage and attack: The perimeter has disappeared. Legacy security technologies do not work. Devices cannot be trusted. A new security architecture is needed to protect data as employees and devices connect to corporate resources in the cloud, all over the world. That architecture is post-perimeter security. Read this whitepaper to: Learn why perimeter security is not longer viable Understand the new, necessary security architecture: post-perimeter security Learn how phishing attacks are thwarting traditional firewalls Find out how Lookout enables enterprises to embrace post-perimeter security in their own environments
Tags : 
    
Lookout
Published By: Carbon Black     Published Date: Apr 10, 2018
With breaches today often going undetected for months or years, many organizations must now accept the very real possibility that intruders have already compromised their systems, regardless of the organizations security posture. Today, compromises are measured in minutes and the speed of response is measured in days. Enterprises the world over are realizing that to close the gap, they need to evolve their security operations from being a largely reactive unit (waiting for alerts that indicate a threat) to being proactively on the hunt for new attacks that have evaded detection. When an incident does occur, the speed of your response will dictate the extent to which you can minimize the impact. In the case of a malicious attack, it takes on average over 7 months to identify a breach, and nearly two and a half additional months to contain the incident. Every second counts, and while the clock is ticking, the cost of the breach is rapidly increasing as well. Breaches that take over 3
Tags : 
    
Carbon Black
Published By: Spredfast     Published Date: Aug 24, 2018
Learn more about how Live Nation used Spredfast to bridge social gaps by creating an environment of seamless collaboration between the central and local marketers.
Tags : 
social media manager, social media management tools, social media tools, social media agency, social media management company, social media marketing companies, best social media management tools, social media marketing agency
    
Spredfast
Published By: Illusive Networks     Published Date: Apr 10, 2019
How well-equipped is your organization to stop malicious attackers once theyre inside your network? According to this study of over 600 IT security professionals, almost two-thirds of respondents lack efficient capabilities to detect and investigate stealth attackers before serious damage occurs. Download the report to learn the primary obstacles to better threat detection and incident response, how well organizations are hardening their environments against lateral movement, and how cybersecurity budgets are changing to address the reality that attackers will get in.
Tags : 
risk management, it security, ponemon institute, ponemon, cybersecurity, research report, cyber attack, data breach
    
Illusive Networks
Published By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to analyzing and mitigating the risks of migrating to PostgreSQL. With the ongoing shift towards open-source database solutions, its no surprise that PostgreSQL is the fastest growing database. While its tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. A key decision criteria for adopting any technology is whether it can support requirements for existing applications while also fitting into longer term strategies and needs. The first section of this eBook provides a detailed analysis of all aspects of migrating from legacy and commercial solutions to PostgreSQL: ? Schema and code migration ? Data migration ? Application code migration ? Testing and evaluation
Tags : 
    
Stratoscale
Published By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to Day One challenges of deploying, managing and monitoring PostgreSQL. With the ongoing shift towards open-source database solutions, its no surprise that PostgreSQL is the fastest growing database. While its tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. An effective monitoring and logging strategy is critical for maintaining the reliability, availability, and performance of database environments. The second section of this eBook provides a detailed analysis of all aspects of monitoring and logging PostgreSQL: ? Monitoring KPIs ? Metrics and stats ? Monitoring tools ? Passive monitoring versus active notifications
Tags : 
    
Stratoscale
Published By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to Day Two challenges of accelerating large-scale PostgreSQL deployments. With the ongoing shift towards open-source database solutions, its no surprise that PostgreSQL is the fastest growing database. While its tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. After a PostgreSQL deployment is live, there are a variety of day-two scenarios that require planning and strategizing. The third section of this eBook provides a detailed analysis of all aspects accelerating large-scale PostgreSQL deployments: ? Backups and Availability: strategies, point-in-time recovery, availability and scalability ? Upgrades and DevOps: PostgreSQL upgrade process, application upgrades and CI/CD
Tags : 
    
Stratoscale
Published By: Stratoscale     Published Date: Feb 01, 2019
This eBook offers a practical hands-on guide to deploying, managing and scaling PostgreSQL in various environments, in the public cloud and on-premises. With the ongoing shift towards open-source database solutions, its no surprise that PostgreSQL is the fastest growing database. While its tempting to simply compare the licensing costs of proprietary systems against that of open source, it is both a misleading and incorrect approach when evaluating the potential for return on investment of a database technology migration. The eBook provides a detailed analysis of planning, day-one, and day-two challenges of PostgreSQL deployments, in the context of potential operating environments: ? Public cloud ? Private cloud ? Private DC (bare metal / VM)
Tags : 
    
Stratoscale
Published By: Genesys     Published Date: Feb 08, 2019
Warum gerade mittelstndische Unternehmen ein cloudbasiertes Contact-Center whlen sollten Die Kundenerwartungen steigen stndig. Inzwischen mchten Kunden jederzeit und von jedem Ort mit Unternehmen kommunizieren. Einige bevorzugen Chat, andere sind in sozialen Medien aktiv und erwarten prompte Antworten auf ihre Posts. Und wiederum andere mchten alles von ihren Mobilgerten aus erledigen. Sie erwarten zudem einen Service, der sowohl konventionelle als auch neue Kanle untersttzt.
Tags : 
    
Genesys
Published By: Oracle     Published Date: Nov 14, 2016
Saper estrarre le informazioni salienti da una massa stata per molto tempo una prerogativa di pochi. Ora non pi. Oggi non pi possibile per un piccolo gruppo di persone gestire il volume di dati disponibili, come non pi possibile immaginare tutte le domande a cui si vuole trovare risposta.
Tags : 
    
Oracle
Published By: Drillinginfo     Published Date: Nov 18, 2015
The Bakken is a very large hydrocarbon-bearing subsurface rock formation underneath a large portion of the Williston Basin in North Dakota, Montana, Saskatchewan and Winnepeg. The Bakken has been the scene of many advancements in drilling technology horizontal drilling, pad drilling and downspacing, to name a few. This first Edition of the DI Expert eBook by Drillinginfo, the premier provider of data and insights for oil and gas exploration decisions, is a collection of articles posted by our staff of engineers, analysts and geologists about the Bakken over the past year.
Tags : 
geologists, downspacing, innovations, oil, gas exploration, drilling
    
Drillinginfo
Published By: Forcepoint     Published Date: May 16, 2016
The financial and legal ramifications of the high-profile cyber-incidents that happened in the past year send an unmistakable message: data theft is too important for a board of directors not to be involved. The Cybersecurity and Data Theft Prevention report provides a non-technical overview every board of directors can use to assess their organizations security posture.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks, access control
    
Forcepoint
Published By: Gelato     Published Date: Jul 02, 2018
How far does your marketing material travel before your it gets into your customers hands? Or even your colleagues? What if it could have reached the moon first? That was the case for the annual posters sent by Hydro Extruded Solutions. With Gelato total shipping distances were easily cut 72%. Gelato presented a faster, greener, and smarter way to print and distribute their message one more step confirming Hydros commitment to sustainability. Download this info-graphic to learn more.
Tags : 
    
Gelato
Published By: Avaya     Published Date: Dec 18, 2013
Your contact center is a hotbed of activity, constantly processing calls and emails, chats and social media posts, problems and solutions. As a result, it generates the kind of big data that other departments wish they had. But collecting that data is just the beginning. The next step is turning it into a plan of action.
Tags : 
avaya, big data, contact center, social media, software development, it management, data center
    
Avaya
Published By: PitneyBowes     Published Date: Sep 21, 2010
Mailstream Consulting can help drive revenue growth and reduce costs by improving net response and generating process improvements that help eliminate waste.
Tags : 
pitneybowes, net response, pitney bowes management services, postage, mailing services, postal
    
PitneyBowes
Published By: PitneyBowes     Published Date: Sep 22, 2010
Focus on your most critical, high-value mail while streamlining the delivery of lower-value mail. As a result, your mail management volumes stay more in line with your budget.
Tags : 
pitney bowes precision mail services, simplified delivery, mailing services, postage, mail management
    
PitneyBowes
Published By: PitneyBowes     Published Date: Sep 22, 2010
Provide your business with pricing flexibility for fluctuating mail volumes.
Tags : 
pitney bowes precision mail services, financial services, volume based pricing, mailing cost, postage, pitney bowes management services, pbms, mail delivery
    
PitneyBowes
Published By: ServiceNow     Published Date: Aug 24, 2011
This white paper takes a look at the adoption and evolution of social IT within ServiceNow.
Tags : 
social it, social media, build relationships, improve service, collaboration, post it, tag it, tweet it
    
ServiceNow
Published By: ServiceNow     Published Date: Feb 07, 2012
Download the white paper to find out more about next-gen IT solutions - and how IT in the cloud will help your organization not only keep up with today's complex IT ecosystem, but manage it more efficiently than ever before!
Tags : 
powering, transformation, cloud, investments, integration, access data, performance, revolution
    
ServiceNow
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security
    
DigitalPersona UK
Published By: Spredfast, Inc.     Published Date: Oct 22, 2014
During the busy holiday season, it takes exceptional marketing to stand out from the crowd. Make a statement with social integrations that place your customer at the heart of your campaign. Its a timeless look. During the 2013 holiday season, luxury watch retailer Tourneau increased watch sales 57% by helping fans find the perfect gift with their omni-channel #TourneauKnows campaign. Just as in fashion, your brand should seek campaign inspiration further afield. Take a cue from tech sector giant, Cisco, who breathed new life into the banner ad by creating socially powered ad units. It was an arresting experience that aligned with readers of The Huffington Post, where the ads were displayed. If you are seeking new, innovative ways to capture your audiences attention this holiday seasonlook no furtherweve curated the top five social experiences for the holidays to inspire your efforts.
Tags : 
spredfast, holidays, social media, social experiences, creativity, instagram, daily deals, black friday
    
Spredfast, Inc.
Published By: SAP     Published Date: Nov 29, 2012
How are you perceived by your customers? In this age, on social media, your buyers are posting their opinions about your products and services. To better serve them, build your brand, and protect your position. How do you listen and understand?
Tags : 
sap, analytics, social media, customer experience, customer perception, brand positioning, brand equity
    
SAP
Published By: Visier     Published Date: Nov 04, 2014
Read an industry report or blog post on hot HR trends and technologies today, and you are bound to see workforce analytics near the top. Analysts and commentators agree: workforce analytics has become a must have tool for HR and a key component of delivering business value. But how do you get started with this complex topic? By thinking through the first four steps, you can develop the requirements to support the fifth step: selecting the right workforce analytics solution for your organization. Download this white paper, Five Steps to Getting Started with Workforce Analytics, to find out how you can simplify and accelerate your journey from HR metrics to workforce analytics.
Tags : 
visier, workforce analytics, hr metrics, planning
    
Visier
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.