gates

Results 1 - 25 of 76Sort Results By: Published Date | Title | Company Name
Published By: Sage Software     Published Date: Nov 12, 2018
Sage Business Cloud Enterprise Management offers you a comprehensive, real-time solution that delivers accurate, up-to-date data that identifies and mitigates the consequences of product recalls and other supply chain issues. With Sage Business Cloud Enterprise Management, your food and beverage business will have a faster, simpler and flexible way to keep the costs and reputational damage of recalls to a minimum.
Tags : 
    
Sage Software
Published By: Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
Cylance
Published By: DocuSign UK     Published Date: Nov 06, 2018
"With every week that passes, our dependency on paper wanes as digital processes are introduced into every aspect of our daily activity. If you want to sign a contract, book a restaurant or make a bank transfer, you can do so digitally it is ingrained in our lives. Taking an entire business digital can be more challenging and reliant on many more moving parts. Identifying how businesses are evolving to meet these rapidly changing demands is essential for decision makers across all sectors of the economy to prepare their organisation or department accordingly to undertake successful digital transformations. This eBook investigates digital expectations from both the consumer and business perspectives. It identifies what action is being taken to meet the demand in the market and where the main challenges lie for businesses that are trying to deliver the digital experience their customers want."
Tags : 
    
DocuSign UK
Published By: CA Technologies     Published Date: Jan 09, 2015
This paper investigates the threat of session hijacking and the solution developed by CA to address the security threat.
Tags : 
web application delivery, session hijacking, security, ca single sign-on, application security, policy based management, security policies, single sign on, application integration, risk management, system management software
    
CA Technologies
Published By: Websense     Published Date: Jan 25, 2013
Websense Security Labs discovers and investigates todays advanced security threats and publishes its findings. This information is used not only to inform the public, but also to inform the ongoing development by Websense of sophisticated security.
Tags : 
websense threat report, security, websense, sophisticated security, web security, phishing, it management, data management, data center
    
Websense
Published By: IBM APAC     Published Date: Jul 09, 2017
This Knowledge Brief investigates the impact of a data lake maintained in a cloud or hybrid infrastructure.
Tags : 
data lake, cloud, hybrid
    
IBM APAC
Published By: SAP     Published Date: Dec 04, 2015
This report investigates the organisational measures companies must take to address the totality of the risks they face. The report is based on interviews with the following executives and experts.
Tags : 
risk management, risks, cfo, finance executives, holistic risk management
    
SAP
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
From the Era Before security to this current era of empowerment this infographic from BlueCoat provides a timeline navigates the rise of web commerce and the rise in securities which protect us. Starting with when web commerce began to grow and hackers took notice to now when Web Security is able to empower businesses.
Tags : 
idc, security, bluecoat, web security, hackers, application security, email security, hacker detection, internet security, web service security
    
Blue Coat Systems
Published By: BMC Software     Published Date: Jun 25, 2013
Large gaps and loss of productivity challenge the value, agility and cost of IT across the globe. Exploring Business and IT Friction: Myths and Realities, outlines key issues that cause friction between business users and IT, such as: Gaps in customer satisfaction and the perceived value of services Inadequate IT support, which decreases productivity and revenue Lack of communication and ownership in how business users and IT work together to identify service levels and technology needs See what 900 business and IT professionals had to say and get recommendations for change.
Tags : 
bmc, productivity, it support, customer satisfaction, technology, it management, enterprise applications, data management
    
BMC Software
Published By: Oracle     Published Date: Aug 08, 2013
Increasing revenue while managing costs is a constant challenge for sales executives. Hiring more salespeople is often not an option. This free sales resource kit investigates some of the challenges facing todays sales teams and ways in which sales can be optimised by using Oracle Sales Cloud to improve sales planning, coaching, prospecting and productivity. Download this free online resource tool to access videos, demos and whitepapers to see how you can sell smarter today.
Tags : 
sales cloud, revenue, sales executives, oracle, sales, knowledge management, data management
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Increasing revenue while managing costs is a constant challenge for sales executives. Hiring more salespeople is often not an option. This free sales resource kit investigates some of the challenges facing todays sales teams and ways in which sales can be optimised by using Oracle Sales Cloud to improve sales planning, coaching, prospecting and productivity. Download this free online resource tool to access videos, demos and whitepapers to see how you can sell smarter today.
Tags : 
sales cloud, revenue, sales executives, oracle, sales, enterprise applications
    
Oracle
Published By: Gates     Published Date: Aug 12, 2011
Field redesigns point the way to next-generation machines. This paper includes case studies showing how conversions from roller chain or gears to synchronous belt drives improved performance while saving maintenance and replacement costs.
Tags : 
gates, power transmission, engineering, oe manufacturing, field retrofits, field redesigns, drive designs, drive systems, designing drives, roller chains, gears, belt drives, v-belts, synchronous belt drives, retensioning, maintenance, energy efficiency, poly chain belts, poly chain gt carbon belt drive, powergrip belts
    
Gates
Published By: CAST     Published Date: May 06, 2013
Through the analysis of 496 Java EE applications, this report investigates the impact of Java EE frameworks on the structural quality of applications. Download the report to learn more.
Tags : 
java ee, applications, application quality, java ee framework, cast software
    
CAST
Published By: ADP     Published Date: Oct 25, 2017
What do Bill Gates, Michael Jordan, and Margaret Thatcher have in common? Each gives valuable insight into what makes a great leader.
Tags : 
    
ADP
Published By: Pure Storage     Published Date: Oct 09, 2017
Semiconductors run and connect todays technology-driven world, powering all the electronic systems and products around us. Critical to communication, entertainment, work, medical diagnoses, travel, socializing, and making new discoveries, these specialized chips are ubiquitous. And chip designs grow ever more sophisticated in order to power new generations of devices, computers, the Internet, and the cloud. To enable new applications and use cases like the Internet of Things semiconductor vendors have continually pushed the boundaries of their designs to accommodate new fabrication processes that make chips smaller, more power efficient (to make personal devices last longer), and able to pack more gates into smaller dies (to make them more powerful).
Tags : 
verification, storage, customer, innovation, management, pure storage
    
Pure Storage
Published By: Dell EMC     Published Date: Apr 18, 2017
A Pathfinder paper navigates decision-makers through the issues surrounding a specific technology or business case, explores the business value of adoption, and recommends the range of considerations and concrete next steps in the decision-making process.
Tags : 
hci, hyperconverged infrastructure, storage, hybrid
    
Dell EMC
Published By: Rackspace     Published Date: Aug 15, 2018
The cloud was supposed to open the floodgates of innovation. The reality, however, is that even in the cloud era, IT spends most of its time on routine maintenance. Discover how IT can spend less time operating and more time innovating by confronting the skills gap.
Tags : 
    
Rackspace
Published By: Forcepoint     Published Date: Aug 31, 2018
Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, its probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Enterprise-grade SD-WAN connectivity. Deploy and operate connections between more than 1,000 sites from a single console Security. Top-rated security that doesnt impede performance and reliability Ease of Deployment and Operation. Built specifically for true, centralized manageability, even at enterprise scale Future-Proof Agility and Flexibility. Adapts to different environments seamlessly Read Modernizing the Distributed Enterprise Network and take the first step toward true network efficiency.
Tags : 
    
Forcepoint
Published By: IBM     Published Date: Jan 27, 2017
Companies today increasingly look for ways to house multiple disparate forms forms of data under the same roof, maintaining original integrity and attributes. Enter the Hadoop-based data lake. While a traditional on-premise data lake might address the immediate needs for scalability and flexibility, research suggests that it may fall short in supporting key aspects of the user experience. This Knowledge Brief investigates the impact of a data lake maintained in a cloud or hybrid infrastructure.
Tags : 
    
IBM
Published By: Arbor     Published Date: Feb 07, 2013
How the Arbor Security Engineering & Response Team (ASERT) Discovers, Analyzes and Mitigates DDoS Attacks
Tags : 
arbor, ddos attacks, botnet
    
Arbor
Published By: IBM     Published Date: Oct 09, 2012
This whitepaper contains a study that investigates how organizations around the world are managing their reputations in today's digital era, where IT is an integral part of the organization and IT failures can result in reputational damage.
Tags : 
it risk management, security, it threats, corporate reputations
    
IBM
Published By: K2     Published Date: Aug 24, 2015
This white paper follows the story of Kim, head of the IT department for a large financial-services company, as she navigates the transition from Microsoft SharePoint 2010 to SharePoint 2013. Kim cant wait to use the latest SharePoint technology, but she also knows shell need a third-party solution to expand the capabilities of SharePoint. She needs a solution that helps increase mobility, flexibility and collaboration between departments within her company.
Tags : 
    
K2
Published By: Symantec     Published Date: Dec 13, 2017
By 2021, cyber attacks are expected to cause $6 trillion in damages worldwide. To combat, spending is predicted to hit $1 trillion between 2017 and 2021. Attackers benefit from an infinite amount of time and tactics at their disposal, as they work to get around the typical static network and endpoint defenses organizations put in place. Deception can complement endpoint and network defenses, adding dynamic security mechanisms that can be customized for every environment to take the attackers advantage away. While endpoint and network security protects you from being compromised, deception mitigates the effects of a compromise by detecting it early and identifying the attacker intent which helps coordinate a faster and better response. Read this white paper to find out more.
Tags : 
deception, endpoint, network, security, protection, breach, attack, symantec
    
Symantec
Published By: OC Tanner     Published Date: Nov 16, 2016
The concept of wellness in the workplace is relatively new and many companies are actively creating wellness programs to improve the lives of their employees. However, the exact definition of wellness remains unclear and inconsistent across organizations. Global research conducted by The O.C. Tanner Institute helps establish a definition of employee wellbeing. This paper explains the large benefits in store for companies that are able to improve their employees wellbeing and explores why this trend is relevant in the workplace today. It describes, in detail, what companies can do to improve the large portion of life spent at work and, more specifically, investigates how the benefits and perks currently offered at work impact wellbeing and where they fall short.
Tags : 
rewards and recogntion, employee engagement, employee recognition, oc tanner, global engagement, global recognition
    
OC Tanner
Published By: Cisco     Published Date: Jul 08, 2016
Whirlpool Corporation had to transform its business. A legacy network stood in the way. Read more to learn how standardization on a Cisco platform opened innovation floodgates.
Tags : 
    
Cisco
Start   Previous   1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.