post

Results 51 - 75 of 462Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched at best static and reactive. Current layers likely arent protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network and most importantly, your data from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
To keep your organization and your data safe, it is crucial to consider forward-thinking approaches to cybersecurity. In this e-book, we discuss how you can augment your existing infrastructure within the data center with security measures in the cloud for a more robust web security posture. We also share Akamais approach to cloud security as well as those of other vendors. We then take a closer look at some commonly used, but sometimes misleading, metrics so you can make more educated decisions about the best solutions for your needs.
Tags : 
cloud security, buyer's guide, data safety, cybersecurity
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors dont want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Navigating Uncertainty & Disruption in a Post-Brexit World Risk management and finance professionals are navigating an unprecedented period of uncertainty. In a post-Brexit world, how can business leaders best navigate disruption? Data has become the most valuable business commodity, but not all data is meaningful. Data that helps you uncover hidden associations with customers, partners and suppliers can be a true catalyst for business transformation and growth. In this ebook, we have mapped out the crucial steps in the journey towards operationalizing relationship data to: - Define Relationship Data - Use relationship data to unlock new opportunities - Apply relationship data across the organization to drive growth
Tags : 
    
Dun & Bradstreet
Published By: Oracle     Published Date: Feb 28, 2018
Per avere successo nella realt competitiva di oggi, le aziende devono svincolarsi dai limiti imposti dallinfrastruttura IT legacy. Lacquisto di hardware e la manutenzione di enormi data center per lesecuzione dei sistemi informatici appartengono al passato: la gestione e la manutenzione dellinfrastruttura sono semplicemente troppo costose. Un recente sondaggio di Gartner ha rivelato che oltre l80% dei CIO ritiene che lInfrastructure-as-a-Service (IaaS) sia unopzione perseguibile e il 10% degli stessi gi la considera la scelta predefinita per linfrastruttura. Lutilizzo di uninfrastruttura con un modello di servizio elastico e con pagamento in base al consumo non solo riduce i costi e le preoccupazioni, ma consente inoltre alle organizzazioni IT di dedicarsi allinnovazione per favorire la crescita aziendale.
Tags : 
ampio, accesso, risorse, misurabile, pubblico, privato, ibrido
    
Oracle
Published By: Oracle     Published Date: Mar 01, 2018
Per avere successo nella realt competitiva di oggi, le aziende devono svincolarsi dai limiti imposti dallinfrastruttura IT legacy. Lacquisto di hardware e la manutenzione di enormi data center per lesecuzione dei sistemi informatici appartengono al passato: la gestione e la manutenzione dellinfrastruttura sono semplicemente troppo costose. Un recente sondaggio di Gartner ha rivelato che oltre l80% dei CIO ritiene che lInfrastructure-as-a-Service (IaaS) sia unopzione perseguibile e il 10% degli stessi gi la considera la scelta predefinita per linfrastruttura. Lutilizzo di uninfrastruttura con un modello di servizio elastico e con pagamento in base al consumo non solo riduce i costi e le preoccupazioni, ma consente inoltre alle organizzazioni IT di dedicarsi allinnovazione per favorire la crescita aziendale.
Tags : 
ampio, accesso, risorse, misurabile, pubblico, privato, ibrido
    
Oracle
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors dont want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors dont want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Larsen & Toubro Infotech(LTI)     Published Date: May 30, 2019
Leading medical devices company were facing business continuity post acquisition, thereby increasing maintenance costs accordingly. LTI proposed to implement Oracle Fusion Cloud which helped in faster and minimal requirement of technical manpower. Benefits i. In-time Delivery with ZERO defects ii. Scalable products with low maintenance costs Download full case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Data breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some point a non-malicious or malicious data breach will occur, the focus of this study is to understand the steps organizations are takingor not taking--to deal with the aftermath of a breach or what we call the Post Breach Boom. Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches and what lessons are to be learned from the investigation and forensic activities organizations conduct following the loss or theft of sensitive and confidential information. The majority of respondents in this study believe it is critical that a thorough post-breach analysis and forensic investigation be conducted following either a non-malicious or malicious security breach.
Tags : 
data, non-malicious, malicious, ponemon, solera network, application security, encryption, internet security
    
Blue Coat Systems
Published By: VMWare - vFabric     Published Date: May 10, 2012
This solutions brief covers the modern data management products that are part of the VMware vFabric platform, including vFabric GemFire, vFabric SQLFire, vFabric Data Director and vFabric Postgres.
Tags : 
vfabric, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware
    
VMWare - vFabric
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors dont want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Akamai     Published Date: May 30, 2017
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premises infrastructure with security measures in the cloud for a more robust web security posture.
Tags : 
cybersecurity, cyber security, cloud security, cloud, csp, cloud security provider, infrastructure
    
Akamai
Published By: RSM US     Published Date: Feb 08, 2019
The Center For Literacy (CFL) is a Philadelphia, Pennsylvania based nonprofit organization that disrupts cyde of poverty by providing basic math, reading and English language skills to nearly 1,5000 adults,so they can succeed in the workplace in post secondary education.
Tags : 
    
RSM US
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against todays external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management
    
CA Technologies
Published By: Juniper Networks     Published Date: Oct 25, 2017
My name is Jonathan McCaffrey and I work on the infrastructure team here at Riot. This is the first post in a series where well go deep on how we deploy and operate backend features around the globe. Before we dive into the technical details, its important to understand how Rioters think about feature development. Player value is paramount at Riot, and development teams often work directly with the player community to inform features and improvements. In order to provide the best possible player experience, we need to move fast and maintain the ability to rapidly change plans based upon feedback. The infrastructure teams mission is to pave the way for our developers to do just that - the more we empower Riot teams, the faster features can be shipped to players to enjoy.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper Networks
Published By: Absolute Software     Published Date: May 31, 2016
The OCR conducts HIPAA audits of covered entities and their business associates and subcontractors. If HIPAA violations are discovered during these audits, the OCR will implement significant penalties. Additionally, since OCR is posting the details of every breach affecting 500 or more individuals on a public website1 , the organizations involved have become susceptible to class-action lawsuits.
Tags : 
best practices, business analytics, productivity, business intelligence, business management
    
Absolute Software
Published By: Riverbed     Published Date: Jul 17, 2013
Riverbed Cascade Shark provides continuous, high-speed packet capture to ensure that packet-level information is available when needed for granular, real-time and post-event forensic analysis. Based on high-performance 1GbE and 10GbE capture cards, Cascade Shark is capable of sustained line-rate, multi-gigabit per second recording of network traffic.
Tags : 
cascade shark, datasheet, riverbed, cascade, riverbed cascade, high-performance, sustained line-rate, network traffic
    
Riverbed
Published By: Socialbakers     Published Date: Jul 22, 2015
This report explores how the best pet food marketers have made targeted gains in Fan growth, engagement, and post efficiency.
Tags : 
social media, social, brand, social metrics, optimise content, engagement, social media engagement, content
    
Socialbakers
Published By: Socialbakers     Published Date: Jul 22, 2015
In this report, we delve into the way Dairy brands reach Fans and prospects on social media, examining what kinds of posts they make and seeing what Fans respond to most, to help your brand optimize your content for maximum engagement.
Tags : 
social media, social media engagement, engagement, brands, content strategies, deliver content, contact management, content delivery
    
Socialbakers
Published By: Zendesk     Published Date: Dec 10, 2018
No importa qual o tipo ou o horrio de operao da sua empresa: sua porta est sempre aberta. Atualmente, os clientes fazem perguntas a qualquer hora do dia ou da noite e esperam ser respondidos (desde que no demore muito). Isso representa um desafio para a maioria das empresas: como antecipar os canais que o cliente vai querer ou dos quais vai precisar? E como determinar se esses canais sero eficientes para a sua organizao? A resposta simples : sim, voc precisa. E este guia vai explorar exatamente isso. Os clientes querem entrar em contato com as empresas de vrias formas e esperam que cada interao com a marca seja consistente com as conversas que teve antes e as que ter depois. Aprenda como com a soluo omnichannel do Zendesk.
Tags : 
    
Zendesk
Published By: Zendesk     Published Date: Jan 04, 2019
No importa qual o tipo ou o horrio de operao da sua empresa: sua porta est sempre aberta. Atualmente, os clientes fazem perguntas a qualquer hora do dia ou da noite e esperam ser respondidos (desde que no demore muito). Isso representa um desafio para a maioria das empresas: como antecipar os canais que o cliente vai querer ou dos quais vai precisar? E como determinar se esses canais sero eficientes para a sua organizao? A resposta simples : sim, voc precisa. E este guia vai explorar exatamente isso. Os clientes querem entrar em contato com as empresas de vrias formas e esperam que cada interao com a marca seja consistente com as conversas que teve antes e as que ter depois. Aprenda como com a soluo omnichannel do Zendesk.
Tags : 
    
Zendesk
Published By: Q2 eBanking     Published Date: Jul 30, 2017
This report is intended to serve as a guide to an effective digital banking conversion/change management plan. From your initial kickoff meeting to post-launch, youll learn about the key components required for success. The framework is the result of interviews with Q2 personnel who have been personally involved in thousands of hours of digital banking conversions, across hundreds of FIs, with every major core banking system on the market over the course of the past twenty years.
Tags : 
    
Q2 eBanking
Published By: Shell U.K. Limited     Published Date: Jul 29, 2019
Entro il 2030, il mercato eolico offshore dovrebbe valere 30 miliardi di sterline all'anno. Passando rapidamente al 2050, si prevede che il settore contribuir per almeno un terzo alla fornitura globale di elettricit. Anche se questa una grande notizia per le aziende produttrici di energia elettrica, recenti ricerche hanno dimostrato che i costi associati alla manutenzione dei parchi eolici raddoppieranno tra il 2015 e il 2020. Assicurarsi un proprio posto nel futuro mix energetico, proteggere il valore e la potenza delle turbine eoliche attraverso una manutenzione efficace si riveler fondamentale per realizzare un vantaggio competitivo. Ci sono passi che possibile compiere ora, per ridurre i costi di manutenzione oggi e mantenerli bassi in futuro. Shell Omala S5 Wind 320 - olio per ingranaggi sintetico avanzato per turbine eoliche contribuisce a garantire un lavoro pi duro e pi lungo delle turbine eoliche, anche nelle condizioni pi difficili. Shell Omala S5 Wind 320 R
Tags : 
    
Shell U.K. Limited
Published By: Workday Spain     Published Date: Sep 20, 2018
En el actual entorno de TI, muchas organizaciones han adoptado un enfoque "cloud-first" en sus sistemas. Pero, con tantos proveedores ofreciendo soluciones SaaS, cmo saber cul le permitir disfrutar de las verdaderas ventajas del SaaS? Qu caractersticas de una solucin SaaS se deben tener en cuenta, y cul es su repercusin real en los negocios de hoy en da? En este documento tcnico gratuito descubrir: Qu es el verdadero SaaS y qu no. Cmo distinguir entre verdaderos proveedores de SaaS y los impostores. La cuestin de la seguridad del SaaS. Ahorro que pueden aportar las soluciones SaaS para su empresa. Si su empresa est preparada para cambiar al SaaS. Este documento ayudar tanto a profesionales de TI como a cualquiera que simplemente quiera conocer las nociones bsicas del SaaS.
Tags : 
    
Workday Spain
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.